QODIQA Certification Framework
for Deterministic Runtime Consent Enforcement

Deterministic Runtime Consent Enforcement for Artificial Intelligence Systems

April 2026

QODIQA-CERT-2026-001  ·  Version 1.0

The framework defines how implementations of the corpus are evaluated, certified, attested, and maintained in a verified conformant state.

Scroll
Contents
Scope and Purpose

This document defines how implementations of the QODIQA Core v1.0 Standard and, where applicable, the QODIQA — 68-Point Enforcement Framework for Deterministic Runtime Consent Enforcement — Version 1.0, are evaluated, certified, attested, and maintained in a verified conformant state. It establishes the evidentiary, procedural, and structural requirements that constitute conformance—and the conditions under which conformance may be affirmed, suspended, or revoked.

This Framework is not a partner program, a commercial endorsement scheme, or a symbolic designation. It is a formal conformance and assurance instrument. Certification under this Framework means that a deployment has demonstrated, through verifiable evidence and reproducible testing, that its enforcement infrastructure satisfies the normative requirements of the QODIQA corpus at a defined assurance level. Certification does not attest to vendor relationship, market position, or organizational intent. It attests solely to technical conformance.

#Executive Certification Overview

The QODIQA Core Standard defines the normative requirements for deterministic runtime consent enforcement. The Implementation Playbook defines how those requirements are realized in infrastructure. The 68-Point Enforcement Framework defines the enumerated control set against which deployments are assessed. This Certification Framework defines how conformance to those requirements is measured, evidenced, and formally affirmed.

These four documents form the complete QODIQA corpus. Each is normatively subordinate to the Core Standard. This Framework is operationally subordinate to the Implementation Playbook for infrastructure guidance, but it is the authoritative specification for all conformance assessment procedures. No certification activity that deviates from the procedures defined here produces a valid QODIQA certification outcome.

1.1 Purpose of Certification

Certification under this Framework serves a single purpose: to produce a verifiable, time-bounded attestation that a specified deployment of QODIQA enforcement infrastructure satisfies the normative requirements of the QODIQA corpus at a declared assurance level. That attestation must be reproducible, evidence-backed, and falsifiable. An attestation that cannot be independently re-derived from the archived evidence is not a valid certification under this Framework.

Certification Anchor: The technical anchor of all QODIQA certification is the determinism invariant: for any frozen enforcement context C at a declared policy version P, the enforcement function E(C, P) must return an identical outcome on every evaluation. Certification at any level that cannot demonstrate this invariant is not conformant certification.

1.2 Relationship to the Core Standard

The Core Standard defines what a conformant system must do. This Framework defines how conformance to those requirements is demonstrated. The Core Standard is normative over enforcement semantics; this Framework is normative over certification procedure. In the event of conflict between this Framework's procedural requirements and the Core Standard's enforcement requirements, the Core Standard prevails for enforcement semantics. This Framework prevails for all matters of evidence, testing, and attestation procedure.

1.3 Relationship to the Implementation Playbook

The Implementation Playbook specifies how conformant infrastructure is built and operated. This Framework specifies how the resulting infrastructure is assessed. The Playbook's conformance checklist (Sections 10.1 through 10.6) defines the baseline evidentiary requirements. This Framework extends those requirements with structured test procedures, evidence packaging specifications, assessor qualification criteria, and certification lifecycle management. The Playbook and this Framework are complementary instruments within the same corpus; the Playbook is the build specification, and this Framework is the audit specification.

1.4 Institutional Scope

This Framework applies to any entity deploying QODIQA enforcement infrastructure for production use and seeking to make a formal conformance claim. The Framework is equally applicable to self-attestation by the deploying organization, third-party attestation by an independent auditor, or certification by an accredited certification body. The procedures defined here are identical regardless of the attestation pathway; only the authority and independence requirements differ.

Documents Governed by This Framework
QODIQA — Core Standard for Deterministic Runtime Consent Enforcement — Version 1.0
QODIQA — 68-Point Enforcement Framework for Deterministic Runtime Consent Enforcement — Version 1.0
QODIQA — Implementation Playbook for Deterministic Runtime Consent Enforcement — Version 1.0
QODIQA — Certification Framework for Deterministic Runtime Consent Enforcement — Version 1.0
In the event of conflict, precedence order: Core Standard → 68-Point Framework → Implementation Playbook → This Framework (for procedural matters only).

#Conformance Definition Model

Conformance to the QODIQA corpus is not a binary attribute. It is a structured claim composed of four distinct conformance dimensions, each of which must be independently satisfied for a certification claim to be valid at any level. A deployment that satisfies three of four dimensions is not partially conformant—it is non-conformant for the dimensions it fails, and the overall certification claim must reflect that deficiency.

2.1 Conformance Dimensions

Dimension A
Normative Conformance
The deployment implements all required controls specified in the applicable QODIQA normative documents at the declared certification level. All QCC controls are operational. No required component is absent or operating outside its defined failure mode. Normative conformance is assessed by inspection of configuration, architecture, and component behavior against the control definitions in the Core Standard and the 68-Point Framework.
Dimension B
Operational Conformance
The deployment operates according to the normative requirements under live conditions. Operational conformance is not satisfied by configuration alone; it requires demonstrated behavior under test conditions, including failure injection, load, and revocation scenarios. A system that is correctly configured but does not behave correctly under operational stress is not operationally conformant.
Dimension C
Evidentiary Conformance
The deployment has produced, preserved, and made available for assessment the evidence artifacts required at the declared certification level. Evidence artifacts include test logs, determinism records, revocation propagation measurements, audit chain exports, and policy version snapshots. Evidentiary conformance requires that evidence is authentic, tamper-evident, time-stamped, and traceable to specific test executions. Missing or unverifiable evidence constitutes evidentiary non-conformance.
Dimension D
Deterministic Conformance
The enforcement function produces identical outcomes for identical inputs across all evaluation instances, PE restarts, and time intervals, subject only to changes in token state or policy version. Deterministic conformance is validated by the VERIFY_DETERMINISM protocol defined in Section 6. It cannot be inferred from operational conformance alone; it requires an independent reproducibility test against archived test vectors. Any deviation in outcome across identical inputs is a determinism failure that invalidates certification at any level.

2.2 Declared, Verified, and Certified Conformance

Three conformance claim types are recognized under this Framework. They differ in the independence and depth of the assessment process that supports them. They are not interchangeable; no claim type may be represented as another.

Claim Type Assessment Method Independence Requirement Registry Eligible
Declared Conformance
Self-assessment against this Framework's procedures; evidence produced and retained internally
Assessor is the deploying organization; no independence requirement
No — internal record only
Verified Conformance
Third-party review of evidence and test results by a qualified independent assessor
Assessor must have no organizational relationship to the deploying entity
Yes — with assessor attestation
Certified Conformance
Full assessment, test execution, and evidence review by an accredited certification body
Accredited body must satisfy the independence criteria in Section 9
Yes — with certification body identification

Representation Constraint: A deploying organization must not represent a Declared Conformance as Verified or Certified Conformance in any external communication. Misrepresentation of conformance claim type constitutes a conformance violation and requires immediate correction of all public-facing claims and notification to any affected parties who received the misrepresented claim.

2.3 Conformance Boundary

A conformance claim is always bounded to a specific deployment, a specific certification level, a specific policy version, and a specific assessment date. The claim does not extend to other deployments of the same software, future policy versions, or deployments at higher maturity levels that have not been independently assessed. The conformance boundary must be explicitly declared in any public conformance statement.

A change in any of the following constitutes a boundary-breaking event that requires re-assessment: deployment topology modification; component replacement or major version upgrade; policy version change; change to revocation TTL commitment; change to the audit ledger infrastructure; or a security event affecting the key hierarchy.

#Certification Levels

Four certification levels are defined. Each level is a complete, independently assessable conformance designation. Higher levels are not additive tiers — each level is a fully specified set of requirements that must be satisfied independently. A deployment seeking Level 3 certification must satisfy all Level 3 requirements; it is not sufficient to satisfy Level 1 and Level 2 requirements and claim Level 3 designation. The assessor must evaluate the deployment against the specific, complete requirements of the claimed level.

