This document defines how implementations of the QODIQA Core v1.0 Standard and, where applicable, the QODIQA — 68-Point Enforcement Framework for Deterministic Runtime Consent Enforcement — Version 1.0, are evaluated, certified, attested, and maintained in a verified conformant state. It establishes the evidentiary, procedural, and structural requirements that constitute conformance—and the conditions under which conformance may be affirmed, suspended, or revoked.
This Framework is not a partner program, a commercial endorsement scheme, or a symbolic designation. It is a formal conformance and assurance instrument. Certification under this Framework means that a deployment has demonstrated, through verifiable evidence and reproducible testing, that its enforcement infrastructure satisfies the normative requirements of the QODIQA corpus at a defined assurance level. Certification does not attest to vendor relationship, market position, or organizational intent. It attests solely to technical conformance.
#Executive Certification Overview
The QODIQA Core Standard defines the normative requirements for deterministic runtime consent enforcement. The Implementation Playbook defines how those requirements are realized in infrastructure. The 68-Point Enforcement Framework defines the enumerated control set against which deployments are assessed. This Certification Framework defines how conformance to those requirements is measured, evidenced, and formally affirmed.
These four documents form the complete QODIQA corpus. Each is normatively subordinate to the Core Standard. This Framework is operationally subordinate to the Implementation Playbook for infrastructure guidance, but it is the authoritative specification for all conformance assessment procedures. No certification activity that deviates from the procedures defined here produces a valid QODIQA certification outcome.
1.1 Purpose of Certification
Certification under this Framework serves a single purpose: to produce a verifiable, time-bounded attestation that a specified deployment of QODIQA enforcement infrastructure satisfies the normative requirements of the QODIQA corpus at a declared assurance level. That attestation must be reproducible, evidence-backed, and falsifiable. An attestation that cannot be independently re-derived from the archived evidence is not a valid certification under this Framework.
Certification Anchor: The technical anchor of all QODIQA certification is the determinism invariant: for any frozen enforcement context C at a declared policy version P, the enforcement function E(C, P) must return an identical outcome on every evaluation. Certification at any level that cannot demonstrate this invariant is not conformant certification.
1.2 Relationship to the Core Standard
The Core Standard defines what a conformant system must do. This Framework defines how conformance to those requirements is demonstrated. The Core Standard is normative over enforcement semantics; this Framework is normative over certification procedure. In the event of conflict between this Framework's procedural requirements and the Core Standard's enforcement requirements, the Core Standard prevails for enforcement semantics. This Framework prevails for all matters of evidence, testing, and attestation procedure.
1.3 Relationship to the Implementation Playbook
The Implementation Playbook specifies how conformant infrastructure is built and operated. This Framework specifies how the resulting infrastructure is assessed. The Playbook's conformance checklist (Sections 10.1 through 10.6) defines the baseline evidentiary requirements. This Framework extends those requirements with structured test procedures, evidence packaging specifications, assessor qualification criteria, and certification lifecycle management. The Playbook and this Framework are complementary instruments within the same corpus; the Playbook is the build specification, and this Framework is the audit specification.
1.4 Institutional Scope
This Framework applies to any entity deploying QODIQA enforcement infrastructure for production use and seeking to make a formal conformance claim. The Framework is equally applicable to self-attestation by the deploying organization, third-party attestation by an independent auditor, or certification by an accredited certification body. The procedures defined here are identical regardless of the attestation pathway; only the authority and independence requirements differ.
#Conformance Definition Model
Conformance to the QODIQA corpus is not a binary attribute. It is a structured claim composed of four distinct conformance dimensions, each of which must be independently satisfied for a certification claim to be valid at any level. A deployment that satisfies three of four dimensions is not partially conformant—it is non-conformant for the dimensions it fails, and the overall certification claim must reflect that deficiency.
2.1 Conformance Dimensions
2.2 Declared, Verified, and Certified Conformance
Three conformance claim types are recognized under this Framework. They differ in the independence and depth of the assessment process that supports them. They are not interchangeable; no claim type may be represented as another.
Representation Constraint: A deploying organization must not represent a Declared Conformance as Verified or Certified Conformance in any external communication. Misrepresentation of conformance claim type constitutes a conformance violation and requires immediate correction of all public-facing claims and notification to any affected parties who received the misrepresented claim.
2.3 Conformance Boundary
A conformance claim is always bounded to a specific deployment, a specific certification level, a specific policy version, and a specific assessment date. The claim does not extend to other deployments of the same software, future policy versions, or deployments at higher maturity levels that have not been independently assessed. The conformance boundary must be explicitly declared in any public conformance statement.
A change in any of the following constitutes a boundary-breaking event that requires re-assessment: deployment topology modification; component replacement or major version upgrade; policy version change; change to revocation TTL commitment; change to the audit ledger infrastructure; or a security event affecting the key hierarchy.
#Certification Levels
Four certification levels are defined. Each level is a complete, independently assessable conformance designation. Higher levels are not additive tiers — each level is a fully specified set of requirements that must be satisfied independently. A deployment seeking Level 3 certification must satisfy all Level 3 requirements; it is not sufficient to satisfy Level 1 and Level 2 requirements and claim Level 3 designation. The assessor must evaluate the deployment against the specific, complete requirements of the claimed level.
