|
1 | 1 | --- |
2 | | -title: "K06 ATA 95 Tasklist" |
| 2 | +title: "K06 ATA 95 — Partitioned Uncertainty Resolution Index" |
3 | 3 | type: IDX |
4 | | -variant: "SPACET" |
| 4 | +variant: SPACET |
5 | 5 | status: Draft |
6 | | -knot_id: "K06" |
| 6 | +knot_id: K06 |
7 | 7 | ata: "95" |
| 8 | +lc_or_subbucket: "LC01" |
| 9 | +description: "GitHub-navigable hub for closing K06 (SSOT/Schemas/Identifiers) for ATA 95 (SBOM / ModelBOM / ML Asset Traceability) with NKU control and TEKNIA sharing rules." |
8 | 10 | --- |
9 | 11 |
|
10 | | -# K06 — data-governance-ssot-schemas-identifiers |
11 | | -## ATA 95 — Tasklist |
| 12 | +# K06 — Data Governance (SSOT / Schemas / Identifiers) |
| 13 | +## ATA 95 — Partitioned Uncertainty Resolution Index (IDX) |
12 | 14 |
|
13 | | -## Uncertainty to Resolve (ATA-specific) |
14 | | -- ... |
| 15 | +This file is the **single navigation hub** for all artifacts required to close **K06** for **ATA 95** (your domain for **SBOM, ModelBOM, and ML asset traceability**). |
| 16 | +NKU progress is credited only when each partition is closed with **evidence + approval**. |
15 | 17 |
|
16 | | -## Tasks (minimum set) |
17 | | -1. Define ATA-specific scope, interfaces, owners. |
18 | | -2. Define decision criteria and evidence package. |
19 | | -3. Execute validation/verification activities. |
20 | | -4. Record decision; update baseline and trace links. |
| 18 | +> ATA 95 operationalizes K06 for software and ML supply chain: if identifiers and schemas are inconsistent here, provenance claims become unverifiable and risk propagates into DPP exports. |
| 19 | +
|
| 20 | +--- |
| 21 | + |
| 22 | +## 1) Global Navigation (GitHub-navigable) |
| 23 | + |
| 24 | +- Knot overview: [K06 overview](../../00_00_IDX_LC01_SPACET_k06-data-governance-ssot-schemas-identifiers_v01.md) |
| 25 | + _Comment:_ Canonical K06 scope, impacted ATAs, closure criteria, and shared definitions. |
| 26 | + |
| 27 | +- Portal index: [AMPEL360-SPACE-T-PORTAL index](../../../../../00_00_IDX_LC01_SPACET_stakeholder-entrypoints_v01.md) |
| 28 | + _Comment:_ Global entry point; use it to navigate stakeholders and the knot portfolio. |
| 29 | + |
| 30 | +- Stakeholder entrypoint (AI): [STK_AI entrypoint](../../../../00_00_IDX_LC01_SPACET_stakeholder-ai-entrypoint_v01.md) |
| 31 | + _Comment:_ AI/ML execution lane; automation hooks and governance helpers. |
| 32 | + |
| 33 | +- ATA 95 home (SBOM/ModelBOM): [AMPEL360_SPACE-T/N-NEURAL_NETWORKS/ATA 95](../../../../../../AMPEL360_SPACE-T/N-NEURAL_NETWORKS/ATA_95-SBOM-MODELBOM/) |
| 34 | + _Comment:_ Intended authoritative location for ATA 95 outputs. If your folder name differs, update only this link target. |
| 35 | + |
| 36 | +--- |
| 37 | + |
| 38 | +## 2) ATA 95 K06 Focus (what uncertainty we are closing) |
| 39 | + |
| 40 | +### Uncertainty to Resolve (ATA-specific) |
| 41 | +K06 within ATA 95 is the absence of a single governed SSOT for: |
| 42 | +- **Software/ML identity:** canonical IDs for software components, packages, containers, libraries, toolchains, models, datasets. |
| 43 | +- **BOM schemas:** stable schemas for SBOM and ModelBOM (including ML metadata: training data provenance, feature schema, evaluation suite). |
