Skip to content

Commit 3d871e3

Browse files
committed
docs(poc): consolidate architecture references into single section
- Created single Architecture Documentation section explaining full framework - Removed redundant architecture references throughout document - Clear explanation: unified identity doc covers both Stage 1 (ingress) and Stage 2 (egress) - Single source of truth for architecture reference
1 parent 824bc92 commit 3d871e3

File tree

1 file changed

+11
-10
lines changed

1 file changed

+11
-10
lines changed

hybrid-cloud-poc/README.md

Lines changed: 11 additions & 10 deletions
Original file line numberDiff line numberDiff line change
@@ -61,7 +61,7 @@ For full use case descriptions, value propositions, and regulatory context, see
6161

6262
### PoC Implementation Coverage
6363

64-
This PoC provides end-to-end implementation for **Stage 2: Trusted Egress & Data Center Infrastructure Attestation**. Stage 1 (Verified Ingress) is defined architecturally in the [Unified Identity & Trust Framework](README-arch-sovereign-unified-identity.md).
64+
This PoC provides end-to-end implementation for **Stage 2: Trusted Egress & Data Center Infrastructure Attestation**. Stage 1 (Verified Ingress) is defined architecturally (see Architecture Documentation section below).
6565

6666
| Use Case | Stage 1: Verified Ingress | Stage 2: Trusted Egress | PoC Status |
6767
|----------|---------------------------|-------------------------|------------|
@@ -78,7 +78,7 @@ This PoC provides end-to-end implementation for **Stage 2: Trusted Egress & Data
7878
- ✅ mTLS with hardware-bound certificates (workload attestation)
7979

8080
**Roadmap (Architecturally Defined):**
81-
- 🔲 Privacy-preserving geofencing (ZKP-based Reg-K compliance without storing GPS) - See [Unified Identity & Trust Framework](README-arch-sovereign-unified-identity.md)
81+
- 🔲 Privacy-preserving geofencing (ZKP-based Reg-K compliance without storing GPS) - See Architecture Documentation section below
8282
- 🔲 Privacy-preserving data center audit trail (batch & purge proofs) - See main [README](../README.md#layer-3-ai-governance-verifiable-logic--privacy)
8383

8484
---
@@ -94,20 +94,21 @@ The AegisSovereignAI framework implements this loop through:
9494
> [!NOTE]
9595
> **Implementation Status**: The Verified Ingress (Stage 1) architecture is defined and the technical implementation is slated for the immediate roadmap. This PoC currently provides the end-to-end implementation for the Trusted Egress (Stage 2).
9696
97-
## Stage 1: Verified Ingress (Roadmap)
98-
The AegisSovereignAI framework treats the trust chain as a closed loop. For a detailed technical breakdown of the Ingress hardware-rooted provenance, see:
97+
## Architecture Documentation
9998

100-
For a detailed technical breakdown of the complete trust framework (Ingress + Egress), see:
99+
For the complete technical breakdown of the **Unified Identity & Trust Framework** covering both stages, see:
101100

102101
👉 **[Unified Identity & Trust Framework](README-arch-sovereign-unified-identity.md)**
103102

104-
## Stage 2: Trusted Egress & Data Center Infrastructure Attestation (Upstream Ready)
103+
This document provides detailed architecture for:
104+
- **Stage 1 (Verified Ingress)** - Hardware-rooted attestation of client devices, privacy-preserving geofencing, and data provenance
105+
- **Stage 2 (Trusted Egress)** - Data center infrastructure attestation, workload identity, and policy enforcement
106+
107+
### Current PoC Implementation Status
108+
109+
The current PoC implementation provides a complete, **upstream-ready** integration demonstrating **Stage 2: Egress Unified Identity**. This stage secures the **Managed Data Center Infrastructure** (Sovereign Cloud) by ensuring that the on-premise servers and AI workloads are attested before they can release sensitive egress data. This provides the "Server-Side" mathematical proof required for **Use Case 4 (Automated Regulatory Audit)**.
105110

106-
The current PoC implementation provides a complete, **upstream-ready** integration demonstrating **Egress Unified Identity**. This stage secures the **Managed Data Center Infrastructure** (Sovereign Cloud) by ensuring that the on-premise servers and AI workloads are attested before they can release sensitive egress data. This provides the "Server-Side" mathematical proof required for **Use Case 4 (Automated Regulatory Audit)**.
107111

108-
### Unified Identity Architecture
109-
For detailed information on the unified identity architecture, including the complete end-to-end flow, attestation mechanisms, and component interactions, see:
110-
**[README-arch-sovereign-unified-identity.md](README-arch-sovereign-unified-identity.md)**
111112

112113
### Architecture Overview
113114

0 commit comments

Comments
 (0)