- All seven canonical components deployed and operationally independent (QCC-01)
- EG is sole enforcement gateway; no bypass path (QCC-02)
- Fail-closed behavior verified for all enforcement-path component failures (QCC-03)
- CR implements linearizable revocation flag reads (QCC-04)
- RS propagates revocation within documented TTL ≤ 300s (QCC-05)
- AL is append-only; hash chain integrity verified weekly (QCC-06)
- AE uses HMAC-SHA256 from three-tier key hierarchy (QCC-07)
- Context canonicalization documented and version-tagged (QCC-08)
- Key hierarchy documented; root key offline (QCC-09)
- Required metrics collected; all alert thresholds active (QCC-10)
- QCC-11 and QCC-12 status documented; full satisfaction not required
- Architecture diagram with component boundaries signed by infrastructure lead
- Network topology map confirming no inference system bypass path
- Fail-closed test execution log: ≥ 4 component failure scenarios
- CR linearizability configuration extract from storage system
- RS propagation measurement log (minimum 100 events)
- AL chain integrity verification log (minimum 1 full-chain run)
- DETERMINISM_TEST AL record for each deployed policy version
- Key hierarchy documentation with root key storage attestation
- Metric endpoint snapshot at two timestamps showing counter increments
- QCC-11/12 status declaration document signed by technical lead
- Component failure injection: CR, PE, AL, AE — verify 100% deny
- Timeout ceiling verification: all components within bounds
- Circuit breaker state test: N failures → OPEN → probe recovery
- Revocation test: commit revocation; confirm propagation within TTL
- VERIFY_DETERMINISM protocol: corpus ≥ 500 vectors per policy version
- AL chain break detection: inject synthetic break; verify alert fires
- Artifact mismatch: tamper artifact; verify inference system refuses
- All CL-01 controls satisfied at CL-01 standard
- CR and AL replicated across ≥ 2 independent failure domains
- EG and PE: ≥ 2 active instances; no shared mutable state
- RS as durable message broker with delivery guarantees
- Revocation TTL ≤ 60 seconds in all failure domains
- Key rotation operational within 30-day deployment key ceiling
- AL hash chain verified daily; out-of-band export daily minimum
- QCC-11 fully satisfied: agent delegation independence verified
- QCC-12 fully satisfied: topology declared; TTL disclosed
- Replay validation: nonce uniqueness enforced and verified
- Artifact recomputation verification: AE output reproducible under same key and nonce
- All CL-01 evidence at CL-01 standard
- Multi-domain replication topology diagram with failure domain boundaries
- RS delivery guarantee configuration extract
- Key rotation log: AL KEY_ROTATION_EVENT records for 90 days
- Dual-key window test log: artifact accepted under both keys during rotation
- Nonce replay test: AL NONCE_REPLAY_DETECTED record from test execution
- Artifact recomputation test: two artifacts from identical inputs, same key and nonce — must be bit-identical
- Agent delegation independence test log: QCC-11 simulation results
- Topology declaration signed document with TTL disclosure
- All CL-01 tests executed at CL-01 standard
- Failure domain isolation: terminate one failure domain; verify other continues enforcing
- Revocation within 60s: 50 revocation events; measure P99 propagation latency
- Replay attack simulation: re-submit prior request with same nonce; verify DENY
- Key rotation live test: rotate key during active traffic; verify no enforcement interruption
- VERIFY_DETERMINISM with PE restart between passes; corpus ≥ 1000 vectors
- Artifact recomputation: AE restart; same inputs; verify identical output
- All CL-02 controls satisfied at CL-02 standard
- Revocation TTL ≤ 60s committed as SLA; measured, not aspirational
- RS propagation P99 ≤ TTL verified in production metric data
- AL durability: continuous export to operator-controlled immutable storage
- AL hash chain integrity verified continuously (per-write at CL-03)
- Enforcement path SLO ≥ 99.9% over 90-day measured window
- Integrity heartbeat operational: 60s maximum verification interval
- Drift classification matrix implemented: Class I through Class 0 alerts active
- SLA breach escalation invariants operational and tested
- Conservative mode tested: RS propagation delay triggers affected consent_id deny
- All CL-02 evidence at CL-02 standard
- 90-day revocation propagation histogram export; P99 ≤ TTL
- AL immutable storage export receipts for 90 days
- AL per-write chain verification log for 30 days
- Enforcement path SLO measurement report: 90-day availability ≥ 99.9%
- Integrity heartbeat run log: all passes; any failures with resolution record
- Conservative mode test: propagation delay injected; affected consent_ids denied; AL records present
- Class I and Class 0 alert test records: each condition triggered; escalation confirmed
- All CL-02 tests executed at CL-02 standard
- Revocation SLA validation: 500 events across 30 days; P99 ≤ TTL confirmed
- Conservative mode trigger: delay RS propagation beyond TTL/2; verify affected consent_id denial activates
- Per-write chain integrity: inject synthetic break during write; verify immediate Class 0 alert and AL suspension
- Integrity heartbeat failure: disable one check; verify heartbeat escalates within 2 minutes
- SLO boundary test: simulate 0.1% enforcement path unavailability; verify Class I alert within threshold
- All CL-03 controls satisfied at CL-03 standard
- Multi-region deployment with linearizable cross-region revocation
- Revocation TTL ≤ 15s across all regions; P99 verified in production data
- HSM-backed AE mandatory in all regions
- PE and AE in hardware secure enclave with verified remote attestation
- Enclave attestation archived in AL at each initialization
- Formal determinism audit by independent third party pre-deployment
- Multi-region propagation race-condition testing completed
- Cross-region consensus divergence scenario tested (FC-04b)
- Annual penetration test of enforcement infrastructure
- Enforcement path SLO ≥ 99.99% over 90-day measured window
- Full AL audit trail independently verifiable without SaaS intermediation
- All CL-03 evidence at CL-03 standard
- Multi-region revocation propagation histogram: P99 ≤ 15s per region pair
- HSM configuration and partition audit for each AE instance
- Remote attestation records: ENCLAVE_ATTESTATION AL records for each enclave
- Independent third-party determinism audit report with methodology disclosure
- Cross-region divergence test log: FC-04b scenario executed; conservative mode activated; recovery confirmed
- Penetration test report from qualified independent tester: enforcement path scope only
- Independent AL verification procedure: verifier operates without deploying organization tooling
- 90-day SLO measurement at ≥ 99.99%
- All CL-03 tests executed at CL-03 standard
- Multi-region revocation: 1000 events; all regions within TTL
- Cross-region partition: isolate Region A from Region B; verify conservative mode for affected consent_ids
- HSM failover: simulate HSM partition saturation; verify AE conservative scale-out
- Enclave restart attestation: restart PE enclave; verify attestation re-verified before key provisioning
- Independent AL chain verification: assessor runs chain verification from exported data without deployer tooling
- Clock skew edge case: inject skew > tolerance; verify timestamp-based denies and ML alert
#Certification Evidence Requirements
Evidence artifacts are the material basis of all conformance claims. An evidence artifact is a structured, time-stamped, tamper-evident record produced by a specific test execution, measurement collection, configuration inspection, or system event. Evidence artifacts are not narratives or self-descriptions—they are machine-verifiable records that a qualified assessor can independently examine and cross-reference against the requirements they attest to.
Evidence Integrity Requirement: All evidence artifacts must be produced at the time of the activity they record. Retroactive evidence construction is not permitted. An evidence artifact that cannot be time-stamped to within the window of the assessed deployment period is not valid evidence under this Framework, regardless of its content.
4.1 Evidence Artifact Taxonomy
qodiqa_revocation_propagation_ms per EG instance and region. Signed export from ML system; hash recorded in evidence package.
4.2 Evidence Package Specification
Evidence for a certification assessment must be assembled into a structured evidence package. The evidence package is the complete, self-contained artifact set submitted to the assessor. It must include: a manifest listing all artifact files with their SHA-256 hashes; a conformance claim statement identifying the certification level, deployment boundary, and policy versions assessed; copies of all required evidence artifacts with timestamps and provenance; AL export for the assessment period covering all normative record types; and a signed declaration from the infrastructure lead attesting to the completeness and authenticity of the package contents.
The assessor must not accept an evidence package that is missing any required artifact type for the claimed certification level, that contains artifacts whose timestamps fall outside the assessed deployment period, or whose AL export hash chain fails verification. An incomplete or unverifiable evidence package is treated as evidentiary non-conformance, equivalent to a test failure for the controls whose evidence is missing.
4.3 Minimum Evidence Set by Level
| Artifact Type | CL-01 | CL-02 | CL-03 | CL-04 |
|---|---|---|---|---|
| Policy Version Snapshot | Required | Required | Required | Required |
| Test Execution Log | Required | Required | Required | Required |
| Determinism Test Record | Required | Required | Required | Required |
| Revocation Propagation Metrics | Required | Required | Required (90 days) | Required (90 days, all regions) |
| Artifact Hash Sample | Required | Required | Required | Required |
| Audit Chain Verification Result | Required | Required | Required (daily run) | Required (independent verifier) |
| Control Failure Log | Required | Required | Required | Required |
| Key Rotation Event Archive | Not required | Required | Required | Required |
| Replay Test Record | Not required | Required | Required | Required |
| Remote Attestation Record | Not required | Not required | Not required | Required |
#Conformance Test Methodology
Conformance testing under this Framework is structured testing against defined pass/fail criteria. Tests are deterministic in structure: given a specified test precondition, a specified stimulus, and a specified expected outcome, the test either passes or fails. There are no partial passes. A test result of "mostly compliant" or "substantially conformant" is not recognized; each test either produces the required outcome or it does not.