| 44 | +- **Link semantics:** standardized links from SBOM/ModelBOM entries to source, build, test, evidence, and approvals. |
| 45 | +- **Release provenance:** deterministic generation, hashing, signing, and verification of SBOM/ModelBOM packs. |
| 46 | +- **Policy gates:** license policy, vulnerability policy, model risk policy (as metadata and CI checks). |
| 47 | +- **Enforcement:** CI gates preventing uncontrolled changes and ensuring BOM-to-trace alignment (ATA 93) and DPP readiness (ATA 94). |
| 48 | + |
| 49 | +### Primary consumers (typical) |
| 50 | +- Software engineering, cybersecurity, certification evidence, release management, DPP export pipeline, sim/test governance nodes (100+), ops. |
| 51 | + |
| 52 | +--- |
| 53 | + |
| 54 | +## 3) Partitioned Uncertainty Resolution Pathway (P1–P8) |
| 55 | + |
| 56 | +Each partition corresponds to a dedicated folder. **Do not credit closure** unless the partition’s “Done” definition is satisfied. |
| 57 | + |
| 58 | +### P1 — Work Breakdown & Ownership (Execution Closure) |
| 59 | +- Folder: [01_WBS/](01_WBS/) |
| 60 | + _Comment:_ Converts uncertainty into executable work packages (tasks, owners, inputs/outputs). |
| 61 | + |
| 62 | +- WBS index: [K06 ATA 95 Work Breakdown](01_WBS/95_00_IDX_LC01_SPACET_k06-ata-95-workbreakdown_v01.md) |
| 63 | + _Closes:_ “We don’t know what to do next / who owns it.” |
| 64 | + _Done when:_ T001–T010 exist with owners, acceptance criteria, and artifact links. |
| 65 | + |
| 66 | +- RACI (CSV): [RACI](01_WBS/95_00_MAT_LC06_SPACET_k06-ata-95-raci_v01.csv) |
| 67 | + _Closes:_ Responsibility ambiguity (execution vs approval). |
| 68 | + _Done when:_ CM approval path is explicit and accepted. |
| 69 | + |
| 70 | +**Task stubs (minimum set — expanded for BOM domain):** |
| 71 | +- T001: [SSOT source & ownership](01_WBS/95_00_ACT_LC06_SPACET_k06-t001-ssot-source-ownership_v01.md) |
| 72 | + _Comment:_ Declares authoritative sources for SBOM/ModelBOM content and ownership boundaries. |
| 73 | + |
| 74 | +- T002: [Identifier grammar](01_WBS/95_00_ACT_LC06_SPACET_k06-t002-identifier-grammar_v01.md) |
| 75 | + _Comment:_ Canonical IDs for software components, build artifacts, models, datasets, and toolchains. |
| 76 | + |
| 77 | +- T003: [SBOM schema definition](01_WBS/95_00_ACT_LC06_SPACET_k06-t003-sbom-schema-definition_v01.md) |
| 78 | + _Comment:_ Stabilizes SBOM semantics and required fields; aligns with ATA 91 schema rules. |
| 79 | + |
| 80 | +- T004: [ModelBOM schema definition](01_WBS/95_00_ACT_LC06_SPACET_k06-t004-modelbom-schema-definition_v01.md) |
| 81 | + _Comment:_ Stabilizes ML asset semantics (model lineage, dataset provenance, evaluation suite, feature schema). |
| 82 | + |
| 83 | +- T005: [Link semantics to trace graph](01_WBS/95_00_ACT_LC06_SPACET_k06-t005-link-semantics-to-trace-graph_v01.md) |
| 84 | + _Comment:_ Defines how BOM entries map to ATA 93 nodes/edges and evidence links. |
| 85 | + |
| 86 | +- T006: [Policy gates](01_WBS/95_00_ACT_LC06_SPACET_k06-t006-policy-gates_v01.md) |
| 87 | + _Comment:_ License, vulnerability, and model-risk policy gating rules and evidence expectations. |
| 88 | + |