CL-01 Core Conformance QCC-01 through QCC-10 · Documented QCC-11/12
Required Controls
  • All seven canonical components deployed and operationally independent (QCC-01)
  • EG is sole enforcement gateway; no bypass path (QCC-02)
  • Fail-closed behavior verified for all enforcement-path component failures (QCC-03)
  • CR implements linearizable revocation flag reads (QCC-04)
  • RS propagates revocation within documented TTL ≤ 300s (QCC-05)
  • AL is append-only; hash chain integrity verified weekly (QCC-06)
  • AE uses HMAC-SHA256 from three-tier key hierarchy (QCC-07)
  • Context canonicalization documented and version-tagged (QCC-08)
  • Key hierarchy documented; root key offline (QCC-09)
  • Required metrics collected; all alert thresholds active (QCC-10)
  • QCC-11 and QCC-12 status documented; full satisfaction not required
Required Evidence
  • Architecture diagram with component boundaries signed by infrastructure lead
  • Network topology map confirming no inference system bypass path
  • Fail-closed test execution log: ≥ 4 component failure scenarios
  • CR linearizability configuration extract from storage system
  • RS propagation measurement log (minimum 100 events)
  • AL chain integrity verification log (minimum 1 full-chain run)
  • DETERMINISM_TEST AL record for each deployed policy version
  • Key hierarchy documentation with root key storage attestation
  • Metric endpoint snapshot at two timestamps showing counter increments
  • QCC-11/12 status declaration document signed by technical lead
Required Tests
  • Component failure injection: CR, PE, AL, AE — verify 100% deny
  • Timeout ceiling verification: all components within bounds
  • Circuit breaker state test: N failures → OPEN → probe recovery
  • Revocation test: commit revocation; confirm propagation within TTL
  • VERIFY_DETERMINISM protocol: corpus ≥ 500 vectors per policy version
  • AL chain break detection: inject synthetic break; verify alert fires
  • Artifact mismatch: tamper artifact; verify inference system refuses
Renewal Interval 24 months or on boundary-breaking event
Claim Type Permitted Declared or Verified
Failure Condition Any QCC-01 through QCC-10 not satisfied
CL-02 Verifiable Deterministic Conformance Replay Validation · Artifact Recomputation · HA Enforcement
Required Controls
  • All CL-01 controls satisfied at CL-01 standard
  • CR and AL replicated across ≥ 2 independent failure domains
  • EG and PE: ≥ 2 active instances; no shared mutable state
  • RS as durable message broker with delivery guarantees
  • Revocation TTL ≤ 60 seconds in all failure domains
  • Key rotation operational within 30-day deployment key ceiling
  • AL hash chain verified daily; out-of-band export daily minimum
  • QCC-11 fully satisfied: agent delegation independence verified
  • QCC-12 fully satisfied: topology declared; TTL disclosed
  • Replay validation: nonce uniqueness enforced and verified
  • Artifact recomputation verification: AE output reproducible under same key and nonce
Required Evidence
  • All CL-01 evidence at CL-01 standard
  • Multi-domain replication topology diagram with failure domain boundaries
  • RS delivery guarantee configuration extract
  • Key rotation log: AL KEY_ROTATION_EVENT records for 90 days
  • Dual-key window test log: artifact accepted under both keys during rotation
  • Nonce replay test: AL NONCE_REPLAY_DETECTED record from test execution
  • Artifact recomputation test: two artifacts from identical inputs, same key and nonce — must be bit-identical
  • Agent delegation independence test log: QCC-11 simulation results
  • Topology declaration signed document with TTL disclosure
Required Tests
  • All CL-01 tests executed at CL-01 standard
  • Failure domain isolation: terminate one failure domain; verify other continues enforcing
  • Revocation within 60s: 50 revocation events; measure P99 propagation latency
  • Replay attack simulation: re-submit prior request with same nonce; verify DENY
  • Key rotation live test: rotate key during active traffic; verify no enforcement interruption
  • VERIFY_DETERMINISM with PE restart between passes; corpus ≥ 1000 vectors
  • Artifact recomputation: AE restart; same inputs; verify identical output
Renewal Interval 18 months or on boundary-breaking event
Claim Type Permitted Verified or Certified
Failure Condition Any determinism or replay test failure; any CL-01 failure
CL-03 Enterprise Assurance Conformance Revocation SLA · Audit Durability · Monitoring Controls
Required Controls
  • All CL-02 controls satisfied at CL-02 standard
  • Revocation TTL ≤ 60s committed as SLA; measured, not aspirational
  • RS propagation P99 ≤ TTL verified in production metric data
  • AL durability: continuous export to operator-controlled immutable storage
  • AL hash chain integrity verified continuously (per-write at CL-03)
  • Enforcement path SLO ≥ 99.9% over 90-day measured window
  • Integrity heartbeat operational: 60s maximum verification interval
  • Drift classification matrix implemented: Class I through Class 0 alerts active
  • SLA breach escalation invariants operational and tested
  • Conservative mode tested: RS propagation delay triggers affected consent_id deny
Required Evidence
  • All CL-02 evidence at CL-02 standard
  • 90-day revocation propagation histogram export; P99 ≤ TTL
  • AL immutable storage export receipts for 90 days
  • AL per-write chain verification log for 30 days
  • Enforcement path SLO measurement report: 90-day availability ≥ 99.9%
  • Integrity heartbeat run log: all passes; any failures with resolution record
  • Conservative mode test: propagation delay injected; affected consent_ids denied; AL records present
  • Class I and Class 0 alert test records: each condition triggered; escalation confirmed
Required Tests
  • All CL-02 tests executed at CL-02 standard
  • Revocation SLA validation: 500 events across 30 days; P99 ≤ TTL confirmed
  • Conservative mode trigger: delay RS propagation beyond TTL/2; verify affected consent_id denial activates
  • Per-write chain integrity: inject synthetic break during write; verify immediate Class 0 alert and AL suspension
  • Integrity heartbeat failure: disable one check; verify heartbeat escalates within 2 minutes
  • SLO boundary test: simulate 0.1% enforcement path unavailability; verify Class I alert within threshold
Renewal Interval 12 months or on boundary-breaking event
Claim Type Permitted Certified only
Failure Condition SLO breach; revocation P99 > TTL; any CL-02 failure
CL-04 High-Assurance Conformance Optional Advanced Tier · Independent Determinism Audit · Multi-Region
Required Controls
  • All CL-03 controls satisfied at CL-03 standard
  • Multi-region deployment with linearizable cross-region revocation
  • Revocation TTL ≤ 15s across all regions; P99 verified in production data
  • HSM-backed AE mandatory in all regions
  • PE and AE in hardware secure enclave with verified remote attestation
  • Enclave attestation archived in AL at each initialization
  • Formal determinism audit by independent third party pre-deployment
  • Multi-region propagation race-condition testing completed
  • Cross-region consensus divergence scenario tested (FC-04b)
  • Annual penetration test of enforcement infrastructure
  • Enforcement path SLO ≥ 99.99% over 90-day measured window
  • Full AL audit trail independently verifiable without SaaS intermediation
Required Evidence
  • All CL-03 evidence at CL-03 standard
  • Multi-region revocation propagation histogram: P99 ≤ 15s per region pair
  • HSM configuration and partition audit for each AE instance
  • Remote attestation records: ENCLAVE_ATTESTATION AL records for each enclave
  • Independent third-party determinism audit report with methodology disclosure
  • Cross-region divergence test log: FC-04b scenario executed; conservative mode activated; recovery confirmed
  • Penetration test report from qualified independent tester: enforcement path scope only
  • Independent AL verification procedure: verifier operates without deploying organization tooling
  • 90-day SLO measurement at ≥ 99.99%
Required Tests
  • All CL-03 tests executed at CL-03 standard
  • Multi-region revocation: 1000 events; all regions within TTL
  • Cross-region partition: isolate Region A from Region B; verify conservative mode for affected consent_ids
  • HSM failover: simulate HSM partition saturation; verify AE conservative scale-out
  • Enclave restart attestation: restart PE enclave; verify attestation re-verified before key provisioning
  • Independent AL chain verification: assessor runs chain verification from exported data without deployer tooling
  • Clock skew edge case: inject skew > tolerance; verify timestamp-based denies and ML alert
Renewal Interval 12 months; independent third-party re-audit required
Claim Type Permitted Certified only — accredited body
Failure Condition Any cross-region invariant failure; enclave attestation failure; any CL-03 failure

#Certification Evidence Requirements

Evidence artifacts are the material basis of all conformance claims. An evidence artifact is a structured, time-stamped, tamper-evident record produced by a specific test execution, measurement collection, configuration inspection, or system event. Evidence artifacts are not narratives or self-descriptions—they are machine-verifiable records that a qualified assessor can independently examine and cross-reference against the requirements they attest to.

Evidence Integrity Requirement: All evidence artifacts must be produced at the time of the activity they record. Retroactive evidence construction is not permitted. An evidence artifact that cannot be time-stamped to within the window of the assessed deployment period is not valid evidence under this Framework, regardless of its content.

4.1 Evidence Artifact Taxonomy

PS
Policy Version Snapshot Frozen rule set with SHA-256 content hash; corresponding AL POLICY_FROZEN record. Integrity via AL hash chain and snapshot hash in POLICY_FROZEN record.
Required from CL-01
TEL
Test Execution Log Structured log of each test step with timestamp, inputs, observed outputs, and pass/fail status. Log signed by test executor; hash archived in AL under CONFORMANCE_TEST record type.
Required from CL-01
DTR
Determinism Test Record AL DETERMINISM_TEST record: corpus hash, vector count, two-pass results, policy version binding. AL hash chain; corpus archived separately with matching hash.
Required from CL-01
RPM
Revocation Propagation Metric Export Time-series histogram of qodiqa_revocation_propagation_ms per EG instance and region. Signed export from ML system; hash recorded in evidence package.
Required from CL-01
AHS
Artifact Hash Sample Set of ≥ 100 HMAC-SHA256 artifacts with corresponding consent_id, context_hash, policy_version; verification pass/fail per sample. Verification result signed by assessor; source artifacts from AL records.
Required from CL-01
ACV
Audit Chain Verification Result Output of chain verification procedure: partition, record range, CHAIN_VALID or CHAIN_BREAK at position k. Verification tooling output signed by assessor; reproducible from AL export.
Required from CL-01
CFL
Control Failure Log Record of each Class I and Class 0 condition triggered during testing: alert timestamp, response action, resolution. ML alert log export signed; cross-referenced with AL ENFORCEMENT_HALTED records.
Required from CL-01
KRA
Key Rotation Event Archive AL KEY_ROTATION_EVENT records for the assessed period; key fingerprint chain traceable to root. AL hash chain integrity; root key fingerprint independently verifiable.
Required from CL-02
RTR
Replay Test Record Test execution: nonce reuse scenario; AL NONCE_REPLAY_DETECTED record with timestamp. AL hash chain; test log signed by assessor.
Required from CL-02
RAR
Remote Attestation Record AL ENCLAVE_ATTESTATION records per enclave instance: measurement, certificate chain, timestamp. AL hash chain; attestation certificate chain verifiable against hardware vendor trust anchor.
Required from CL-04

4.2 Evidence Package Specification

Evidence for a certification assessment must be assembled into a structured evidence package. The evidence package is the complete, self-contained artifact set submitted to the assessor. It must include: a manifest listing all artifact files with their SHA-256 hashes; a conformance claim statement identifying the certification level, deployment boundary, and policy versions assessed; copies of all required evidence artifacts with timestamps and provenance; AL export for the assessment period covering all normative record types; and a signed declaration from the infrastructure lead attesting to the completeness and authenticity of the package contents.

The assessor must not accept an evidence package that is missing any required artifact type for the claimed certification level, that contains artifacts whose timestamps fall outside the assessed deployment period, or whose AL export hash chain fails verification. An incomplete or unverifiable evidence package is treated as evidentiary non-conformance, equivalent to a test failure for the controls whose evidence is missing.