All conformance tests must be executed in an environment that is representative of the production deployment being assessed. Tests executed in a development or staging environment that differs from production in topology, component versions, or configuration do not produce valid evidence for a production deployment assessment.
5.1 Test Vector Validation
Test vector validation is the process of verifying that the enforcement function produces the expected decision for each member of a defined test corpus. The test corpus must be constructed before test execution and must be immutable during execution. The corpus hash must be computed and archived before the first evaluation pass. Any modification to the corpus after its hash is archived invalidates the test.
// Corpus composition requirements — minimum 500 vectors at CL-01 // Minimum 1000 vectors at CL-02 through CL-04 Mandatory vector categories: ACTIVE_token_full_scope_match — expected: PERMIT (≥ 10%) ACTIVE_token_scope_mismatch — expected: DENY (≥ 10%) REVOKED_token — expected: DENY (≥ 10%) EXPIRED_token — expected: DENY (≥ 10%) NOT_FOUND_token — expected: DENY (≥ 5%) UNKNOWN_issuer — expected: DENY (≥ 5%) boundary_context_hash_valid — expected: PERMIT (≥ 5%) boundary_context_hash_invalid — expected: DENY (≥ 5%) default_deny_no_matching_rule — expected: DENY (≥ 5%) policy_version_not_found — expected: DENY (≥ 5%) combined_multi_condition_permit — expected: PERMIT (≥ 5%) combined_multi_condition_deny — expected: DENY (≥ 5%) // Remaining vectors: operator-defined for deployment-specific policy coverage Corpus serialization: corpus_hash = SHA-256(canonical_serialize(all_vectors_sorted_by_id)) corpus_hash archived before first evaluation pass corpus stored with evidence package; verifiable by assessor
5.2 Negative Test Cases
Negative test cases verify that the enforcement system does not permit what it must not permit. They are as important as positive test cases—a system that permits correctly but fails to deny correctly is non-conformant. The following negative test categories are mandatory at all certification levels:
- Revoked token must be denied; ACTIVE state returned by a non-linearizable read does not relax this requirement
- Request with no consent_id field must be denied at the EG extraction stage before CR query
- Request with invalid context_hash format (not matching sha256: prefix and format) must be denied
- Request referencing an unknown policy version must be denied by PE without evaluation
- Request from a caller with an expired mTLS certificate must be denied at transport layer before enforcement evaluation
- Request submitted after rate limit exceedance must be denied with RATE_LIMIT_EXCEEDED and produce AL record
- Request where AL write fails must never result in inference execution, regardless of PE decision
- Inference execution with missing, malformed, or HMAC-invalid artifact must be refused by inference system
5.3 Fail-Closed Validation Procedure
5.4 Revocation Race Condition Test
The revocation race condition test verifies that the system handles concurrent enforcement and revocation correctly and that the audit record correctly reflects both events. This test must be executed under load conditions representative of the production deployment, not under idle conditions.
procedure REVOCATION_RACE_TEST(consent_id C, load_rps R):
Step 1: Establish baseline
Confirm C.state = ACTIVE; run 100 requests for C at R req/s
Verify all 100 produce PERMIT with AL records
Step 2: Concurrent revocation
At T0: begin continuous requests for C at R req/s
At T0 + 50ms: commit revocation of C via RS
Continue requests for C until T0 + TTL + 100ms
Step 3: Collect results
Extract all AL records for C between [T0, T0 + TTL + 100ms]
Classify records as: PERMIT_BEFORE_REVOCATION or DENY_AFTER_REVOCATION
Step 4: Verify invariants
(a) All PERMIT records must have committed_at < revocation_committed_at + epsilon
where epsilon = revocation propagation tolerance (max: TTL)
(b) All DENY records after T0 + TTL must have reason = TOKEN_REVOKED
(c) No PERMIT record exists at committed_at > T0 + TTL
(d) Revocation propagation: qodiqa_revocation_propagation_ms P99 ≤ TTL
(e) Conservative mode: if any EG did not acknowledge revocation at TTL/2,
verify that EG applied DENY for affected consent_ids
Pass criterion: all four invariants satisfied; no PERMIT after T0 + TTL
5.5 Policy Drift Detection Test
Policy drift occurs when a deployed PE instance diverges from the canonical frozen policy snapshot—either through unauthorized modification, version mismatch across PE instances, or snapshot corruption. The policy drift detection test verifies that all PE instances report identical policy versions and snapshot hashes, and that the integrity heartbeat detects any divergence.
- Query policy version and snapshot hash from all active PE instances; confirm they are identical. Any divergence is an immediate test failure.
- Verify the snapshot hash reported by each PE instance matches the SHA-256 hash in the corresponding AL POLICY_FROZEN record
- Inject a single-bit modification to a PE instance's local policy snapshot; verify PE detects the tamper at next integrity check and emits POLICY_LOAD_FAILURE
- Deploy a test PE instance with a syntactically valid but semantically different policy snapshot; verify it is rejected and does not join the enforcement pool
- Verify the integrity heartbeat detects PE policy version divergence within its scheduled interval
5.6 Artifact Recomputation Test
Artifact recomputation testing verifies that the Artifact Emitter produces bit-identical output for identical inputs under the same key and nonce. This is distinct from the determinism test: the determinism test verifies that the enforcement decision is reproducible; the artifact recomputation test verifies that the artifact encoding of that decision is reproducible. Both must hold for certification at CL-02 and above. A system that makes correct enforcement decisions but produces non-deterministic artifacts violates the integrity model because the inference system cannot reliably verify the artifact against a known expected value.
procedure ARTIFACT_RECOMPUTATION_TEST(sample_size N ≥ 100): Preconditions: AE is operational; PE is operational; current key K is active No key rotation in progress during test execution Step 1: Generate N input tuples ∀ i ∈ [1..N]: T_i = (consent_id_i, context_hash_i, policy_version, decision_i, nonce_i) A_i_first = AE.emit(T_i, K) Record A_i_first with timestamp ts_first_i Step 2: AE restart Perform controlled AE process restart Verify remote attestation re-executed (CL-04: mandatory; CL-02/03: log-only) Verify AE reports same key K loaded and verified Step 3: Recompute artifacts ∀ i ∈ [1..N]: A_i_second = AE.emit(T_i, K) // same input tuple, same key, same nonce Record A_i_second with timestamp ts_second_i Step 4: Bit-identity verification ∀ i ∈ [1..N]: if A_i_first ≠ A_i_second: FAIL — non-deterministic artifact emission record: index=i, first_hash=SHA256(A_i_first), second_hash=SHA256(A_i_second) test terminates; all N results must pass Step 5: Inference system verification Submit A_i_first to inference system for 20 sampled inputs; verify acceptance Submit A_i_second to inference system for same 20 inputs; verify acceptance Verify inference system acceptance outcome is identical for both versions Pass criterion: ∀ i: A_i_first = A_i_second (byte-exact); inference system accepts both versions identically Evidence: test log with input tuple hashes, artifact hashes, restart timestamp; archived to AL as ARTIFACT_RECOMPUTATION_TEST record type
The artifact recomputation invariant must hold across all three failure modes: (a) AE process restart with key reload from persisted key store; (b) AE instance replacement within a multi-instance AE pool; and (c) AE recovery from a DENY state following a transient key verification failure. In all three cases, the recomputed artifact for a previously seen input must be bit-identical to the original artifact produced under the same key and nonce. An AE implementation that uses any timestamp, randomness source, or instance-specific state in the artifact encoding is structurally non-conformant at CL-02 and above.