| 89 | +- T007: [Export publication](01_WBS/95_00_ACT_LC06_SPACET_k06-t007-export-publication_v01.md) |
| 90 | + _Comment:_ Deterministic generation of SBOM/ModelBOM packs with manifests and checksums. |
| 91 | + |
| 92 | +- T008: [CI validation gates](01_WBS/95_00_ACT_LC06_SPACET_k06-t008-ci-validation-gates_v01.md) |
| 93 | + _Comment:_ Enforces schema validity, registry completeness, policy checks, and trace alignment. |
| 94 | + |
| 95 | +- T009: [Baseline BOM set](01_WBS/95_00_ACT_LC06_SPACET_k06-t009-baseline-bom-set_v01.md) |
| 96 | + _Comment:_ Frozen baseline SBOM/ModelBOM for a milestone release (referenced by DPP packs). |
| 97 | + |
| 98 | +- T010: [Verification procedure](01_WBS/95_00_ACT_LC06_SPACET_k06-t010-verification-procedure_v01.md) |
| 99 | + _Comment:_ How consumers verify BOM authenticity, completeness, and policy status. |
| 100 | + |
| 101 | +--- |
| 102 | + |
| 103 | +### P2 — IDs & Registry (Identity Closure) |
| 104 | +- Folder: [02_IDS_REGISTRY/](02_IDS_REGISTRY/) |
| 105 | + _Comment:_ Ensures every software component/model/dataset/toolchain artifact has a unique ID, owner, lifecycle state, and dedup policy. |
| 106 | + |
| 107 | +- Standard (STD): [Identifier grammar](02_IDS_REGISTRY/95_00_STD_LC03_SPACET_bom-identifier-grammar_v01.md) |
| 108 | + _Done when:_ Grammar is approved and referenced by export tooling + CI. |
| 109 | + |
| 110 | +- Registry (TAB/CSV): [Software component registry](02_IDS_REGISTRY/95_00_TAB_LC03_SPACET_software-component-registry_v01.csv) |
| 111 | + _Done when:_ Components have canonical IDs, owners, versions, and source references. |
| 112 | + |
| 113 | +- Registry (TAB/CSV): [Model & dataset registry](02_IDS_REGISTRY/95_00_TAB_LC03_SPACET_model-dataset-registry_v01.csv) |
| 114 | + _Done when:_ ML assets have canonical IDs, provenance pointers, and evaluation references. |
| 115 | + |
| 116 | +- Registry (TAB/CSV): [Toolchain registry](02_IDS_REGISTRY/95_00_TAB_LC03_SPACET_toolchain-registry_v01.csv) |
| 117 | + _Done when:_ Build and training toolchains are identified and versioned. |
| 118 | + |
| 119 | +- Change log (LOG): [Registry change log](02_IDS_REGISTRY/95_00_LOG_LC03_SPACET_registry-change-log_v01.md) |
| 120 | + _Done when:_ Every change references a decision (P7). |
| 121 | + |
| 122 | +--- |
| 123 | + |
| 124 | +### P3 — Schema & Versioning (Semantic Closure) |
| 125 | +- Folder: [03_SCHEMA/](03_SCHEMA/) |
| 126 | + _Comment:_ Defines machine-readable schemas for SBOM/ModelBOM and compatibility rules. |
| 127 | + |
| 128 | +- Schema (SCH/JSON): [SBOM schema](03_SCHEMA/95_00_SCH_LC03_SPACET_sbom-schema_v01.json) |
| 129 | + _Done when:_ Validates SBOM exports and is used by CI. |
| 130 | + |
| 131 | +- Schema (SCH/JSON): [ModelBOM schema](03_SCHEMA/95_00_SCH_LC03_SPACET_modelbom-schema_v01.json) |
| 132 | + _Done when:_ Validates ModelBOM exports and is used by CI. |
| 133 | + |
| 134 | +- Schema (SCH/JSON): [BOM manifest schema](03_SCHEMA/95_00_SCH_LC03_SPACET_bom-manifest-schema_v01.json) |
| 135 | + _Done when:_ Validates provenance metadata, checksums, and policy results. |
| 136 | + |
| 137 | +- Standard (STD): [Schema versioning policy](03_SCHEMA/95_00_STD_LC03_SPACET_schema-versioning-policy_v01.md) |
