Procurement‑grade deliverables — verified offline.
Acceptance criteria and audit‑ready artifacts that yield deterministic PASS/FAIL/HOLD, replayable receipts, and fail‑closed gates.
Attach 1 URL (DSSE)
One canonical DSSE pointer for your internal ticket. Detached signatures are authoritative; if they are unpublished, the correct result is intentional HOLD (fail-closed).
Verify offline (2 min)
Unzip + run. Deterministic GO/HOLD. Any mismatch ⇒ HOLD/FAIL with tamper evidence.
Attach 3 items
Auditor attachments with deterministic naming + bundle manifest (SHA‑256). No uploads.
Map to controls
SOC 2 / ISO 27001 / NIST CSF + OWASP Agentic ↔ MVG. Jump to evidence pointers and offline verification hints.
Decide & escalate
GO only with verifiable evidence. HOLD on uncertainty. FAIL on mismatch — escalate before proceeding.
Enterprise asks we’re hearing
A compact translation of current agentic-AI diligence asks into evidence reviewers can score offline.
Signals summarized from Snowflake AI + Data Predictions 2026.
Attach to ticket: 1 URL
Attach one canonical DSSE URL to your internal ticket. It resolves to the latest Ticket Pack + status + evidence pointers. Detached procurement signatures under *.sig/ are authoritative; if they are unpublished, HOLD is intentional and the signing ceremony runbook tells you exactly what is missing.
Featured diligence PDFs (public • procurement‑safe)
Two high-signal documents for fast partner diligence — framework crosswalks with deterministic evidence pointers and offline verification hints.
2-minute verify (no uploads): unzip the bundle you actually downloaded, then run the matching mode. Canonical public path: PROD.
# PROD bundle (canonical)
python3 verify_ticket_pack.py --trust-mode prod
# Optional compatibility sample bundle
python3 verify_ticket_pack.py --trust-mode demo
Current public truth: if detached signatures remain unpublished, the canonical public result stays HOLD. Publication-complete expected result: PROD bundle + --trust-mode prod ⇒ GO (exit 0). Compatibility sample bundle + --trust-mode demo ⇒ GO. Mixed bundle/mode pairings or unpublished signatures ⇒ HOLD/FAIL (fail-closed). The bundled verifier does not accept ready_to_sign.
Policy one-pager: Rollback guard + cache keys + bootstrap governance. Ceremony: exact signing runbook.
Pilot‑in‑a‑Box (30 / 60 / 90 days)
A licensing‑friendly pilot package: timeline + deliverables + deterministic acceptance criteria (PASS/FAIL/HOLD). Designed so your procurement/security team can close on one ticket with replayable evidence.
Integrate + verify. Ship a replayable evidence pack fast.
- Receipt Finder + DSSE viewer workflow
- Signed sample / compatibility pack + offline verifier
- Acceptance: canonical PROD bundle => GO on
--trust-mode prod; optional compatibility sample bundle => GO on--trust-mode demo
Controls language. Map to SOC 2 / ISO / NIST + OWASP Agentic.
- Controls mapping packs attached to ticket
- Evidence pointers + expected outputs
- Acceptance: deterministic PASS/FAIL/HOLD offline
Production posture. Offline keys + ceremony rail, fail‑closed gates.
- Identity + AIMS + Safety‑IR receipts rails
- Signed advisories log (append‑only)
- Acceptance: prod gates = GO (or explicit HOLD reason)
Attach 3 items
Ticket‑ready attachments, matchable by a single Approval short code.
MVG_AuditSummary_.pdf MVG_CountersignedApproval_ .json MVG_KitSupplyChainReceipt_ .json
Naming rule: MVG_<Artifact>_<ApprovalShort>.<ext> — ApprovalShort is printed in the PDF and embedded in JSON receipts.
Print diligence summary Print assurance summary Print kit supply‑chain summary
Reviewer‑generated, offline‑verifiable artifacts.
Changed since last review.
Falsification Receipt is the standards name for the replay object behind local, witnessed, and challenged outcomes.
Front-door trust asset: independently witnessed HOLD. Public spec text remains subject to revision as witnessed replay matures.
Reviewer kit supply‑chain governance
Signed keyring snapshots, head‑of‑heads, and rotation policy — audit‑replayable offline.
Keyring snapshots + rotation
A signed keyring snapshot (DSSE) with roles, deprecation, and grace windows — designed for reproducible audit and safe key rollover.
Commitment log update chain
A log‑of‑heads binds commitment log heads over time, so release commitments remain auditable even as the log updates.
Verify supply‑chain offline
One‑screen verdict for signature validity, key status, inclusion proofs, and headchain continuity — built for skeptical review.
Minimum requirements + acceptances
What buyers can score. What sellers must prove.
- P1 Deliver artifacts: policy IDs, validator outputs, receipts, permits, conformance packs.
- P2 Deterministic PASS/FAIL/HOLD with stable reason codes + declared scope.
- P3 Receipts replayable under pinned versions + canonicalization.
- P4 Fail‑closed gates at declared control points (block on HOLD/FAIL).
- P5 Permits minted only after PASS; scope + TTL bounded.
- P6 Retention + auditor replay support for the agreed window.
- P1 Validate signatures + required fields.
- P2 Run test vectors; reproduce expected outcomes incl. negatives.
- P3 Replay a sample using only conformance pack + allowed evidence handles.
- P4 Demonstrate deterministic blocking at each control point in scope.
- P5 Audit sampling shows no in‑scope side effects without a valid permit.
- P6 Replay succeeds within retention; degraded mode remains fail‑closed.
What we show
- Pick one action surface: egress or dispatch.
- Show fail‑closed behavior: missing/stale/unverifiable → HOLD + block.
- Export receipts designed for Security review.
What you get
- Evidence schema + reason code registry + test vectors.
- Integration details for your enforcement chokepoint.
- Pilot plan + acceptance criteria for production hardening.
SOC 2 / ISO 27001 mapping (illustrative)
Which artifacts can be submitted as audit evidence. (Not legal advice.)
| Artifact | Evidence | SOC 2 | ISO 27001 | How to verify |
|---|---|---|---|---|
| Evidence Pack (manifest + SHA256SUMS) | Completeness + tamper‑evidence of the audit bundle | Security + Change Mgmt |
Change Mgmt • Evidence integrity |
/verify offline replay |
| Pinned registry snapshots | Policy/version pinning; drift‑resistant semantics | Change Mgmt |
Configuration • Change Mgmt |
/verify pins + snapshot IDs |
| Deterministic PASS/FAIL/HOLD | Control operation with fail‑closed behavior | System Ops |
Monitoring • Operational controls |
/verify verdict reproduction |
| Reason codes (stable) | Explainable enforcement decisions under pinned semantics | Monitoring + Incident response |
Monitoring • Event analysis |
/verify reason registry |
| IAL receipts (hash‑chained) | Append‑only accountability trail (who/what/why) | Logging + Monitoring |
Logging • Monitoring |
/verify receipts integrity |
| Permits (scope + TTL + audience) | Pre‑action authorization bounds | Logical access |
Access control |
Permit validation |
| Signed Conformance Report export | Machine‑ingestable evidence for GRC & auditors | Reporting |
Audit evidence |
Download JSON / signed DSSE |