Enterprise RAG — A practitioner's build log | Post 6 of 6
This series has documented a system built to a specific standard: one where access control is enforced before retrieval scoring, where every answer includes traceable citations, and where the evaluation set measures restricted document leakage rather than retrieval relevance alone.
This final post answers the question that matters most for teams considering this as a foundation: what works today, what needs to be in place before this handles real internal documents in a production environment, and what the gap between those two states actually looks like.
What is fully operational today
Every item below runs locally without external dependencies or provider credentials.