#Determinism Verification Protocol
Determinism is the fundamental assurance property of QODIQA enforcement. It means that the enforcement function is a pure mathematical function of its inputs: given identical token state, context hash, and policy version, the function must return an identical decision on every invocation, on every PE instance, after every restart, and across every deployment that holds the same frozen policy snapshot. Determinism verification is a certification requirement at all levels and cannot be waived or approximated.
The deterministic certification invariant: for all frozen contexts C and policy versions P, evaluate(C, P) = replay(C, P). Any implementation for which this invariant fails for any vector in the test corpus fails the determinism requirement and cannot receive certification at any level.
6.1 Frozen Context Extraction Method
A frozen context is the canonicalized, version-tagged representation of a processing request's enforcement-relevant attributes at the moment of evaluation. Frozen context extraction must produce a context object that is both complete and irreducible: complete in that all attributes that could affect the enforcement decision are present; irreducible in that no attribute is included that does not affect the enforcement decision. The frozen context extraction procedure must be identical to the canonical serialization procedure defined in the Implementation Playbook §8.1.
// FC-EXT-INV-01: Completeness frozen_context(request R) must include: { consent_id, context_hash, policy_version, token.state, token.issuer, token.scope, token.issued_at, token.expires_at, request_nonce, caller_id } // FC-EXT-INV-02: Canonical hash reproduction canonical_hash(frozen_context) must be deterministic: ∀ C₁, C₂: semantically_equal(C₁, C₂) → canonical_hash(C₁) = canonical_hash(C₂) ∀ C: canonical_hash(C) is invariant under field reordering, whitespace, encoding // FC-EXT-INV-03: Policy binding frozen_context.policy_version must reference a FROZEN policy version PE must reject evaluation requests for non-FROZEN versions Frozen context produced for a non-FROZEN policy version is invalid for certification // FC-EXT-INV-04: Timestamp exclusion evaluation_timestamp must NOT be included in the canonical context hash The hash must be invariant across time for identical token states Token expiry is evaluated against the EG clock, not baked into the hash // FC-EXT-INV-05: Scope normalization token.scope must be canonical-sorted before hashing scope = sort_lexicographic(split(raw_scope, delimiter)) Scope presentation order must not affect evaluation outcome
6.2 Hash Reproduction Test
The hash reproduction test verifies that the canonical serialization procedure produces identical hashes for semantically equivalent contexts. This test is a prerequisite for all higher-order determinism tests—if the canonicalization procedure is not reproducible, the determinism test results are not interpretable.
procedure HASH_REPRODUCTION_TEST(sample_size M ≥ 50):
Step 1: Generate M base context objects with known canonical hashes
Step 2: For each base context C_i, generate variants:
V_i_1: field reordering (same fields, different JSON key order)
V_i_2: whitespace injection (spaces after colons and commas)
V_i_3: scope reordering (same scope values, different sequence)
V_i_4: encoding variation (ASCII-escaped vs UTF-8 for non-ASCII values)
Step 3: For each variant V_i_k:
h_variant = canonical_hash(V_i_k)
if h_variant ≠ canonical_hash(C_i): FAIL — non-deterministic canonicalization
record: variant type V_i_k, divergent hash pair, test failure
Step 4: Verify floating-point rejection
Inject a context with a floating-point numeric field
Verify: rejected with CONTEXT_TYPE_VIOLATION before hash computation
Pass criterion: all M×4 variants produce hash identical to base context hash
Evidence: hash reproduction test log with all input/output pairs archived
6.3 Policy Version Binding Verification
Policy version binding verification confirms that the enforcement function is bound to the declared policy version at the time of evaluation and that the binding is enforced at the PE layer—not inferred, approximated, or subject to runtime policy loading. The verifier must confirm that PE holds the exact policy snapshot whose SHA-256 hash matches the POLICY_FROZEN AL record for the declared policy version.
- Query PE for the current loaded policy version and snapshot hash; verify match against AL POLICY_FROZEN record for that version
- Submit an evaluation request referencing an unrecognized policy version; verify DENY with reason POLICY_VERSION_NOT_FOUND before any rule evaluation
- Submit a request referencing a valid but deprecated policy version (not the current active version); verify whether the deployment correctly handles version plurality or restricts to a single active version, per operator declaration
- Verify that the PE snapshot hash is computed at startup and verified before accepting any evaluation request; a PE that begins accepting requests before snapshot verification is non-conformant
6.4 Replay Invariant Validation
Replay invariant validation verifies that submitting the same enforcement request a second time produces the same enforcement outcome, given identical token state and policy version, but is correctly blocked if the request nonce has been previously consumed. These two properties are distinct and must be tested separately.
#Audit and Ledger Integrity Validation
The Audit Ledger (AL) is the evidentiary foundation of QODIQA enforcement accountability. Its integrity is not a performance characteristic—it is a precondition for any conformance claim. A certification assessment that cannot verify AL chain integrity is incomplete regardless of the results of all other tests. AL integrity validation is mandatory at every certification level.
7.1 Hash-Chain Validation Process
committed_at timestamp and that no two records share an identical timestamp within the same partition. Duplicate timestamps indicate either a clock failure or a record injection attempt and must be reported as a chain integrity anomaly.
7.2 Log Tamper Detection
Tamper detection for the AL relies on the combination of the hash chain and the signed export mechanism. A tamper that modifies, deletes, or reorders records within a partition will produce a chain break at the tamper location. A tamper that appends fabricated records at the end of the chain cannot be detected by the chain alone—it requires cross-referencing the export against a prior integrity checkpoint or against an independently maintained record count.
At CL-03 and CL-04, the per-write chain integrity verification provides near-real-time tamper detection. Any write that does not produce a valid chain extension must trigger an immediate Class 0 alert. At CL-01 and CL-02, weekly and daily chain verification schedules allow for a longer tamper detection window, which must be disclosed in the conformance claim as part of the stated assurance boundary.
7.3 Retention Compliance Verification
Audit record retention requirements are defined by the operator's declared retention policy, which must be disclosed as part of the conformance boundary. The assessor must verify that: records in the AL have not been deleted or truncated within the declared retention period; the AL export for the assessed period is complete and contiguous; and the immutable storage export (where required at CL-02 and above) contains records back to the beginning of the declared retention period with unbroken chain continuity.
7.4 Sampling Strategy for Audit Validation
For large-scale deployments where the AL contains millions of records per day, full-chain verification on every record may be computationally intensive. The following sampling strategy is permitted for CL-01 and CL-02 assessments where full verification is impractical within the assessment window. At CL-03 and CL-04, full-chain verification is required and sampling is not permitted.