4.3 Minimum Evidence Set by Level

Table 4.2 — Minimum Evidence Set by Certification Level
Artifact Type CL-01 CL-02 CL-03 CL-04
Policy Version SnapshotRequiredRequiredRequiredRequired
Test Execution LogRequiredRequiredRequiredRequired
Determinism Test RecordRequiredRequiredRequiredRequired
Revocation Propagation MetricsRequiredRequiredRequired (90 days)Required (90 days, all regions)
Artifact Hash SampleRequiredRequiredRequiredRequired
Audit Chain Verification ResultRequiredRequiredRequired (daily run)Required (independent verifier)
Control Failure LogRequiredRequiredRequiredRequired
Key Rotation Event ArchiveNot requiredRequiredRequiredRequired
Replay Test RecordNot requiredRequiredRequiredRequired
Remote Attestation RecordNot requiredNot requiredNot requiredRequired

#Conformance Test Methodology

Conformance testing under this Framework is structured testing against defined pass/fail criteria. Tests are deterministic in structure: given a specified test precondition, a specified stimulus, and a specified expected outcome, the test either passes or fails. There are no partial passes. A test result of "mostly compliant" or "substantially conformant" is not recognized; each test either produces the required outcome or it does not.

All conformance tests must be executed in an environment that is representative of the production deployment being assessed. Tests executed in a development or staging environment that differs from production in topology, component versions, or configuration do not produce valid evidence for a production deployment assessment.

5.1 Test Vector Validation

Test vector validation is the process of verifying that the enforcement function produces the expected decision for each member of a defined test corpus. The test corpus must be constructed before test execution and must be immutable during execution. The corpus hash must be computed and archived before the first evaluation pass. Any modification to the corpus after its hash is archived invalidates the test.

Test Vector Corpus — Construction Requirements
SPEC
// Corpus composition requirements — minimum 500 vectors at CL-01
// Minimum 1000 vectors at CL-02 through CL-04

Mandatory vector categories:
  ACTIVE_token_full_scope_match        — expected: PERMIT  (≥ 10%)
  ACTIVE_token_scope_mismatch          — expected: DENY    (≥ 10%)
  REVOKED_token                        — expected: DENY    (≥ 10%)
  EXPIRED_token                        — expected: DENY    (≥ 10%)
  NOT_FOUND_token                      — expected: DENY    (≥ 5%)
  UNKNOWN_issuer                       — expected: DENY    (≥ 5%)
  boundary_context_hash_valid          — expected: PERMIT  (≥ 5%)
  boundary_context_hash_invalid        — expected: DENY    (≥ 5%)
  default_deny_no_matching_rule        — expected: DENY    (≥ 5%)
  policy_version_not_found             — expected: DENY    (≥ 5%)
  combined_multi_condition_permit      — expected: PERMIT  (≥ 5%)
  combined_multi_condition_deny        — expected: DENY    (≥ 5%)
  // Remaining vectors: operator-defined for deployment-specific policy coverage

Corpus serialization:
  corpus_hash = SHA-256(canonical_serialize(all_vectors_sorted_by_id))
  corpus_hash archived before first evaluation pass
  corpus stored with evidence package; verifiable by assessor

5.2 Negative Test Cases

Negative test cases verify that the enforcement system does not permit what it must not permit. They are as important as positive test cases—a system that permits correctly but fails to deny correctly is non-conformant. The following negative test categories are mandatory at all certification levels:

  • Revoked token must be denied; ACTIVE state returned by a non-linearizable read does not relax this requirement
  • Request with no consent_id field must be denied at the EG extraction stage before CR query
  • Request with invalid context_hash format (not matching sha256: prefix and format) must be denied
  • Request referencing an unknown policy version must be denied by PE without evaluation
  • Request from a caller with an expired mTLS certificate must be denied at transport layer before enforcement evaluation
  • Request submitted after rate limit exceedance must be denied with RATE_LIMIT_EXCEEDED and produce AL record
  • Request where AL write fails must never result in inference execution, regardless of PE decision
  • Inference execution with missing, malformed, or HMAC-invalid artifact must be refused by inference system

5.3 Fail-Closed Validation Procedure

FCT-01
CR Component Failure Injection Terminate or network-isolate CR process. Submit 50 requests spanning at least 10 distinct consent_ids. Verify: (a) 100% of requests denied; (b) all AL records show DENY with reason CR_UNAVAILABLE; (c) zero inference executions recorded; (d) CIRCUIT_OPEN alert dispatched within circuit window W.
Pass criterion: 100% deny, 0 permits
FCT-02
PE Component Failure Injection Terminate PE process after CR is confirmed operational. Submit 20 requests for ACTIVE tokens. Verify: (a) 100% denied; (b) AL records show DENY with PE_UNAVAILABLE; (c) zero inference executions; (d) CIRCUIT_OPEN alert for PE dispatched.
Pass criterion: 100% deny
FCT-03
AL Write Failure Injection Network-partition EG→AL path. Submit 10 requests for ACTIVE tokens eligible for PERMIT. Verify: (a) PE returns PERMIT in all 10 cases; (b) AE generates artifact in all 10 cases; (c) none of the 10 requests reach inference system; (d) EG returns error to caller; (e) AUDIT_WRITE_FAILURE alert dispatched.
Pass criterion: 0 inference executions
FCT-04
AE Signing Failure Injection Corrupt or revoke the AE signing key. Submit 10 PERMIT-eligible requests. Verify: (a) PE returns PERMIT; (b) AE fails to generate artifact; (c) EG blocks all 10 requests; (d) inference system receives zero requests; (e) AE_UNAVAILABLE alert dispatched.
Pass criterion: 0 inference executions
FCT-05
Timeout Ceiling Verification For each component (CR, PE, AE, AL): configure artificial response delay exceeding the configured timeout ceiling. Verify EG does not wait beyond ceiling; request is denied; AL receives DENY record; timeout alert dispatched. Verify timeout values are within bounds specified in Implementation Playbook §5.
Pass criterion: denial at ceiling ± 5ms

5.4 Revocation Race Condition Test

The revocation race condition test verifies that the system handles concurrent enforcement and revocation correctly and that the audit record correctly reflects both events. This test must be executed under load conditions representative of the production deployment, not under idle conditions.

Revocation Race Condition Test — Procedure
PROCEDURE
procedure REVOCATION_RACE_TEST(consent_id C, load_rps R):

  Step 1: Establish baseline
    Confirm C.state = ACTIVE; run 100 requests for C at R req/s
    Verify all 100 produce PERMIT with AL records

  Step 2: Concurrent revocation
    At T0: begin continuous requests for C at R req/s
    At T0 + 50ms: commit revocation of C via RS
    Continue requests for C until T0 + TTL + 100ms

  Step 3: Collect results
    Extract all AL records for C between [T0, T0 + TTL + 100ms]
    Classify records as: PERMIT_BEFORE_REVOCATION or DENY_AFTER_REVOCATION

  Step 4: Verify invariants
    (a) All PERMIT records must have committed_at < revocation_committed_at + epsilon
        where epsilon = revocation propagation tolerance (max: TTL)
    (b) All DENY records after T0 + TTL must have reason = TOKEN_REVOKED
    (c) No PERMIT record exists at committed_at > T0 + TTL
    (d) Revocation propagation: qodiqa_revocation_propagation_ms P99 ≤ TTL
    (e) Conservative mode: if any EG did not acknowledge revocation at TTL/2,
        verify that EG applied DENY for affected consent_ids

  Pass criterion: all four invariants satisfied; no PERMIT after T0 + TTL

5.5 Policy Drift Detection Test

Policy drift occurs when a deployed PE instance diverges from the canonical frozen policy snapshot—either through unauthorized modification, version mismatch across PE instances, or snapshot corruption. The policy drift detection test verifies that all PE instances report identical policy versions and snapshot hashes, and that the integrity heartbeat detects any divergence.

  • Query policy version and snapshot hash from all active PE instances; confirm they are identical. Any divergence is an immediate test failure.
  • Verify the snapshot hash reported by each PE instance matches the SHA-256 hash in the corresponding AL POLICY_FROZEN record
  • Inject a single-bit modification to a PE instance's local policy snapshot; verify PE detects the tamper at next integrity check and emits POLICY_LOAD_FAILURE
  • Deploy a test PE instance with a syntactically valid but semantically different policy snapshot; verify it is rejected and does not join the enforcement pool
  • Verify the integrity heartbeat detects PE policy version divergence within its scheduled interval

5.6 Artifact Recomputation Test

Artifact recomputation testing verifies that the Artifact Emitter produces bit-identical output for identical inputs under the same key and nonce. This is distinct from the determinism test: the determinism test verifies that the enforcement decision is reproducible; the artifact recomputation test verifies that the artifact encoding of that decision is reproducible. Both must hold for certification at CL-02 and above. A system that makes correct enforcement decisions but produces non-deterministic artifacts violates the integrity model because the inference system cannot reliably verify the artifact against a known expected value.

Artifact Recomputation Test — Formal Procedure ART
PROCEDURE
procedure ARTIFACT_RECOMPUTATION_TEST(sample_size N ≥ 100):

  Preconditions:
    AE is operational; PE is operational; current key K is active
    No key rotation in progress during test execution

  Step 1: Generate N input tuples
    ∀ i ∈ [1..N]:
      T_i = (consent_id_i, context_hash_i, policy_version, decision_i, nonce_i)
      A_i_first = AE.emit(T_i, K)
      Record A_i_first with timestamp ts_first_i

  Step 2: AE restart
    Perform controlled AE process restart
    Verify remote attestation re-executed (CL-04: mandatory; CL-02/03: log-only)
    Verify AE reports same key K loaded and verified

  Step 3: Recompute artifacts
    ∀ i ∈ [1..N]:
      A_i_second = AE.emit(T_i, K)   // same input tuple, same key, same nonce
      Record A_i_second with timestamp ts_second_i

  Step 4: Bit-identity verification
    ∀ i ∈ [1..N]:
      if A_i_first ≠ A_i_second: FAIL — non-deterministic artifact emission
        record: index=i, first_hash=SHA256(A_i_first), second_hash=SHA256(A_i_second)
        test terminates; all N results must pass

  Step 5: Inference system verification
    Submit A_i_first to inference system for 20 sampled inputs; verify acceptance
    Submit A_i_second to inference system for same 20 inputs; verify acceptance
    Verify inference system acceptance outcome is identical for both versions

  Pass criterion: ∀ i: A_i_first = A_i_second (byte-exact);
    inference system accepts both versions identically
  Evidence: test log with input tuple hashes, artifact hashes, restart timestamp;
    archived to AL as ARTIFACT_RECOMPUTATION_TEST record type

The artifact recomputation invariant must hold across all three failure modes: (a) AE process restart with key reload from persisted key store; (b) AE instance replacement within a multi-instance AE pool; and (c) AE recovery from a DENY state following a transient key verification failure. In all three cases, the recomputed artifact for a previously seen input must be bit-identical to the original artifact produced under the same key and nonce. An AE implementation that uses any timestamp, randomness source, or instance-specific state in the artifact encoding is structurally non-conformant at CL-02 and above.

