The nara Edge Connector is designed for organizations that require strong control over how AI tooling reaches internal systems. This page summarizes the controls, operating model, hosting posture, and independent assurance measures that govern the Edge Connector and the services that manage it.
nara operates the Edge Connector under a defense-in-depth model built around four principles:
Constrained central control — the platform cannot introduce arbitrary endpoint behavior without cryptographic trust and policy enforcement at the connector.
Least privilege by design — deployments, tools, and operators receive only the permissions required for their scope.
Auditable operations — administrative changes, bundle releases, approvals, and runtime actions are logged and reviewable.
Independent assurance — the nara security and operating model is backed by external audits, penetration testing, and formal compliance programs.
The Edge Connector separates the control plane from execution on customer-managed infrastructure.
Customer Admin / nara Admin
|
v
nara Control Plane
|
v
Signed Bundle + Policy Distribution
|
v
Edge Connector (customer infrastructure)
|
v
Local Tool Sandbox + Customer Systems
Signed code only
Tool bundles are signed before release. The Edge Connector verifies bundle signatures locally
using pinned trust roots before any updated code is accepted or executed.
Policy-enforced runtime
Every deployment is governed by policy. Tool capabilities, update behavior, approval
requirements, and device scope are enforced by the connector at runtime.
Isolated execution
Tool implementations run in isolated execution contexts with explicit capability boundaries.
High-risk primitives are disabled by default and must be enabled intentionally.
Customer-controlled rollout
Customers can require staged rollout, change approval, or customer-controlled signing before new
bundle versions are activated.
nara operates its production environment with Germany-first hosting for Edge Connector control-plane services and customer data covered by the Edge Connector operating model.
nara operates formal monitoring and security operations processes for the Edge Connector service boundary.
Security-relevant events are centralized in monitored audit and telemetry systems.
Alerts cover authentication anomalies, rollout anomalies, connector health degradation, and suspicious administrative activity.
Incident response follows defined runbooks for containment, revocation, key rotation, rollback, and customer communication.
Customers receive timely notification for confirmed incidents affecting confidentiality, integrity, or availability according to contractual commitments.
Post-incident reviews drive corrective actions, control hardening, and documented follow-up.
nara secures the managed platform, control plane, bundle trust chain, and product-level governance controls. Customers remain responsible for local endpoint hardening, operating-system baselines, internal network controls, and any customer-managed approvals or signing workflows they enable.
This shared responsibility model allows customers to adopt the Edge Connector while preserving local security standards, approval models, and infrastructure governance.