@@ -6,99 +6,220 @@ status: Draft
66knot_id : K06
77ata : " 00"
88lc_or_subbucket : " LC01"
9+ bucket : " 00"
10+ description : " CM-owned tasklist for K06 governance spine: SSOT boundaries, identifier/nomenclature authority, schema governance references, CI enforcement, and auditability proof chain."
11+ owner : " STK_CM — Configuration Management"
912---
1013
1114# K06 — data-governance-ssot-schemas-identifiers
12- ## ATA 00 — Tasklist
15+ ## ATA 00 — Tasklist (OWNER: STK_CM)
16+
17+ This tasklist is the ** authoritative execution lane** for K06 items that are ** program-governance** in nature.
18+ ATA 00 is managed by ** CM** . Other stakeholders contribute, but ** CM owns decisions and baselines** .
19+
20+ ---
1321
1422## Links (GitHub-navigable)
15- - Knot overview: [ K06 overview] ( ../../00_00_IDX_LC01_SPACET_k06-data-governance-ssot-schemas-identifiers_v01.md )
16- - Portal index: [ AMPEL360-SPACE-T-PORTAL index] ( ../../../../../00_00_IDX_LC01_SPACET_stakeholder-entrypoints_v01.md )
17- - Stakeholder entrypoint (AI): [ STK_AI entrypoint] ( ../../../../00_00_IDX_LC01_SPACET_stakeholder-ai-entrypoint_v01.md )
18- - ATA 00 home (program governance): [ AMPEL360_SPACE-T/P-PROGRAM/ATA 00] ( ../../../../../../AMPEL360_SPACE-T/P-PROGRAM/ATA_00-GENERAL/ )
19- - If your folder name differs, update only this link target.
23+
24+ - Knot overview (within STK_CM):
25+ [ K06 overview] ( ../../00_00_IDX_LC01_SPACET_k06-data-governance-ssot-schemas-identifiers_v01.md )
26+ _ Comment:_ Canonical K06 scope, impacted ATAs, closure criteria, and shared definitions.
27+
28+ - Portal index:
29+ [ AMPEL360-SPACE-T-PORTAL index] ( ../../../../00_00_IDX_LC01_SPACET_stakeholder-entrypoints_v01.md )
30+ _ Comment:_ Single portal navigation for all stakeholders.
31+
32+ - Stakeholder entrypoint (CM):
33+ [ STK_CM entrypoint] ( ../../../00_00_IDX_LC01_SPACET_stakeholder-cm-entrypoint_v01.md )
34+ _ Comment:_ CM authority for ATA 00 governance, baselines, and enforcement.
35+
36+ - ATA 00 home (program governance, CM-owned):
37+ [ STK_CM/P-PROGRAM/ATA_00-GENERAL] ( ../../../P-PROGRAM/ATA_00-GENERAL/ )
38+ _ Comment:_ Canonical location for program structures: nomenclature, SSOT rules, registers, change control, baselines.
39+
40+ > Note: ATA homes for engineering domains may exist outside STK_CM, but ** ATA 00 program governance** is anchored here.
41+
42+ ---
2043
2144## Related ATA tasklists (same Knot)
22- - [ ATA 91 (Schemas)] ( ../ATA_91/ )
23- - [ ATA 93 (Traceability Graph)] ( ../ATA_93/ )
24- - [ ATA 94 (DPP)] ( ../ATA_94/ )
25- - [ ATA 95 (SBOM/ModelBOM)] ( ../ATA_95/ )
26- - [ ATA 98 (Signed Export Packs)] ( ../ATA_98/ )
27- - [ ATA 99 (Master Registers)] ( ../ATA_99/ )
45+
46+ > These are cross-links to the same knot in other ATA partitions (where they exist).
47+ > Use these to verify K06 closure end-to-end.
48+
49+ - [ ATA 91 (Schemas)] ( ../ATA_91/ )
50+ _ Comment:_ Canonical schema registry, versioning, compatibility, and controlled publication.
51+
52+ - [ ATA 93 (Traceability Graph)] ( ../ATA_93/ )
53+ _ Comment:_ Node/edge semantics, evidence link rules, and trace snapshots.