#Determinism Verification Protocol

Determinism is the fundamental assurance property of QODIQA enforcement. It means that the enforcement function is a pure mathematical function of its inputs: given identical token state, context hash, and policy version, the function must return an identical decision on every invocation, on every PE instance, after every restart, and across every deployment that holds the same frozen policy snapshot. Determinism verification is a certification requirement at all levels and cannot be waived or approximated.

The deterministic certification invariant: for all frozen contexts C and policy versions P, evaluate(C, P) = replay(C, P). Any implementation for which this invariant fails for any vector in the test corpus fails the determinism requirement and cannot receive certification at any level.

6.1 Frozen Context Extraction Method

A frozen context is the canonicalized, version-tagged representation of a processing request's enforcement-relevant attributes at the moment of evaluation. Frozen context extraction must produce a context object that is both complete and irreducible: complete in that all attributes that could affect the enforcement decision are present; irreducible in that no attribute is included that does not affect the enforcement decision. The frozen context extraction procedure must be identical to the canonical serialization procedure defined in the Implementation Playbook §8.1.

Frozen Context Extraction — Canonical Invariants
INVARIANTS
// FC-EXT-INV-01: Completeness
frozen_context(request R) must include:
  { consent_id, context_hash, policy_version,
    token.state, token.issuer, token.scope,
    token.issued_at, token.expires_at,
    request_nonce, caller_id }

// FC-EXT-INV-02: Canonical hash reproduction
canonical_hash(frozen_context) must be deterministic:
  ∀ C₁, C₂: semantically_equal(C₁, C₂) → canonical_hash(C₁) = canonical_hash(C₂)
  ∀ C: canonical_hash(C) is invariant under field reordering, whitespace, encoding

// FC-EXT-INV-03: Policy binding
frozen_context.policy_version must reference a FROZEN policy version
  PE must reject evaluation requests for non-FROZEN versions
  Frozen context produced for a non-FROZEN policy version is invalid for certification

// FC-EXT-INV-04: Timestamp exclusion
evaluation_timestamp must NOT be included in the canonical context hash
  The hash must be invariant across time for identical token states
  Token expiry is evaluated against the EG clock, not baked into the hash

// FC-EXT-INV-05: Scope normalization
token.scope must be canonical-sorted before hashing
  scope = sort_lexicographic(split(raw_scope, delimiter))
  Scope presentation order must not affect evaluation outcome

6.2 Hash Reproduction Test

The hash reproduction test verifies that the canonical serialization procedure produces identical hashes for semantically equivalent contexts. This test is a prerequisite for all higher-order determinism tests—if the canonicalization procedure is not reproducible, the determinism test results are not interpretable.

Hash Reproduction Test — Procedure HRT
PROCEDURE
procedure HASH_REPRODUCTION_TEST(sample_size M ≥ 50):

  Step 1: Generate M base context objects with known canonical hashes
  Step 2: For each base context C_i, generate variants:
    V_i_1: field reordering (same fields, different JSON key order)
    V_i_2: whitespace injection (spaces after colons and commas)
    V_i_3: scope reordering (same scope values, different sequence)
    V_i_4: encoding variation (ASCII-escaped vs UTF-8 for non-ASCII values)

  Step 3: For each variant V_i_k:
    h_variant = canonical_hash(V_i_k)
    if h_variant ≠ canonical_hash(C_i): FAIL — non-deterministic canonicalization
      record: variant type V_i_k, divergent hash pair, test failure

  Step 4: Verify floating-point rejection
    Inject a context with a floating-point numeric field
    Verify: rejected with CONTEXT_TYPE_VIOLATION before hash computation

  Pass criterion: all M×4 variants produce hash identical to base context hash
  Evidence: hash reproduction test log with all input/output pairs archived

6.3 Policy Version Binding Verification

Policy version binding verification confirms that the enforcement function is bound to the declared policy version at the time of evaluation and that the binding is enforced at the PE layer—not inferred, approximated, or subject to runtime policy loading. The verifier must confirm that PE holds the exact policy snapshot whose SHA-256 hash matches the POLICY_FROZEN AL record for the declared policy version.

  • Query PE for the current loaded policy version and snapshot hash; verify match against AL POLICY_FROZEN record for that version
  • Submit an evaluation request referencing an unrecognized policy version; verify DENY with reason POLICY_VERSION_NOT_FOUND before any rule evaluation
  • Submit a request referencing a valid but deprecated policy version (not the current active version); verify whether the deployment correctly handles version plurality or restricts to a single active version, per operator declaration
  • Verify that the PE snapshot hash is computed at startup and verified before accepting any evaluation request; a PE that begins accepting requests before snapshot verification is non-conformant

6.4 Replay Invariant Validation

Replay invariant validation verifies that submitting the same enforcement request a second time produces the same enforcement outcome, given identical token state and policy version, but is correctly blocked if the request nonce has been previously consumed. These two properties are distinct and must be tested separately.

Determinism Test — Same Inputs → Same Decision
Replay Detection Test — Same Nonce → Deny
1.Submit request R with unique nonce N1; record decision D1.
2.Submit identical request R with a new unique nonce N2 (different nonce).
3.Record decision D2.
4.Verify: D1 = D2 (same token state, context, policy version).
5.Repeat with PE restart between N1 and N2 submissions.
Pass: D1 = D2 across all repetitions including PE restart
1.Submit request R with nonce N1; record decision D1; confirm AL record.
2.Submit identical request R with the same nonce N1 again.
3.Verify: second submission denied with NONCE_REPLAY_DETECTED.
4.Verify: AL record for second submission shows DENY.
5.Verify: no second inference execution occurred.
Pass: N1 reuse denied; AL record present; zero second executions

#Audit and Ledger Integrity Validation

The Audit Ledger (AL) is the evidentiary foundation of QODIQA enforcement accountability. Its integrity is not a performance characteristic—it is a precondition for any conformance claim. A certification assessment that cannot verify AL chain integrity is incomplete regardless of the results of all other tests. AL integrity validation is mandatory at every certification level.

7.1 Hash-Chain Validation Process

HCV-01
Export and Hash Verification Export the AL partition under assessment. Verify the export signature against the AL component's public signing key. Compute SHA-256 of the export content; verify it matches the export manifest hash. A signature failure or hash mismatch at this step means the export is not a valid evidence artifact.
Prerequisite to all subsequent steps
HCV-02
Record Ordering Verification For each partition, verify that records are ordered by committed_at timestamp and that no two records share an identical timestamp within the same partition. Duplicate timestamps indicate either a clock failure or a record injection attempt and must be reported as a chain integrity anomaly.
Anomaly: duplicate timestamps
HCV-03
Chain Link Verification For each consecutive record pair (r_n, r_{n+1}) in each partition: compute SHA-256 of r_n's canonical serialization; verify it equals r_{n+1}.prev_hash. Any mismatch at position k is a chain break at k. Record the break position, the computed hash, and the stored prev_hash.
Chain break at k = test failure
HCV-04
Completeness Verification Cross-reference AL records against the enforcement request log for the assessment period. For each enforcement decision in the request log, verify that a corresponding AL record exists. Any enforcement decision without an AL record is an audit completeness failure—more severe than a chain break because it represents a missing accountability record.
Missing record = completeness failure
HCV-05
Record Type Distribution Verification Verify that the expected distribution of AL record types is present: PERMIT, DENY, KEY_ROTATION_EVENT, POLICY_FROZEN, DETERMINISM_TEST, and ENFORCEMENT_HALTED (if applicable). An AL partition that contains only PERMIT records without any KEY_ROTATION_EVENT records over a 90-day period is anomalous and must be flagged for manual review.
Anomalous distribution = flagged

7.2 Log Tamper Detection

Tamper detection for the AL relies on the combination of the hash chain and the signed export mechanism. A tamper that modifies, deletes, or reorders records within a partition will produce a chain break at the tamper location. A tamper that appends fabricated records at the end of the chain cannot be detected by the chain alone—it requires cross-referencing the export against a prior integrity checkpoint or against an independently maintained record count.

At CL-03 and CL-04, the per-write chain integrity verification provides near-real-time tamper detection. Any write that does not produce a valid chain extension must trigger an immediate Class 0 alert. At CL-01 and CL-02, weekly and daily chain verification schedules allow for a longer tamper detection window, which must be disclosed in the conformance claim as part of the stated assurance boundary.

7.3 Retention Compliance Verification

Audit record retention requirements are defined by the operator's declared retention policy, which must be disclosed as part of the conformance boundary. The assessor must verify that: records in the AL have not been deleted or truncated within the declared retention period; the AL export for the assessed period is complete and contiguous; and the immutable storage export (where required at CL-02 and above) contains records back to the beginning of the declared retention period with unbroken chain continuity.

7.4 Sampling Strategy for Audit Validation

For large-scale deployments where the AL contains millions of records per day, full-chain verification on every record may be computationally intensive. The following sampling strategy is permitted for CL-01 and CL-02 assessments where full verification is impractical within the assessment window. At CL-03 and CL-04, full-chain verification is required and sampling is not permitted.

