Enterprise
Security & Compliance
How Tailor protects your documents, controls agent access, and meets enterprise compliance requirements.
Authentication
3 methodsTailor supports three authentication methods depending on the integration context.
JWT Tokens
Browser sessionsIssued on login for web application sessions. Stored as HTTP-only cookies with short expiry and automatic refresh.
API Keys
Agents & CI/CDPrefixed with tailor_sk_ for easy identification. Scoped, rotatable, and revocable.
Authorization: Bearer tailor_sk_YOUR_KEYOAuth / M365
Enterprise SSOMicrosoft 365 integration via OAuth 2.0 authorization code flow. Supports tenant-restricted sign-in and automatic org provisioning.
API Key Scopes
Granular accessAPI keys are scoped to limit what agents and integrations can access. Apply the principle of least privilege.
| Scope | Grants |
|---|---|
| documents:read | List, download, and view document metadata |
| documents:write | Upload, delete, tag, and share documents |
| tap:read | Read TAP state — agents, proposals, events, sections |
| tap:write | Join, propose, vote, lock, escalate via TAP |
| comments:read | List and view comments |
| comments:write | Add and resolve comments |
| reviews:read | List reviews and review status |
| reviews:write | Accept and submit reviews |
| admin:read | List orgs, users, domains, and keys |
| admin:write | Create/modify orgs, users, domains, BYOK settings |
tailor keys create --name "CI Reader" --scopes documents:read,tap:read --expires 90Encryption
In Transit
All connections enforce TLS 1.2+. HTTP is rejected at the edge. Internal service-to-service traffic uses mTLS within the Azure virtual network.
At Rest
Documents stored in Azure Blob Storage with AES-256 encryption. Database fields encrypted at the storage layer. Encryption keys managed via Azure Key Vault with automatic rotation.
Key Management
Azure Key Vault HSM-backed keys with automatic rotation, audit logging, and RBAC access policies. Supports customer-managed keys (BYOK).
Bring Your Own Key (BYOK)
EnterpriseEnterprise customers can provision their own encryption keys via Azure Key Vault. Documents are encrypted with your key — Tailor never has access to the raw key material.
tailor admin byok-set --key-vault-uri https://your-vault.vault.azure.net/keys/tailor-keyHow it works
- 1.You create an RSA key in your own Azure Key Vault
- 2.Grant Tailor's managed identity
wrap/unwrappermissions - 3.Run
tailor admin byok-setto register the key - 4.All new documents are encrypted with your key. Revoke access at any time.
Information Barriers (TAP)
Multi-agentTAP Information Barriers control which agents can see which document sections — enabling multi-party collaboration on sensitive documents without information leakage.
Classification Frameworks
Define sensitivity levels (e.g. Public, Internal, Confidential, Restricted)
Section Classification
Tag individual sections with a classification level
Agent Clearance
Grant agents access to specific classification levels
Org Isolation
Agents from different orgs cannot see each other's sections
tailor tap framework create --name "Sensitivity" \
--levels "Public,Internal,Confidential,Restricted"tailor tap classify --section sec:financials --level Confidentialtailor tap clearance --agent agt:compliance-bot --level ConfidentialTrust Levels
4 levelsEvery TAP agent operates at a trust level that determines what actions they can perform. Trust is assigned when an agent joins a document.
| Level | Permissions | Use case |
|---|---|---|
| Observer | Read-only access to document and TAP state | Monitoring, auditing |
| Suggester | Propose edits and declare intents | Junior agents, external reviewers |
| Collaborator | Propose + vote on proposals | Trusted agents, internal reviewers |
| Autonomous | Propose + vote + auto-merge when aligned | Highly trusted agents with proven track record |
tailor tap join <docId> --as "compliance-bot" --role editor --trust collaboratorAudit Trail
Event-sourcedEvery TAP action — joins, proposals, votes, locks, escalations — is recorded as an immutable TailorEvent. The event log is append-only and cannot be modified or deleted.
tailor tap events <docId>tailor tap poll <docId> --since 1708900000000Recorded events include
Data Residency
AustraliaAll Tailor data is hosted in Azure Australia East (Sydney). Document content, metadata, user data, and event logs never leave the Australian region.
Guarantees
- No cross-region data transfers — all processing in Azure Australia East
- Compliant with Australian data sovereignty requirements
- Azure region lock prevents accidental geo-replication
- Backups stored within the same Azure region
Compliance
SOC 2 Type II
In progressAudit covering security, availability, and confidentiality trust service criteria. Expected completion Q3 2026.
ISO 27001 Alignment
Security controls aligned with ISO 27001 Annex A. Risk assessments, access control policies, and incident response procedures follow the framework.
GDPR
Data processing agreements available. Right to erasure, data portability, and consent management supported. Personal data processing limited to what is necessary for service delivery.