← back to features

Security & Compliance

Your organization protected

0+
Permissions granted
0+
Services approved
0+
Policies enforced

Multi-level access control

Schild enforces dual-layer security: users must have both required role-based permissions and meet a minimum sensitivity clearance. Access is denied if either requirement fails.

Allowed

User has required permission and meets clearance level

Missing permission

User lacks the required permission

Insufficient clearance

User's clearance is below the minimum required

Example context

Role: Security Officer Clearance: Confidential

Below are access evaluations for various data types using this user context.

Post operations

View post schedules

Denied
Permission
View post
Min. clearance
None
Has permission?
No
Meets clearance?
Yes

Special incident

Sensitive report content

Denied
Permission
View SI
Min. clearance
Secret
Has permission?
Yes
Meets clearance?
No

Policy document

Organization policies

Allowed
Permission
View policy
Min. clearance
Confidential
Has permission?
Yes
Meets clearance?
Yes

Clearance hierarchy: NoneConfidentialSecretTop secret

USER APPROVALS

Automatic qualification enforcement on every op.

Set qualification requirements for operations—professional credentials and particular services—and personnel can only be assigned if they meet the requirements. Schild enforces compliance automatically.

SERVICE APPROVALS

Automatic scope of work enforcement on every op.

Schild requires you to define which services each client has authorized—from routine patrols to cyber audits. Only approved services can be performed, ensuring every billable operation has documented client authorization.

COMPLIANCE TRAINING

Maintain compliance with Schild's training ops.

Schild supports scheduled training ops. At the turn of the year or as needs evolve, you can schedule compliance training that validates prior knowledge and keeps officers fresh.

Training Schedule

Upcoming sessions

Activity Log

Time
User
Action

AUDIT TRAILS

Every action accounted for.

Schild automatically tracks administrative actions and supports field logging. Whether you need to review schedule changes or demonstrate compliance, you always have complete records.

COMPLIANCE CHECKS

Acknowledgements, right in your ops.

Schedules tight? Just put policy acknowledgements and other required tasks right in your ops. Personnel can complete them mid-op, maintaining compliance with minimal disruption.

Frequently asked questions

Common questions about security & compliance in Schild

There are predefined approvals like approval to carry a firearm. When selecting candidates for operations, the only options available for assignment are those who meet the requirements. If you specify that an operation requires a firearm, only personnel approved to carry firearms are available for assignment. The same validation occurs with automatic assignments.
Service approvals define which services are authorized for each client. Like user approvals, clients cannot be selected for operations if there is no prior documented authorization.
Training in Schild is an operation. It follows the same pattern as the other the operations: define parameters, specify tasks, and assign personnel. Training supports instructor assignments—personnel you want to guide or supervise the training. Instructors view the tasks the same way learners view them. Like learner assignments, Schild considers instruction compensable.
Records are access-controlled by permissions and sensitivity clearance (security clearance). Depending on the context, if a user has insufficient permissions or clearance, the resource either does not exist or permission is explicitly denied. Personnel also cannot be assigned to operations above their clearance.
Ready to protect your organization?
© 2026 Schild Technologies