iiRecord
Agentic AI Atlas · responsibility:access-control
responsibility:access-controla5c.ai
II.
Responsibility JSON

responsibility:access-control

Structured · live

responsibility:access-control json

Inspect the normalized record payload exactly as the atlas UI reads it.

File · domain/products/krate-connectivity.yamlCluster · domain
Record JSON
{
  "id": "responsibility:access-control",
  "_kind": "Responsibility",
  "_file": "domain/products/krate-connectivity.yaml",
  "_cluster": "domain",
  "attributes": {},
  "outgoingEdges": [
    {
      "from": "responsibility:access-control",
      "to": "platform:krate",
      "kind": "applies_to",
      "attributes": {
        "notes": "Access control is managed through Krate's org-scoped RBAC model"
      }
    }
  ],
  "incomingEdges": [
    {
      "from": "role:privacy-engineer",
      "to": "responsibility:access-control",
      "kind": "holds_responsibility"
    },
    {
      "from": "role:security-engineer",
      "to": "responsibility:access-control",
      "kind": "holds_responsibility"
    },
    {
      "from": "role:it-ops-engineer",
      "to": "responsibility:access-control",
      "kind": "holds_responsibility"
    },
    {
      "from": "workflow:access-review",
      "to": "responsibility:access-control",
      "kind": "triggers_responsibility"
    }
  ]
}