Live App →

Whitepapers

Enterprise-grade documentation for security reviews, compliance audits, and procurement processes.


Available Whitepapers

Security & Compliance

Sentinel Security Architecture

  • Trust boundaries and network segmentation
  • Encryption at rest and in transit
  • Secret management and rotation
  • Audit logging and immutability
  • Download: PDF

SEBI Alignment Matrix

  • Investment adviser registration workflow
  • Suitability documentation requirements
  • Risk disclosure standards
  • Data protection compliance
  • Download: PDF

Data Residency & Sovereignty

  • AWS ap-south-1 architecture
  • No cross-border data transfer
  • Customer-managed encryption keys (BYOK)
  • 7-year retention and deletion policies
  • Download: PDF

Technical Architecture

AI-Agent Readiness

  • llms.txt and llms-full.txt implementation
  • MCP server architecture
  • Clean markdown content negotiation
  • Download: PDF

Multi-Tenant Isolation

  • Tenant-scoped data boundaries
  • RBAC enforcement at every layer
  • Cross-tenant leakage prevention
  • Download: PDF

Request a Custom Whitepaper

For procurement, RFP responses, or compliance reviews:

Email: sales@centricity.co.in Subject: [WHITEPAPER REQUEST] Your Company Name

Include:

  • Use case description
  • Regulatory requirements
  • Timeline
  • Distribution scope