54+
55+ - [ ATA 94 (DPP)] ( ../ATA_94/ )
56+ _ Comment:_ DPP export packs and provenance references that rely on K06 governance.
57+
58+ - [ ATA 95 (SBOM/ModelBOM)] ( ../ATA_95/ )
59+ _ Comment:_ Supply chain identity and BOM export governance driven by K06 primitives.
60+
61+ - [ ATA 98 (Signed Export Packs)] ( ../ATA_98/ )
62+ _ Comment:_ Signing/hashing verification requirements coupling to K13.
63+
64+ - [ ATA 99 (Master Registers)] ( ../ATA_99/ )
65+ _ Comment:_ Namespace boundaries, dedup policy, drift monitoring, master inventory.
2866
2967---
3068
3169## 1) Uncertainty to Resolve (ATA-specific)
32- ATA 00 must define the ** authoritative governance** for:
33- - Canonical identifiers (parts, docs, baselines, hazards, requirements, datasets, models).
34- - SSOT rules (what is authoritative, where it lives, how it is versioned).
35- - Schema/versioning policy used by the whole Space-T repository.
3670
37- ### Decision required
38- One CM-approved decision covering:
39- - Identifier grammar + registry authority.
40- - Schema governance + compatibility rules.
41- - CI gates for validation and auditability.
71+ ATA 00 must define the ** authoritative CM governance spine** for:
72+
73+ - ** Identifier authority:** canonical identifier grammar, namespace boundaries, uniqueness rules.
74+ - ** SSOT boundaries:** which artifacts are authoritative vs derived, where they live, how they change.
75+ - ** Schema governance references:** the mandatory program-level referencing rules to ATA 91 (schemas) and ATA 93 (trace semantics).
76+ - ** Enforcement:** CI gates and review rules that prevent uncontrolled proliferation of IDs/schemas and broken trace links.
77+ - ** Auditability chain:** minimum proof that ` IDs → Schema → Trace → Export (signed when required) ` is reproducible.
78+
79+ ### Decision required (CM-owned)
80+ One CM-approved decision (with recorded minutes) establishing:
81+ - Identifier grammar + namespace registry authority (in coordination with ATA 99).
82+ - SSOT decision matrix and publication locations (paths).
83+ - Mandatory references to schema governance (ATA 91) and trace governance (ATA 93).
84+ - CI gates (lint/validation) and escalation path on failure.
85+
86+ ---
4287
4388## 2) Scope Boundary
89+
4490### In-scope
45- - Nomenclature + metadata rules for program-level artifacts (ATA 00).
46- - Registries and schema publication mechanism (policy + “where it lives”).
47- - CI enforcement rules + auditability hooks.
91+ - Program-level nomenclature and metadata rules (ATA 00).
92+ - SSOT decision matrix (authoritative vs derived) and publication location rules.
93+ - Cross-ATA governance references (how ATAs must reference ATA 91/93/99 registries).
94+ - CI enforcement rules + reviewer workflow for governance-impacting changes.
95+ - Minimum auditability proof chain definition and demonstration approach.
4896
4997### Out-of-scope
50- - Subsystem-specific schema definitions (owned in ATA 91 and downstream ATAs).
51- - Tool implementation details beyond “minimum viable enforcement” (owned by tooling backlog unless pulled in).
98+ - Subsystem-specific schema definitions (owned by ATA 91 + downstream ATAs).
99+ - Implementation details beyond minimum viable enforcement (tracked as tooling tasks unless pulled into K06).
100+ - Cryptographic key management design (owned by K13), except defining governance requirements and interfaces.
