| Layer | Description | |------|-------------| | Encryption at rest | AES‑256 encryption for all stored files. | | Access control | Role‑based permissions with MFA for every user. | | Auditing | Immutable logs stored on a blockchain ledger. | | Data provenance | Cryptographic hashes verify dataset integrity. |