Trust

The governance is the architecture.

Most AI products ship a policy and hope it holds. RakerOne ships a runtime where the unsafe action can't happen. It's blocked at the system boundary.

The model has no write credentials

Separation by design, not by policy.

RakerOne agents produce intents. Intents route through rules. The integration layer executes with your credentials, through your adapters.

The model never holds a connection string, an API key, or a session token for your systems of record. This is how the product is built. It's not a policy layered on top.

Identity and access

Identity and access.

Single sign-on through SAML 2.0 and OIDC. Okta, Azure AD, Google Workspace, Ping Identity. SCIM 2.0 provisioning. Role-based and rule-based access control.

Every session, approval, and action ties to an authenticated identity. The log knows who acted, what they did, and under which rule.

Agents running in RakerOne get assigned an identity of their own.

Audit and replay

Audit and replay.

Every run writes to an append-only log. Runs are replayable against their original inputs, and outputs are cryptographically signed.

Export the log in formats your compliance team reads and your engineering team uses. Both teams see the same surface.

Append-only audit log

Data handling

Your data stays yours.

No training on customer content. No exceptions.

Regional data residency in Canada, the United States, and the European Union. Data is encrypted in transit and at rest. Retention is configured per tenant and enforced by the runtime.

Certifications

Certifications and compliance posture.

SOC 2 Type II. HIPAA posture for healthcare deployments. Canadian privacy posture covering PIPEDA and provincial equivalents.

Disclosure and response

Disclosure and response.

Report a vulnerability to security@cloudraker.com. We acknowledge within one business day.

The subprocessors list is maintained publicly. Incident communication runs through a named channel to affected customers.

See the architecture firsthand.

We'll walk your security and compliance team through the runtime. You'll see how intents route, where credentials live, and what the audit log captures.