Security

Security & Governance

T-REX AI OS is built for regulated operational environments where accountability, auditability, and access control are mandatory—not optional. Security is enforced at the system architecture level.

Security & Governance (Final Public Version)

Security is not marketing copy. It is a design constraint for every workflow inside the platform.

Governance Model

Authority is separated by design: Governance (Owner/Admin), Pricing (Estimator), Execution (Dispatch), Operations (Users). No role can exceed its mandate.

Access Enforcement

  • Server-side role validation on every request
  • No reliance on client-side controls
  • Company-scoped data isolation

Audit & Non-Repudiation

  • Append-only audit logs
  • Immutable records for approvals and compliance
  • Cryptographic verification of critical artifacts

Document Security

  • Encrypted storage
  • Signed, time-limited access
  • Versioned PDFs
  • No public file exposure

Compliance Integrity

  • Compliance records are Owner/Admin controlled
  • Snapshot-based and QR-verifiable
  • Immutable after issuance

Operational Reality

The system supports real-world workflows: Email attachments allowed, field uploads supported, bid documents and operational files preserved. Execution never blocks without visibility.

Audit-Ready by Default

The system withstands audits, disputes, and inspections by default. Field uploads, bid documents, and operational files are preserved, and every action is attributable.

Next steps

Need deeper evidence? Request full security documentation via support.

Contact Support
Type to search across contacts, deals, and tasks