Technology Overview
Attested Governance Artifacts transform passive audit logging into active compliance enforcement with cryptographic proof generation.
Three-Phase Architecture
Seal. Enforce. Prove.
Policy Artifact
Cryptographically signed governance object defining integrity baselines, telemetry policies, and enforcement mappings.
- Ed25519 signatures
- Deterministic hashing
- Time-bounded validity
Sentinel Runtime
Local Governance Engine that monitors subjects, detects drift, and executes enforcement actions with signed receipts.
- Launch Gate validation
- Continuous monitoring
- Automatic enforcement
Evidence Bundle
Portable verification package containing all cryptographic proofs. Verifiable offline in air-gapped environments.
- Offline verification
- Chain integrity
- PASS/FAIL verdict
Cryptographic Primitives Policy
Industry-standard primitives. No proprietary algorithms.
Hash algorithm is explicit in the artifact schema and included in signatures. Verifiers MUST reject mismatched algorithms. This ensures algorithm agility while maintaining strict verification semantics.
SHA-256
PrimaryDefault hash algorithm for content addressing and integrity verification
BLAKE2b-256
AlternativeOptional high-throughput alternative for performance-critical applications
Ed25519
PrimaryPolicy artifact and receipt signatures
RFC 3161
PrimaryTrusted timestamp attestation
RFC 8785
PrimaryDeterministic JSON canonicalization
Core Capabilities
Runtime Integrity
Continuous measurement of governed subjects against sealed baselines. Drift detection triggers immediate enforcement.
Signed Receipts
Every policy decision generates a cryptographically signed receipt. Hash-linked into tamper-evident chains.
Offline Verification
Evidence bundles verify without network access. Designed for air-gapped and classified environments.
Time Attestation
RFC 3161 timestamps provide trusted temporal ordering. Critical for regulatory and legal evidence.
Technical Specification
Review the complete protocol specification including schemas, verification algorithms, and implementation requirements.