This sampling strategy applies to CL-01 and CL-02 assessments only. At CL-03 and CL-04, full-chain verification is required and sampling is not permitted.
#Revocation Propagation Certification
The revocation propagation guarantee is the time-bounded commitment that a revocation event committed to the Consent Registry will be acknowledged by all Enforcement Gateway instances within a declared TTL. This guarantee is a contractual commitment to affected parties. Certification of this guarantee requires demonstrated measurement—not configuration inspection alone.
8.1 Revocation SLA Verification
Revocation SLA verification is the process of confirming that the measured revocation propagation latency does not exceed the declared TTL at the P99 percentile. SLA verification requires production metric data—not test-environment measurements. The assessor must examine the qodiqa_revocation_propagation_ms histogram from the production ML system, covering the most recent 30 days of operation at CL-01 and CL-02, and the most recent 90 days at CL-03 and CL-04.
procedure REVOCATION_SLA_VERIFY(metric_export M, declared_TTL T):
Step 1: Verify metric export integrity
M.signature verified against ML signing key
M.period_start, M.period_end within assessment window
Step 2: Per-EG-instance P99 check
∀ EG instance i ∈ M.instances:
P99_i = percentile(M.latencies[i], 99)
if P99_i > T: FAIL — SLA violation at EG instance i
record: instance_id=i, P99=P99_i, declared_TTL=T, violation_delta=P99_i-T
Step 3: Worst-case P99 check
P99_max = max(P99_i for all i)
if P99_max > T: FAIL — aggregate SLA violation
if P99_max > T * 0.9: WARNING — operating within 10% of TTL ceiling
Step 4: Event count validation
total_events = count(M.events)
if total_events < minimum_events_threshold: INCONCLUSIVE
minimum_events_threshold = max(1000, estimated_daily_revocations × period_days × 0.1)
Step 5: Conservative mode activation record
Query AL for CONSERVATIVE_MODE_ACTIVATED records in assessment period
Each CONSERVATIVE_MODE_ACTIVATED record must have a corresponding
CONSERVATIVE_MODE_RESOLVED record within the same TTL window
Unresolved conservative mode records are a SLA certification failure
Pass criterion: all P99_i ≤ T; event count ≥ threshold;
no unresolved CONSERVATIVE_MODE_ACTIVATED records
8.2 TTL Boundary Enforcement
TTL boundary enforcement testing verifies that the system enforces the TTL boundary as a hard constraint, not a soft target. The test must verify that no PERMIT is issued for a consent_id whose revocation was committed at time T_rev at any EG instance after T_rev + TTL, regardless of cache state or propagation lag. This invariant must hold under load, under network stress, and immediately following an EG restart.
- At T_rev, commit revocation of C. At T_rev + TTL + 1s, submit a request for C at all EG instances. Verify all instances return DENY.
- Verify that EG instances for which propagation was delayed beyond TTL activated conservative mode before the TTL expired and not after.
- Verify that requests submitted between T_rev and T_rev + TTL are classified correctly: PERMITs before revocation reached the EG are acceptable; PERMITs after revocation reached the EG are failures.
- Restart an EG instance at T_rev + TTL/2. Verify that the restarted instance does not issue a PERMIT for C—even before it has received the propagated revocation—by requiring a fresh CR read on restart before resuming enforcement.
8.3 Stale Registry Detection
Stale registry detection testing verifies that the CR cache correctly expires and that stale ACTIVE states are not served beyond their cache TTL. The test simulates a scenario where the CR network is transiently unavailable, after which the cache TTL expires and the EG must either re-query CR or deny due to unavailability—and must not serve the stale ACTIVE state beyond the cache TTL bound.
8.4 Time-Bound Validation Procedure
procedure TIME_BOUND_VALIDATION(consent_id C, declared_TTL T, n_EG_instances K):
Precondition: C.state = ACTIVE; all K EG instances operational
Phase A — Baseline (t = 0 to t = 60s):
Submit 10 requests per EG instance; verify all PERMIT
Record baseline latencies and AL record timestamps
Phase B — Revocation Commit (t = 60s):
T_rev = now()
Commit revocation of C via RS; record T_rev precisely (monotonic clock)
RS emits revocation event to all K EG instances
Phase C — Window Monitoring (t = 60s to t = 60s + TTL):
Every 5s: submit one request to each EG instance
Record: (EG_instance_id, request_time, decision, AL_record)
Any PERMIT after T_rev is acceptable only if request_time < T_rev + propagation_lag_i
Phase D — Post-TTL Boundary (t = 60s + TTL + 1s):
Submit 5 requests to each EG instance
Assert: ALL decisions = DENY with reason = TOKEN_REVOKED
Assert: zero PERMITs across all K instances after T_rev + TTL
If any PERMIT: FAIL — TTL boundary violated at instance i
Phase E — Measurement
For each EG instance i: propagation_lag_i = first_DENY_at_i - T_rev
Verify: ∀ i: propagation_lag_i ≤ T
Record: P50, P95, P99 across all instances
Evidence: full AL export for C over [T_rev - 60s, T_rev + TTL + 60s];
metric export for revocation_propagation_ms covering Phase C
#Certification Authority Model
Certification authority is the organizational and procedural structure through which a certification claim is evaluated and affirmed. This Framework defines three authority pathways. Each pathway produces a different claim type with different independence and credibility properties. The authority pathway must be declared as part of every public conformance statement.
9.1 Internal Self-Attestation
Internal self-attestation is the process by which a deploying organization assesses its own deployment against this Framework's requirements, produces the required evidence, and issues a Declared Conformance claim. Internal self-attestation is permitted at CL-01 and CL-02. It is not permitted at CL-03 or CL-04.
An internal self-attestation is valid only if: the assessment is performed by personnel who were not responsible for the design or implementation of the deployment being assessed; the evidence package is reviewed by a technical lead independent of the assessment team; and the resulting conformance claim is documented internally with the evidence package retained for at least the duration of the certification validity period plus six months.
9.2 Independent Third-Party Attestation
Independent third-party attestation is the process by which a qualified assessor not affiliated with the deploying organization reviews the evidence package and, where required by the certification level, executes additional verification procedures. A third-party attestation produces a Verified Conformance claim. Third-party attestation is required for CL-02 claims submitted to the public registry, and is the minimum pathway for CL-03.
9.3 Accredited Certification Bodies
An accredited certification body (ACB) is an organization that has established formal procedures for conducting QODIQA certification assessments, employs or contracts qualified assessors, maintains assessment records, and issues Certified Conformance claims. ACBs are required for CL-04 certification and are an option for CL-03.
An ACB must satisfy the following structural requirements: independent governance with no financial dependency on the deploying organizations it certifies; documented assessment procedures consistent with this Framework; assessor qualification standards at least as rigorous as §9.2; a formal certification revocation procedure; and public disclosure of the certification methodology used. An ACB that fails to satisfy any of these requirements may not issue claims under this Framework.
9.4 Conflict-of-Interest Rules
The following relationships between an assessor or ACB and a deploying organization are disqualifying and require disclosure to any party relying on the certification claim: equity ownership or financial interest in the deploying organization; provision of implementation services, architecture design, or infrastructure components to the deployment under assessment; participation in the design or specification of the deployment's enforcement infrastructure; and any relationship that would create an incentive for the assessor to produce a positive certification outcome regardless of evidence.
