Skip to main content

Frequently Asked Questions

Common questions about Rethunk.Tech, Bastion, Rethunk.AI, governance, and how we work with customers.

Governance & Audit

What did the system do?

Bastion maintains a hash-chained intent ledger where every operator directive is recorded with cryptographic chaining. This audit trail is offline-verifiable, meaning you can prove the sequence of actions independent of any live system. The evidence path ties every action back to the operator intent that authorized it, creating an immutable record that boards and regulators can inspect.

Under whose authority?

Authority starts with operator intent. Before Bastion executes any directive, it routes the request through IRONLAW - a file-backed policy gate that evaluates whether the directive aligns with your governance rules. The TheatreManager (on the edge) holds command-and-control authority for its hosts; Bastion does not command theatres directly. This chain of custody is structural, not a claim about permissions later.

Can you prove it?

Yes. The hash-chained intent ledger, combined with optional Ed25519 directive signing and server-side verification, creates an evidence trail that proves what ran, who authorized it, and when. This is not logging after the fact; it is cryptographic proof architecture. We document operator runbooks and evidence-pack tooling under engagement so you can verify the chain offline.

Engagements (DEVaaS)

How does an engagement start?

We start with a discovery call to understand your regulatory environment, existing architecture, and what governed agent operations look like in your context. We then scope a dedicated team to design or integrate Bastion into your platform, deliver implementation artifacts, and stay hands-on through to launch. This is not staff aug; it is outcome-accountable delivery.

Do you work on retainer or fixed scope?

Both. Some engagements are fixed-scope (build and hand off), others evolve into retainer relationships where we maintain platform health, roll out new Bastion features, or expand governance coverage as your roadmap changes. We prefer engagements where we leave behind useful platform and tooling artifacts that your team can own.

Who owns the IP?

Your organization owns the IP created during engagement - code, documentation, governance schemas, and deployment configurations. We may open-source patterns and generalizable tooling (like our IRONLAW governance rules framework) under permissive licenses, but customer-specific work is yours to keep, modify, and commercialize as you see fit.

Data & Security

Where do you store customer data?

Bastion can be deployed in your VPC, air-gapped environment, or other infrastructure you control. We do not run a SaaS instance of Bastion or hold customer operational data in a Rethunk.Tech-managed service. Technical materials and governance schemas shared under engagement may be stored securely, but your runtime data stays in your control. See our Trust & security page for more details.

Can you work in our VPC or air-gapped environment?

Yes. Bastion is designed for deployment in restricted networks. We work with your infrastructure, PKI, and security posture. During engagement, we provide runbooks for TheatreManager enrollment, edge integration patterns, and policy gate setup in your environment. We do not require internet access or external dependencies for core governance operations.

What certifications or compliance frameworks do you hold?

We are in the process of pursuing additional compliance certifications aligned with regulated industry requirements. For the most current status, details on SOC 2, FedRAMP, or other frameworks your organization requires, reach out to [email protected]. We are transparent about what we do and do not claim; security is architecture, not a slide.

Product

Is Bastion open source?

Bastion as a whole is not open source, but we ship open components that reflect our engineering style and philosophy. The Bastion component overview on our open-source page shows what we publish and why. Core platform work is delivered under engagement with source-code access tied to customer contracts, not as anonymous public repositories.

Can we self-host Bastion?

Yes. Bastion is designed for deployment in your own infrastructure. We work with you during engagement to stand up Bastion in your VPC, air-gapped network, or other controlled environment. Self-hosting includes your own PKI, policy gate management with IRONLAW, and operational runbooks specific to your deployment.

How does Bastion differ from other AI governance tools?

Bastion is architecture-first. It does not try to be a catch-all compliance dashboard; instead, it routes every operator intent through a policy gate (IRONLAW), hands execution to AI, and leaves a cryptographically-verifiable evidence path. We talk about chain of command on the wire, not permissions as an afterthought. This structural approach is backed by deployment experience in regulated industries, not academic theory.

Open Source

What does Rethunk.Tech open source and why?

We open-source tools and libraries that reflect how we think about governed systems and developer experience - utilities for policy validation, governance schema tooling, and patterns for integrating governed workflows. We keep the view deliberately small to avoid turning the site into a directory; see our open-source page for the current portfolio. We open-source when the work helps the broader community and aligns with our delivery philosophy.

Can I use Rethunk open-source tools with non-Bastion systems?

Yes. Our open-source libraries and utilities are licensed under permissive terms and designed to be composable. IRONLAW governance schemas and policy validation tooling, for example, can be integrated into other systems. Our philosophy is that good governance patterns should propagate beyond our platform if they help organizations build safer, more auditable systems.

More questions? Reach out to [email protected] or book a consultation.

Was this page helpful?