
Role-safe by design. Local-first by default. Auditable at the boundary.
The environment is segmented so a compromise in one zone does not cascade into control.
Operator clients with role-scoped permissions
Policy, state, audit, and orchestration (Protected)
Gateways and protocol adapters
Field buses and endpoints
Muted note: Cloud connectivity is not required for core control.
High-level intents and modes. No engineering controls.
Operational controls within commissioned scope. No privileged actions.
Maintenance windows, diagnostics, updates, recovery procedures (audited).
The interface does not actuate devices directly. All actuation passes through a deterministic policy gate with an audit record.