You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
docs(poc): consolidate architecture references into single section
- Created single Architecture Documentation section explaining full framework
- Removed redundant architecture references throughout document
- Clear explanation: unified identity doc covers both Stage 1 (ingress) and Stage 2 (egress)
- Single source of truth for architecture reference
Copy file name to clipboardExpand all lines: hybrid-cloud-poc/README.md
+11-10Lines changed: 11 additions & 10 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -61,7 +61,7 @@ For full use case descriptions, value propositions, and regulatory context, see
61
61
62
62
### PoC Implementation Coverage
63
63
64
-
This PoC provides end-to-end implementation for **Stage 2: Trusted Egress & Data Center Infrastructure Attestation**. Stage 1 (Verified Ingress) is defined architecturally in the [Unified Identity & Trust Framework](README-arch-sovereign-unified-identity.md).
64
+
This PoC provides end-to-end implementation for **Stage 2: Trusted Egress & Data Center Infrastructure Attestation**. Stage 1 (Verified Ingress) is defined architecturally (see Architecture Documentation section below).
65
65
66
66
| Use Case | Stage 1: Verified Ingress | Stage 2: Trusted Egress | PoC Status |
@@ -78,7 +78,7 @@ This PoC provides end-to-end implementation for **Stage 2: Trusted Egress & Data
78
78
- ✅ mTLS with hardware-bound certificates (workload attestation)
79
79
80
80
**Roadmap (Architecturally Defined):**
81
-
- 🔲 Privacy-preserving geofencing (ZKP-based Reg-K compliance without storing GPS) - See [Unified Identity & Trust Framework](README-arch-sovereign-unified-identity.md)
81
+
- 🔲 Privacy-preserving geofencing (ZKP-based Reg-K compliance without storing GPS) - See Architecture Documentation section below
82
82
- 🔲 Privacy-preserving data center audit trail (batch & purge proofs) - See main [README](../README.md#layer-3-ai-governance-verifiable-logic--privacy)
83
83
84
84
---
@@ -94,20 +94,21 @@ The AegisSovereignAI framework implements this loop through:
94
94
> [!NOTE]
95
95
> **Implementation Status**: The Verified Ingress (Stage 1) architecture is defined and the technical implementation is slated for the immediate roadmap. This PoC currently provides the end-to-end implementation for the Trusted Egress (Stage 2).
96
96
97
-
## Stage 1: Verified Ingress (Roadmap)
98
-
The AegisSovereignAI framework treats the trust chain as a closed loop. For a detailed technical breakdown of the Ingress hardware-rooted provenance, see:
97
+
## Architecture Documentation
99
98
100
-
For a detailed technical breakdown of the complete trust framework (Ingress + Egress), see:
99
+
For the complete technical breakdown of the **Unified Identity & Trust Framework** covering both stages, see:
## Stage 2: Trusted Egress & Data Center Infrastructure Attestation (Upstream Ready)
103
+
This document provides detailed architecture for:
104
+
-**Stage 1 (Verified Ingress)** - Hardware-rooted attestation of client devices, privacy-preserving geofencing, and data provenance
105
+
-**Stage 2 (Trusted Egress)** - Data center infrastructure attestation, workload identity, and policy enforcement
106
+
107
+
### Current PoC Implementation Status
108
+
109
+
The current PoC implementation provides a complete, **upstream-ready** integration demonstrating **Stage 2: Egress Unified Identity**. This stage secures the **Managed Data Center Infrastructure** (Sovereign Cloud) by ensuring that the on-premise servers and AI workloads are attested before they can release sensitive egress data. This provides the "Server-Side" mathematical proof required for **Use Case 4 (Automated Regulatory Audit)**.
105
110
106
-
The current PoC implementation provides a complete, **upstream-ready** integration demonstrating **Egress Unified Identity**. This stage secures the **Managed Data Center Infrastructure** (Sovereign Cloud) by ensuring that the on-premise servers and AI workloads are attested before they can release sensitive egress data. This provides the "Server-Side" mathematical proof required for **Use Case 4 (Automated Regulatory Audit)**.
107
111
108
-
### Unified Identity Architecture
109
-
For detailed information on the unified identity architecture, including the complete end-to-end flow, attestation mechanisms, and component interactions, see:
0 commit comments