  • Under 100,000 records/day: Full chain verification of all records — no sampling permitted.
  • 100K to 1M records/day: Minimum 10% of records per day. Sample selection: systematic — every N-th record, where N = floor(daily count / sample size). If any sampled break is found: full verification of the surrounding 10,000 records.
  • 1M to 10M records/day: Minimum 1% of records per day, with a floor of 10,000 records. Sample selection: stratified random, proportional across all record types. If any sampled break is found: full verification of the surrounding 50,000 records.
  • Over 10M records/day: Minimum 0.1% with a floor of 10,000 records; mandatory boundary sampling required. Sample selection: stratified random plus mandatory boundary sampling. Any break triggers full partition verification.
  • This sampling strategy applies to CL-01 and CL-02 assessments only. At CL-03 and CL-04, full-chain verification is required and sampling is not permitted.

    #Revocation Propagation Certification

    The revocation propagation guarantee is the time-bounded commitment that a revocation event committed to the Consent Registry will be acknowledged by all Enforcement Gateway instances within a declared TTL. This guarantee is a contractual commitment to affected parties. Certification of this guarantee requires demonstrated measurement—not configuration inspection alone.

    8.1 Revocation SLA Verification

    Revocation SLA verification is the process of confirming that the measured revocation propagation latency does not exceed the declared TTL at the P99 percentile. SLA verification requires production metric data—not test-environment measurements. The assessor must examine the qodiqa_revocation_propagation_ms histogram from the production ML system, covering the most recent 30 days of operation at CL-01 and CL-02, and the most recent 90 days at CL-03 and CL-04.

    Revocation SLA Verification — Formal Procedure
    PROCEDURE
    procedure REVOCATION_SLA_VERIFY(metric_export M, declared_TTL T):
    
      Step 1: Verify metric export integrity
        M.signature verified against ML signing key
        M.period_start, M.period_end within assessment window
    
      Step 2: Per-EG-instance P99 check
        ∀ EG instance i ∈ M.instances:
          P99_i = percentile(M.latencies[i], 99)
          if P99_i > T: FAIL — SLA violation at EG instance i
            record: instance_id=i, P99=P99_i, declared_TTL=T, violation_delta=P99_i-T
    
      Step 3: Worst-case P99 check
        P99_max = max(P99_i for all i)
        if P99_max > T: FAIL — aggregate SLA violation
        if P99_max > T * 0.9: WARNING — operating within 10% of TTL ceiling
    
      Step 4: Event count validation
        total_events = count(M.events)
        if total_events < minimum_events_threshold: INCONCLUSIVE
          minimum_events_threshold = max(1000, estimated_daily_revocations × period_days × 0.1)
    
      Step 5: Conservative mode activation record
        Query AL for CONSERVATIVE_MODE_ACTIVATED records in assessment period
        Each CONSERVATIVE_MODE_ACTIVATED record must have a corresponding
        CONSERVATIVE_MODE_RESOLVED record within the same TTL window
        Unresolved conservative mode records are a SLA certification failure
    
      Pass criterion: all P99_i ≤ T; event count ≥ threshold;
        no unresolved CONSERVATIVE_MODE_ACTIVATED records

    8.2 TTL Boundary Enforcement

    TTL boundary enforcement testing verifies that the system enforces the TTL boundary as a hard constraint, not a soft target. The test must verify that no PERMIT is issued for a consent_id whose revocation was committed at time T_rev at any EG instance after T_rev + TTL, regardless of cache state or propagation lag. This invariant must hold under load, under network stress, and immediately following an EG restart.

    • At T_rev, commit revocation of C. At T_rev + TTL + 1s, submit a request for C at all EG instances. Verify all instances return DENY.
    • Verify that EG instances for which propagation was delayed beyond TTL activated conservative mode before the TTL expired and not after.
    • Verify that requests submitted between T_rev and T_rev + TTL are classified correctly: PERMITs before revocation reached the EG are acceptable; PERMITs after revocation reached the EG are failures.
    • Restart an EG instance at T_rev + TTL/2. Verify that the restarted instance does not issue a PERMIT for C—even before it has received the propagated revocation—by requiring a fresh CR read on restart before resuming enforcement.

    8.3 Stale Registry Detection

    Stale registry detection testing verifies that the CR cache correctly expires and that stale ACTIVE states are not served beyond their cache TTL. The test simulates a scenario where the CR network is transiently unavailable, after which the cache TTL expires and the EG must either re-query CR or deny due to unavailability—and must not serve the stale ACTIVE state beyond the cache TTL bound.

    8.4 Time-Bound Validation Procedure

    Time-Bound Revocation Validation — TBV Procedure
    PROCEDURE
    procedure TIME_BOUND_VALIDATION(consent_id C, declared_TTL T, n_EG_instances K):
    
      Precondition: C.state = ACTIVE; all K EG instances operational
    
      Phase A — Baseline (t = 0 to t = 60s):
        Submit 10 requests per EG instance; verify all PERMIT
        Record baseline latencies and AL record timestamps
    
      Phase B — Revocation Commit (t = 60s):
        T_rev = now()
        Commit revocation of C via RS; record T_rev precisely (monotonic clock)
        RS emits revocation event to all K EG instances
    
      Phase C — Window Monitoring (t = 60s to t = 60s + TTL):
        Every 5s: submit one request to each EG instance
        Record: (EG_instance_id, request_time, decision, AL_record)
        Any PERMIT after T_rev is acceptable only if request_time < T_rev + propagation_lag_i
    
      Phase D — Post-TTL Boundary (t = 60s + TTL + 1s):
        Submit 5 requests to each EG instance
        Assert: ALL decisions = DENY with reason = TOKEN_REVOKED
        Assert: zero PERMITs across all K instances after T_rev + TTL
        If any PERMIT: FAIL — TTL boundary violated at instance i
    
      Phase E — Measurement
        For each EG instance i: propagation_lag_i = first_DENY_at_i - T_rev
        Verify: ∀ i: propagation_lag_i ≤ T
        Record: P50, P95, P99 across all instances
    
      Evidence: full AL export for C over [T_rev - 60s, T_rev + TTL + 60s];
        metric export for revocation_propagation_ms covering Phase C

    #Certification Authority Model

    Certification authority is the organizational and procedural structure through which a certification claim is evaluated and affirmed. This Framework defines three authority pathways. Each pathway produces a different claim type with different independence and credibility properties. The authority pathway must be declared as part of every public conformance statement.

    9.1 Internal Self-Attestation

    Internal self-attestation is the process by which a deploying organization assesses its own deployment against this Framework's requirements, produces the required evidence, and issues a Declared Conformance claim. Internal self-attestation is permitted at CL-01 and CL-02. It is not permitted at CL-03 or CL-04.

    An internal self-attestation is valid only if: the assessment is performed by personnel who were not responsible for the design or implementation of the deployment being assessed; the evidence package is reviewed by a technical lead independent of the assessment team; and the resulting conformance claim is documented internally with the evidence package retained for at least the duration of the certification validity period plus six months.

    9.2 Independent Third-Party Attestation

    Independent third-party attestation is the process by which a qualified assessor not affiliated with the deploying organization reviews the evidence package and, where required by the certification level, executes additional verification procedures. A third-party attestation produces a Verified Conformance claim. Third-party attestation is required for CL-02 claims submitted to the public registry, and is the minimum pathway for CL-03.

    Independent Assessor Qualification Requirements
    No current or prior employment, contractual, or financial relationship with the deploying organization within the preceding 24 months
    Demonstrable technical qualification in distributed systems, cryptographic systems, or high-assurance infrastructure assessment
    Familiarity with the QODIQA corpus sufficient to evaluate evidence against normative requirements without interpretation assistance from the deploying organization
    No financial interest in the outcome of the assessment (fixed-fee engagements only; outcome-contingent fees are disqualifying)
    Assessor identity and qualification disclosed in the Verified Conformance claim
    Qualification is self-declared by the assessor. The deploying organization is responsible for verifying qualification before engaging the assessor.

    9.3 Accredited Certification Bodies

    An accredited certification body (ACB) is an organization that has established formal procedures for conducting QODIQA certification assessments, employs or contracts qualified assessors, maintains assessment records, and issues Certified Conformance claims. ACBs are required for CL-04 certification and are an option for CL-03.

    An ACB must satisfy the following structural requirements: independent governance with no financial dependency on the deploying organizations it certifies; documented assessment procedures consistent with this Framework; assessor qualification standards at least as rigorous as §9.2; a formal certification revocation procedure; and public disclosure of the certification methodology used. An ACB that fails to satisfy any of these requirements may not issue claims under this Framework.

    9.4 Conflict-of-Interest Rules

    The following relationships between an assessor or ACB and a deploying organization are disqualifying and require disclosure to any party relying on the certification claim: equity ownership or financial interest in the deploying organization; provision of implementation services, architecture design, or infrastructure components to the deployment under assessment; participation in the design or specification of the deployment's enforcement infrastructure; and any relationship that would create an incentive for the assessor to produce a positive certification outcome regardless of evidence.

    When a conflict of interest is discovered after a certification has been issued, the certification must be suspended pending review. The deploying organization must be notified immediately. The certification may be reinstated only after a conflict-free assessor repeats the assessment from the original evidence package.

    9.5 Certification Revocation Procedure

    A certification issued under this Framework may be revoked under the following conditions: evidence of a boundary-breaking event (as defined in §2.3) that has not triggered re-certification; discovery that the evidence package contained fabricated, altered, or retroactively constructed artifacts; discovery of a conflict of interest that was not disclosed; a Class 0 integrity breach in the certified deployment that has not been resolved and re-assessed; and failure to renew within the required renewal interval.

    Revocation is an administrative action, not a punishment. When a certification is revoked, the deploying organization must update all public conformance statements to reflect the revocation within 48 hours. The revocation must be recorded in the public registry alongside the original certification entry. A revoked certification may be reinstated through a complete re-assessment under the applicable certification level requirements.

    #Renewal and Continuous Compliance

    Certification is a time-bounded claim. A certification issued today does not attest to the conformance of the deployment in twelve months. The enforcement infrastructure will evolve; policy versions will change; components will be updated; infrastructure will be modified. Renewal procedures ensure that the certification claim remains an accurate representation of the deployment's current conformance state.

