You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: README.md
+2-1Lines changed: 2 additions & 1 deletion
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -137,7 +137,8 @@ AegisSovereignAI is designed to be framework-agnostic, serving as a secure execu
137
137
## Technical & Auditor Resources
138
138
139
139
***[Auditor Guide](./docs/auditor.md)** - High-level overview of the attestation-linked evidence model covering the full AI lifecycle (Ingestion, Training, and Inference), verifiable geofencing (Reg-K), and identity binding. Includes the complete Evidence Bundle structure for regulatory reporting.
140
-
***[Privacy-Preserving Deep-Dive for Technical Auditors](./docs/auditor-privacy-preserving-deep-dive.md)** - Technical walkthrough of the **Five-Track Sovereign AI Lifecycle** (Ingestion, Training, Inference), verifiable geofencing circuits, Batch & Purge architecture, and incident response workflow for comprehensive governance.
140
+
***[Infrastructure Sovereignty (Layer 1/2)](./docs/infrastructure-sovereignty.md)** - Technical deep-dive on **Environmental Trust**: Hardware attestation (TEE/TPM), identity binding (SPIFFE/SPIRE + Keylime), privacy-preserving geofencing (Reg-K), and data ingestion provenance.
141
+
***[Privacy-Preserving AI Governance (Layer 3)](./docs/auditor-privacy-preserving-deep-dive.md)** - Technical walkthrough of the **Four-Track Layer 3 Governance Lifecycle** (Training, System Prompt, User Prompt, Output), Batch & Purge architecture, and modular Evidence Bundle verification.
141
142
***[Threat Model: Unmanaged Device Security](./hybrid-cloud-poc/THREAT-MODEL-unmanaged-device.md)** - Analysis of **Infrastructure Blind Spots** on **BYOD/Unmanaged Devices**, detailing how AegisSovereignAI prevents location spoofing via hardware-rooted sensor fusion.
142
143
***[Unified Identity Deep-Dive](./hybrid-cloud-poc/README-arch-sovereign-unified-identity.md)** - Detailed technical architecture of the SPIRE/Keylime identity fusion model.
143
144
***[IETF WIMSE Draft](https://datatracker.ietf.org/doc/draft-lkspa-wimse-verifiable-geo-fence/)** - Our contribution to standardizing verifiable geo-fences in multi-system environments.
Copy file name to clipboardExpand all lines: docs/auditor-privacy-preserving-deep-dive.md
+39-47Lines changed: 39 additions & 47 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -1,8 +1,11 @@
1
-
# Privacy-Preserving Techniques (e.g. **Zero-knowledge-proofs aka ZKPs**) for the Full AI Lifecycle
1
+
# Layer 3: Privacy-Preserving AI Governance (The "Audit without Disclosure" Paradox)
2
2
3
-
> **For Technical Auditors & Architects:** This document provides a deep technical walkthrough of the **privacy-preserving (e.g.**ZKP**-based)** prompt integrity verification system. For a high-level overview of the complete attestation model (hardware, location, identity, and prompts), see the **[Auditor Guide](./auditor.md)**.
3
+
> **For Technical Auditors & Architects:** This document provides a deep technical walkthrough of the **Layer 3 AI Governance** model using **privacy-preserving techniques (e.g., ZKPs)**for prompt and output verification. For Layer 1/2 foundations (Hardware Trust, Identity, Location), see **[Infrastructure Sovereignty](./infrastructure-sovereignty.md)**.
4
4
5
-
This document provides a technical walkthrough of how **AegisSovereignAI** utilizes **privacy-preserving techniques (e.g. **ZKP**)** to solve the **"Audit without Disclosure"** paradox for AI prompts.
5
+
This document solves the **"Audit without Disclosure"** paradox: how can enterprises prove AI compliance to regulators without exposing proprietary prompts or retaining high-liability PII?
