Skip to content

Commit a4a15bf

Browse files
committed
docs(poc): refactor use cases section to reference main README
- Removed duplicated use case descriptions (29 lines → concise reference) - Added PoC Implementation Coverage table showing Stage 1 vs Stage 2 status - Fixed nested bold ZKP syntax (privacy-preserving techniques) - Single source of truth now in main README.md - PoC README focuses on implementation rather than concept duplication
1 parent 7539436 commit a4a15bf

File tree

1 file changed

+30
-29
lines changed

1 file changed

+30
-29
lines changed

hybrid-cloud-poc/README.md

Lines changed: 30 additions & 29 deletions
Original file line numberDiff line numberDiff line change
@@ -41,41 +41,42 @@ Our solution provides a **Unified Identity & Trust Framework** that secures the
4141
### The Sovereign Trust Loop
4242
A "Sovereign" system that only secures the output is a broken chain. For Tier-1 financial institutions, trust must be established at the source, maintained in the cloud, and verified at the edge.
4343

44-
1. **Verified Ingress**: Hardware-rooted attestation of the originating client device ensuring data provenance and **Regulation K (Reg-K)** geographic compliance via ZKP.
44+
1. **Verified Ingress**: Hardware-rooted attestation of the originating client device ensuring data provenance and **Regulation K (Reg-K)** geographic compliance via **privacy-preserving techniques** (e.g., Zero-Knowledge Proofs / ZKPs).
4545
* *Customer Value:* **Radical Privacy**—verify compliance without tracking movement history.
4646
2. **Trusted Processing**: Confidential Computing (TEEs) and Platform Integrity (Keylime) ensuring the AI workload is isolated from the cloud infrastructure.
4747
* *Customer Value:* **Absolute Data Sovereignty**—ensuring personal financial data is never exposed to third-party infrastructure.
4848
3. **Verifiable Egress**: Hardware-rooted verification ensuring insights are released only to identity-verified and geofenced endpoints.
4949
* *Customer Value:* **Security of Outcome**—guaranteeing that sensitive financial insights are delivered only to the authorized user's verified device.
5050

