Whitepapers
Security, compliance, and architecture deep-dives for enterprise buyers.
Whitepapers
Enterprise-grade documentation for security reviews, compliance audits, and procurement processes.
Available Whitepapers
Security & Compliance
Sentinel Security Architecture
- Trust boundaries and network segmentation
- Encryption at rest and in transit
- Secret management and rotation
- Audit logging and immutability
- Download: PDF
SEBI Alignment Matrix
- Investment adviser registration workflow
- Suitability documentation requirements
- Risk disclosure standards
- Data protection compliance
- Download: PDF
Data Residency & Sovereignty
- AWS ap-south-1 architecture
- No cross-border data transfer
- Customer-managed encryption keys (BYOK)
- 7-year retention and deletion policies
- Download: PDF
Technical Architecture
AI-Agent Readiness
llms.txtandllms-full.txtimplementation- MCP server architecture
- Clean markdown content negotiation
- Download: PDF
Multi-Tenant Isolation
- Tenant-scoped data boundaries
- RBAC enforcement at every layer
- Cross-tenant leakage prevention
- Download: PDF
Request a Custom Whitepaper
For procurement, RFP responses, or compliance reviews:
Email: sales@centricity.co.in
Subject: [WHITEPAPER REQUEST] Your Company Name
Include:
- Use case description
- Regulatory requirements
- Timeline
- Distribution scope