| 138 | + _Done when:_ Compatibility/breaking-change rules exist and are enforced. |
| 139 | + |
| 140 | +--- |
| 141 | + |
| 142 | +### P4 — Exports (Consumable Data Closure) |
| 143 | +- Folder: [04_EXPORTS/](04_EXPORTS/) |
| 144 | + _Comment:_ Deterministic BOM exports and audit-ready baselines. |
| 145 | + |
| 146 | +- Baseline export (TAB/CSV): [Baseline SBOM export](04_EXPORTS/95_00_TAB_LC04_SPACET_baseline-sbom-export_v01.csv) |
| 147 | + _Done when:_ Export is reproducible, validated, and milestone-referenced. |
| 148 | + |
| 149 | +- Baseline export (TAB/CSV): [Baseline ModelBOM export](04_EXPORTS/95_00_TAB_LC04_SPACET_baseline-modelbom-export_v01.csv) |
| 150 | + _Done when:_ Export is reproducible, validated, and milestone-referenced. |
| 151 | + |
| 152 | +- Manifest (RPT): [Export manifest](04_EXPORTS/95_00_RPT_LC04_SPACET_export-manifest_v01.md) |
| 153 | + _Done when:_ Inputs/tools/versions are recorded; rebuild is deterministic. |
| 154 | + |
| 155 | +- Diagram (DIA): [BOM-to-trace map](04_EXPORTS/95_00_DIA_LC04_SPACET_bom-to-trace-map_v01.md) |
| 156 | + _Done when:_ Diagram references match registry IDs and trace semantics (ATA 93). |
| 157 | + |
| 158 | +--- |
| 159 | + |
| 160 | +### P5 — CI Gates (Enforcement Closure) |
| 161 | +- Folder: [05_CI_GATES/](05_CI_GATES/) |
| 162 | + _Comment:_ Blocks merges that break BOM validity, policy gates, or trace alignment. |
| 163 | + |
| 164 | +- Requirements (STD): [CI validation requirements](05_CI_GATES/95_00_STD_LC05_SPACET_ci-validation-requirements_v01.md) |
| 165 | + _Done when:_ Rules map to checks; failures are actionable. |
| 166 | + |
| 167 | +- Checklist (LOG): [CI checklist](05_CI_GATES/95_00_LOG_LC05_SPACET_ci-checklist_v01.md) |
| 168 | + _Done when:_ Checklist matches CI outputs and reviewer expectations. |
| 169 | + |
| 170 | +- Sample run (RPT): [CI validation sample run](05_CI_GATES/95_00_RPT_LC05_SPACET_ci-validation-sample-run_v01.md) |
| 171 | + _Done when:_ Demonstrates pass/fail cases (missing registry entry, license violation, vulnerability threshold breach, trace mismatch). |
| 172 | + |
| 173 | +--- |
| 174 | + |
| 175 | +### P6 — Evidence Pack (Proof Closure) |
| 176 | +- Folder: [06_EVIDENCE/](06_EVIDENCE/) |
| 177 | + _Comment:_ NKU credit requires reproducible evidence and stable links (including policy results and signed packs). |
| 178 | + |
| 179 | +- Evidence pack index (IDX): [Evidence pack](06_EVIDENCE/95_00_IDX_LC06_SPACET_k06-ata-95-evidence-pack_v01.md) |
| 180 | + _Done when:_ All required evidence is linked and current. |
| 181 | + |
| 182 | +- Evidence links (TRC/CSV): [Evidence links register](06_EVIDENCE/95_00_TRC_LC06_SPACET_k06-ata-95-evidence-links_v01.csv) |
| 183 | + _Done when:_ Each claim has evidence links and status (OK/STALE/MISSING). |
| 184 | + |
| 185 | +- NKU ledger (TAB/CSV): [NKU ledger](06_EVIDENCE/95_00_TAB_LC06_SPACET_k06-ata-95-nku-ledger_v01.csv) |
| 186 | + _Done when:_ Partition scores are updated and backed by evidence + decision. |
| 187 | + |
| 188 | +--- |
| 189 | + |
| 190 | +### P7 — Decisions & Approvals (Authority Closure) |
| 191 | +- Folder: [07_DECISIONS/](07_DECISIONS/) |