6
+
7
+
> [!IMPORTANT]
8
+
> **Layer 2 Prerequisites:** All Layer 3 governance assumes a verified **Sovereign Anchor** is in place. Before proceeding with content verification, auditors must confirm the workload is running on attested hardware (Layer 1) with verified identity and location (Layer 2). See **[Infrastructure Sovereignty](./infrastructure-sovereignty.md)** for Stage 1 verification.
6
9
7
10
## 1. The Problem: The Prompt & Output Paradox
8
11
@@ -76,36 +79,14 @@ While multiple Privacy-Enhancing Technologies (PETs) exist, **ZKP** provides the
Before auditing AI logic, auditors must often verify **where** the data is being processed to comply with residency laws like **Regulation K** or **GDPR**.
82
-
83
-
**The Challenge:** Traditional GPS/IP-based geofencing creates PII liability by storing the user's precise location.
84
-
85
-
**The ZKP Solution:** A "Coordinate-in-Polygon" circuit.
86
-
1.**Private Input:** The node's precise GPS/cellular coordinates (verified by TPM-signed sensor data).
87
-
2.**Public Input:** The permitted geographic boundary (the "Green Zone" polygon).
88
-
3.**Proof:** The circuit mathematically proves the private coordinate is inside the public polygon without ever revealing the coordinate itself.
89
-
90
-
**Outcome:** The auditor sees a "Pass/Fail" cryptographic result tied to a hardware-rooted identity, satisfying residency requirements with zero privacy leakage.
91
-
92
-
---
93
-
94
-
## 5. The Five-Track Sovereign AI Lifecycle Strategy
95
-
96
-
AegisSovereignAI provides **end-to-end cryptographic verification** across every stage of the AI lifecycle: **Ingestion → Training → Inference → Output**.
82
+
## 4. The Four-Track Layer 3 Governance Lifecycle
97
83
98
-
### Track A: Data Ingestion (Hardware-Rooted Provenance)
84
+
AegisSovereignAI's Layer 3 provides **cryptographic verification** across the AI governance lifecycle: **Model Training → System Prompt → User Prompt → AI Output**.
99
85
100
-
Proving the integrity and origin of raw data before it enters the AI pipeline.
101
-
102
-
**Process:**
103
-
1.**Hardware Attestation:** Data is ingested through a FIDO/TPM-verified node.
104
-
2.**Provenance ZKP:** A circuit proves that the data was signed by a genuine hardware-rooted key associated with a specific authorized region, while **hiding the specific device UUID** or MSISDN.
86
+
> [!NOTE]
87
+
> **Layer 2 Content Moved:** Data Ingestion Provenance (Track A) and Geofencing verification are Layer 2 concerns. See **[Infrastructure Sovereignty](./infrastructure-sovereignty.md)** for these primitives.
105
88
106
-
**Outcome:** Proof of Data Integrity and Regional Provenance without creating a "Device Tracking" database.
107
-
108
-
### Track B: Model Training (Redaction Policy)
89
+
### Track A: Model Training Governance (Redaction Policy)
109
90
110
91
Proving that sensitive information was excluded from the model's weights during the training phase.
111
92
@@ -115,7 +96,7 @@ Proving that sensitive information was excluded from the model's weights during
115
96
116
97
**Outcome:** Mathematical proof that the model is "Clean-by-Design," mitigating the risk of future PII leakage via model inversion.
117
98
118
-
### Track C: System Prompt Integrity (Pre-Computed)
99
+
### Track B: System Prompt Integrity (Pre-Computed)
119
100
120
101
System prompts are the "Law" of the AI. Because they are static, we pre-compute proofs at deployment.
121
102
@@ -129,7 +110,7 @@ System prompts are the "Law" of the AI. Because they are static, we pre-compute
129
110
130
111
**Outcome:** "Compliance-by-Design." The proof is valid for the lifetime of that system prompt version.
131
112
132
-
### Track D: User Prompt Compliance (Batch & Purge)
113
+
### Track C: User Prompt Compliance (Batch & Purge)
133
114
134
115
User prompts are dynamic and high-volume. To maintain performance, we use an **Aggregated Batching** model.
