Security & Trust

Authorization is critical infrastructure. Here's how Bailiff keeps your data secure and your decisions auditable.

Hosted Deployment

Bailiff runs as a fully managed service. Your authorization data is stored in isolated, encrypted databases. You connect via HTTPS API calls from your backend. No sensitive user data needs to leave your infrastructure — Bailiff only stores relationship tuples (e.g., "user:alice is editor on doc:123"), not PII.

Environment Separation

Each environment (development, staging, production) is fully isolated. Separate API keys, separate data stores, separate audit logs. Changes in development never affect production.

Auditability

Every authorization check is logged with the full decision path. You can query who had access to what resource, when, and why. Audit logs are retained and exportable for compliance reviews.

Explainable Decisions

Every ALLOW or DENY comes with a trace showing the exact relationship chain that led to the decision. This isn't just for debugging — it's the kind of evidence compliance teams and auditors need.

API Key Management

Each environment has its own API key. Keys can be rotated at any time without downtime. All API calls are authenticated and rate-limited. Keys are scoped to specific environments and never shared across boundaries.

Backups & Reliability

Authorization data is continuously backed up. The service is designed for high availability with redundant infrastructure. Bailiff is built to be a low-latency, always-on dependency for your API layer.

Self-Hosting Roadmap

Bailiff is currently hosted-only. Self-hosting is on the roadmap and will be informed by feedback from founding design partners. If running authorization infrastructure in your own environment is a requirement, we want to hear from you.

Questions about security?

We're happy to discuss security requirements, compliance needs, or deployment architecture.