You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: README.md
+1-1Lines changed: 1 addition & 1 deletion
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -138,7 +138,7 @@ AegisSovereignAI is designed to be framework-agnostic, serving as a secure execu
138
138
139
139
***[Auditor Guide](./docs/auditor.md)** - High-level overview of the attestation-linked evidence model covering the full AI lifecycle (Ingestion, Training, and Inference), verifiable geofencing (Reg-K), and identity binding. Includes the complete Evidence Bundle structure for regulatory reporting.
140
140
***[Infrastructure Sovereignty (Layer 1/2)](./docs/infrastructure-sovereignty.md)** - Technical deep-dive on **Environmental Trust**: Hardware attestation (TEE/TPM), identity binding (SPIFFE/SPIRE + Keylime), privacy-preserving geofencing (Reg-K), and data ingestion provenance.
141
-
***[Privacy-Preserving AI Governance (Layer 3)](./docs/auditor-privacy-preserving-deep-dive.md)** - Technical walkthrough of the **Four-Track Layer 3 Governance Lifecycle** (Training, System Prompt, User Prompt, Output), Batch & Purge architecture, and modular Evidence Bundle verification.
141
+
***[Privacy-Preserving AI Governance (Layer 3)](./docs/auditor-privacy-preserving-ai-governance.md)** - Technical walkthrough of the **Four-Track Layer 3 Governance Lifecycle** (Training, System Prompt, User Prompt, Output), Batch & Purge architecture, and modular Evidence Bundle verification.
142
142
***[Threat Model: Unmanaged Device Security](./hybrid-cloud-poc/THREAT-MODEL-unmanaged-device.md)** - Analysis of **Infrastructure Blind Spots** on **BYOD/Unmanaged Devices**, detailing how AegisSovereignAI prevents location spoofing via hardware-rooted sensor fusion.
143
143
***[Unified Identity Deep-Dive](./hybrid-cloud-poc/README-arch-sovereign-unified-identity.md)** - Detailed technical architecture of the SPIRE/Keylime identity fusion model.
144
144
***[IETF WIMSE Draft](https://datatracker.ietf.org/doc/draft-lkspa-wimse-verifiable-geo-fence/)** - Our contribution to standardizing verifiable geo-fences in multi-system environments.
Copy file name to clipboardExpand all lines: docs/auditor.md
+3-3Lines changed: 3 additions & 3 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -1,6 +1,6 @@
1
1
# Auditor Guide: Verifying the Sovereign Trust Loop
2
2
3
-
> **For Auditors & Risk Officers:** This is the high-level guide to understanding AegisSovereignAI's attestation-linked evidence model. For a deep technical dive into **privacy-preserving techniques (e.g. ZKP)** circuits and the Five-Track architecture for the full AI lifecycle, see the **[Privacy-Preserving Deep-Dive for Technical Auditors](./auditor-privacy-preserving-deep-dive.md)**.
3
+
> **For Auditors & Risk Officers:** This is the high-level guide to understanding AegisSovereignAI's attestation-linked evidence model. For a deep technical dive into **privacy-preserving techniques (e.g. **Zero-knowledge-proofs aka ZKPs**)** circuits and the Five-Track architecture for the full AI lifecycle, see the **[Privacy-Preserving Deep-Dive for Technical Auditors](./auditor-privacy-preserving-deep-dive.md)**.
4
4
5
5
AegisSovereignAI provides a cryptographically verifiable solution to the **"Accountability Gap"** in modern AI infrastructure. This guide provides auditors and risk officers with the technical framework required to prove compliance with global standards, including the **EU AI Act**, **NIST AI RMF**, and **Regulation K (Reg-K)**.
6
6
@@ -10,7 +10,7 @@ Traditional IT security relies on **Infrastructure Blind Spots**—where an admi
10
10
11
11
Auditors use time-bound, attestation-linked proofs to:
12
12
-**Test Control Effectiveness**: Verify that claimed controls (attestation, residency, model integrity) worked at a concrete instant.
