Security posture
Procurement-ready security posture
Fable deploys decision engines that measurably improve EBITDA, margin, and cash. Security, access, and auditability are built into delivery design.
For private equity operators and mid market enterprises with complex decision flow. Not for early stage teams or advisory only engagements.
Deployment options
Where engines can run
Dedicated client environment
Deployment in a dedicated client environment for isolated execution.
Client cloud deployment where applicable
Deploy into client-managed cloud or VPC requirements when needed.
Isolation
Single-tenant isolation model
- Single-tenant VPC model per engagement.
- Scoped network boundaries and segmented services.
- Containerized workloads with reproducible deployment patterns.
Access and audit
Controlled access and lineage
- Least-privilege access aligned to role and workflow.
- Decision lineage from inputs to recommended actions.
- Audit trails for approvals, policy changes, and release history.
Data minimization
Scope access to what is required
- Access is scoped only to data required to validate and run the selected engine.
- Read-only validation is the default first step.
- Controlled write-backs are enabled only after approval and operating comfort.
Procurement pack available on request
Security questionnaire, DPA, and architecture overview are available on request.
