Skip to content

Commit acb71cb

Browse files
committed
docs: Refactor auditor deep-dive for Layer 3 focus
- NEW: infrastructure-sovereignty.md for Layer 1/2 content - Hardware Trust (TEE/TPM attestation) - Identity binding (SPIFFE/SPIRE + Keylime) - Privacy-preserving geofencing (Reg-K) - Data ingestion provenance (Track A) - REFACTOR: auditor-privacy-preserving-deep-dive.md for Layer 3 - New title: 'Layer 3: Privacy-Preserving AI Governance' - Added Layer 2 Prerequisites callout - Four-Track governance (A=Training, B=System Prompt, C=User Prompt, D=Output) - Modular Evidence Bundle with Stage 1/2 verification - Renumbered sections 1-10 - UPDATE: README Technical & Auditor Resources section - Added infrastructure-sovereignty.md link - Updated deep-dive description for Layer 3 focus
1 parent 772ef1f commit acb71cb

File tree

3 files changed

+198
-48
lines changed

3 files changed

+198
-48
lines changed

README.md

Lines changed: 2 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -137,7 +137,8 @@ AegisSovereignAI is designed to be framework-agnostic, serving as a secure execu
137137
## Technical & Auditor Resources
138138

139139
* **[Auditor Guide](./docs/auditor.md)** - High-level overview of the attestation-linked evidence model covering the full AI lifecycle (Ingestion, Training, and Inference), verifiable geofencing (Reg-K), and identity binding. Includes the complete Evidence Bundle structure for regulatory reporting.
140-
* **[Privacy-Preserving Deep-Dive for Technical Auditors](./docs/auditor-privacy-preserving-deep-dive.md)** - Technical walkthrough of the **Five-Track Sovereign AI Lifecycle** (Ingestion, Training, Inference), verifiable geofencing circuits, Batch & Purge architecture, and incident response workflow for comprehensive governance.
140+
* **[Infrastructure Sovereignty (Layer 1/2)](./docs/infrastructure-sovereignty.md)** - Technical deep-dive on **Environmental Trust**: Hardware attestation (TEE/TPM), identity binding (SPIFFE/SPIRE + Keylime), privacy-preserving geofencing (Reg-K), and data ingestion provenance.
141+
* **[Privacy-Preserving AI Governance (Layer 3)](./docs/auditor-privacy-preserving-deep-dive.md)** - Technical walkthrough of the **Four-Track Layer 3 Governance Lifecycle** (Training, System Prompt, User Prompt, Output), Batch & Purge architecture, and modular Evidence Bundle verification.
141142
* **[Threat Model: Unmanaged Device Security](./hybrid-cloud-poc/THREAT-MODEL-unmanaged-device.md)** - Analysis of **Infrastructure Blind Spots** on **BYOD/Unmanaged Devices**, detailing how AegisSovereignAI prevents location spoofing via hardware-rooted sensor fusion.
142143
* **[Unified Identity Deep-Dive](./hybrid-cloud-poc/README-arch-sovereign-unified-identity.md)** - Detailed technical architecture of the SPIRE/Keylime identity fusion model.
143144
* **[IETF WIMSE Draft](https://datatracker.ietf.org/doc/draft-lkspa-wimse-verifiable-geo-fence/)** - Our contribution to standardizing verifiable geo-fences in multi-system environments.

docs/auditor-privacy-preserving-deep-dive.md

Lines changed: 39 additions & 47 deletions
Original file line numberDiff line numberDiff line change
@@ -1,8 +1,11 @@
1-
# Privacy-Preserving Techniques (e.g. **Zero-knowledge-proofs aka ZKPs**) for the Full AI Lifecycle
1+
# Layer 3: Privacy-Preserving AI Governance (The "Audit without Disclosure" Paradox)
22

