Sentinel Decision Systems

Security

Sentinel Decision Systems is designed for enterprise security expectations. This page is an overview of our approach.

Data minimization

Sentinel can operate with redaction, hashing, and pointer-based retrieval patterns to reduce sensitive payload retention.

Encryption

Encryption in transit (TLS) and at rest. Key management options are available for enterprise deployments.

Access controls

SSO (SAML/OIDC), role-based access control, and audit logging to support governance and least-privilege workflows.

Deployment options

SaaS and single-tenant/private deployment models are supported to align with customer security requirements.

Security inquiries

For security questionnaires or assessment requests, contact: security@sentineldecision.com

Note: This page is informational and does not constitute contractual commitments.