Security posture

Procurement-ready security posture

Fable deploys decision engines that measurably improve EBITDA, margin, and cash. Security, access, and auditability are built into delivery design.

For private equity operators and mid market enterprises with complex decision flow. Not for early stage teams or advisory only engagements.

Deployment options

Where engines can run

Dedicated client environment

Deployment in a dedicated client environment for isolated execution.

Client cloud deployment where applicable

Deploy into client-managed cloud or VPC requirements when needed.

Isolation

Single-tenant isolation model

  • Single-tenant VPC model per engagement.
  • Scoped network boundaries and segmented services.
  • Containerized workloads with reproducible deployment patterns.

Access and audit

Controlled access and lineage

  • Least-privilege access aligned to role and workflow.
  • Decision lineage from inputs to recommended actions.
  • Audit trails for approvals, policy changes, and release history.

Data minimization

Scope access to what is required

  • Access is scoped only to data required to validate and run the selected engine.
  • Read-only validation is the default first step.
  • Controlled write-backs are enabled only after approval and operating comfort.

Procurement pack available on request

Security questionnaire, DPA, and architecture overview are available on request.