| 192 | + _Comment:_ Converts evidence into approved baseline outcomes for BOM governance and policy thresholds. |
| 193 | + |
| 194 | +- Decision minutes (MIN): [Decision minutes](07_DECISIONS/95_00_MIN_LC07_SPACET_k06-ata-95-decision-minutes_v01.md) |
| 195 | + _Done when:_ Decision, rationale, dissent/risks are recorded (including policy exceptions). |
| 196 | + |
| 197 | +- Approvals log (LOG): [Approvals log](07_DECISIONS/95_00_LOG_LC07_SPACET_k06-ata-95-approvals_v01.md) |
| 198 | + _Done when:_ CM approval + security/model governance sign-offs are referenced. |
| 199 | + |
| 200 | +--- |
| 201 | + |
| 202 | +### P8 — Traceability & Adoption (Impact Closure) |
| 203 | +- Folder: [08_TRACEABILITY/](08_TRACEABILITY/) |
| 204 | + _Comment:_ Ensures BOM consumers adopt the SSOT and can verify authenticity and policy status. |
| 205 | + |
| 206 | +- Consumers (TRC/CSV): [Consumers list](08_TRACEABILITY/95_00_TRC_LC08_SPACET_k06-ata-95-consumers_v01.csv) |
| 207 | + _Done when:_ Consumers are listed with BOM version, verification method, and owner. |
| 208 | + |
| 209 | +- Adoption status (RPT): [Adoption status](08_TRACEABILITY/95_00_RPT_LC08_SPACET_k06-ata-95-adoption-status_v01.md) |
| 210 | + _Done when:_ Each consumer has status + remediation plan if blocked. |
| 211 | + |
| 212 | +--- |
| 213 | + |
| 214 | +## 4) Cross-ATA Links (same Knot, coupled closures) |
| 215 | + |
| 216 | +ATA 95 is a core downstream consumer of K06 primitives; these couplings are mandatory. |
| 217 | + |
| 218 | +- [ATA 90 — Meta spine (NN / Schemas / Trace / DPP)](../ATA_90/) |
| 219 | + _Comment:_ Provenance expectations and TEKNIA packaging gates. |
| 220 | + |
| 221 | +- [ATA 91 — Schemas](../ATA_91/) |
| 222 | + _Comment:_ SBOM/ModelBOM schemas and registries must align with canonical schema governance. |
| 223 | + |
| 224 | +- [ATA 93 — Traceability Graph](../ATA_93/) |
| 225 | + _Comment:_ BOM-to-trace mapping and evidence link semantics must be valid. |
| 226 | + |
| 227 | +- [ATA 94 — DPP](../ATA_94/) |
| 228 | + _Comment:_ DPP packs should reference baseline BOM exports and policy results where applicable. |
| 229 | + |
| 230 | +- [ATA 98 — Signed Export Packs](../ATA_98/) |
| 231 | + _Comment:_ Signing/hashing and verification primitives for released BOM packs. |
| 232 | + |
| 233 | +- [ATA 99 — Master Registers](../ATA_99/) |
| 234 | + _Comment:_ Consolidated registers and anti-duplication controls. |
| 235 | + |
| 236 | +**Sim/Test Coupling (100+):** |
| 237 | +- [ATA 101](../ATA_101/) / [ATA 107](../ATA_107/) / [ATA 109](../ATA_109/) |
| 238 | + _Comment:_ Test evidence should reference BOM IDs and verify policy gates as part of the evidence chain. |
| 239 | + |
| 240 | +--- |
| 241 | + |
| 242 | +## 5) Control & Monitoring (NKU Values + TEKNIA Sharing Rules) |
| 243 | + |
| 244 | +### 5.1 NKU Control Model |
| 245 | +**Primary metric:** NKU Progress Score for K06/ATA95 |
| 246 | +**Source of truth:** [NKU ledger](06_EVIDENCE/95_00_TAB_LC06_SPACET_k06-ata-95-nku-ledger_v01.csv) |
| 247 | + |
| 248 | +**Scoring:** |
| 249 | +- `score ∈ {0, 0.5, 1.0}` |
| 250 | +- **NKU Score** = `Σ(weight × score)` across partitions P1..P8 |
| 251 | + |
| 252 | +**No-false-closure (mandatory):** |
