Sharing and access.
Agents access documents your team already works with. Owners decide who can use, edit, or publish. Access starts narrow and only widens when someone with authority opens the door.
Governance shouldn't be the thing you bolt on after something breaks. We build it in by default. Agents inherit permissions like any teammate, operate only inside the scopes you approve, and leave a clean audit trail behind every action.

01 / The three pillars
Three pillars handle every question your security and compliance teams will throw at you. Together they answer the one that actually matters: do you still call the shots after the agent ships?
Agents access documents your team already works with. Owners decide who can use, edit, or publish. Access starts narrow and only widens when someone with authority opens the door.
Every request gets checked against the agent's role and entitlements. Read access means read access. Nothing more. Nothing less.
Agents stay in the lane you put them in. Guardrails define what they can do, what they cannot touch, and how they have to reason before they act.
People with access
General access
02 / Sharing & access
Every agent has owners, collaborators, and viewers. Owners shape the tools, prompts, and publishing rules. Collaborators tune the configuration. Viewers can't change a thing. The sharing model your team uses for documents now governs the AI doing the work, so nobody has to learn a new system to stay safe.
03 / Permission enforcement
Marshal evaluates entitlements the moment an action runs. If a user reaches for data they have no reason to see, the agent refuses, logs the attempt, and tells you exactly why it stopped.
Read Q4 financials
Draft renewal email
Export Q4 financials
Approve external contract
Drafted renewal email · cited Q3 contract · waiting on approval
Built onboarding plan · used HR template · routed to manager
Compiled status digest · sourced from Linear and Slack · ready to send
04 / Alignment & scope
Owners draw the lines: which tools the agent can call, which data it can read, which actions need a human signature, and how it must reason before it moves. When something falls outside the scope, the agent stops and routes the request to a person. It never improvises its way around the rules.