101+
102+ ---
52103
53104## 3) Owners & Stakeholders
54- - ** Primary owner:** AI + DATA (joint) with ** CM** as approval authority
55- - ** Contributors:** SE, CERT, CY, OPS, TEST
56- - ** Approvers:** CM WG (final), CERT (if compliance impact)
105+
106+ ### Primary owner
107+ - ** STK_CM — Configuration Management** (authority, decision owner, baseline owner)
108+
109+ ### Required contributors (inputs)
110+ - ** STK_DATA — Data Governance** (stewardship, SSOT boundaries, registry requirements)
111+ - ** STK_AI — AI/ML Engineering** (automation/validation, TEKNIA/NKU instrumentation)
112+ - ** STK_SE — Systems Engineering** (ICD expectations, interface-driven schema consumption)
113+ - ** STK_CERT — Certification & Authorities** (evidence expectations if compliance impacts)
114+ - ** STK_CY — Cybersecurity** (K13 coupling for signing/key controls)
115+ - ** STK_TEST — IVVQ/Testing** (evidence node adoption for 100+)
116+
117+ ### Approvers
118+ - ** CM WG** (final approval, baseline release)
119+ - ** CERT** (approval required only if compliance/evidence format is impacted)
120+
121+ ---
57122
58123## 4) Interfaces / Affected Areas
124+
59125### Impacted ATAs (dependency view)
60- - Direct: ATA 00 (governance), ATA 91 (schemas), ATA 93 (trace graph), ATA 94/95/98 (DPP/SBOM/export packs), ATA 101/109 (sim/test evidence linkage)
61- - Indirect: any ATA emitting IDs or consuming registries/schemas
126+ - Direct governance dependencies:
127+ - ** ATA 99** (namespaces, dedup, master inventory)
128+ - ** ATA 91** (schemas + versioning)
129+ - ** ATA 93** (trace semantics + evidence links)
130+ - Output consumers:
131+ - ** ATA 94/95/98** (DPP/BOM/signed packs)
132+ - ** ATA 101/107/109** (sim/test evidence nodes consuming IDs/schemas and emitting trace)
133+
134+ ### Authoritative targets (SSOT pointers)
135+ > ATA 00 declares “where truth lives” without duplicating the truth.
136+
137+ - CM governance home: ` STK_CM/P-PROGRAM/ATA_00-GENERAL/ `
138+ - Master registers/dedup: ` .../ATA_99/... `
139+ - Schemas governance: ` .../ATA_91/... `
140+ - Trace semantics: ` .../ATA_93/... `
141+ - DPP packs: ` .../ATA_94/... `
142+ - SBOM/ModelBOM: ` .../ATA_95/... `
143+ - Signed packs: ` .../ATA_98/... `
62144
63- ### Authoritative targets (SSOT candidates)
64- - ` AMPEL360_SPACE-T/P-PROGRAM/ATA_00-GENERAL/ ` (program governance)
65- - ` AMPEL360_SPACE-T/N-NEURAL_NETWORKS/ATA_91-* ` (schemas)
66- - ` AMPEL360_SPACE-T/N-NEURAL_NETWORKS/ATA_93-* ` (traceability)
67- - ` AMPEL360_SPACE-T/N-NEURAL_NETWORKS/ATA_94-* ` (DPP)
68- - ` AMPEL360_SPACE-T/N-NEURAL_NETWORKS/ATA_95-* ` (SBOM/ModelBOM)
69- - ` AMPEL360_SPACE-T/N-NEURAL_NETWORKS/ATA_98-* ` (signed exports)
145+ ---
70146
71147## 5) Closure Criteria
148+
72149This tasklist is ** closed only if** all conditions are true:
73- 1 . Identifier standard approved (CM WG) and published (ATA 00).
74- 2 . Schema governance/versioning policy published (DATA owner) and referenced from ATA 00.
75- 3 . CI enforcement exists (PR gate) and is documented (how to comply + how it fails).
76- 4 . At least one reproducible audit query exists proving: ` IDs → Schema → Trace → Signed export ` .
77- 5 . Baseline update recorded (change record/changelog) and links updated for affected ATAs.
150+
151+ 1 . ** Identifier standard** approved by CM WG and published under ATA 00 governance home.
152+ 2 . ** SSOT decision matrix** approved by CM WG and published (authoritative vs derived + ownership).
153+ 3 . ** Schema governance reference policy** published: ATA 00 mandates how to reference ATA 91 schemas and versioning.