| 253 | +- `score = 1.0` requires: |
| 254 | + - evidence link(s) in `06_EVIDENCE/...evidence-links...csv`, and |
| 255 | + - decision reference in `07_DECISIONS/...decision-minutes...md` (and approvals if applicable). |
| 256 | + |
| 257 | +### 5.2 Monitoring Cadence |
| 258 | +| Control Item | Owner | Frequency | Source | Comment | |
| 259 | +|---|---|---:|---|---| |
| 260 | +| NKU ledger updates | AI + DATA | Per PR affecting K06/ATA95 | NKU ledger + evidence links | No score uplift without links | |
| 261 | +| CI gate compliance | CM + Tooling | Per PR | CI gates + logs | Enforcement mechanism | |
| 262 | +| License & vuln policy results | Security + Tooling | Per PR + release | CI policy reports | Exceptions must be approved (P7) | |
| 263 | +| Model risk policy results | Model Governance + Tooling | Per PR + release | CI policy reports | Exceptions must be approved (P7) | |
| 264 | +| Evidence freshness | SE + V&V | Weekly / per gate | Evidence links register | Detect staleness | |
| 265 | +| Decision capture | CM WG + Security/Model Gov | At gate closure | Decisions + approvals | Required for closure | |
| 266 | +| Consumer verification | BOM consumers | Per release | Adoption status | Verify authenticity and policy status | |
| 267 | + |
| 268 | +### 5.3 Thresholds |
| 269 | +- Green ≥ 0.80; Amber 0.50–0.79; Red < 0.50 |
| 270 | +Hard blockers: missing P2/P3/P5 closure, missing P7 decision, missing policy results for baseline exports, stale evidence for any closed item. |
| 271 | + |
| 272 | +### 5.4 TEKNIA Sharing Rules |
| 273 | +TEKTOKs may be created only when: |
| 274 | +- Evidence is reproducible (P6 complete) |
| 275 | +- Decision exists (P7 complete, CM-approved) |
| 276 | +- Dedup passes (SHA-256) |
| 277 | +- NV threshold met (≥ 0.50 internal, ≥ 0.65 external recommended) |
| 278 | + |
| 279 | +### 5.5 TEKNIA Packaging Requirements (mandatory metadata) |
| 280 | +Any TEKTOK derived from ATA 95 closure must include: |
| 281 | +- knot_id, ata, partitions_closed |
| 282 | +- sbom_id / modelbom_id + release_state |
| 283 | +- schema_ids referenced + registry references |
| 284 | +- trace_snapshot_id + evidence links |
| 285 | +- hash_sha256 + signature metadata (if baseline) |
| 286 | +- policy results summary + exceptions (if any) |
| 287 | +- nv + rationale + sharing classification |
| 288 | + |
| 289 | +### 5.6 Enforcement |
| 290 | +CI should validate: |
| 291 | +- SBOM/ModelBOM schema compliance + registry completeness |
| 292 | +- uniqueness of component/model/dataset IDs |
| 293 | +- policy thresholds (license/vuln/model risk) and exceptions workflow |
| 294 | +- trace alignment (ATA 93) and DPP readiness (ATA 94) |
| 295 | +- TEKNIA gate for “approved” TEKTOK status (NV + dedup) |
| 296 | + |
| 297 | +--- |
| 298 | + |
| 299 | +## 6) Practical Notes (common failure modes) |
| 300 | +- “SBOM exists” is not closure: it must be deterministic, policy-checked, trace-linked, and approved. |
| 301 | +- Treat ModelBOM provenance as critical: dataset identity and evaluation suite links are frequent weak points. |
| 302 | +- Prefer signed packs for baseline BOM releases; raw file paths drift and are not audit-grade. |
| 303 | +``` |
0 commit comments