AZ-038 — External Audit Interface and Evidence Export Format v1
Status
Acest document definește interfața de audit extern și formatul de export al dovezilor pentru ATLAS ZERO.
După AZ-001 până la AZ-037, există deja:
- specificația protocolului și a subsistemelor lui;
- vault-ul de artefacte, manifesturile și atestările;
- pachetele release/genesis;
- launch discipline, monitoring, review și archive;
- upgrade, hard fork, key rotation și long-term archive preservation.
AZ-038 răspunde la întrebarea: cum exportăm dovezile relevante pentru audit extern astfel încât auditorii să poată verifica afirmațiile critice despre launch, upgrade, incident, stabilizare și conservare, fără să depindă de acces complet la infrastructura internă și fără să pierdem integritatea, trasabilitatea sau delimitarea dintre date normative și date sensibile?
Scopul documentului este să fixeze:
- interfața de audit extern;
- clasele de audit și de pachete exportate;
- formatul canonic al bundle-urilor de dovezi;
- regulile de reducție, redacție și minimizare;
- verificabilitatea exporturilor;
- relația dintre export, manifest, atestări și provenance;
- și comportamentul la supersession, revocation și refresh de dovezi.
Acest document se bazează pe:
- AZ-002 până la AZ-037, cu accent direct pe AZ-018 până la AZ-037.
Termeni:
- MUST = obligatoriu
- MUST NOT = interzis
- SHOULD = recomandat puternic
- MAY = opțional
1. Obiectiv
AZ-038 răspunde la 10 întrebări critice:
- Ce este External Audit Interface?
- Ce tipuri de audit extern trebuie suportate?
- Ce bundle-uri de dovezi pot fi exportate?
- Cum păstrăm verificabilitatea după export?
- Cum reducem sau redactăm datele sensibile fără să distrugem auditabilitatea?
- Cum leagă auditorul exportul de artefactele și manifesturile originale?
- Cum se modelează scope-ul exact al unui export?
- Cum tratăm exporturi parțiale, incremental refresh și supersession?
- Cum poate un auditor extern verifica un export fără acces intern complet?
- Cum evităm exporturi haotice, incomplete sau imposibil de validat?
2. Principii
2.1 Exported evidence must remain cryptographically and semantically anchored
Un export de audit MUST rămâne legat de:
- manifesturile originale;
- identitățile artefactelor;
- atestările și deciziile relevante;
- scope-ul exact pentru care a fost produs.
2.2 Least disclosure compatible with auditability
Interfața SHOULD expune minimum necesar pentru verificare. Nu tot ce este intern trebuie exportat, dar tot ce susține afirmația auditată MUST fi verificabil.
2.3 Redaction must be explicit, not silent omission
Dacă unele date sunt reduse sau redactate, acest lucru MUST fi explicit și reprezentat ca atare în export.
2.4 Export is a view, not new truth
Exportul nu devine sursa normativă primară. El este o vedere verificabilă și scope-bound asupra adevărului deja existent.
2.5 Auditors need reproducible entry points
Auditorul extern SHOULD primi:
- un manifest principal;
- bundle-uri tipizate;
- instrucțiuni minime de verificare;
- mapping clar între afirmație și dovadă.
2.6 Partial export must not pretend completeness
Un export parțial MUST spune clar că este parțial și pentru ce afirmații este suficient.
3. External audit interface purpose
3.1 External Audit Interface (EAI)
EAI este setul de:
- formate canonice;
- manifesturi;
- bundle-uri de export;
- reguli de redactare;
- și proceduri de verificare, prin care ATLAS ZERO poate furniza dovezi externe verificabile.
3.2 Rule
EAI SHOULD support both:
- auditors with deep technical capability;
- external reviewers who need structured, self-describing bundles.
