| Access Integrity |
Unauthorized request rejection rate and key validation behavior. |
Prevent unauthorized simulation and data exfiltration. |
Verified |
| Evidence Integrity |
Hash-valid packet exports for simulation artifacts. |
Reproducible audit chain from request to output. |
Verified |
| Model Transparency |
Documented assumptions, confidence bounds, and known limits. |
Avoid overclaiming and reduce decision misuse. |
Verified |
| Operational Reliability |
Queue completion behavior, retry semantics, and stall recovery. See Operational Reliability Controls. |
Consistent production-grade job completion. |
Implemented baseline controls (watchdog + restart + deploy gates) |
| Enterprise Governance |
RBAC, release controls, incident runbooks, and SLO dashboards. See Enterprise Governance Controls. |
Procurement-ready security and compliance posture. |
Implemented baseline governance pack (runbooks + release controls + SLO cadence) |