Deployment

Corevexa Deployment | Layer-7 Governance Architecture

Corevexa Deployment Architecture

This page explains how the demo maps to production deployments. The demo is a controlled simulation of Layer-7: evaluate → route authority → gate execution → log evidence. Production deployments enforce those same primitives as a control plane.

Core principle: the governance layer sits in the execution pathway. It is not a reporting tool that watches after the fact.

Deployment Models

Layer-7 can be deployed as SaaS, on-prem, or hybrid. The “right” model depends on where execution occurs, where approvals must live, and how strict the audit boundary needs to be.

SaaS (Central Control Plane)

Governance service runs centrally. Multiple systems submit actions to one evaluation and approval pathway.

Best for: distributed teams, fast iteration, shared governance.

On-Prem (Local Control Plane)

Governance runs inside the customer boundary with local data residency and internal identity controls.

Best for: regulated environments, sensitive data, strict boundary controls.

Hybrid (Central + Local)

Central policy/visibility with local enforcement nodes at each site or environment.

Best for: multi-site enterprises, segmented networks, edge execution.

What “moves” between environments

  • Policies: versioned thresholds and constraints
  • Authority maps: roles → tiers → approval rules
  • Decision metadata: risk tier, route, gate state
  • Audit records: event trail (may be replicated, exported, or sealed)
In strict deployments, only metadata moves; sensitive payloads remain local.

What stays local (typical)

  • Sensitive payloads: content, files, regulated data
  • Execution: the actual system action (change/campaign/config)
  • Identity enforcement: SSO/IdP role mapping and session policy
  • Evidence sealing: immutable record storage if required
Governance must be enforceable without exporting sensitive operational content.

Enforcement Patterns

Production enforcement depends on where the “gate” sits. These patterns keep governance non-bypassable.

Inline Gate

Execution service calls governance before acting. No clearance → no execution.

Strongest: direct non-bypassability

Proxy Gate

A gateway mediates execution calls and enforces governance checks centrally.

Best: standardization across many systems

Queue Gate

Actions become jobs. Jobs are released only after approvals exist.

Best: operational workflows and releases

Edge Gate

Site-local node validates clearance and blocks execution locally.

Best: remote sites, segmented networks
Demo mapping: the UI simulates the gate state. Production mapping: the gate is a technical control that can’t be bypassed by clients.

Fail-Closed Rules (Non-Negotiable)

If the governance service is unavailable, governed execution surfaces must default to “no.” Otherwise the governance layer becomes advisory.

Fail-closed behavior

  • Tier 2–4 cannot execute without valid approval evidence.
  • Governance unreachable → execution disabled for governed paths.
  • Approvals must be time-bound and context-bound (no replay).
  • Clearance binds to decision_id + request_hash.
This is what makes Layer-7 a control plane, not a dashboard.

Evidence requirements

  • Every transition emits a ledger event (intake → eval → route → approve → execute).
  • Approver identity is attributable (role + actor_id).
  • Policy version recorded per decision.
  • Execution status must be reported back into the ledger.
Without evidence, governance can’t be audited; without auditability, governance can’t be trusted.

Hardware Mapping (Optional Assurance Layer)

Hardware surfaces increase assurance for high-tier approvals and enable local enforcement in restricted environments. These are implementation surfaces, not separate brands.

EAT-1

Executive Authority Token for high-tier approvals (presence + assurance).

Use: Tier 4 approvals, two-person control patterns.

IGN-1 / EGD-1

Enforcement nodes that validate clearance and block execution at site or edge.

Use: segmented networks, remote sites, edge execution.

GCW-1

Visibility surface: “what AI is doing now,” pending approvals, blocked items.

Use: executive oversight and operational governance rooms.
Hardware is optional. The core requirement is enforceable governance. Hardware increases assurance where needed.

Request a Deployment Briefing

For a structured discussion on SaaS vs on-prem vs hybrid deployment, enforcement gates, and audit boundaries:

james@corevexa.com

Single point of contact is intentional: it preserves routing clarity and governance accountability while Corevexa scales.