3-
> **For Technical Auditors & Architects:** This document provides a deep technical walkthrough of the **privacy-preserving (e.g. **ZKP**-based)** prompt integrity verification system. For a high-level overview of the complete attestation model (hardware, location, identity, and prompts), see the **[Auditor Guide](./auditor.md)**.
3+
> **For Technical Auditors & Architects:** This document provides a deep technical walkthrough of the **Layer 3 AI Governance** model using **privacy-preserving techniques (e.g., ZKPs)** for prompt and output verification. For Layer 1/2 foundations (Hardware Trust, Identity, Location), see **[Infrastructure Sovereignty](./infrastructure-sovereignty.md)**.
44
5-
This document provides a technical walkthrough of how **AegisSovereignAI** utilizes **privacy-preserving techniques (e.g. **ZKP**)** to solve the **"Audit without Disclosure"** paradox for AI prompts.
5+
This document solves the **"Audit without Disclosure"** paradox: how can enterprises prove AI compliance to regulators without exposing proprietary prompts or retaining high-liability PII?
6+
7+
> [!IMPORTANT]
8+
> **Layer 2 Prerequisites:** All Layer 3 governance assumes a verified **Sovereign Anchor** is in place. Before proceeding with content verification, auditors must confirm the workload is running on attested hardware (Layer 1) with verified identity and location (Layer 2). See **[Infrastructure Sovereignty](./infrastructure-sovereignty.md)** for Stage 1 verification.
69
710
## 1. The Problem: The Prompt & Output Paradox
811

@@ -76,36 +79,14 @@ While multiple Privacy-Enhancing Technologies (PETs) exist, **ZKP** provides the
7679

7780
---
7881

79-
## 4. Foundational Primitive: Verifiable Geofencing (Reg-K)
80-
81-
Before auditing AI logic, auditors must often verify **where** the data is being processed to comply with residency laws like **Regulation K** or **GDPR**.
82-
83-
**The Challenge:** Traditional GPS/IP-based geofencing creates PII liability by storing the user's precise location.
84-
85-
**The ZKP Solution:** A "Coordinate-in-Polygon" circuit.
86-
1. **Private Input:** The node's precise GPS/cellular coordinates (verified by TPM-signed sensor data).
87-
2. **Public Input:** The permitted geographic boundary (the "Green Zone" polygon).
88-
3. **Proof:** The circuit mathematically proves the private coordinate is inside the public polygon without ever revealing the coordinate itself.
89-
90-
**Outcome:** The auditor sees a "Pass/Fail" cryptographic result tied to a hardware-rooted identity, satisfying residency requirements with zero privacy leakage.
91-
92-
---
93-
94-
## 5. The Five-Track Sovereign AI Lifecycle Strategy
95-
96-
AegisSovereignAI provides **end-to-end cryptographic verification** across every stage of the AI lifecycle: **Ingestion → Training → Inference → Output**.
82+
## 4. The Four-Track Layer 3 Governance Lifecycle
9783

98-
### Track A: Data Ingestion (Hardware-Rooted Provenance)
84+
AegisSovereignAI's Layer 3 provides **cryptographic verification** across the AI governance lifecycle: **Model Training → System Prompt → User Prompt → AI Output**.
9985

100-
Proving the integrity and origin of raw data before it enters the AI pipeline.
101-
102-
**Process:**
103-
1. **Hardware Attestation:** Data is ingested through a FIDO/TPM-verified node.
104-
2. **Provenance ZKP:** A circuit proves that the data was signed by a genuine hardware-rooted key associated with a specific authorized region, while **hiding the specific device UUID** or MSISDN.
86+
> [!NOTE]
87+
> **Layer 2 Content Moved:** Data Ingestion Provenance (Track A) and Geofencing verification are Layer 2 concerns. See **[Infrastructure Sovereignty](./infrastructure-sovereignty.md)** for these primitives.
10588
106-
**Outcome:** Proof of Data Integrity and Regional Provenance without creating a "Device Tracking" database.
107-
108-
### Track B: Model Training (Redaction Policy)
89+
### Track A: Model Training Governance (Redaction Policy)
10990