4. Audit classes
4.1 Recommended audit classes
ATLAS ZERO SHOULD suporta cel puțin:
AUD_LAUNCH_READINESSAUD_MAINNET_LAUNCHAUD_EARLY_MAINNET_STABILIZATIONAUD_INCIDENT_RESPONSEAUD_UPGRADE_AND_FORKAUD_KEY_SECURITYAUD_ARCHIVE_PRESERVATIONAUD_CONFORMANCE_RELEASEAUD_PROVENANCE_AND_RELEASE_PIPELINEAUD_GOVERNANCE_ACTION
4.2 Rule
Every export SHOULD declare exact audit class and question scope.
5. Evidence export classes
5.1 Recommended export classes
EE_SUMMARY_ONLYEE_VERIFIABLE_MINIMALEE_SCOPE_COMPLETEEE_INCREMENTAL_REFRESHEE_REDACTED_SCOPE_COMPLETEEE_FULL_AUDIT_MIRROR
5.2 Meaning
EE_SUMMARY_ONLY
Human-oriented, low-assurance summary export. Insufficient for serious verification by itself.
EE_VERIFIABLE_MINIMAL
Minimum evidence necessary to verify a narrow claim set.
EE_SCOPE_COMPLETE
Complete export for a defined audit scope.
EE_INCREMENTAL_REFRESH
Exports only deltas since earlier export, with continuity proofs.
EE_REDACTED_SCOPE_COMPLETE
Complete enough for a defined scope but with explicit redactions.
EE_FULL_AUDIT_MIRROR
Near-complete external mirror of an internal audit package.
5.3 Rule
Serious external audits SHOULD prefer EE_VERIFIABLE_MINIMAL, EE_SCOPE_COMPLETE or EE_REDACTED_SCOPE_COMPLETE.
6. Export scope model
6.1 Canonical structure
AuditExportScope {
export_scope_id
audit_class
target_network_class
target_chain_id?
target_genesis_hash?
target_release_package_id?
target_launch_window_id?
target_upgrade_proposal_id?
target_incident_id?
target_archive_id?
claim_scope_root
}
6.2 claim_scope_root
Anchors the exact claims the export is meant to support.
6.3 Rule
Export scope MUST be explicit and bounded.
7. Claim model
7.1 Need
Audits test claims, not only files.
7.2 Canonical structure
AuditClaim {
claim_id
claim_class
scope_hash
statement_hash
required_evidence_root
}
7.3 claim_class examples
- release_artifact_integrity
- genesis_package_validity
- launch_go_decision_supported
- restricted_posture_exit_supported
- upgrade_cutover_authorized
- key_rotation_auditable
- archive_rebuild_verified
7.4 Rule
Evidence exports SHOULD be organized around claims or claim families, not arbitrary document dumps.
8. Export manifest
8.1 Canonical structure
ExternalAuditExportManifest {
version_major
version_minor
export_id
export_class
export_scope
claim_root
normative_bundle_root
auxiliary_bundle_root?
redaction_root?
attestation_root?
source_archive_refs_root?
generation_time_unix_ms
metadata_hash?
}
8.2 export_id
export_id = H("AZ:EXTERNAL_AUDIT_EXPORT:" || canonical_export_manifest)
8.3 Rule
The export manifest MUST be the normative entry point for external verification.
9. Normative bundle classes
9.1 Recommended normative bundle classes
NB_ARTIFACT_IDENTITYNB_MANIFEST_CHAINNB_ATTESTATION_CHAINNB_DECISION_LEDGER_SUBSETNB_CHECKLIST_SUBSETNB_CEREMONY_SUBSETNB_MONITORING_EVIDENCENB_INCIDENT_EVIDENCENB_STABILIZATION_EVIDENCENB_ARCHIVE_VERIFICATION_EVIDENCENB_CONFORMANCE_LINKAGE
9.2 Rule
Normative bundles MUST be machine-verifiable and declared in manifest.
10. Auxiliary bundle classes
10.1 Recommended auxiliary bundle classes
AB_HUMAN_SUMMARYAB_DIAGRAMSAB_REVIEW_NOTESAB_STATUS_TIMELINEAB_PUBLIC_ADVISORY_SNAPSHOTAB_DASHBOARD_EXPORTAB_REDACTION_EXPLANATION
10.2 Rule
Auxiliary bundles MUST be clearly marked non-authoritative unless separately given canonical semantics.