    10.1 Certification Validity Period

    Table 10.1 — Certification Validity Periods by Level
    Level Validity Period Renewal Type Required Evidence Refresh Requirement
    CL-01 Declared24 monthsSelf-attestation re-assessmentFull evidence package; all tests re-executed
    CL-01 Verified24 monthsThird-party re-reviewFull evidence package; assessor may rely on delta evidence for unchanged controls
    CL-02 Verified18 monthsThird-party re-assessment including replay testsFull evidence; determinism corpus re-run required
    CL-03 Certified12 monthsCertified re-assessment; all SLA evidence refreshed90-day metric data must cover period ending within 30 days of renewal date
    CL-04 Certified12 monthsIndependent third-party re-audit; accredited body requiredAll CL-04 evidence; independent determinism audit required at each renewal

    10.2 Trigger Events for Re-Certification

    The following events require re-certification before the next scheduled renewal, regardless of how recently the previous certification was issued. A boundary-breaking event overrides the validity period.

    • Change in deployment topology—including addition, removal, or relocation of any canonical component
    • Major version upgrade of any enforcement-path component (EG, PE, CR, AL, AE)
    • Change in the declared revocation TTL, in any direction
    • Change in the audit ledger infrastructure, including storage system replacement, partition restructuring, or export mechanism change
    • Change in the key hierarchy—including root key re-establishment, intermediate key replacement, or AE signing key algorithm change
    • A Class 0 integrity breach event that required forensic review and remediation
    • Policy version change that introduces new rule categories not present in the previous assessed version
    • Discovery of a conformance failure in production that was not detected by the prior assessment

    10.3 Version Migration Requirements

    When the QODIQA corpus is revised and new normative versions of the Core Standard, the 68-Point Framework, or the Implementation Playbook are published, a version migration window is declared. During the migration window, certifications issued against the prior version remain valid. After the migration window closes, certifications must be renewed against the new version requirements. The migration window duration will be defined in the corpus revision notice; it will not be less than six months.

    A deployment that is certified against an earlier version of the QODIQA corpus and that wishes to claim certification against a newer version must complete a full re-assessment against the new version requirements. Delta assessments are not sufficient for version migration; the new version may introduce requirements that interact with previously assessed controls in ways that require fresh evaluation.

    10.4 Revocation of Certification Conditions

    Certification revocation is distinct from certification expiry. Expiry is a scheduled event at the end of the validity period. Revocation is an unscheduled event triggered by evidence that the certified deployment is no longer conformant, regardless of position within the validity period. The following conditions mandate revocation initiation within 72 hours of discovery:

    • A Class 0 integrity breach—confirmed replay, ledger chain break with external modification evidence, unauthorized CR write, or policy mutation post-freeze—that has not been remediated and re-assessed
    • Evidence that the evidence package submitted for certification contained fabricated test results, retroactively constructed artifacts, or timestamps inconsistent with the claimed test execution window
    • Discovery that the assessor or ACB had a disqualifying conflict of interest not disclosed at the time of assessment
    • A boundary-breaking event (§2.3) that has not triggered re-certification within 30 days of the event
    • Deployment of a component version that the deploying organization has determined introduces a regression in conformance but that has not yet been assessed
    • A public security disclosure affecting a cryptographic primitive or key management component in the certified deployment, where the deploying organization has not demonstrated that the affected component has been replaced or mitigated
    • Failure to renew within the maximum renewal interval plus a 30-day grace period

    Revocation does not delete the certification history. All revoked certifications remain in the public registry with their revocation reason code and the date of revocation. A deploying organization that disagrees with a revocation determination by an ACB may request a review by a second ACB; the original certification remains SUSPENDED (not REVOKED) during the review period. If the review ACB concurs with the original revocation determination, the status changes to REVOKED and the review outcome is archived alongside the original certification record.

    #Public Registry Model

    The public certification registry is the authoritative record of all QODIQA conformance claims that have been submitted for public listing under the Verified or Certified claim types. It is a transparency instrument, not a marketing channel. Its purpose is to allow relying parties to independently verify conformance claims made by deploying organizations without depending on the deploying organization's own representations.

    11.1 Registry Structure

    Each registry entry must contain the following mandatory fields. No entry may be published without all mandatory fields. Optional fields may be included where applicable.

    Table 11.1 — Registry Entry Schema
    Field Type Description Mandatory
    registry_idStringUnique opaque identifier assigned at registry submissionYes
    deployment_idStringDeploying organization's identifier for the assessed deployment; must be consistent across renewalsYes
    certification_levelEnumCL-01, CL-02, CL-03, or CL-04Yes
    claim_typeEnumVERIFIED or CERTIFIEDYes
    assessment_dateISO dateDate of final evidence review and conformance determinationYes
    valid_untilISO dateExpiry date per §10.1 validity periodsYes
    corpus_versionStringQODIQA corpus version assessed against (e.g., CORE-1.0, FW-3.0)Yes
    policy_versionsArrayList of policy version identifiers in scope at assessment dateYes
    assessor_idStringIdentifier for assessor or ACB; not disclosed for self-attestationVerified/Certified
    evidence_package_hashSHA-256 hexHash of the evidence package manifest submitted with the certificationYes
    statusEnumACTIVE, EXPIRED, REVOKED, SUSPENDEDYes
    revocation_reasonStringIf status = REVOKED: structured reason code per §9.5If revoked

    11.2 Transparency Requirements

    Registry entries must be publicly queryable by registry_id and by deployment_id. The current status of any entry must be returned within 24 hours of a status change. REVOKED entries must remain in the registry indefinitely—they are not removed on revocation. The registry must disclose the corpus version and claim type for every entry so that relying parties can assess the scope and independence of the conformance claim.

    Registry entries do not disclose the content of the evidence package, the detailed test results, or any internal deployment information. The evidence package hash is published so that a relying party who has been provided the evidence package by the deploying organization can verify its authenticity. The registry is not a substitute for direct evidence review by relying parties with specific assurance needs.

    11.3 Registry Integrity

    The registry itself must maintain an append-only record of all status changes, with timestamps and reason codes for each change. A registry operator that cannot demonstrate the integrity of its status change history is not operating a conformant public registry under this Framework. The registry integrity record must be independently verifiable by the deploying organization for entries pertaining to its deployments.

    11.4 Version Disclosure

    The public registry must disclose, for every entry, the exact QODIQA corpus version against which the deployment was assessed. Corpus version disclosure must be specific to the named document versions—it is not sufficient to state "QODIQA Core" without specifying the version number. Where the assessment covered multiple corpus documents (e.g., both the Core Standard and the 68-Point Framework), both versions must be disclosed separately in the registry entry.

    Version disclosure enables relying parties to determine whether a certification was conducted against the current version of the corpus, an earlier version, or a version that has since been superseded by a normative revision. A relying party must be able to assess, from the registry entry alone and without additional information from the deploying organization, the following: the exact normative requirements the deployment was assessed against; whether those requirements have been superseded; and, if superseded, how long ago the superseding version was published. The registry must provide version lineage information sufficient to support this determination.

    Table 11.2 — Version Disclosure Requirements by Registry Field
    Disclosure Element Requirement and Relying Party Purpose
    Core Standard version Must be expressed as a major.minor identifier with publication date (e.g., CORE-1.0 (2026-Q1)). Enables relying parties to determine the normative enforcement requirements in scope.
    68-Point Framework version Must be version identifier 1.0 corresponding to the QODIQA corpus version in scope.
    Implementation Playbook version Major.minor if assessed; NONE if not in scope (e.g., IMPL-1.1 or NONE). Enables determination of the infrastructure conformance reference used.
    Certification Framework version Major.minor identifier — always required (e.g., CERT-1.0). Enables determination of the certification procedure version and detection of procedural changes since assessment.
    Corpus status at assessment CURRENT or SUPERSEDED at time of assessment. Enables relying parties to determine whether the deployment was assessed against the then-current corpus.
    Corpus status at query time CURRENT or SUPERSEDED, computed by the registry at query time (e.g., SUPERSEDED by CERT-1.1). Enables relying parties to determine whether the certification basis is still current.

    #Institutional Closing Statement

    This Framework completes the QODIQA corpus by providing the assurance layer that makes the corpus's normative requirements verifiable. A standard without a certification framework is a set of claims that cannot be independently substantiated. A certification framework without a technically rigorous standard to certify against is a procedural shell with no normative content. The QODIQA corpus requires both, and this Framework is the second half of that pair.

    Certification under this Framework is not a declaration of intent. It is a technically substantiated claim, bound to a specific deployment, a specific time window, and a specific assurance level. It means that someone who was not responsible for building the deployment has examined the evidence and concluded that the determinism invariant holds, the revocation guarantee is measured and within bounds, the ledger is tamper-evident and complete, and the fail-closed behavior is demonstrated under injection—not merely configured.

    The certification anchor—the deterministic certification invariant evaluate(C, P) = replay(C, P)—is not a performance metric and not a statistical property. It is a structural requirement: the enforcement function must be pure. If it is not pure, the entire accountability model built on top of it collapses. Certified conformance under this Framework is evidence that it is pure, for the assessed deployment, at the assessed time, against the assessed policy version. Nothing more and nothing less.

    Fail-closed enforcement is the non-negotiable posture of this Framework. A deployment that routes requests through an open circuit breaker, serves stale revocation state beyond TTL, or executes inference without a committed audit record cannot be certified at any level. The absence of a certification claim is not a failure of process—it is an accurate representation of the deployment's conformance state. Certification under this Framework is earned through demonstrated behavior, not through documentation of intent.

    12.1 Corpus Alignment Statement

    This Certification Framework (QODIQA-CERT-2026-001 v1.0) is normatively subordinate to and must be read in conjunction with: QODIQA — Consent as Infrastructure for Artificial Intelligence Technical Whitepaper — Version 1.0; QODIQA — 68-Point Enforcement Framework for Deterministic Runtime Consent Enforcement — Version 1.0; QODIQA — Core Standard for Deterministic Runtime Consent Enforcement — Version 1.0; QODIQA — Implementation Playbook for Deterministic Runtime Consent Enforcement — Version 1.0. In the event of conflict between this Framework's procedural specifications and the enforcement semantics of the foregoing documents, the foregoing documents prevail. This Framework is authoritative for all matters of certification procedure, evidence specification, and attestation pathway.

