Skip to main content
Security

Enterprise-Grade Security

Miradoris is built for environments where security is not optional. Critical infrastructure, energy systems, manufacturing floors. Every layer of the platform is designed with defense in depth, from blockchain-verified command provenance to human-machine safety attestation.

Authentication and access control

Authentication and access control

Role-based access control with fine-grained permissions at the resource level. SSO integration through SAML 2.0 and OpenID Connect. Multi-factor authentication enforced by default.

RBAC with per-resource permissions
SSO via SAML 2.0 and OIDC
MFA enforced for all operator accounts
API keys with scoped access and expiry
AES-256 encryption at rest
TLS 1.3 for all data in transit
Automatic key rotation
Tenant-isolated encryption keys
Data encryption

Data encryption

All data encrypted at rest using AES-256 and in transit using TLS 1.3. Encryption keys managed through a dedicated key management service with automatic rotation.

Blockchain-verified provenance

Blockchain-verified provenance

Every command in the system carries a cryptographic chain of custody. The issuing operator, the authorizing system, and the exact policies in effect at execution time are anchored to an append-only ledger. No command reaches a humanoid or device without a verifiable origin.

Cryptographic command origin chain
Operator identity attestation per action
Policy hash snapshot at execution time
Tamper-proof chain of custody for all instructions
Structured audit logs for every operation
Blockchain-anchored log integrity verification
Time Event Horizon for immutable event sealing
Event-sourced state reconstruction and replay
Audit logging and event integrity

Audit logging and event integrity

Multi-tier logging architecture capturing system events, operator actions, and autonomous decisions. Logs are anchored to a blockchain-backed ledger with a Time Event Horizon: once committed, events are cryptographically sealed and cannot be retroactively altered. Full event-sourced state reconstruction for forensics and compliance.

Human-machine collaboration safety

Human-machine collaboration safety

Where humans work alongside humanoids and autonomous systems, safety verification must be continuous and provable. Safety protocol attestations are recorded before any human-proximity operation begins. In the event of an incident, the blockchain record provides irrefutable proof of whether safety systems were active and compliant.

Safety protocol attestation before proximity operations
Verified collaboration zone boundaries
Real-time safety state monitoring and recording
Provable compliance record for liability protection
Real-time behavioural pattern tracking
Configurable alert thresholds per entity type
Multi-channel warning escalation (email, webhook, dashboard)
Full alert context with timeline reconstruction
Behaviour monitoring, alerts and warnings

Behaviour monitoring, alerts and warnings

Continuous monitoring of every operator, device, and autonomous agent across the environment. The platform evaluates behavioural patterns in real time, surfaces alerts when thresholds are breached, and escalates warnings through configurable notification channels. Every alert is logged with full context for post-incident review.

Custom triggers and actions

Custom triggers and actions

Operators define rules that bind specific conditions to automated responses. When a trigger fires, whether a sensor reading, a geofence breach, or an access anomaly, the platform executes the associated action sequence without manual intervention. Trigger chains can be composed to model complex operational logic.

Condition-based trigger definitions with logical operators
Automated action sequences on trigger activation
Composable trigger chains for multi-step logic
Trigger audit trail with execution timestamps
AI-driven baseline learning per entity and process
Automatic anomaly detection with severity scoring
Probable cause analysis and remediation guidance
Zero-configuration monitoring with adaptive thresholds
Automatic deviance monitoring

Automatic deviance monitoring

AI models trained on operational baselines continuously evaluate system behaviour and flag deviations. When a humanoid, device, or process acts outside its established norms, the platform generates a deviance report with severity classification, probable cause analysis, and recommended remediation. No manual rule writing required.

Operational reporting

Operational reporting

Comprehensive reporting engine that transforms raw security data into structured, actionable intelligence. Generate scheduled or on-demand reports covering incident summaries, compliance posture, behavioural trends, and deviance patterns. Reports are exportable and designed for both technical teams and executive stakeholders.

Scheduled and on-demand report generation
Incident, compliance, and trend report templates
Executive and technical report formats
Export to PDF, CSV, and API-accessible endpoints
Logging architecture

Three-tier operational logging

Every layer of the platform emits structured, verifiable log data. From low-level system events to high-level operator decisions, the logging architecture ensures nothing is lost and nothing can be altered after the fact.

System logs

Infrastructure and application-level events. Service health, resource allocation, network activity, and error states. Structured for automated monitoring and alerting.

Service health and uptime events
Resource allocation changes
Automated anomaly detection

Audit logs

Operator and system actions recorded with full context: who, what, when, through which interface, and under which policy set. Blockchain-anchored for tamper-proof integrity.

Full actor and context attribution
Policy state recorded per action
Blockchain-anchored integrity hashes

Event logs

Domain-level events from the operational environment: sensor readings, device state transitions, humanoid task completions, and workflow triggers. Subject to the Time Event Horizon.

Sensor and device state transitions
Workflow execution trace records
Time Event Horizon sealing

Time Event Horizon

Events pass through a temporal boundary after which they become cryptographically sealed. Once an event crosses the Time Event Horizon, its record is anchored to the blockchain and can no longer be modified, reordered, or deleted. This provides an irrefutable timeline for forensic investigation, compliance audits, and incident reconstruction.

Pending
Committed
Sealed
Infrastructure

Secure infrastructure at every layer

Beyond application security, the underlying infrastructure is hardened with network isolation, secret management, automated vulnerability scanning, and continuous monitoring.

Network isolation

Tenant workloads run in isolated network segments. No shared compute between customers. Private endpoints available for data plane connections.

Secret management

Credentials, API keys, and certificates stored in a hardened vault. Never logged, never exposed in configuration files, rotated on a schedule.

Vulnerability management

Automated dependency scanning and container image analysis on every build. Known vulnerabilities patched within defined SLA windows.

Incident response

Documented incident response procedures with defined escalation paths. Security events monitored continuously with automated alerting.

Compliance

Standards and certifications

Miradoris is designed to meet the compliance requirements of regulated industries. Certifications are on the roadmap as the platform moves toward general availability.

GDPR

Compliant

Data processing agreements, right to erasure, and data portability supported.

OWASP Top 10

Addressed

Application security testing against the OWASP Top 10 vulnerability classes.

SOC 2 Type II

Planned

Service organization controls for security, availability, and confidentiality.

ISO 27001

Planned

Information security management system certification.

Be among the first

We are looking for partners willing to test Miradoris in real operational environments. Early adopters get priority access to the platform at significantly reduced rates.

We'll review your request and follow up. No unsolicited contact.