11. Evidence bundle object
11.1 Canonical structure
EvidenceBundle {
bundle_id
bundle_class
bundle_scope_hash
entry_root
required
normative
notes_hash?
}
11.2 Rule
Each bundle MUST declare whether it is required and normative.
12. Evidence bundle entry object
12.1 Canonical structure
EvidenceBundleEntry {
entry_id
entry_class
artifact_ref?
record_ref?
manifest_ref?
attestation_ref?
auxiliary_ref?
required
}
12.2 entry_class examples
- artifact_identity_record
- package_manifest
- decision_record
- checklist_record
- ceremony_record
- monitoring_snapshot
- anomaly_record
- incident_record
- review_record
- conformance_case_ref
- summary_note
12.3 Rule
All required entries MUST be explicitly marked and root-hashed.
13. Source archive linkage
13.1 Purpose
An export should remain linked to source internal archives or vault artifacts.
13.2 Canonical structure
SourceArchiveRef {
archive_id
archive_class
source_manifest_ref
}
13.3 Rule
Serious exports SHOULD include source archive refs or equivalent provenance refs.
14. Redaction model
14.1 Need
Some exports need to hide:
- local operator identifiers;
- internal topology;
- sensitive logs;
- private contact paths;
- non-essential internal notes.
14.2 Rule
Redaction MUST be explicit and scoped.
14.3 Canonical structure
RedactionEntry {
redaction_id
target_entry_ref
redaction_class
justification_hash
effect_class
}
14.4 redaction_class examples
- personal_identity_minimization
- infrastructure_topology_minimization
- security_sensitive_path_removal
- legal_privacy_requirement
- third_party_confidentiality
14.5 effect_class
- removed
- replaced_with_hash_only
- replaced_with_summary
- partially_masked
14.6 Rule
A redacted export MUST show what was redacted and why, at least at structural level.
15. Redaction root
15.1 Derivation
redaction_entry_hash_i = H("AZ:EXPORT_REDACTION:" || canonical_redaction_entry_i)
redaction_root = MerkleRoot(redaction_entry_hash_i...)
15.2 Rule
No redactions => use standard empty-root convention or omit by policy consistently.
16. Minimal export for narrow audit claim
16.1 A minimal verifiable export SHOULD include:
- export manifest
- claim list
- only the normative bundles required by those claims
- source archive refs
- attestation refs proving export integrity/completeness for declared scope
- redaction manifest if redacted
16.2 Rule
Minimal export MUST still be sufficient for the declared claims, not merely “small”.
17. Scope-complete export
17.1 A scope-complete export SHOULD include:
- all required records for the declared audit scope
- all claim-supporting bundles
- enough manifest chain and linkage to reconstruct scope truth
- evidence of no missing required entry for scope
- attestation of completeness
17.2 Rule
A scope-complete export SHOULD be auditable without requesting hidden missing pieces for that exact scope.
18. Incremental refresh export
18.1 Need
Audits sometimes happen over time and need delta refreshes.
18.2 Canonical structure
IncrementalExportLinkage {
linkage_id
prior_export_id
current_export_id
delta_root
continuity_proof_root
}
18.3 Rule
Incremental refresh MUST prove continuity to earlier export and SHOULD identify superseded or new entries explicitly.
19. Completeness attestation
19.1 Need
Auditor should know whether export is claimed complete for scope.
19.2 Canonical structure
ExportCompletenessAttestation {
attestation_id
export_id
export_scope_hash
completeness_class
attestor_policy_ref
timestamp_unix_ms
signature_envelopes
}
19.3 completeness_class
- complete_for_declared_scope
- minimal_for_declared_claims
- partial_with_known_omissions
- redacted_complete_for_scope
19.4 Rule
This attestation MUST NOT overclaim beyond actual export scope.