51-
### Enterprise Personas & Sovereign Use Case Alignment
52-
53-
| Persona | Core Use Case | Primary Benefit | Technical Enabler |
54-
| :--- | :--- | :--- | :--- |
55-
| **Enterprise Customer** | **Private Wealth Gen-AI Advisory (Unmanaged Devices)** | **Radical Privacy** | Verified Ingress with ZKP Geolocation |
56-
| **Enterprise Employee** | **Secure Remote Branch Operations** | **Frictionless Compliance** | Hardware-Rooted Attestation (TPM/Keylime) |
57-
| **Enterprise Tenant** | **Regulatory Sandboxing for LOBs** | **Multi-Tenant Isolation** | SVID-based Identity Segmentation (SPIFFE) |
58-
| **Enterprise Stakeholder** | **Automated Regulatory Audit (All Devices & DC Infrastructure)** | **Compliance without Liability** | Continuous "Silicon-to-Audit" Trail |
59-
60-
#### 1. The Enterprise Customer (Retail/Private Banking End-Consumer)
61-
* **Core Use Case**: **Private Wealth Gen-AI Advisory (Unmanaged Devices).** Providing high-net-worth clients with AI-driven portfolio insights on their personal, unmanaged devices while guaranteeing that their physical location and identity are never leaked to the public cloud.
62-
* **Target Need**: Private interactions with Gen-AI advisors without sacrificing civil liberties or location history.
63-
* **Sovereign Value**: **Radical Privacy.** Users are verified as compliant (e.g., "In the US" or "In a Branch") via ZKP, ensuring the bank meets regulatory metrics (Reg-K) without the privacy liability of storing raw customer movement data.
64-
65-
#### 2. The Enterprise Employee (Branch Relationship Manager)
66-
* **Core Use Case**: **Secure Remote Branch Operations.** Allowing Relationship Managers to access sensitive PII from "Green Zone" servers on managed hardware, whether at a branch or a verified remote location.
67-
* **Target Need**: Frictionless access to sensitive client PII on-site for analysis or loan processing using managed laptops or branch servers.
68-
* **Sovereign Value**: **Frictionless Compliance.** Instead of manual VPNs or vulnerable passwords, the **Hardware Integrity** of their device (TPM/Keylime) automatically proves it is untampered and policy-compliant. If the device firmware is compromised, access is revoked cryptographically at the hardware layer.
69-
70-
#### 3. The Enterprise Tenant (Line-of-Business Owner)
71-
* **Core Use Case**: **Regulatory Sandboxing for Lobs.** Enabling the Mortgage and Credit Card divisions to share the same physical Sovereign Cloud while ensuring total cryptographic isolation of their respective AI models and data.
72-
* **Target Need**: Guarantee that sensitive workloads are isolated even when sharing Sovereign Cloud infrastructure.
73-
* **Sovereign Value**: **Multi-Tenant Isolation.** Trust is established via **Cryptographic Identity (SPIFFE/SVID)** rather than network location. This provides hardware-enforced isolation between business units, even on shared silicon.
74-
75-
#### 4. The Enterprise Stakeholder (Chief Risk/Sovereignty Officer)
76-
* **Core Use Case**: **Automated Regulatory Audit (All End-User Devices & Data Center Infrastructure).** Providing a real-time, mathematical proof-of-compliance for the **Office of the Comptroller of the Currency (OCC)** or **European Central Bank (ECB)**, demonstrating that every AI interaction—across all retail devices, employee hardware, and **Managed Data Center Infrastructure**—was verified by hardware and compliant with data residency laws.
77-
* **Target Need**: Deterministic, math-based proof for **Government Regulators** that data residency and sovereignty policies are strictly enforced.
78-
* **Sovereign Value**: **Compliance without Liability.** By using ZKP-based location proofs, the Risk Officer can prove regional residency to regulators without the bank ever having to ingest or store high-resolution, high-liability customer location data.
51+
## Enterprise Use Cases
52+
53+
This PoC demonstrates the technical implementation for the 4 enterprise use cases described in the [main AegisSovereignAI README](../README.md#enterprise-sovereign-use-cases-focus-financial-services):
54+
55+
1. **Enterprise Customer** - Private Wealth Gen-AI Advisory (Unmanaged Devices)
56+
2. **Enterprise Employee** - Secure Remote Branch Operations
57+
3. **Enterprise Tenant** - Secure Sandboxing for Line-of-Business (LOB) units
58+
4. **Regulator** - Automated Regulatory Audit
59+
60+
For full use case descriptions, value propositions, and regulatory context, see the [main README](../README.md).
61+
62+
### PoC Implementation Coverage
63+
64+
This PoC provides end-to-end implementation for **Stage 2: Trusted Egress & Data Center Infrastructure Attestation**. Stage 1 (Verified Ingress) is defined architecturally in [README-arch-sovereign-ingress.md](README-arch-sovereign-ingress.md).
65+
66+
| Use Case | Stage 1: Verified Ingress | Stage 2: Trusted Egress | PoC Status |
67+
|----------|---------------------------|-------------------------|------------|
68+
| **Enterprise Customer** | Roadmap (Ingress architecture defined) | ✅ Implemented | Partial - Egress ready |
69+
| **Enterprise Employee** | Roadmap (Ingress architecture defined) | ✅ Implemented | Partial - Egress ready |
70+
| **Enterprise Tenant** | N/A (Internal workload isolation) | ✅ Implemented | Full |
71+
| **Regulator** | Roadmap (Ingress architecture defined) | ✅ Implemented | Partial - Data center audit ready |
72+
73+
**What This PoC Demonstrates:**
74+
- ✅ Hardware-rooted identity (TPM attestation via Keylime)
75+
- ✅ Unified SPIFFE/SPIRE identity with geolocation claims
76+
- ✅ Privacy-preserving geofencing (Reg-K compliance without storing GPS)
77+
- ✅ Envoy-based policy enforcement (fail-closed WASM filtering)
78+
- ✅ Silicon-to-Audit trail for regulatory compliance
79+
- ✅ Degraded SVID detection (insider threat protection)
7980

8081
---
8182

0 commit comments

Comments
 (0)