Administrative Controls & Audit Capabilities

Inopli includes a set of administrative control mechanisms designed to ensure platform integrity, security, and governance. These controls cover sensitive operational functions such as system-level auditing, integrity monitoring, and internal administrative actions that go beyond standard user and analyst permissions.

In the standard SaaS deployment model, access to these administrative controls is strictly restricted to the Diazero Technologies operations team. This includes platform-level audit capabilities and internal administrative actions required to maintain service availability, security, and compliance. Customers using the SaaS model do not have direct access to these controls, ensuring a clear separation between platform administration and customer operations.

The platform maintains active auditing across all product actions, including user activity, configuration changes, incident handling, automation execution, and system-level operations. These audit records are continuously generated and preserved to ensure traceability, accountability, and operational transparency. In the SaaS model, audit data is managed and safeguarded by Diazero Technologies as part of its operational and compliance responsibilities.

In the on-premises deployment model for military and sovereign organizations, these administrative controls become available to the customer. In this scenario, the organization assumes full ownership of the platform infrastructure and administrative domain, including access to system-level audit functions and internal administrative capabilities. This enables direct oversight of all platform operations, aligned with strict governance, sovereignty, and compliance requirements.

By differentiating administrative access between deployment models, Inopli ensures strong security and operational control in its SaaS offering, while providing full administrative autonomy in dedicated on-premises deployments. This approach balances managed service integrity with the needs of organizations that require complete control over their security platforms.

Last updated