EdithLog in
Security

Built for financial trust from day one.

Edith is planned around tenant isolation, role-based access, maker-checker approvals, period locks, audit trails, and human-approved AI actions.

Financial controls

Protect the ledger from accidental or unauthorized changes.

Period locks
Reversals
Maker-checker
Close checklist
Approval roles
Export audit
Explore financial controls

Tenant safety

Keep company data scoped and recoverable.

Tenant isolation
Scoped queries
Ledger isolation
Backups
Exports
Admin audit
Explore tenant safety

Access

Make sensitive operations explicit and controlled.

Users
Roles
Bank masking
API scopes
Webhook signing
Session controls
Explore access

AI guardrails

AI assists the work but does not own financial state.

Tool allowlists
Context chips
Used sources
Human approval
No auto-posting
No auto-close
Explore ai guardrails
Deep product detail

What this page covers in practice

Security posture

Financial security is not just login protection; it is a product behavior across every sensitive action.

Review-confirm-reverse
Role separation
Audit evidence
Export logging
Bank masking
Admin escalation

AI safety posture

AI should operate with limited tools, explicit context, and no direct authority over ledger state.

No autonomous posting
No autonomous filing
Tool allowlists
Source citations
PII-aware retrieval
Human approval