    #Certification Lifecycle

    Certification under this Framework is not a one-time event. It is a continuing compliance state that must be actively maintained through a structured lifecycle of assessment, surveillance, and renewal. A certification claim is valid only for the specific deployment configuration, policy version, and assurance level against which it was issued—and only for the duration of its declared validity period. Any departure from the assessed configuration that is not captured and re-evaluated in a subsequent assessment constitutes an unmanaged deviation from the certified state.

    The certification lifecycle is the operational mechanism by which the deterministic certification invariant is kept current. A certificate that has expired, lapsed under surveillance failure, or been issued against a configuration that has since materially changed does not constitute valid evidence of conformance. Relying parties must verify not only that a certificate exists but that it remains active and reflects the current deployment state.

    13.1 Certification Lifecycle Phases

    LC-01
    Application The deploying organization submits a formal certification application identifying the deployment scope, target certification level, applicable corpus version, and proposed assessment pathway. The application must include a declaration of the conformance boundary and an identification of all system components within scope. Applications that do not clearly define the conformance boundary are returned for clarification before assessment scheduling.
    Entry gate to lifecycle
    LC-02
    Pre-Assessment The assessor conducts an initial readiness review against the minimum evidence set for the target certification level. The pre-assessment is not a certification determination—it is a structured triage that identifies evidence gaps, architectural ambiguities, and test precondition failures before formal evaluation begins. A pre-assessment finding of material readiness gaps suspends progress until the deploying organization has resolved the identified deficiencies.
    Readiness gate
    LC-03
    Conformance Evaluation The assessor executes the conformance test suite defined in Section 5, the determinism verification protocol defined in Section 6, and the audit ledger integrity validation defined in Section 7. Each test produces a structured result record that is archived as a component of the evidence package. Conformance evaluation may not be conducted by the deploying organization at CL-02 and above; independence requirements defined in Section 9 apply in full.
    Core technical gate
    LC-04
    Evidence Review The complete evidence package—comprising test results, audit ledger exports, deployment topology documentation, policy artifact records, and key management records—is reviewed against the artifact requirements defined in Section 4. Evidence review verifies that the package is internally consistent, that test results are traceable to specific deployment configurations, and that no required artifact is absent or unverifiable. Evidence packages that fail integrity checks are rejected and must be resubmitted following remediation.
    Evidence integrity gate
    LC-05
    Certification Decision On the basis of the conformance evaluation results and the evidence review outcome, the certification authority issues a formal certification decision: Certified, Conditionally Certified with specified remediation conditions, or Not Certified with a structured finding report. The decision record must reference the specific test results, evidence artifacts, and assessor identity that support it. Certification decisions may not be issued without a complete and verified evidence package.
    Authority determination
    LC-06
    Certificate Issuance Upon a positive certification decision, the certification authority issues a structured certificate identifying the certified deployment, the assurance level, the validity period, the policy version assessed, the assessor identity, and the evidence package identifier. The certificate is registered in the public registry defined in Section 11. Certificates are issued with explicit expiry dates and are not automatically renewable—renewal requires a separate assessment under the procedures defined in Section 10.
    Formal record creation
    LC-07
    Surveillance Monitoring During the validity period, the certified deployment is subject to surveillance monitoring at intervals defined by the applicable certification level. Surveillance monitoring verifies that the deployment continues to operate within the assessed configuration, that no trigger events defined in Section 10.2 have occurred without notification, and that audit ledger integrity has been maintained. Surveillance findings that indicate deviation from the certified state may result in suspension or revocation as defined in Section 14.4.
    Ongoing compliance gate
    LC-08
    Renewal and Re-Certification Prior to certificate expiry, the deploying organization must initiate renewal assessment. Renewal follows the same procedural pathway as initial certification but may be scoped to the changes that have occurred since the prior assessment. If no material changes have occurred and surveillance monitoring has been continuous and uninterrupted, a scoped renewal assessment covering only the changed components and updated evidence is permissible at CL-01 and CL-02. At CL-03 and CL-04, full reassessment is required regardless of change scope.
    Continuity pathway
    LC-09
    Revocation Conditions Certification may be suspended or revoked at any point during the validity period if conditions defined in Section 14.4 are met. Revocation terminates the certification status immediately and requires removal of the certificate from the public registry. A revoked certification cannot be reinstated—a new certification assessment must be completed. Revocation findings are recorded in the public registry and are not expunged upon subsequent recertification.
    Integrity enforcement

    13.2 Certification as a Continuing Compliance State

    The lifecycle model above reflects a fundamental principle of this Framework: certification status is not a fixed property of a deployment—it is a time-bounded, configuration-specific, evidence-backed assertion that is continuously subject to invalidation. A deployment that was conformant at the time of certification may become non-conformant through any of the following: changes to the enforcement architecture without reassessment; policy version updates that alter enforcement semantics without re-verification; key rotation events that are not captured in the audit ledger; infrastructure migrations that alter component isolation properties; or surveillance findings that reveal unresolved deviations.

    Relying parties must treat a certification claim as a living assertion, not a historical record. The public registry defined in Section 11 is the authoritative source of current certification status. A certificate that appears in the registry as active and unexpired, against a deployment configuration that matches the current operational state, is a valid certification claim. A certificate that is expired, suspended, or revoked—or that was issued against a configuration that has materially changed—is not valid evidence of current conformance regardless of when it was originally issued.

    Lifecycle Integrity Principle

    The certification lifecycle is the operational expression of the deterministic certification invariant. The invariant asserts that enforcement behavior is reproducible. The lifecycle asserts that reproducibility has been verified, that the verification is current, and that any change to the deployment that could affect reproducibility has been captured and re-evaluated. A certification program that issues certificates but does not maintain lifecycle integrity is not implementing this Framework—it is issuing assertions without the accountability structure that makes those assertions verifiable.

    #Certification Assessment Procedure

    Certification under this Framework requires verifiable runtime enforcement—not policy declarations, architectural diagrams, or vendor attestations. The assessment procedure is structured to produce evidence that is independently reproducible: an assessor who was not present at the original assessment must be able to re-derive the certification determination from the archived evidence package alone. Any assessment that does not produce a self-contained, independently verifiable evidence package does not satisfy the procedural requirements of this Framework.

    14.1 Structured Evaluation Process

    The assessment procedure is organized into six sequential evaluation stages. Each stage must be completed before the subsequent stage begins. A finding of non-conformance at any stage may be grounds for suspension of the assessment, depending on the severity classification of the finding and the certification level being sought.

    AE-01
    Technical Documentation Review The assessor reviews the deployment's technical documentation package against the architecture and component requirements of the QODIQA Core Standard. Documentation review covers: enforcement gateway topology and component isolation model; consent registry persistence and signing configuration; policy artifact version control and frozen-snapshot mechanism; audit ledger write path and signing chain; key management architecture and rotation schedule; and revocation propagation configuration and measured TTL. Documentation review does not constitute evidence of runtime conformance—it establishes the architectural context within which runtime testing is interpreted.
    AE-01 — Documentation
    AE-02
    Architecture Inspection The assessor conducts a structured inspection of the deployed architecture to verify that the component topology described in the documentation matches the operational deployment. Architecture inspection must include: verification that the enforcement gateway is the sole path through which inference requests transit; verification that the consent registry is not co-located with the enforcement gateway on shared mutable infrastructure; verification that the audit ledger write path cannot be bypassed by the enforcement gateway; and verification that model endpoint access is not reachable from outside the enforcement boundary. Architecture inspection findings that reveal discrepancies between documentation and deployment are classified as documentation integrity failures and must be resolved before runtime testing proceeds.
    AE-02 — Architecture
    AE-03
    Runtime Enforcement Verification The assessor executes the full conformance test suite defined in Section 5 against the live deployment. Runtime enforcement verification is the core of the assessment procedure and cannot be replaced by simulation, staging-environment results, or vendor-supplied test records. The assessor must have direct access to the enforcement gateway's test interface and must be able to independently submit test vectors and retrieve audit ledger records for the submitted vectors. Any mediation of the assessor's access to the enforcement gateway by the deploying organization is a conflict-of-interest finding that disqualifies the assessment at CL-02 and above.
    AE-03 — Runtime testing
    AE-04
    Conformance Test Suite Execution The assessor executes each test defined in Sections 5, 6, 7, and 8, recording structured result records for each test vector submitted. Test suite execution must cover: the complete positive test set for ACTIVE and REVOKED token states; the complete negative test set for boundary and injection conditions; the fail-closed injection procedure for each enforcement component; the determinism verification protocol against archived test vectors; the audit ledger hash-chain validation; and the revocation SLA verification against production metric exports. Test suite execution results are archived as structured evidence artifacts and must be traceable to specific test identifiers and timestamps.
    AE-04 — Test execution
    AE-05
    Evidence Validation Following test suite execution, the assessor assembles and validates the complete evidence package. Evidence validation verifies: that all required artifact types for the target certification level are present; that each artifact carries a valid integrity signature or hash; that test result records are internally consistent and cross-reference correctly to the deployment configuration; that audit ledger exports are contiguous and chain-verified; and that no required artifact has been produced by the deploying organization in circumstances that compromise its independence. Evidence packages that fail validation are returned for remediation and may not be used to support a certification determination until revalidated.
    AE-05 — Evidence package
    AE-06
    Independent Assessment Requirements At CL-02 and above, all assessment stages from AE-02 through AE-05 must be conducted by an assessor who satisfies the independence criteria defined in Section 9. Independence is not merely organizational separation—it requires that the assessor has no financial, contractual, or advisory relationship with the deploying organization that could influence the assessment outcome; that the assessor has direct and unmediated access to the deployment under assessment; and that the assessor is technically qualified to evaluate the specific enforcement architecture under assessment without relying on the deploying organization's interpretation of its own architecture.
    AE-06 — Independence

    14.2 Required Certification Evidence

    The following table defines the standard artifact categories required during certification. Each artifact category must be represented in the evidence package by at least one artifact that satisfies the integrity and provenance requirements for the target certification level. Artifact categories marked as mandatory at a given level must be present; artifact categories marked as conditional must be present if the relevant system component or configuration is within the declared conformance boundary.

