Inventory quartet and initial leases

This commit is contained in:
vaultsovereign
2025-12-17 15:54:20 +00:00
parent 44edf6734b
commit 901444a6d5
21 changed files with 291 additions and 0 deletions

View File

@@ -0,0 +1,12 @@
# Leases
Leases are time-bound grants of access tied to a device (or system) and a role.
Rules:
- A lease has an expiry.
- A lease is revocable.
- Every lease has a recorded grant and a recorded revoke/rotate event.
Use `20-identity/templates/lease.md` for new leases.

View File

@@ -0,0 +1,20 @@
# Lease: op-console-mac
## Grant
- Lease type: device (console)
- Issued to role: operator
- Issued at (UTC):
- Expires at (UTC):
- Revoked at (UTC):
## Scope
- Permits: physical and local access required to operate `op-core-vm`.
- Forbids: treating the host OS as a source of trust.
## Rotation / revocation
- Revoke: remove local access, rotate any credentials that could have been exposed, and rebuild `op-core-vm` if integrity is in doubt.
- Verify: confirm operator access is only possible from a trusted, rebuilt core.

View File

@@ -0,0 +1,20 @@
# Lease: op-witness-phone
## Grant
- Lease type: device (witness)
- Issued to role: witness
- Issued at (UTC):
- Expires at (UTC):
- Revoked at (UTC):
## Scope
- Permits: read-only verification and confirmations.
- Forbids: initiating critical operational changes.
## Rotation / revocation
- Revoke: remove device access and rotate any linked factors.
- Verify: confirm no critical role can originate from this device.

View File

@@ -0,0 +1,20 @@
# Role: operator
## Purpose
Execute critical operational actions from the core boundary.
## Scope
- Allowed: provisioning, configuration, recovery, decommission.
- Forbidden: ad-hoc changes outside `op-core-vm`.
## Allowed origins
- `op-core-vm` only.
## Rotation / revocation
- Revoke: invalidate leases, rotate credentials, and sever device trust.
- Prove: record the action in `70-audits/reports/`.

View File

@@ -0,0 +1,20 @@
# Role: witness
## Purpose
Observe and confirm (alerts, read-only checks, second-factor confirmations).
## Scope
- Allowed: read-only verification and confirmations.
- Forbidden: provisioning and configuration changes.
## Allowed origins
- `op-witness-phone` only.
## Rotation / revocation
- Revoke: remove device access and rotate any linked factors.
- Prove: record the action in `70-audits/reports/`.

View File

@@ -0,0 +1,7 @@
# Templates
Use these templates to keep identity material consistent:
- `role.md`
- `lease.md`

View File

@@ -0,0 +1,24 @@
# Lease: <device-or-system>
## Grant
- Lease type:
- Issued to role:
- Issued at (UTC):
- Expires at (UTC):
- Revoked at (UTC):
## Scope
- What this lease permits:
- What it explicitly forbids:
## Rotation / revocation
- Revocation procedure:
- Post-revoke verification:
## Evidence
What you record when granting/rotating/revoking (timestamps, IDs, logs).

View File

@@ -0,0 +1,29 @@
# Role: <name>
## Purpose
What this role exists to do.
## Scope
- Allowed actions:
- Forbidden actions:
## Allowed origins
Where this role is allowed to be used from (e.g., `op-core-vm`).
## Credentials
What mechanisms this role uses (keys/tokens), and where the encrypted material lives.
## Rotation / revocation
- How to revoke fast:
- How to rotate predictably:
- Proof you record:
## Notes
Anything future-you must remember.