13
-
-**Solve the Residency vs. Privacy Deadlock**: Use **privacy-preserving techniques (e.g. ZKP)** to prove data residency and model compliance without ingesting or storing high-liability **Personally Identifiable Information (PII)**.
13
+
-**Solve the Residency vs. Privacy Deadlock**: Use **privacy-preserving techniques (e.g. **ZKP**)** to prove data residency and model compliance without ingesting or storing high-liability **Personally Identifiable Information (PII)**.
14
14
-**Establish Physical Provenance**: Prove that a specific decision was made on authorized, heterogeneous hardware (Intel TDX, AMD SEV, NVIDIA H100) and not on a spoofed or unauthorized platform.
15
15
-**Ensure Litigation Readiness**: Create an evidentiary chain suitable for regulatory audit, expert review, or courtroom discovery.
16
16
@@ -40,7 +40,7 @@ When an AI inference request is made, AegisSovereignAI performs a "Pre-Flight Ch
40
40
1.**Ingestion/Provenance Verification:** Proving the data source is a genuine hardware device in an authorized region (Track A).
41
41
2.**Training/Redaction Verification:** Proving the model was trained only on policy-compliant, redacted data (Track B).
42
42
3.**Hardware Verification:** Keylime requests a **TPM Quote** to ensure the silicon is genuine and the OS is untampered.
43
-
4.**Location Verification:** The node generates a **privacy-preserving proof (e.g. ZKP)** that its current hardware-measured location matches the "Green Zone" policy.
43
+
4.**Location Verification:** The node generates a **privacy-preserving techniques (e.g. **ZKP**)** proof that its current hardware-measured location matches the "Green Zone" policy.
44
44
5.**Inference Governance (Batch & Purge):** Generating proofs for system/user prompts and AI outputs while purging raw data (Tracks C/D/E).
45
45
6.**Identity Fusion:** SPIRE issues a **Unified SVID** that cryptographically binds the verified hardware to the specific User Session.
> **For Technical Auditors & Architects:** This document covers the **Environmental Trust** foundations (Hardware + Identity + Location) that must be established before Layer 3 AI Governance can begin. For the AI-specific governance model (prompts, outputs, compliance proofs), see the **[Privacy-Preserving Deep-Dive](./auditor-privacy-preserving-deep-dive.md)**.
3
+
> **For Technical Auditors & Architects:** This document covers the **Environmental Trust** foundations (Hardware + Identity + Location) that must be established before Layer 3 AI Governance can begin. For the AI-specific governance model (prompts, outputs, compliance proofs), see the **[Privacy-Preserving Deep-Dive](./auditor-privacy-preserving-ai-governance.md)**.
4
4
5
5
---
6
6
@@ -12,11 +12,11 @@ Before auditing **what the AI is saying** (Layer 3), auditors must first verify
|**Layer 2: Identity**| Environmental Trust | "Is this workload running in an authorized location on an authorized device?" |
15
-
|**Layer 3: Governance**| Content Trust | "Did this AI follow the governance policy?" (See [Privacy-Preserving Deep-Dive](./auditor-privacy-preserving-deep-dive.md)) |
15
+
|**Layer 3: Governance**| Content Trust | "Did this AI follow the governance policy?" (See [Privacy-Preserving Deep-Dive](./auditor-privacy-preserving-ai-governance.md)) |
16
16
17
17
**The Modular Evidence Bundle:** When an auditor receives an Evidence Bundle, verification proceeds in stages:
18
18
-**Stage 1 (This Document):** "Is this a valid Aegis Sovereign Node?" → Verified via Layer 1/2 Attestation
19
-
-**Stage 2 ([Deep-Dive](./auditor-privacy-preserving-deep-dive.md)):** "Did this node follow the governance policy?" → Verified via Layer 3 ZKP
19
+
-**Stage 2 ([Deep-Dive](./auditor-privacy-preserving-ai-governance.md)):** "Did this node follow the governance policy?" → Verified via Layer 3 ZKP
20
20
21
21
---
22
22
@@ -138,7 +138,7 @@ When an auditor requests infrastructure attestation, they receive:
138
138
2.**Verify Identity Binding:** Confirm the SVID is bound to the attested hardware.
139
139
3.**Verify Geofence Proof:** Confirm the workload is within the compliant boundary.
140
140
141
-
Once Stage 1 passes, the auditor proceeds to **Stage 2** ([Layer 3 Governance Verification](./auditor-privacy-preserving-deep-dive.md)).
141
+
Once Stage 1 passes, the auditor proceeds to **Stage 2** ([Layer 3 Governance Verification](./auditor-privacy-preserving-ai-governance.md)).
142
142
143
143
---
144
144
@@ -154,4 +154,4 @@ Once Stage 1 passes, the auditor proceeds to **Stage 2** ([Layer 3 Governance Ve
Copy file name to clipboardExpand all lines: docs/langgraph-integration.md
+1-1Lines changed: 1 addition & 1 deletion
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -46,7 +46,7 @@ Using the **Keylime-to-SPIRE** loop, Aegis acts as a physical kill-switch for th
46
46
| --- | --- | --- |
47
47
|**Ingress (BYOD)**|**Secure Enclave Attestation**| Proves the customer's phone is untampered without needing MDM. |
48
48
|**Orchestration**|**Blended SVID Handshake**| Ensures Agent A can only talk to Agent B if both share a valid User-Session claim. |
49
-
|**Egress (Audit)**|**Privacy-Preserving (e.g. ZKP) Geofencing**| Proves the advisor's final sign-off occurred in a "Green Zone" (US branch). |
49
+
|**Egress (Audit)**|**Privacy-Preserving (e.g. Zero-knowledge-proofs aka ZKPs) Geofencing**| Proves the advisor's final sign-off occurred in a "Green Zone" (US branch). |
Aegis provides a unified security strategy for billions of managed and unmanaged endpoints:
270
-
1.**Apple (iOS & Apple Silicon macOS)**: Uses **App Attest** for app-level hardware binding. Note that on macOS, App Attest requires **Apple Silicon** (M-series chips). For Enterprise-managed hardware (e.g., JPMC-managed), **Managed Device Attestation (MDA)** provides enterprise policy enforcement across both iOS and macOS (Intel & Silicon).
270
+
1.**Apple (iOS & Apple Silicon macOS)**: Uses **App Attest** for app-level hardware binding. Note that on macOS, App Attest requires **Apple Silicon** (M-series chips). For Enterprise-managed hardware (e.g., at JPMC or Barclays), **Managed Device Attestation (MDA)** provides enterprise policy enforcement across both iOS and macOS (Intel & Silicon).
271
271
2.**Android (StrongBox/TEE)**: Uses **Android Key Attestation**. The Aegis Verifier validates the hardware-rooted certificate chain (signed by Google's Root CA) to verify Bootloader status and ensure the banking app's keys are stored in a dedicated **StrongBox** or **Trusted Execution Environment (TEE)**.
Copy file name to clipboardExpand all lines: hybrid-cloud-poc/README.md
+2-2Lines changed: 2 additions & 2 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -78,8 +78,8 @@ This PoC provides end-to-end implementation for **Stage 2: Trusted Egress & Data
78
78
- ✅ mTLS with hardware-bound certificates (workload attestation)
79
79
80
80
**Roadmap (Architecturally Defined):**
81
-
- 🔲 Privacy-preserving Geofencing (Ingress & Egress): ZKP-based Reg-K compliance without storing GPS - See Architecture Documentation section below
82
-
or Mo- 🔲 Privacy-preserving data center audit trail (batch & purge proofs) - See main [README](../README.md#layer-3-ai-governance-verifiable-logic--privacy)
81
+
- 🔲 Privacy-preserving Geofencing (Ingress & Egress): ZKP-based Reg-K compliance without storing GPS or Mobile Network location data - See Architecture Documentation section below
82
+
- 🔲 Privacy-preserving data center audit trail (batch & purge proofs) - See main [README](../README.md#layer-3-ai-governance-verifiable-logic--privacy)
0 commit comments