You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
docs(poc): refactor use cases section to reference main README
- Removed duplicated use case descriptions (29 lines → concise reference)
- Added PoC Implementation Coverage table showing Stage 1 vs Stage 2 status
- Fixed nested bold ZKP syntax (privacy-preserving techniques)
- Single source of truth now in main README.md
- PoC README focuses on implementation rather than concept duplication
Copy file name to clipboardExpand all lines: hybrid-cloud-poc/README.md
+30-29Lines changed: 30 additions & 29 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -41,41 +41,42 @@ Our solution provides a **Unified Identity & Trust Framework** that secures the
41
41
### The Sovereign Trust Loop
42
42
A "Sovereign" system that only secures the output is a broken chain. For Tier-1 financial institutions, trust must be established at the source, maintained in the cloud, and verified at the edge.
43
43
44
-
1.**Verified Ingress**: Hardware-rooted attestation of the originating client device ensuring data provenance and **Regulation K (Reg-K)** geographic compliance via ZKP.
44
+
1.**Verified Ingress**: Hardware-rooted attestation of the originating client device ensuring data provenance and **Regulation K (Reg-K)** geographic compliance via **privacy-preserving techniques** (e.g., Zero-Knowledge Proofs / ZKPs).
45
45
**Customer Value:***Radical Privacy**—verify compliance without tracking movement history.
46
46
2.**Trusted Processing**: Confidential Computing (TEEs) and Platform Integrity (Keylime) ensuring the AI workload is isolated from the cloud infrastructure.
47
47
**Customer Value:***Absolute Data Sovereignty**—ensuring personal financial data is never exposed to third-party infrastructure.
48
48
3.**Verifiable Egress**: Hardware-rooted verification ensuring insights are released only to identity-verified and geofenced endpoints.
49
49
**Customer Value:***Security of Outcome**—guaranteeing that sensitive financial insights are delivered only to the authorized user's verified device.
50
50
51
-
### Enterprise Personas & Sovereign Use Case Alignment
52
-
53
-
| Persona | Core Use Case | Primary Benefit | Technical Enabler |
|**Enterprise Stakeholder**|**Automated Regulatory Audit (All Devices & DC Infrastructure)**|**Compliance without Liability**| Continuous "Silicon-to-Audit" Trail |
59
-
60
-
#### 1. The Enterprise Customer (Retail/Private Banking End-Consumer)
61
-
***Core Use Case**: **Private Wealth Gen-AI Advisory (Unmanaged Devices).** Providing high-net-worth clients with AI-driven portfolio insights on their personal, unmanaged devices while guaranteeing that their physical location and identity are never leaked to the public cloud.
62
-
***Target Need**: Private interactions with Gen-AI advisors without sacrificing civil liberties or location history.
63
-
***Sovereign Value**: **Radical Privacy.** Users are verified as compliant (e.g., "In the US" or "In a Branch") via ZKP, ensuring the bank meets regulatory metrics (Reg-K) without the privacy liability of storing raw customer movement data.
64
-
65
-
#### 2. The Enterprise Employee (Branch Relationship Manager)
66
-
***Core Use Case**: **Secure Remote Branch Operations.** Allowing Relationship Managers to access sensitive PII from "Green Zone" servers on managed hardware, whether at a branch or a verified remote location.
67
-
***Target Need**: Frictionless access to sensitive client PII on-site for analysis or loan processing using managed laptops or branch servers.
68
-
***Sovereign Value**: **Frictionless Compliance.** Instead of manual VPNs or vulnerable passwords, the **Hardware Integrity** of their device (TPM/Keylime) automatically proves it is untampered and policy-compliant. If the device firmware is compromised, access is revoked cryptographically at the hardware layer.
69
-
70
-
#### 3. The Enterprise Tenant (Line-of-Business Owner)
71
-
***Core Use Case**: **Regulatory Sandboxing for Lobs.** Enabling the Mortgage and Credit Card divisions to share the same physical Sovereign Cloud while ensuring total cryptographic isolation of their respective AI models and data.
72
-
***Target Need**: Guarantee that sensitive workloads are isolated even when sharing Sovereign Cloud infrastructure.
73
-
***Sovereign Value**: **Multi-Tenant Isolation.** Trust is established via **Cryptographic Identity (SPIFFE/SVID)** rather than network location. This provides hardware-enforced isolation between business units, even on shared silicon.
74
-
75
-
#### 4. The Enterprise Stakeholder (Chief Risk/Sovereignty Officer)
76
-
***Core Use Case**: **Automated Regulatory Audit (All End-User Devices & Data Center Infrastructure).** Providing a real-time, mathematical proof-of-compliance for the **Office of the Comptroller of the Currency (OCC)** or **European Central Bank (ECB)**, demonstrating that every AI interaction—across all retail devices, employee hardware, and **Managed Data Center Infrastructure**—was verified by hardware and compliant with data residency laws.
77
-
***Target Need**: Deterministic, math-based proof for **Government Regulators** that data residency and sovereignty policies are strictly enforced.
78
-
***Sovereign Value**: **Compliance without Liability.** By using ZKP-based location proofs, the Risk Officer can prove regional residency to regulators without the bank ever having to ingest or store high-resolution, high-liability customer location data.
51
+
## Enterprise Use Cases
52
+
53
+
This PoC demonstrates the technical implementation for the 4 enterprise use cases described in the [main AegisSovereignAI README](../README.md#enterprise-sovereign-use-cases-focus-financial-services):
3.**Enterprise Tenant** - Secure Sandboxing for Line-of-Business (LOB) units
58
+
4.**Regulator** - Automated Regulatory Audit
59
+
60
+
For full use case descriptions, value propositions, and regulatory context, see the [main README](../README.md).
61
+
62
+
### PoC Implementation Coverage
63
+
64
+
This PoC provides end-to-end implementation for **Stage 2: Trusted Egress & Data Center Infrastructure Attestation**. Stage 1 (Verified Ingress) is defined architecturally in [README-arch-sovereign-ingress.md](README-arch-sovereign-ingress.md).
65
+
66
+
| Use Case | Stage 1: Verified Ingress | Stage 2: Trusted Egress | PoC Status |
0 commit comments