When a conflict of interest is discovered after a certification has been issued, the certification must be suspended pending review. The deploying organization must be notified immediately. The certification may be reinstated only after a conflict-free assessor repeats the assessment from the original evidence package.
9.5 Certification Revocation Procedure
A certification issued under this Framework may be revoked under the following conditions: evidence of a boundary-breaking event (as defined in §2.3) that has not triggered re-certification; discovery that the evidence package contained fabricated, altered, or retroactively constructed artifacts; discovery of a conflict of interest that was not disclosed; a Class 0 integrity breach in the certified deployment that has not been resolved and re-assessed; and failure to renew within the required renewal interval.
Revocation is an administrative action, not a punishment. When a certification is revoked, the deploying organization must update all public conformance statements to reflect the revocation within 48 hours. The revocation must be recorded in the public registry alongside the original certification entry. A revoked certification may be reinstated through a complete re-assessment under the applicable certification level requirements.
#Renewal and Continuous Compliance
Certification is a time-bounded claim. A certification issued today does not attest to the conformance of the deployment in twelve months. The enforcement infrastructure will evolve; policy versions will change; components will be updated; infrastructure will be modified. Renewal procedures ensure that the certification claim remains an accurate representation of the deployment's current conformance state.
10.1 Certification Validity Period
| Level | Validity Period | Renewal Type Required | Evidence Refresh Requirement |
|---|---|---|---|
| CL-01 Declared | 24 months | Self-attestation re-assessment | Full evidence package; all tests re-executed |
| CL-01 Verified | 24 months | Third-party re-review | Full evidence package; assessor may rely on delta evidence for unchanged controls |
| CL-02 Verified | 18 months | Third-party re-assessment including replay tests | Full evidence; determinism corpus re-run required |
| CL-03 Certified | 12 months | Certified re-assessment; all SLA evidence refreshed | 90-day metric data must cover period ending within 30 days of renewal date |
| CL-04 Certified | 12 months | Independent third-party re-audit; accredited body required | All CL-04 evidence; independent determinism audit required at each renewal |
10.2 Trigger Events for Re-Certification
The following events require re-certification before the next scheduled renewal, regardless of how recently the previous certification was issued. A boundary-breaking event overrides the validity period.
- Change in deployment topology—including addition, removal, or relocation of any canonical component
- Major version upgrade of any enforcement-path component (EG, PE, CR, AL, AE)
- Change in the declared revocation TTL, in any direction
- Change in the audit ledger infrastructure, including storage system replacement, partition restructuring, or export mechanism change
- Change in the key hierarchy—including root key re-establishment, intermediate key replacement, or AE signing key algorithm change
- A Class 0 integrity breach event that required forensic review and remediation
- Policy version change that introduces new rule categories not present in the previous assessed version
- Discovery of a conformance failure in production that was not detected by the prior assessment
10.3 Version Migration Requirements
When the QODIQA corpus is revised and new normative versions of the Core Standard, the 68-Point Framework, or the Implementation Playbook are published, a version migration window is declared. During the migration window, certifications issued against the prior version remain valid. After the migration window closes, certifications must be renewed against the new version requirements. The migration window duration will be defined in the corpus revision notice; it will not be less than six months.
A deployment that is certified against an earlier version of the QODIQA corpus and that wishes to claim certification against a newer version must complete a full re-assessment against the new version requirements. Delta assessments are not sufficient for version migration; the new version may introduce requirements that interact with previously assessed controls in ways that require fresh evaluation.
10.4 Revocation of Certification Conditions
Certification revocation is distinct from certification expiry. Expiry is a scheduled event at the end of the validity period. Revocation is an unscheduled event triggered by evidence that the certified deployment is no longer conformant, regardless of position within the validity period. The following conditions mandate revocation initiation within 72 hours of discovery:
- A Class 0 integrity breach—confirmed replay, ledger chain break with external modification evidence, unauthorized CR write, or policy mutation post-freeze—that has not been remediated and re-assessed
- Evidence that the evidence package submitted for certification contained fabricated test results, retroactively constructed artifacts, or timestamps inconsistent with the claimed test execution window
- Discovery that the assessor or ACB had a disqualifying conflict of interest not disclosed at the time of assessment
- A boundary-breaking event (§2.3) that has not triggered re-certification within 30 days of the event
- Deployment of a component version that the deploying organization has determined introduces a regression in conformance but that has not yet been assessed
- A public security disclosure affecting a cryptographic primitive or key management component in the certified deployment, where the deploying organization has not demonstrated that the affected component has been replaced or mitigated
- Failure to renew within the maximum renewal interval plus a 30-day grace period
Revocation does not delete the certification history. All revoked certifications remain in the public registry with their revocation reason code and the date of revocation. A deploying organization that disagrees with a revocation determination by an ACB may request a review by a second ACB; the original certification remains SUSPENDED (not REVOKED) during the review period. If the review ACB concurs with the original revocation determination, the status changes to REVOKED and the review outcome is archived alongside the original certification record.
#Public Registry Model
The public certification registry is the authoritative record of all QODIQA conformance claims that have been submitted for public listing under the Verified or Certified claim types. It is a transparency instrument, not a marketing channel. Its purpose is to allow relying parties to independently verify conformance claims made by deploying organizations without depending on the deploying organization's own representations.
11.1 Registry Structure
Each registry entry must contain the following mandatory fields. No entry may be published without all mandatory fields. Optional fields may be included where applicable.
| Field | Type | Description | Mandatory |
|---|---|---|---|
registry_id | String | Unique opaque identifier assigned at registry submission | Yes |
deployment_id | String | Deploying organization's identifier for the assessed deployment; must be consistent across renewals | Yes |
certification_level | Enum | CL-01, CL-02, CL-03, or CL-04 | Yes |
claim_type | Enum | VERIFIED or CERTIFIED | Yes |
assessment_date | ISO date | Date of final evidence review and conformance determination | Yes |
valid_until | ISO date | Expiry date per §10.1 validity periods | Yes |
corpus_version | String | QODIQA corpus version assessed against (e.g., CORE-1.0, FW-3.0) | Yes |
policy_versions | Array | List of policy version identifiers in scope at assessment date | Yes |
assessor_id | String | Identifier for assessor or ACB; not disclosed for self-attestation | Verified/Certified |
evidence_package_hash | SHA-256 hex | Hash of the evidence package manifest submitted with the certification | Yes |
status | Enum | ACTIVE, EXPIRED, REVOKED, SUSPENDED | Yes |
revocation_reason | String | If status = REVOKED: structured reason code per §9.5 | If revoked |
11.2 Transparency Requirements
Registry entries must be publicly queryable by registry_id and by deployment_id. The current status of any entry must be returned within 24 hours of a status change. REVOKED entries must remain in the registry indefinitely—they are not removed on revocation. The registry must disclose the corpus version and claim type for every entry so that relying parties can assess the scope and independence of the conformance claim.
Registry entries do not disclose the content of the evidence package, the detailed test results, or any internal deployment information. The evidence package hash is published so that a relying party who has been provided the evidence package by the deploying organization can verify its authenticity. The registry is not a substitute for direct evidence review by relying parties with specific assurance needs.