    Table 14.1 — Required Certification Evidence Artifact Categories
    Artifact Category Description and Required Content Minimum Level Integrity Requirement
    Enforcement Gateway Deployment Topology Architectural diagram and configuration record of the enforcement gateway deployment, including component isolation model, network boundary configuration, and inference endpoint access controls. Must reflect the operational deployment at the time of assessment. CL-01 Assessor-signed at time of inspection
    Runtime Enforcement Logs Exported audit ledger records covering the assessment period, including PERMIT, DENY, and circuit-breaker event records. Must be exported via the signed export mechanism and carry a valid chain-integrity signature. Log exports must be contiguous and cover the full test window. CL-01 AL-signed export with chain verification
    Consent Registry Integrity Proof Evidence that the consent registry is operating with write-ahead logging, signing, and tamper-detection active. At CL-02 and above, includes a signed export of the registry state at the time of assessment with a corresponding hash record in the audit ledger. CL-01 CR-signed export
    Policy Artifact Validation Record Record confirming that the policy engine is operating against a frozen, immutable policy snapshot. Must include the snapshot hash, the POLICY_FROZEN audit ledger record, and evidence that no policy modification occurred during the assessment period. At CL-03 and above, includes multi-instance snapshot hash consistency verification. CL-01 PE-reported hash with AL cross-reference
    Model Endpoint Isolation Evidence Network topology records or inspection evidence confirming that the model endpoint is not directly reachable from outside the enforcement boundary. At CL-02 and above, includes active verification that requests submitted directly to the model endpoint without a valid enforcement artifact are rejected. CL-02 Assessor-verified at inspection
    System Integration Documentation Complete integration map of all systems that interact with the enforcement boundary, including upstream request originators, downstream inference consumers, and any external dependencies of the consent registry or audit ledger. Integration documentation must identify all data paths that carry consent signals or enforcement decisions. CL-01 Deploying organization declaration with assessor verification
    Audit Log Integrity Proof Independent verification that the audit ledger chain is unbroken for the assessment period. Must include the hash-chain verification result record from procedure HCV-01 through HCV-05. At CL-03 and above, must also include the per-write integrity verification configuration record and a sample of real-time tamper-detection alerts (or a record that no alerts were generated). CL-01 Assessor-executed chain verification
    Conformance Test Result Archive Structured archive of all test result records produced during conformance test suite execution, including input vectors, output decisions, audit ledger records for each vector, and pass/fail determinations. Test result archives must be tamper-evident and must carry an assessor integrity signature applied at the time of test execution. CL-01 Assessor-signed at execution time
    Determinism Verification Record Result record from the VERIFY_DETERMINISM protocol defined in Section 6, including input tuple hashes, output decision records, replay comparison results, and the pass/fail determination. At CL-02 and above, includes the PE restart record and the post-restart replay comparison results confirming bit-identical output for all sampled vectors. CL-02 Assessor-signed with tuple hash archive
    Revocation SLA Metric Export Signed export of the revocation propagation latency histogram covering the required measurement period for the target certification level, as defined in Section 8.1. Export must include per-EG-instance P99 values and the worst-case aggregate P99, both verified against the declared TTL. CL-01 ML-signed metric export

    14.3 Certification Process Overview

    The following diagram illustrates the sequential flow of the certification process from initial application through ongoing surveillance and renewal. Each stage corresponds to a lifecycle phase defined in Section 13.1. The diagram is intended to provide a navigational overview of the process for applicants and relying parties; the normative procedural requirements are defined in Sections 13, 14.1, and 14.4.

    APPLICANT
    LC-01
    Application
    Scope declaration
    Target level selection
    Corpus version declaration
    LC-02
    Pre-Assessment
    Readiness review
    Evidence gap identification
    Scope confirmation
    LC-03
    Technical Conformance Testing
    Sections 5 · 6 · 7 · 8
    Test suite execution
    Runtime verification
    LC-04
    Evidence Review
    Artifact completeness
    Chain integrity
    Independence verification
    LC-05
    Certification Decision
    Certified
    Conditionally Certified
    Not Certified
    LC-06
    Certificate Issuance
    Public registry entry
    Validity period set
    Evidence archival
    LC-07
    Surveillance Monitoring
    Periodic verification
    Trigger event monitoring
    Deviation detection
    Renewal and
    Re-Certification
    LC-08
    Suspension and
    Revocation
    LC-09 · SR-01–SR-06
    Figure 14.1 — Certification Process Flow. Each stage is a gate; non-conformance at any stage suspends forward progress pending remediation.

    14.4 Certification Suspension and Revocation

    Certification status must be withdrawn if deterministic enforcement can no longer be verified for the certified deployment. Suspension and revocation are not disciplinary actions—they are accurate representations of the deployment's current conformance state. A certification authority that maintains active certification status for a deployment that has materially departed from its certified configuration is not administering this Framework; it is issuing misleading assurance claims.

    The following conditions constitute grounds for immediate certification suspension, pending investigation and remediation assessment:

    SR-01
    Removal or Bypass of Runtime Enforcement Controls Any configuration change that allows inference requests to reach model endpoints without transiting the enforcement gateway, or that allows the enforcement gateway to issue permits without a committed audit ledger record, constitutes an immediate suspension trigger.
    Immediate suspension
    SR-02
    Failure of Scheduled Surveillance Audit Failure to complete a required surveillance audit within the scheduled window, or failure to produce the required surveillance evidence artifacts upon request, constitutes a suspension trigger. Surveillance failure is not excused by operational constraints; if the deployment cannot be audited, its certification status cannot be maintained.
    Suspension trigger
    SR-03
    Material Architecture Changes Without Reassessment Any change to the enforcement boundary, the component isolation model, the audit ledger write path, the policy engine configuration, or the consent registry persistence mechanism that has not been captured in a subsequent assessment constitutes a suspension trigger. Minor configuration changes that do not affect enforcement semantics may be managed through a scoped change notification process, subject to assessor review.
    Suspension trigger
    SR-04
    Inability to Produce Audit Evidence If the deploying organization is unable to produce a complete, chain-verified audit ledger export for any period within the certificate's validity window upon assessor request, this constitutes a suspension trigger. The inability to produce audit evidence is itself an accountability failure, independent of whether the underlying enforcement behavior was conformant.
    Suspension trigger
    SR-05
    Confirmed Determinism Failure If post-issuance evidence demonstrates that the enforcement function produced different outcomes for identical inputs during the certificate's validity period—outside of documented token state or policy version changes—this constitutes a revocation trigger. Determinism failures discovered post-issuance may also require retroactive notification to relying parties who relied on the certificate during the affected period.
    Revocation trigger
    SR-06
    Revocation Propagation SLA Breach If measured revocation propagation latency is found to have exceeded the declared TTL at the P99 percentile during the certificate's validity period, and this was not disclosed at the time of certification as a known conformance boundary condition, this constitutes a revocation trigger.
    Revocation trigger

    Following suspension, the deploying organization has a defined remediation window to resolve the suspension trigger and submit evidence of remediation for assessor review. If remediation is confirmed, the suspension is lifted and the certificate is reinstated with an updated surveillance schedule. If remediation is not completed within the remediation window, or if the investigation reveals that the trigger condition reflects a deeper conformance failure, the certificate is revoked.

    Revocation is permanent. A revoked certificate cannot be reinstated. A new certification assessment is required to establish a new conformance claim. Revocation records are retained in the public registry and are not removed upon subsequent recertification. Relying parties must be notified of revocation through the registry notification mechanism defined in Section 11.

    The suspension and revocation framework is not a punitive mechanism. It is the accountability layer that gives certification status its meaning. A certification program that does not revoke certificates when revocation conditions are met is not providing assurance—it is providing the appearance of assurance. The integrity of every active certificate in the registry depends on the willingness of the certification authority to revoke certificates that no longer reflect the conformance state they were issued to attest.

    #Document Status and Classification

    This document is the Certification Framework of the QODIQA specification corpus. It defines the conformance assessment procedures, evidence requirements, test methodology, and attestation authority model for implementations of the QODIQA Core Standard and the QODIQA 68-Point Enforcement Framework. It is issued as a Technical Certification Specification and is not a product specification, a commercial certification program, or a legal instrument.

    The framework establishes four certification levels, defines the evidentiary requirements and test procedures for each level, and specifies the authority pathways through which conformance claims may be affirmed, maintained, and revoked. It is the authoritative instrument for all QODIQA conformance assessment activity.

    This document should be read together with the following related specifications:

    • QODIQA — Consent as Infrastructure for Artificial Intelligence Technical Whitepaper — Version 1.0
    • QODIQA — Core Standard for Deterministic Runtime Consent Enforcement — Version 1.0
    • QODIQA — 68-Point Enforcement Framework for Deterministic Runtime Consent Enforcement — Version 1.0
    • QODIQA — Implementation Playbook for Deterministic Runtime Consent Enforcement — Version 1.0
    • QODIQA — Reference Architecture for Deterministic Runtime Consent Enforcement — Version 1.0
    • QODIQA — Security and Cryptographic Profile for Runtime Consent Enforcement — Version 1.0
    • QODIQA — Threat Model and Abuse Case Specification — Version 1.0
    • QODIQA — Governance Charter for the QODIQA Standard Corpus — Version 1.0

    Version 1.0 represents the initial formal release of this document as part of the QODIQA standard corpus.


    For strategic inquiries, architectural discussions, or partnership exploration:

    Bogdan Duțescu

    bddutescu@gmail.com

    0040.724.218.572

    Document Identifier QODIQA-CERT-2026-001
    Title Certification Framework for Deterministic Runtime Consent Enforcement
    Subtitle Conformance, Assurance, and Attestation Model for QODIQA Enforcement Infrastructure
    Publication Date April 2026
    Version 1.0
    Document Type Technical Certification Specification
    Document Status Normative — Technical Certification Specification
    Governing Authority QODIQA Governance Charter
    Integrity Notice Document integrity may be verified using the official SHA-256 checksum distributed with the QODIQA specification corpus.