All paths
Operations Guide

NL Protocol for Enterprise & Operations

Deploy and operate NL Protocol at scale. Deployment models, compliance, key management, and operational runbooks.

You are

A platform engineering team, infrastructure team, or operations organization running AI agents in production and needing to govern how those agents access secrets at scale.

Key areas of focus

  • Deployment models — local-first, centralized, hybrid, and multi-region topologies for NL-compliant systems
  • Operational runbooks — monitoring, alerting, incident response, and secret rotation procedures for production environments
  • Compliance requirements — mapping NL Protocol conformance tiers to SOC 2, ISO 27001, and industry-specific regulations
  • Key management — cryptographic key lifecycle, rotation policies, HSM integration, and disaster recovery

Recommended path

1
Understand core concepts

The foundational architecture: opaque handles, isolation boundaries, and the seven-layer defense model.

2
Read the spec overview

High-level architecture, conformance tiers, and the requirements for each level of protection.

3
Review deployment considerations

Topology options, scaling patterns, key management requirements, and operational procedures.

4
Map conformance to your requirements

Choose the right conformance tier based on your regulatory environment and operational maturity.

Time commitment

~20 minutes for the architecture overview, ~1-2 hours for deployment planning and compliance mapping.