11.3 Registry Integrity
The registry itself must maintain an append-only record of all status changes, with timestamps and reason codes for each change. A registry operator that cannot demonstrate the integrity of its status change history is not operating a conformant public registry under this Framework. The registry integrity record must be independently verifiable by the deploying organization for entries pertaining to its deployments.
11.4 Version Disclosure
The public registry must disclose, for every entry, the exact QODIQA corpus version against which the deployment was assessed. Corpus version disclosure must be specific to the named document versions—it is not sufficient to state "QODIQA Core" without specifying the version number. Where the assessment covered multiple corpus documents (e.g., both the Core Standard and the 68-Point Framework), both versions must be disclosed separately in the registry entry.
Version disclosure enables relying parties to determine whether a certification was conducted against the current version of the corpus, an earlier version, or a version that has since been superseded by a normative revision. A relying party must be able to assess, from the registry entry alone and without additional information from the deploying organization, the following: the exact normative requirements the deployment was assessed against; whether those requirements have been superseded; and, if superseded, how long ago the superseding version was published. The registry must provide version lineage information sufficient to support this determination.
| Disclosure Element | Requirement and Relying Party Purpose |
|---|---|
| Core Standard version | Must be expressed as a major.minor identifier with publication date (e.g., CORE-1.0 (2026-Q1)). Enables relying parties to determine the normative enforcement requirements in scope. |
| 68-Point Framework version | Must be version identifier 1.0 corresponding to the QODIQA corpus version in scope. |
| Implementation Playbook version | Major.minor if assessed; NONE if not in scope (e.g., IMPL-1.1 or NONE). Enables determination of the infrastructure conformance reference used. |
| Certification Framework version | Major.minor identifier — always required (e.g., CERT-1.0). Enables determination of the certification procedure version and detection of procedural changes since assessment. |
| Corpus status at assessment | CURRENT or SUPERSEDED at time of assessment. Enables relying parties to determine whether the deployment was assessed against the then-current corpus. |
| Corpus status at query time | CURRENT or SUPERSEDED, computed by the registry at query time (e.g., SUPERSEDED by CERT-1.1). Enables relying parties to determine whether the certification basis is still current. |
#Institutional Closing Statement
This Framework completes the QODIQA corpus by providing the assurance layer that makes the corpus's normative requirements verifiable. A standard without a certification framework is a set of claims that cannot be independently substantiated. A certification framework without a technically rigorous standard to certify against is a procedural shell with no normative content. The QODIQA corpus requires both, and this Framework is the second half of that pair.
Certification under this Framework is not a declaration of intent. It is a technically substantiated claim, bound to a specific deployment, a specific time window, and a specific assurance level. It means that someone who was not responsible for building the deployment has examined the evidence and concluded that the determinism invariant holds, the revocation guarantee is measured and within bounds, the ledger is tamper-evident and complete, and the fail-closed behavior is demonstrated under injection—not merely configured.
The certification anchor—the deterministic certification invariant evaluate(C, P) = replay(C, P)—is not a performance metric and not a statistical property. It is a structural requirement: the enforcement function must be pure. If it is not pure, the entire accountability model built on top of it collapses. Certified conformance under this Framework is evidence that it is pure, for the assessed deployment, at the assessed time, against the assessed policy version. Nothing more and nothing less.
Fail-closed enforcement is the non-negotiable posture of this Framework. A deployment that routes requests through an open circuit breaker, serves stale revocation state beyond TTL, or executes inference without a committed audit record cannot be certified at any level. The absence of a certification claim is not a failure of process—it is an accurate representation of the deployment's conformance state. Certification under this Framework is earned through demonstrated behavior, not through documentation of intent.
12.1 Corpus Alignment Statement
This Certification Framework (QODIQA-CERT-2026-001 v1.0) is normatively subordinate to and must be read in conjunction with: QODIQA — Consent as Infrastructure for Artificial Intelligence Technical Whitepaper — Version 1.0; QODIQA — 68-Point Enforcement Framework for Deterministic Runtime Consent Enforcement — Version 1.0; QODIQA — Core Standard for Deterministic Runtime Consent Enforcement — Version 1.0; QODIQA — Implementation Playbook for Deterministic Runtime Consent Enforcement — Version 1.0. In the event of conflict between this Framework's procedural specifications and the enforcement semantics of the foregoing documents, the foregoing documents prevail. This Framework is authoritative for all matters of certification procedure, evidence specification, and attestation pathway.
#Certification Lifecycle
Certification under this Framework is not a one-time event. It is a continuing compliance state that must be actively maintained through a structured lifecycle of assessment, surveillance, and renewal. A certification claim is valid only for the specific deployment configuration, policy version, and assurance level against which it was issued—and only for the duration of its declared validity period. Any departure from the assessed configuration that is not captured and re-evaluated in a subsequent assessment constitutes an unmanaged deviation from the certified state.
The certification lifecycle is the operational mechanism by which the deterministic certification invariant is kept current. A certificate that has expired, lapsed under surveillance failure, or been issued against a configuration that has since materially changed does not constitute valid evidence of conformance. Relying parties must verify not only that a certificate exists but that it remains active and reflects the current deployment state.
13.1 Certification Lifecycle Phases
13.2 Certification as a Continuing Compliance State
The lifecycle model above reflects a fundamental principle of this Framework: certification status is not a fixed property of a deployment—it is a time-bounded, configuration-specific, evidence-backed assertion that is continuously subject to invalidation. A deployment that was conformant at the time of certification may become non-conformant through any of the following: changes to the enforcement architecture without reassessment; policy version updates that alter enforcement semantics without re-verification; key rotation events that are not captured in the audit ledger; infrastructure migrations that alter component isolation properties; or surveillance findings that reveal unresolved deviations.
Relying parties must treat a certification claim as a living assertion, not a historical record. The public registry defined in Section 11 is the authoritative source of current certification status. A certificate that appears in the registry as active and unexpired, against a deployment configuration that matches the current operational state, is a valid certification claim. A certificate that is expired, suspended, or revoked—or that was issued against a configuration that has materially changed—is not valid evidence of current conformance regardless of when it was originally issued.
The certification lifecycle is the operational expression of the deterministic certification invariant. The invariant asserts that enforcement behavior is reproducible. The lifecycle asserts that reproducibility has been verified, that the verification is current, and that any change to the deployment that could affect reproducibility has been captured and re-evaluated. A certification program that issues certificates but does not maintain lifecycle integrity is not implementing this Framework—it is issuing assertions without the accountability structure that makes those assertions verifiable.
#Certification Assessment Procedure
Certification under this Framework requires verifiable runtime enforcement—not policy declarations, architectural diagrams, or vendor attestations. The assessment procedure is structured to produce evidence that is independently reproducible: an assessor who was not present at the original assessment must be able to re-derive the certification determination from the archived evidence package alone. Any assessment that does not produce a self-contained, independently verifiable evidence package does not satisfy the procedural requirements of this Framework.
14.1 Structured Evaluation Process
The assessment procedure is organized into six sequential evaluation stages. Each stage must be completed before the subsequent stage begins. A finding of non-conformance at any stage may be grounds for suspension of the assessment, depending on the severity classification of the finding and the certification level being sought.