11091
Proving that sensitive information was excluded from the model's weights during the training phase.
11192

@@ -115,7 +96,7 @@ Proving that sensitive information was excluded from the model's weights during
11596

11697
**Outcome:** Mathematical proof that the model is "Clean-by-Design," mitigating the risk of future PII leakage via model inversion.
11798

118-
### Track C: System Prompt Integrity (Pre-Computed)
99+
### Track B: System Prompt Integrity (Pre-Computed)
119100

120101
System prompts are the "Law" of the AI. Because they are static, we pre-compute proofs at deployment.
121102

@@ -129,7 +110,7 @@ System prompts are the "Law" of the AI. Because they are static, we pre-compute
129110

130111
**Outcome:** "Compliance-by-Design." The proof is valid for the lifetime of that system prompt version.
131112

132-
### Track D: User Prompt Compliance (Batch & Purge)
113+
### Track C: User Prompt Compliance (Batch & Purge)
133114

134115
User prompts are dynamic and high-volume. To maintain performance, we use an **Aggregated Batching** model.
135116

@@ -186,7 +167,7 @@ User prompts are dynamic and high-volume. To maintain performance, we use an **A
186167
│ ┌──────────────┐ ┌──────────────┐
187168
│ │ 🔥 PURGE │ │ ESCALATE TO │
188169
│ │ Raw Prompts │ │ HITL REVIEW │
189-
│ │ Deleted │ │ (Sec. 8) │
170+
│ │ Deleted │ │ (Sec. 7) │
190171
│ └──────────────┘ └──────────────┘
191172
│ │
192173
│ ▼
@@ -200,7 +181,7 @@ User prompts are dynamic and high-volume. To maintain performance, we use an **A
200181
PII while maintaining full cryptographic auditability.
201182
```
202183

203-
### Track E: AI Output Compliance (Real-Time Filtering & Batch Proof)
184+
### Track D: AI Output Compliance (Real-Time Filtering & Batch Proof)
204185

205186
AI model outputs pose unique compliance risks that require verification even when inputs are safe:
206187
- **PII Leakage:** AI can hallucinate or inadvertently expose SSNs, account numbers, or other sensitive data
@@ -230,11 +211,11 @@ AI model outputs pose unique compliance risks that require verification even whe
230211
- **Compliant Output:** "I don't have access to individual client portfolios. Please contact your relationship manager."
231212
- **Non-Compliant Hallucination:** "John Smith (SSN: 123-45-6789) has $2.3M in equities and $800K in bonds."
232213

233-
Even if the system prompt prohibits disclosure and the user prompt was benign, **the AI model itself** can generate PII. Track E ensures this never reaches the user **and** provides cryptographic proof of the filter's effectiveness.
214+
Even if the system prompt prohibits disclosure and the user prompt was benign, **the AI model itself** can generate PII. Track D ensures this never reaches the user **and** provides cryptographic proof of the filter's effectiveness.
234215

235216
---
236217

237-
## 6. Concrete Example: Private Wealth Gen-AI Advisory (Unmanaged Devices)
218+
## 5. Concrete Example: Private Wealth Gen-AI Advisory (Unmanaged Devices)
238219

239220
### Scenario
240221

@@ -276,7 +257,7 @@ This ZKP addresses the **Excessive Agency Risk**—the danger that the AI model
276257

277258
---
278259

279-
## 7. The Noir Circuit (Technical Implementation)
260+
## 6. The Noir Circuit (Technical Implementation)
280261

281262
The core logic uses a ZK-friendly string search algorithm.
282263

@@ -308,7 +289,7 @@ fn main(
308289

309290
---
310291

311-
## 8. Incident Response & Escalation Workflow
292+
## 7. Incident Response & Escalation Workflow
312293

