Corevexa Deployment Architecture
This page explains how the demo maps to production deployments. The demo is a controlled simulation of Layer-7: evaluate → route authority → gate execution → log evidence. Production deployments enforce those same primitives as a control plane.
Deployment Models
Layer-7 can be deployed as SaaS, on-prem, or hybrid. The “right” model depends on where execution occurs, where approvals must live, and how strict the audit boundary needs to be.
SaaS (Central Control Plane)
Governance service runs centrally. Multiple systems submit actions to one evaluation and approval pathway.
On-Prem (Local Control Plane)
Governance runs inside the customer boundary with local data residency and internal identity controls.
Hybrid (Central + Local)
Central policy/visibility with local enforcement nodes at each site or environment.
What “moves” between environments
- Policies: versioned thresholds and constraints
- Authority maps: roles → tiers → approval rules
- Decision metadata: risk tier, route, gate state
- Audit records: event trail (may be replicated, exported, or sealed)
What stays local (typical)
- Sensitive payloads: content, files, regulated data
- Execution: the actual system action (change/campaign/config)
- Identity enforcement: SSO/IdP role mapping and session policy
- Evidence sealing: immutable record storage if required
Enforcement Patterns
Production enforcement depends on where the “gate” sits. These patterns keep governance non-bypassable.
Inline Gate
Execution service calls governance before acting. No clearance → no execution.
Proxy Gate
A gateway mediates execution calls and enforces governance checks centrally.
Queue Gate
Actions become jobs. Jobs are released only after approvals exist.
Edge Gate
Site-local node validates clearance and blocks execution locally.
Fail-Closed Rules (Non-Negotiable)
If the governance service is unavailable, governed execution surfaces must default to “no.” Otherwise the governance layer becomes advisory.
Fail-closed behavior
- Tier 2–4 cannot execute without valid approval evidence.
- Governance unreachable → execution disabled for governed paths.
- Approvals must be time-bound and context-bound (no replay).
- Clearance binds to decision_id + request_hash.
Evidence requirements
- Every transition emits a ledger event (intake → eval → route → approve → execute).
- Approver identity is attributable (role + actor_id).
- Policy version recorded per decision.
- Execution status must be reported back into the ledger.
Hardware Mapping (Optional Assurance Layer)
Hardware surfaces increase assurance for high-tier approvals and enable local enforcement in restricted environments. These are implementation surfaces, not separate brands.
EAT-1
Executive Authority Token for high-tier approvals (presence + assurance).
IGN-1 / EGD-1
Enforcement nodes that validate clearance and block execution at site or edge.
GCW-1
Visibility surface: “what AI is doing now,” pending approvals, blocked items.
Request a Deployment Briefing
For a structured discussion on SaaS vs on-prem vs hybrid deployment, enforcement gates, and audit boundaries: