Skip to content

Commit 852d9c2

Browse files
committed
docs: Rename auditor deep-dive to auditor-privacy-preserving-ai-governance.md
More representative of Layer 3 focused content. Updated all cross-references.
1 parent acb71cb commit 852d9c2

12 files changed

+18
-163
lines changed

README.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -138,7 +138,7 @@ AegisSovereignAI is designed to be framework-agnostic, serving as a secure execu
138138

139139
* **[Auditor Guide](./docs/auditor.md)** - High-level overview of the attestation-linked evidence model covering the full AI lifecycle (Ingestion, Training, and Inference), verifiable geofencing (Reg-K), and identity binding. Includes the complete Evidence Bundle structure for regulatory reporting.
140140
* **[Infrastructure Sovereignty (Layer 1/2)](./docs/infrastructure-sovereignty.md)** - Technical deep-dive on **Environmental Trust**: Hardware attestation (TEE/TPM), identity binding (SPIFFE/SPIRE + Keylime), privacy-preserving geofencing (Reg-K), and data ingestion provenance.
141-
* **[Privacy-Preserving AI Governance (Layer 3)](./docs/auditor-privacy-preserving-deep-dive.md)** - Technical walkthrough of the **Four-Track Layer 3 Governance Lifecycle** (Training, System Prompt, User Prompt, Output), Batch & Purge architecture, and modular Evidence Bundle verification.
141+
* **[Privacy-Preserving AI Governance (Layer 3)](./docs/auditor-privacy-preserving-ai-governance.md)** - Technical walkthrough of the **Four-Track Layer 3 Governance Lifecycle** (Training, System Prompt, User Prompt, Output), Batch & Purge architecture, and modular Evidence Bundle verification.
142142
* **[Threat Model: Unmanaged Device Security](./hybrid-cloud-poc/THREAT-MODEL-unmanaged-device.md)** - Analysis of **Infrastructure Blind Spots** on **BYOD/Unmanaged Devices**, detailing how AegisSovereignAI prevents location spoofing via hardware-rooted sensor fusion.
143143
* **[Unified Identity Deep-Dive](./hybrid-cloud-poc/README-arch-sovereign-unified-identity.md)** - Detailed technical architecture of the SPIRE/Keylime identity fusion model.
144144
* **[IETF WIMSE Draft](https://datatracker.ietf.org/doc/draft-lkspa-wimse-verifiable-geo-fence/)** - Our contribution to standardizing verifiable geo-fences in multi-system environments.
File renamed without changes.

docs/auditor.md

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -1,6 +1,6 @@
11
# Auditor Guide: Verifying the Sovereign Trust Loop
22

3-
> **For Auditors & Risk Officers:** This is the high-level guide to understanding AegisSovereignAI's attestation-linked evidence model. For a deep technical dive into **privacy-preserving techniques (e.g. ZKP)** circuits and the Five-Track architecture for the full AI lifecycle, see the **[Privacy-Preserving Deep-Dive for Technical Auditors](./auditor-privacy-preserving-deep-dive.md)**.
3+
> **For Auditors & Risk Officers:** This is the high-level guide to understanding AegisSovereignAI's attestation-linked evidence model. For a deep technical dive into **privacy-preserving techniques (e.g. **Zero-knowledge-proofs aka ZKPs**)** circuits and the Five-Track architecture for the full AI lifecycle, see the **[Privacy-Preserving Deep-Dive for Technical Auditors](./auditor-privacy-preserving-deep-dive.md)**.
44
55
AegisSovereignAI provides a cryptographically verifiable solution to the **"Accountability Gap"** in modern AI infrastructure. This guide provides auditors and risk officers with the technical framework required to prove compliance with global standards, including the **EU AI Act**, **NIST AI RMF**, and **Regulation K (Reg-K)**.
66

@@ -10,7 +10,7 @@ Traditional IT security relies on **Infrastructure Blind Spots**—where an admi
1010

1111
Auditors use time-bound, attestation-linked proofs to:
1212
- **Test Control Effectiveness**: Verify that claimed controls (attestation, residency, model integrity) worked at a concrete instant.
13-
- **Solve the Residency vs. Privacy Deadlock**: Use **privacy-preserving techniques (e.g. ZKP)** to prove data residency and model compliance without ingesting or storing high-liability **Personally Identifiable Information (PII)**.
13+
- **Solve the Residency vs. Privacy Deadlock**: Use **privacy-preserving techniques (e.g. **ZKP**)** to prove data residency and model compliance without ingesting or storing high-liability **Personally Identifiable Information (PII)**.
1414
- **Establish Physical Provenance**: Prove that a specific decision was made on authorized, heterogeneous hardware (Intel TDX, AMD SEV, NVIDIA H100) and not on a spoofed or unauthorized platform.
1515
- **Ensure Litigation Readiness**: Create an evidentiary chain suitable for regulatory audit, expert review, or courtroom discovery.
1616

@@ -40,7 +40,7 @@ When an AI inference request is made, AegisSovereignAI performs a "Pre-Flight Ch
4040
1. **Ingestion/Provenance Verification:** Proving the data source is a genuine hardware device in an authorized region (Track A).
4141
2. **Training/Redaction Verification:** Proving the model was trained only on policy-compliant, redacted data (Track B).
4242
3. **Hardware Verification:** Keylime requests a **TPM Quote** to ensure the silicon is genuine and the OS is untampered.
43-
4. **Location Verification:** The node generates a **privacy-preserving proof (e.g. ZKP)** that its current hardware-measured location matches the "Green Zone" policy.
43+
4. **Location Verification:** The node generates a **privacy-preserving techniques (e.g. **ZKP**)** proof that its current hardware-measured location matches the "Green Zone" policy.
4444
5. **Inference Governance (Batch & Purge):** Generating proofs for system/user prompts and AI outputs while purging raw data (Tracks C/D/E).
4545
6. **Identity Fusion:** SPIRE issues a **Unified SVID** that cryptographically binds the verified hardware to the specific User Session.
4646

docs/infrastructure-sovereignty.md

Lines changed: 5 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -1,6 +1,6 @@
11
# Infrastructure Sovereignty: Layer 1 & Layer 2 Trust Primitives
22

3-
> **For Technical Auditors & Architects:** This document covers the **Environmental Trust** foundations (Hardware + Identity + Location) that must be established before Layer 3 AI Governance can begin. For the AI-specific governance model (prompts, outputs, compliance proofs), see the **[Privacy-Preserving Deep-Dive](./auditor-privacy-preserving-deep-dive.md)**.
3+
> **For Technical Auditors & Architects:** This document covers the **Environmental Trust** foundations (Hardware + Identity + Location) that must be established before Layer 3 AI Governance can begin. For the AI-specific governance model (prompts, outputs, compliance proofs), see the **[Privacy-Preserving Deep-Dive](./auditor-privacy-preserving-ai-governance.md)**.
44
55
---
66

@@ -12,11 +12,11 @@ Before auditing **what the AI is saying** (Layer 3), auditors must first verify
1212
|-------|--------------|----------------------|
1313
| **Layer 1: Infrastructure** | Hardware Trust | "Is this genuine, untampered silicon?" |
1414
| **Layer 2: Identity** | Environmental Trust | "Is this workload running in an authorized location on an authorized device?" |
15-
| **Layer 3: Governance** | Content Trust | "Did this AI follow the governance policy?" (See [Privacy-Preserving Deep-Dive](./auditor-privacy-preserving-deep-dive.md)) |
15+
| **Layer 3: Governance** | Content Trust | "Did this AI follow the governance policy?" (See [Privacy-Preserving Deep-Dive](./auditor-privacy-preserving-ai-governance.md)) |
1616

1717
**The Modular Evidence Bundle:** When an auditor receives an Evidence Bundle, verification proceeds in stages:
1818
- **Stage 1 (This Document):** "Is this a valid Aegis Sovereign Node?" → Verified via Layer 1/2 Attestation
19-
- **Stage 2 ([Deep-Dive](./auditor-privacy-preserving-deep-dive.md)):** "Did this node follow the governance policy?" → Verified via Layer 3 ZKP
19+
- **Stage 2 ([Deep-Dive](./auditor-privacy-preserving-ai-governance.md)):** "Did this node follow the governance policy?" → Verified via Layer 3 ZKP
2020

2121
---
2222

@@ -138,7 +138,7 @@ When an auditor requests infrastructure attestation, they receive:
138138
2. **Verify Identity Binding:** Confirm the SVID is bound to the attested hardware.
139139
3. **Verify Geofence Proof:** Confirm the workload is within the compliant boundary.
140140

141-
Once Stage 1 passes, the auditor proceeds to **Stage 2** ([Layer 3 Governance Verification](./auditor-privacy-preserving-deep-dive.md)).
141+
Once Stage 1 passes, the auditor proceeds to **Stage 2** ([Layer 3 Governance Verification](./auditor-privacy-preserving-ai-governance.md)).
142142

143143
---
144144

@@ -154,4 +154,4 @@ Once Stage 1 passes, the auditor proceeds to **Stage 2** ([Layer 3 Governance Ve
154154

155155
---
156156

157-
[Root README](../README.md) | [Auditor Guide](./auditor.md) | [Privacy-Preserving Deep-Dive (Layer 3)](./auditor-privacy-preserving-deep-dive.md)
157+
[Root README](../README.md) | [Auditor Guide](./auditor.md) | [Privacy-Preserving Deep-Dive (Layer 3)](./auditor-privacy-preserving-ai-governance.md)

docs/langgraph-integration.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -46,7 +46,7 @@ Using the **Keylime-to-SPIRE** loop, Aegis acts as a physical kill-switch for th
4646
| --- | --- | --- |
4747
| **Ingress (BYOD)** | **Secure Enclave Attestation** | Proves the customer's phone is untampered without needing MDM. |
4848
| **Orchestration** | **Blended SVID Handshake** | Ensures Agent A can only talk to Agent B if both share a valid User-Session claim. |
49-
| **Egress (Audit)** | **Privacy-Preserving (e.g. ZKP) Geofencing** | Proves the advisor's final sign-off occurred in a "Green Zone" (US branch). |
49+
| **Egress (Audit)** | **Privacy-Preserving (e.g. Zero-knowledge-proofs aka ZKPs) Geofencing** | Proves the advisor's final sign-off occurred in a "Green Zone" (US branch). |
5050

5151
---
5252

hybrid-cloud-poc/README-arch-sovereign-unified-identity.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -172,7 +172,7 @@ SPIRE AGENT SVID ISSUANCE & WORKLOAD SVID ISSUANCE:
172172
- Envoy WASM Plugin and Mobile Sensor Microservice (Mock MNO) to be released as standalone, reusable open source projects
173173
- **Mobile Sensor Microservice (Mock MNO)**:
174174
- Acts as the "Mock MNO" provider for verifying "Device Location" via CAMARA APIs.
175-
- Verifier calls this service (conceptually) or verifies the ZKP receipt derived from it.
175+
- Verifier calls this service (conceptually) or verifies the Zero-knowledge-proofs aka ZKPs receipt derived from it.
176176
- No breaking changes to either upstream project
177177
- Each component independently mergeable
178178

@@ -267,7 +267,7 @@ AegisSovereignAI closes the Perception Gap by moving beyond single-source trust:
267267
## Edge Ecosystems (Apple, Android, Windows, Linux)
268268

269269
Aegis provides a unified security strategy for billions of managed and unmanaged endpoints:
270-
1. **Apple (iOS & Apple Silicon macOS)**: Uses **App Attest** for app-level hardware binding. Note that on macOS, App Attest requires **Apple Silicon** (M-series chips). For Enterprise-managed hardware (e.g., JPMC-managed), **Managed Device Attestation (MDA)** provides enterprise policy enforcement across both iOS and macOS (Intel & Silicon).
270+
1. **Apple (iOS & Apple Silicon macOS)**: Uses **App Attest** for app-level hardware binding. Note that on macOS, App Attest requires **Apple Silicon** (M-series chips). For Enterprise-managed hardware (e.g., at JPMC or Barclays), **Managed Device Attestation (MDA)** provides enterprise policy enforcement across both iOS and macOS (Intel & Silicon).
271271
2. **Android (StrongBox/TEE)**: Uses **Android Key Attestation**. The Aegis Verifier validates the hardware-rooted certificate chain (signed by Google's Root CA) to verify Bootloader status and ensure the banking app's keys are stored in a dedicated **StrongBox** or **Trusted Execution Environment (TEE)**.
272272

273273
> [!TIP]

hybrid-cloud-poc/README.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -78,8 +78,8 @@ This PoC provides end-to-end implementation for **Stage 2: Trusted Egress & Data
7878
- ✅ mTLS with hardware-bound certificates (workload attestation)
7979

8080
**Roadmap (Architecturally Defined):**
81-
- 🔲 Privacy-preserving Geofencing (Ingress & Egress): ZKP-based Reg-K compliance without storing GPS - See Architecture Documentation section below
82-
or Mo- 🔲 Privacy-preserving data center audit trail (batch & purge proofs) - See main [README](../README.md#layer-3-ai-governance-verifiable-logic--privacy)
81+
- 🔲 Privacy-preserving Geofencing (Ingress & Egress): ZKP-based Reg-K compliance without storing GPS or Mobile Network location data - See Architecture Documentation section below
82+
- 🔲 Privacy-preserving data center audit trail (batch & purge proofs) - See main [README](../README.md#layer-3-ai-governance-verifiable-logic--privacy)
8383

8484
---
8585

hybrid-cloud-poc/ROADMAP-CCB-pilot-30-60-90.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -19,7 +19,7 @@ This roadmap outlines a 90-day execution template to transition the AegisSoverei
1919
**Goal:** Extend the trust boundary to unmanaged HNW customer devices via Verified Ingress.
2020

2121
* **Workstream 4 (Mobile SDK):** Integrate the Aegis Ingress SDK (App Attest/Key Attestation) into an authorized mobile application (e.g., JPM Private Banking).
22-
* **Workstream 5 (Privacy-Preserving Geofencing):** Implement **privacy-preserving techniques (e.g. ZKP)** for verified geofencing (Reg-K compliance) in high-risk regions.
22+
* **Workstream 5 (Privacy-Preserving Geofencing):** Implement **privacy-preserving techniques (e.g. Zero-knowledge-proofs aka ZKPs)** for verified geofencing (Reg-K compliance) in high-risk regions.
2323
* **Workstream 6 (Aegis Verifier):** Instantiate the Aegis Verifier as the "Trust Bridge" between OEM Root CAs and the bank's SPIRE server.
2424
* **Milestone:** A HNW customer performs a trade verification from a personal iPhone with **Point-in-Time** hardware attestation.
2525

hybrid-cloud-poc/THREAT-MODEL-runtime-perception-gap.md

Lines changed: 0 additions & 73 deletions
This file was deleted.

0 commit comments

Comments
 (0)