20. Export integrity attestation
20.1 Canonical structure
ExportIntegrityAttestation {
attestation_id
export_id
export_manifest_hash
normative_bundle_root
redaction_root?
attestor_policy_ref
timestamp_unix_ms
signature_envelopes
}
20.2 Rule
Every serious export SHOULD include integrity attestation.
21. Export verification path for external auditor
21.1 Auditor SHOULD be able to:
- load export manifest
- verify export_id
- verify normative bundle roots
- verify attestation bundle
- inspect claim list
- resolve evidence entries supporting each claim
- verify source archive or artifact refs where included
- assess redactions and completeness claims
- conclude whether declared claims are supported
21.2 Rule
Export format SHOULD support this path without hidden internal dependencies wherever possible.
22. Sensitive data minimization rules
22.1 Export SHOULD minimize:
- raw personally identifying operator details
- internal-only hostnames or addresses unless directly material
- secrets or secret-adjacent data
- unnecessary raw logs with unrelated noise
- private communications not needed for claim support
22.2 Rule
Minimization MUST NOT remove evidence required for declared claim verification.
23. Normalization of exported paths and containers
23.1 Need
External export may be packaged into portable container.
23.2 Rule
Outer container MAY vary, but SHOULD normalize:
- file ordering
- timestamps if possible
- path naming
- compression behavior if reproducibility desired
23.3 Rule
Container format MUST NOT alter normative artifact bytes.
24. Export package layout
24.1 Recommended layout
external_audit_export/
export_manifest/
claims/
normative/
auxiliary/
redactions/
attestations/
source_refs/
checksums/
docs/
24.2 Meaning
claims/
Claim objects and mapping files.
normative/
Normative evidence bundles.
auxiliary/
Human summaries and context aids.
redactions/
Explicit redaction records and optional rationales.
source_refs/
Links or references to source archives / archive ids / manifests.
docs/
Export guide, verification notes, scope explanation.
24.3 Rule
This layout is recommended for predictability; manifest truth remains canonical.
25. Export claim-to-evidence mapping
25.1 Canonical structure
ClaimEvidenceMap {
map_id
claim_id
supporting_bundle_root
supporting_entry_root
}
25.2 Rule
Auditor SHOULD not have to guess which files support which claim.
26. Export verification note bundle
26.1 Purpose
Human-readable, non-normative explanation of how to verify bundle.
26.2 MAY include
- bundle classes used
- expected toolchain versions
- summary of redactions
- scope statement
- claim summary table
26.3 Rule
Verification note bundle MUST NOT replace manifest and attestation logic.
27. Export statuses
27.1 Recommended statuses
EXPORTED_DRAFTEXPORTED_REVIEWEDEXPORTED_RELEASEDEXPORTED_SUPERSEDEDEXPORTED_REVOKED
27.2 Rule
Serious audit handoff SHOULD happen only after reviewed or released export state.
28. Export supersession
28.1 Need
A newer export may clarify scope or add evidence.
28.2 Rule
Supersession MUST be explicit:
- prior_export_id
- new_export_id
- supersession_reason
- whether prior export was incomplete, redacted differently or merely refreshed
28.3 Rule
Superseded exports remain historically relevant and SHOULD not disappear.
29. Export revocation
29.1 Need
An export may later be found broken, misleading or scope-inaccurate.
29.2 Rule
Revocation MUST be explicit and SHOULD include:
- export_id
- reason hash
- affected claim scope
- replacement export if any
29.3 Rule
Revoked exports MUST remain auditable as revoked, not silently deleted.
30. Audit-facing filtering policy
30.1 The system SHOULD support filters by:
- audit class
- network scope
- launch window
- upgrade proposal
- incident id
- archive id
- claim class
- sensitivity class
30.2 Rule
Filters MUST NOT silently produce incomplete export while claiming completeness for full broader scope.
31. Evidence export for launch audits
31.1 Launch audit export SHOULD typically include:
- release/genesis package refs
- ceremony records
- go/no-go and authorization records
- operator checklist subset
- launch monitoring evidence
- first epoch observations
- stabilization entry decisions
31.2 Rule
This export SHOULD be sufficient to prove that launch was executed under explicit artifact and decision scope.