313294
In a cryptographic audit model, a **"Failure to Generate a Proof"** is the primary signal of a policy violation.
314295

@@ -324,16 +305,26 @@ If the ZKP circuit encounters a prompt that violates an **Exclusion Rule** (e.g.
324305

325306
---
326307

327-
## 9. The Evidence Bundle for Auditors
308+
## 8. The Evidence Bundle for Auditors (Stage 2: Layer 3 Verification)
309+
310+
> [!NOTE]
311+
> **Modular Verification:** The complete Evidence Bundle is verified in two stages:
312+
> - **Stage 1 (Layer 1/2):** "Is this a valid Aegis Sovereign Node?" See **[Infrastructure Sovereignty](./infrastructure-sovereignty.md)**
313+
> - **Stage 2 (This Document):** "Did this node follow the governance policy for this session?"
328314
329-
When an auditor requests compliance evidence, they receive an **Evidence Bundle**:
315+
When an auditor requests **Layer 3 compliance evidence**, they receive:
330316

331317
```json
332318
{
319+
"bundle_type": "LAYER_3_GOVERNANCE",
333320
"audit_window": {
334321
"start": "2026-01-20T14:00:00Z",
335322
"end": "2026-01-20T14:15:00Z"
336323
},
324+
"layer_2_reference": {
325+
"infrastructure_bundle_id": "infra-bundle-2026-01-20-14",
326+
"status": "STAGE_1_VERIFIED"
327+
},
337328
"system_prompt": {
338329
"version": "v3.2.1",
339330
"proof": "base64-noir-proof...",
@@ -363,14 +354,15 @@ When an auditor requests compliance evidence, they receive an **Evidence Bundle*
363354
}
364355
```
365356

366-
**Auditor Workflow:**
367-
1. **Verify System Prompt Proof:** Confirm the deployed system prompt version satisfies the policy.
368-
2. **Verify Batch Proofs:** For each batch, confirm the proof is valid against the stated policy.
369-
3. **Verify Chain of Custody:** Confirm the Merkle Root values are anchored in the immutable audit log.
357+
**Auditor Workflow (Stage 2):**
358+
1. **Prerequisite:** Confirm Stage 1 (Layer 1/2) verification passed via `infrastructure_bundle_id` reference.
359+
2. **Verify System Prompt Proof:** Confirm the deployed system prompt version satisfies the policy.
360+
3. **Verify Batch Proofs:** For each batch, confirm the proof is valid against the stated policy.
361+
4. **Verify Chain of Custody:** Confirm the Merkle Root values are anchored in the immutable audit log.
370362

371363
---
372364

373-
## 10. Regulatory Value Proposition
365+
## 9. Regulatory Value Proposition (Layer 3)
374366

375367
| Regulatory Need | AegisSovereignAI Execution |
376368
| --- | --- |
@@ -382,7 +374,7 @@ When an auditor requests compliance evidence, they receive an **Evidence Bundle*
382374

383375
---
384376

385-
## 11. Practical Implementation: The LangGraph Sovereign Substrate
377+
## 10. Practical Implementation: The LangGraph Sovereign Substrate
386378

387379
This section demonstrates how the **Batch & Purge** model is implemented in practice using the **AegisSovereignAI Sovereign Substrate** for **LangGraph** multi-agent workflows.
388380

@@ -455,4 +447,4 @@ A `sovereign_factory` applies the `governance.wrap_node` decorator to the LangGr
455447

456448
---
457449

458-
[Root README](../README.md) | [Auditor Guide](./auditor.md) | [IETF WIMSE Draft](https://datatracker.ietf.org/doc/draft-lkspa-wimse-verifiable-geo-fence/)
450+
[Root README](../README.md) | [Auditor Guide](./auditor.md) | [Infrastructure Sovereignty (Layer 1/2)](./infrastructure-sovereignty.md) | [IETF WIMSE Draft](https://datatracker.ietf.org/doc/draft-lkspa-wimse-verifiable-geo-fence/)

0 commit comments

Comments
 (0)