14.2 Required Certification Evidence
The following table defines the standard artifact categories required during certification. Each artifact category must be represented in the evidence package by at least one artifact that satisfies the integrity and provenance requirements for the target certification level. Artifact categories marked as mandatory at a given level must be present; artifact categories marked as conditional must be present if the relevant system component or configuration is within the declared conformance boundary.
| Artifact Category | Description and Required Content | Minimum Level | Integrity Requirement |
|---|---|---|---|
| Enforcement Gateway Deployment Topology | Architectural diagram and configuration record of the enforcement gateway deployment, including component isolation model, network boundary configuration, and inference endpoint access controls. Must reflect the operational deployment at the time of assessment. | CL-01 | Assessor-signed at time of inspection |
| Runtime Enforcement Logs | Exported audit ledger records covering the assessment period, including PERMIT, DENY, and circuit-breaker event records. Must be exported via the signed export mechanism and carry a valid chain-integrity signature. Log exports must be contiguous and cover the full test window. | CL-01 | AL-signed export with chain verification |
| Consent Registry Integrity Proof | Evidence that the consent registry is operating with write-ahead logging, signing, and tamper-detection active. At CL-02 and above, includes a signed export of the registry state at the time of assessment with a corresponding hash record in the audit ledger. | CL-01 | CR-signed export |
| Policy Artifact Validation Record | Record confirming that the policy engine is operating against a frozen, immutable policy snapshot. Must include the snapshot hash, the POLICY_FROZEN audit ledger record, and evidence that no policy modification occurred during the assessment period. At CL-03 and above, includes multi-instance snapshot hash consistency verification. | CL-01 | PE-reported hash with AL cross-reference |
| Model Endpoint Isolation Evidence | Network topology records or inspection evidence confirming that the model endpoint is not directly reachable from outside the enforcement boundary. At CL-02 and above, includes active verification that requests submitted directly to the model endpoint without a valid enforcement artifact are rejected. | CL-02 | Assessor-verified at inspection |
| System Integration Documentation | Complete integration map of all systems that interact with the enforcement boundary, including upstream request originators, downstream inference consumers, and any external dependencies of the consent registry or audit ledger. Integration documentation must identify all data paths that carry consent signals or enforcement decisions. | CL-01 | Deploying organization declaration with assessor verification |
| Audit Log Integrity Proof | Independent verification that the audit ledger chain is unbroken for the assessment period. Must include the hash-chain verification result record from procedure HCV-01 through HCV-05. At CL-03 and above, must also include the per-write integrity verification configuration record and a sample of real-time tamper-detection alerts (or a record that no alerts were generated). | CL-01 | Assessor-executed chain verification |
| Conformance Test Result Archive | Structured archive of all test result records produced during conformance test suite execution, including input vectors, output decisions, audit ledger records for each vector, and pass/fail determinations. Test result archives must be tamper-evident and must carry an assessor integrity signature applied at the time of test execution. | CL-01 | Assessor-signed at execution time |
| Determinism Verification Record | Result record from the VERIFY_DETERMINISM protocol defined in Section 6, including input tuple hashes, output decision records, replay comparison results, and the pass/fail determination. At CL-02 and above, includes the PE restart record and the post-restart replay comparison results confirming bit-identical output for all sampled vectors. | CL-02 | Assessor-signed with tuple hash archive |
| Revocation SLA Metric Export | Signed export of the revocation propagation latency histogram covering the required measurement period for the target certification level, as defined in Section 8.1. Export must include per-EG-instance P99 values and the worst-case aggregate P99, both verified against the declared TTL. | CL-01 | ML-signed metric export |
14.3 Certification Process Overview
The following diagram illustrates the sequential flow of the certification process from initial application through ongoing surveillance and renewal. Each stage corresponds to a lifecycle phase defined in Section 13.1. The diagram is intended to provide a navigational overview of the process for applicants and relying parties; the normative procedural requirements are defined in Sections 13, 14.1, and 14.4.
Target level selection
Corpus version declaration
Evidence gap identification
Scope confirmation
Test suite execution
Runtime verification
Chain integrity
Independence verification
Conditionally Certified
Not Certified
Validity period set
Evidence archival
Trigger event monitoring
Deviation detection
Re-Certification
Revocation
14.4 Certification Suspension and Revocation
Certification status must be withdrawn if deterministic enforcement can no longer be verified for the certified deployment. Suspension and revocation are not disciplinary actions—they are accurate representations of the deployment's current conformance state. A certification authority that maintains active certification status for a deployment that has materially departed from its certified configuration is not administering this Framework; it is issuing misleading assurance claims.
The following conditions constitute grounds for immediate certification suspension, pending investigation and remediation assessment:
Following suspension, the deploying organization has a defined remediation window to resolve the suspension trigger and submit evidence of remediation for assessor review. If remediation is confirmed, the suspension is lifted and the certificate is reinstated with an updated surveillance schedule. If remediation is not completed within the remediation window, or if the investigation reveals that the trigger condition reflects a deeper conformance failure, the certificate is revoked.
Revocation is permanent. A revoked certificate cannot be reinstated. A new certification assessment is required to establish a new conformance claim. Revocation records are retained in the public registry and are not removed upon subsequent recertification. Relying parties must be notified of revocation through the registry notification mechanism defined in Section 11.
The suspension and revocation framework is not a punitive mechanism. It is the accountability layer that gives certification status its meaning. A certification program that does not revoke certificates when revocation conditions are met is not providing assurance—it is providing the appearance of assurance. The integrity of every active certificate in the registry depends on the willingness of the certification authority to revoke certificates that no longer reflect the conformance state they were issued to attest.
#Document Status and Classification
This document is the Certification Framework of the QODIQA specification corpus. It defines the conformance assessment procedures, evidence requirements, test methodology, and attestation authority model for implementations of the QODIQA Core Standard and the QODIQA 68-Point Enforcement Framework. It is issued as a Technical Certification Specification and is not a product specification, a commercial certification program, or a legal instrument.
The framework establishes four certification levels, defines the evidentiary requirements and test procedures for each level, and specifies the authority pathways through which conformance claims may be affirmed, maintained, and revoked. It is the authoritative instrument for all QODIQA conformance assessment activity.
This document should be read together with the following related specifications:
- QODIQA — Consent as Infrastructure for Artificial Intelligence Technical Whitepaper — Version 1.0
- QODIQA — Core Standard for Deterministic Runtime Consent Enforcement — Version 1.0
- QODIQA — 68-Point Enforcement Framework for Deterministic Runtime Consent Enforcement — Version 1.0
- QODIQA — Implementation Playbook for Deterministic Runtime Consent Enforcement — Version 1.0
- QODIQA — Reference Architecture for Deterministic Runtime Consent Enforcement — Version 1.0
- QODIQA — Security and Cryptographic Profile for Runtime Consent Enforcement — Version 1.0
- QODIQA — Threat Model and Abuse Case Specification — Version 1.0
- QODIQA — Governance Charter for the QODIQA Standard Corpus — Version 1.0
Version 1.0 represents the initial formal release of this document as part of the QODIQA standard corpus.
For strategic inquiries, architectural discussions, or partnership exploration:
Bogdan Duțescu
0040.724.218.572