End-to-End Governance Workflow
From artifact creation through runtime enforcement to offline-verifiable evidence. Eight steps, fully autonomous, cryptographically proven.
Artifact Creation
A governance artifact is created during system approval containing integrity parameters, permitted operations, measurement rules, enforcement policies, and a validity period. All fields are cryptographically signed with Ed25519. Once sealed, the artifact is immutable.
System Launch
The Governance Portal retrieves and verifies the Policy Artifact signature, confirms time validity, and parses enforcement parameters. If any verification fails, execution is blocked. Default state is denial.
Initial Measurement
The portal computes an initial integrity measurement and compares to the sealed baseline. If the measurement does not match, execution is not permitted. Only the attested version can run.
Continuous Monitoring
During execution, the portal collects measurements at the cadence specified in the artifact. Measurement classes include binary integrity, configuration integrity, dependency checksums, environment metadata, and system-specific telemetry.
Drift Detection
If any measurement deviates from the sealed baseline, drift is detected through deterministic cryptographic hash comparison. The portal identifies which measurement class triggered the deviation.
Enforcement Action
The portal executes the enforcement action defined in the artifact: TERMINATE, QUARANTINE, SAFE_STATE, or ALERT_ONLY. For safety-critical systems, SAFE_STATE triggers graceful degradation. Enforcement is autonomous.
Receipt Generation
Every enforcement decision generates a signed receipt containing measurement result, policy decision, timestamp, previous receipt hash, and portal signature. Receipts are hash-linked into a tamper-evident chain.
Evidence Bundle & Verification
Execution produces a portable evidence bundle containing the governance artifact, complete receipt chain, Merkle inclusion proofs, and checkpoint references. Anyone can independently verify everything without network access.
End-to-End Trace
All hashes truncated. Sample data from the reference implementation drone governance scenario.
Explore the Architecture
Dive deeper into the cryptographic primitives, enforcement mechanisms, and verification algorithms that power each step.