135
116
@@ -186,7 +167,7 @@ User prompts are dynamic and high-volume. To maintain performance, we use an **A
186
167
│ ┌──────────────┐ ┌──────────────┐
187
168
│ │ 🔥 PURGE │ │ ESCALATE TO │
188
169
│ │ Raw Prompts │ │ HITL REVIEW │
189
-
│ │ Deleted │ │ (Sec. 8) │
170
+
│ │ Deleted │ │ (Sec. 7) │
190
171
│ └──────────────┘ └──────────────┘
191
172
│ │
192
173
│ ▼
@@ -200,7 +181,7 @@ User prompts are dynamic and high-volume. To maintain performance, we use an **A
200
181
PII while maintaining full cryptographic auditability.
AI model outputs pose unique compliance risks that require verification even when inputs are safe:
206
187
-**PII Leakage:** AI can hallucinate or inadvertently expose SSNs, account numbers, or other sensitive data
@@ -230,11 +211,11 @@ AI model outputs pose unique compliance risks that require verification even whe
230
211
-**Compliant Output:** "I don't have access to individual client portfolios. Please contact your relationship manager."
231
212
-**Non-Compliant Hallucination:** "John Smith (SSN: 123-45-6789) has $2.3M in equities and $800K in bonds."
232
213
233
-
Even if the system prompt prohibits disclosure and the user prompt was benign, **the AI model itself** can generate PII. Track E ensures this never reaches the user **and** provides cryptographic proof of the filter's effectiveness.
214
+
Even if the system prompt prohibits disclosure and the user prompt was benign, **the AI model itself** can generate PII. Track D ensures this never reaches the user **and** provides cryptographic proof of the filter's effectiveness.
@@ -363,14 +354,15 @@ When an auditor requests compliance evidence, they receive an **Evidence Bundle*
363
354
}
364
355
```
365
356
366
-
**Auditor Workflow:**
367
-
1.**Verify System Prompt Proof:** Confirm the deployed system prompt version satisfies the policy.
368
-
2.**Verify Batch Proofs:** For each batch, confirm the proof is valid against the stated policy.
369
-
3.**Verify Chain of Custody:** Confirm the Merkle Root values are anchored in the immutable audit log.
357
+
**Auditor Workflow (Stage 2):**
358
+
1.**Prerequisite:** Confirm Stage 1 (Layer 1/2) verification passed via `infrastructure_bundle_id` reference.
359
+
2.**Verify System Prompt Proof:** Confirm the deployed system prompt version satisfies the policy.
360
+
3.**Verify Batch Proofs:** For each batch, confirm the proof is valid against the stated policy.
361
+
4.**Verify Chain of Custody:** Confirm the Merkle Root values are anchored in the immutable audit log.
370
362
371
363
---
372
364
373
-
## 10. Regulatory Value Proposition
365
+
## 9. Regulatory Value Proposition (Layer 3)
374
366
375
367
| Regulatory Need | AegisSovereignAI Execution |
376
368
| --- | --- |
@@ -382,7 +374,7 @@ When an auditor requests compliance evidence, they receive an **Evidence Bundle*
382
374
383
375
---
384
376
385
-
## 11. Practical Implementation: The LangGraph Sovereign Substrate
377
+
## 10. Practical Implementation: The LangGraph Sovereign Substrate
386
378
387
379
This section demonstrates how the **Batch & Purge** model is implemented in practice using the **AegisSovereignAI Sovereign Substrate** for **LangGraph** multi-agent workflows.
388
380
@@ -455,4 +447,4 @@ A `sovereign_factory` applies the `governance.wrap_node` decorator to the LangGr
0 commit comments