32. Evidence export for upgrade / hard fork audits
32.1 Upgrade export SHOULD include:
- upgrade proposal
- compatibility matrix
- rollout policy
- threshold evidence
- cutover decisions
- post-activation monitoring
- stabilization or post-upgrade findings
- operator guidance refs
32.2 Rule
Hard fork exports SHOULD also include identity separation and boundary treatment evidence.
33. Evidence export for incident audits
33.1 Incident audit export SHOULD include:
- incident classification and timeline
- relevant anomaly records
- decisions taken
- affected scopes and artifacts
- recovery or remediation records
- post-incident review and closure status
33.2 Rule
Incident exports MAY require stronger redaction due to sensitivity, but redactions must remain explicit.
34. Evidence export for archive preservation audits
34.1 Preservation export SHOULD include:
- archive manifest
- preservation schedule refs
- verification runs
- migration records
- recovery test records
- degradation findings
- retention policy refs
34.2 Rule
This allows external audit of long-term memory integrity, not just launch-time behavior.
35. Tooling and schema preservation
35.1 The export SHOULD include or reference:
- schema versions
- canonicalization rules
- verifier tool versions or source refs
- bundle class definitions
35.2 Rule
An auditor years later SHOULD still have enough information to parse and verify the export.
36. Query model external auditors SHOULD be able to answer
36.1 Examples
- Which evidence supports claim X?
- Was export Y complete for declared scope?
- What was redacted and why?
- Which source archives back this export?
- Which decision authorized launch or upgrade?
- Was stabilization verdict supported by monitoring and incident evidence?
- Has this export been superseded or revoked?
36.2 Rule
If the export format cannot answer these, it is under-specified.
37. Anti-patterns
Systems SHOULD avoid:
- sending auditors a flat folder with no export manifest
- over-redacting until claims become unverifiable
- under-redacting and leaking unnecessary sensitive data
- no claim mapping between findings and evidence
- summary PDF-like exports with no machine-verifiable roots
- export containers that change normative bytes silently
- no linkage back to source archive ids
- partial exports mislabeled as complete
- no supersession/revocation model for exports
- relying on tribal explanations instead of export schemas
38. Formal goals
AZ-038 urmărește aceste obiective:
38.1 Verifiable external review
External auditors can verify important claims without privileged internal access to everything.
38.2 Controlled disclosure
Sensitive information is minimized or redacted explicitly without destroying auditability.
38.3 Claim-centered evidence delivery
Evidence arrives organized around the questions being audited.
38.4 Durable audit interface
The export format remains useful across launch, upgrade, incident and preservation audits.
39. Formula documentului
External Audit Interface = scope-bound export manifest + claim model + normative evidence bundles + explicit redaction records + completeness/integrity attestations + source archive linkage
40. Relația cu restul suitei
- AZ-033 definește arhiva internă de launch și audit.
- AZ-037 definește conservarea ei pe termen lung.
- AZ-038 definește cum extragi din aceste surse bundle-uri externe verificabile pentru audit.
Pe scurt: AZ-033 și AZ-037 păstrează adevărul; AZ-038 îl face exportabil și verificabil în afara graniței operaționale interne.
41. Ce urmează
După AZ-038, direcțiile cu valoare maximă sunt:
- AZ-039 — Threat Model Consolidation and Residual Risk Canon
- AZ-040 — Formal Conformance Claim Framework
- AZ-041 — Economic Attack Simulation and Red-Team Evaluation Protocol
- AZ-042 — Incident Postmortem Canon and Lessons Registry
- AZ-043 — Constitutional Record and Network Identity Canon
Închidere
Un audit extern bun nu are nevoie să primească tot. Are nevoie să primească exact suficient, într-o formă care păstrează legătura dintre afirmație și dovadă, dintre bundle și sursa lui, dintre redacție și motivul ei.
Acolo începe interfața de audit matură: nu când trimiți multe fișiere, ci când trimiți o vedere verificabilă, delimitată și onestă asupra adevărului pe care vrei să îl auditezi.