Key rotation in production
- owner
- Security
- interval
- 90 days
- last review
- 2026-04-02
AI only becomes productive inside a company when it can draw on current, source-backed context. Without it, every new tool is just another interface on top of confusion. WiseWare gives your people and AI the memory they can actually act on — from the tools your teams already use, kept current as the work changes.
Decisions, customer context, policies, project rationale, evidence, commitments, and exceptions already exist — across calls, chats, docs, tickets, CRMs, specs, and wikis. The problem is recall, trust, currency, provenance, and permissioning.
A decision exists, but the rationale is buried in chat.
Customer commitments exist across calls, CRM notes, tickets, and Slack.
A policy exists, but nobody trusts that it is current.
Project history exists, but only in old docs and people's heads.
This is not a content problem. It is a memory problem.
Every useful AI workflow needs company context that is current, relevant, permission-aware, and traceable. If that context is fragmented, stale, or untrusted, every new interface just becomes another layer on top of confusion.
WiseWare reads the chat, the ticket, the call transcript, the spec, and turns what matters into structured memory: decisions, claims, entities, relationships, state, evidence, and permissions. Every object keeps the link back to where it came from.
AI proposes memory changes. Humans approve canonical writes. Every approved change becomes part of a human-readable, auditable history — so you can see what changed, when, why, and who approved it.
Corrections and new sources re-enter as proposed changes. The loop is the product.
Every approved change is a versioned, signed update. You can read, compare, revert, and export your memory at any time — nothing is locked inside WiseWare. AI never writes directly into canonical memory without human review.
For the technical reader: the canonical layer is plain markdown files in a standard git repository. No proprietary store to migrate out of; your memory is already in a format your team can work with.
@Quarterly access review · CTL-12
owner: Security
cadence: Quarterly
−last reviewed: 2026-01-15
+last reviewed: 2026-04-03
+reviewer: CTO
+evidence: Q2-Access-Review.pdf
state: current
Sources
+— Jira AC-128 (signed off 2026-04-03)
+— Slack #security · thread 2026-04-03
A proposed change from a closed ticket. One reviewer click turns it into canonical memory.
Volume grows. Nuance compounds. Permissions change. People leave. Memory health is the set of signals that keep company memory useful over time — not a dashboard bolted on, but the way the whole system is designed.
Memory that has not been touched or cited is flagged before it's stale.
When one decision replaces another, the old one carries the pointer forward.
Contradictions between objects surface as disputes, not silent drift.
Who said it matters. Memory weighs canonical sources over passing mentions.
Claims without evidence are visible as gaps, not quietly assumed.
Every object has an owner responsible for keeping it honest.
Access rules travel with the memory, not just the source document.
Review cadences are tracked; overdue memory is marked, not hidden.
Every approved change is signed, readable, and reversible — the spine of trustworthy memory.
Memory is not useful because it was written. It is useful because it is still true.
The same substrate holds customer, product, engineering, operations, and security memory. Different objects. Same loop of source → proposal → review → canonical memory.
An ISMS is a demanding memory domain — policies, risks, controls, evidence, exceptions, findings, corrective actions, and audit history. It rewards traceability, freshness, and temporal history. If memory can stay useful here, it can stay useful anywhere.
This is not a full GRC suite. It is proof that WiseWare can maintain one high-stakes memory domain as living, reviewable, source-backed company memory.
What evidence supports quarterly access review this quarter?
Q2 access review was signed off by the CTO on 2026-04-03. Evidence is Q2-Access-Review.pdf, originating from Jira AC-128.
Which exceptions expire this month?
One exception expires in April 2026: EXC-08 (Legacy SSH access for vendor Acme, Platform-owned). Renewal or closure is required by 2026-04-30.
EXC-08's last review is 41 days old. Consider re-confirming before renewal.
Tell us what your company needs to remember. We'll show you the same source → proposal → review → canonical memory loop, applied to your domain.