Identity and access model

  • Role-based control across master, MSP, client, and employee scopes
  • Policy-aware access decisions with configurable approval paths
  • Tenant boundaries designed for multi-client operational safety

Audit and traceability

  • Operational logs and activity trails across all core modules
  • Export-ready reporting for review and governance workflows
  • Device and workflow events mapped to owners and next actions

MANPRA trust architecture

Application layer

Workforce, Surveillance, Access, and NetworkSearch run with role-scoped workflows and controlled module boundaries.

Policy enforcement layer

Policy rails define who can onboard devices, approve events, export reports, and close incidents.

Device trust layer

Device trust scoring and policy modes support allow, review, and restrict decisions before registration.

Data governance layer

Retention, audit trails, and access controls are designed for configurable regional policy requirements.

Regional deployment layer

Deployment zones support region-specific hosting strategy and architecture review for enterprise and partner teams.

Device trust scoring and policy modes

Architecture surface only. This flow demonstrates policy-controlled trust evaluation and does not claim certification or legal approval.

Customer Mode

Flexible onboarding with guided trust checks for commercial deployments.

  • Allow: Known protocol + stable heartbeat + acceptable risk score
  • Review: Unknown firmware baseline or intermittent trust drift
  • Restrict: Policy conflict or repeated security signal mismatch

Procurement Mode

Review-focused onboarding for procurement and IT architecture checks.

  • Allow: Documented protocol path and review-cleared vendor profile
  • Review: Missing deployment artifacts or unresolved policy exceptions
  • Restrict: Insufficient trust evidence for procurement gate

Regulated Mode

High-control mode for sensitive operational environments.

  • Allow: Explicit policy allowlist + verified trust profile
  • Review: New vendor fingerprint awaiting governance approval
  • Restrict: Restricted vendor policy hit or unresolved device integrity signal

Trust evaluation queue

DeviceVendor fingerprintProtocolTrust scorePolicy modeDecisionNext action
CAM-AL-14OEM-EDGE-A1RTSP + ONVIF events92/100Customer ModeTrustedAssign to Alpha Logistics camera lane
NVR-AL-02OEM-EDGE-R7Edge gateway relay74/100Procurement ModeReview requiredRun firmware and policy review checklist
ACCESS-ZE-06OEM-CTRL-C2Controller API + heartbeat sync88/100Regulated ModeTrustedProceed with zone assignment
CAM-AL-14: TrustedNVR-AL-02: Review requiredACCESS-ZE-06: Trusted

Data governance and regional deployment surfaces

India zone

India-first deployment lane for local operations and support teams.

Regional policy design, retention controls, and recovery posture

EU zone

European deployment-ready architecture for regional data governance requirements.

Scoped data placement, audit trails, and configurable retention

US zone

US deployment-ready posture for enterprise operating models and partner delivery lanes.

Identity controls, auditability, and governance review workflow

APAC zone

APAC multi-region strategy for distributed operations and growth-stage expansion.

Regional failover planning and policy-controlled deployment scope

Regions shown represent deployment-ready architecture zones. Final hosting and policy scope are defined per deployment plan.

Recovery and deployment posture

  • Backup and rollback planning designed for staged deployment safety
  • Migration flows include validation checkpoints before cutover
  • Support escalation model aligns severity with ownership and response lanes

Security and deployment statements represent supported architecture posture and implementation design; they are not certification claims.

Detailed compliance and onboarding documents are shared during verified enterprise discussions.

Security Architecture | MANPRA