154+ 4 . ** CI enforcement** exists and demonstrably blocks:
155+ - invalid nomenclature / namespace violations,
156+ - unregistered schema IDs,
157+ - broken trace links / missing evidence pointers,
158+ - unauthorized governance-impacting changes.
159+ 5 . ** Auditability proof chain** documented and demonstrated for at least one reference flow:
160+ ` ID registry entry → schema ID → trace snapshot link → export pack reference (signed when required) ` .
161+ 6 . ** Decision record** exists (minutes + approvals log) and baseline references are updated.
162+
163+ ---
78164
79165## 6) Tasks (minimum set)
166+
80167### 6.1 Governance and SSOT definition
81- - [ ] ** T1** Define canonical identifier grammar + registry ownership (CM+DATA+AI).
82- - [ ] ** T2** Define SSOT decision matrix (authoritative vs derived artifacts).
83- - [ ] ** T3** Define schema versioning policy (compatibility + breaking-change rules).
168+ - [ ] ** T1 (CM-owned)** Define canonical identifier grammar and namespace boundaries (coordinate with ATA 99).
169+ - _ Deliverable:_ ` 00_00_STD_LC01_SPACET_identifier-grammar_v01.md ` (location: ATA 00 home)
170+
171+ - [ ] ** T2 (CM-owned)** Define SSOT decision matrix (authoritative vs derived artifacts; ownership + location).
172+ - _ Deliverable:_ ` 00_00_STD_LC01_SPACET_ssot-decision-matrix_v01.md ` (location: ATA 00 home)
173+
174+ - [ ] ** T3 (CM-owned)** Publish “governance reference policy”: how ATAs must reference schemas (ATA 91) and trace (ATA 93).
175+ - _ Deliverable:_ ` 00_00_STD_LC01_SPACET_governance-reference-policy_v01.md ` (location: ATA 00 home)
84176
85- ### 6.2 Enforcement implementation
86- - [ ] ** T4** Confirm CI gates: naming + metadata + schema validation + trace link checks.
87- - [ ] ** T5** Provide a minimal “audit query” script or documented query path (K06→K08 linkage).
177+ ### 6.2 Enforcement (CI + reviews)
178+ - [ ] ** T4 (Tooling with CM authority)** Confirm CI gates for:
179+ - nomenclature + namespace checks,
180+ - schema registration checks,
181+ - trace/evidence link integrity checks,
182+ - approvals required for governance-impacting diffs.
183+ - _ Deliverable:_ ` 00_00_IDX_LC01_SPACET_ci-governance-gates_v01.md ` + CI workflow updates (linked)
184+
185+ - [ ] ** T5 (CM-owned)** Define the minimal audit query path (how an auditor reproduces the chain).
186+ - _ Deliverable:_ ` 00_00_RPT_LC01_SPACET_auditability-proof-path_v01.md `
88187
89188### 6.3 Evidence + baseline freeze
90- - [ ] ** T6** Produce minimal evidence pack: ` IDs → Schema → Trace → Signed export ` .
91- - [ ] ** T7** Record decision, link approvals, update baseline references (CM).
189+ - [ ] ** T6 (CM-owned)** Produce minimal evidence pack showing:
190+ ` IDs → Schema → Trace → Export (signed when required) `
191+ - _ Deliverable:_ Evidence pack IDX + link register under K06/ATA00 evidence folder
192+
193+ - [ ] ** T7 (CM-owned)** Record decision minutes, approvals, and baseline update entry.
194+ - _ Deliverable:_ minutes + approvals log + changelog/baseline record
92195
93- ## 7) Outputs / Artifacts
94- - Identifier standard (ATA 00, TYPE=STD)
95- - Schema governance policy (ATA 91, TYPE=SCH/STD)
96- - CI workflow updates + validation logs (evidence)
97- - Traceability proof artifact (ATA 93)
98- - Signed export pack reference (ATA 98)
196+ ---
197+
198+ ## 7) Outputs / Artifacts (expected)
199+
200+ - ATA 00 governance standards (TYPE=STD):
201+ - Identifier grammar + namespace boundaries
202+ - SSOT decision matrix
203+ - Governance reference policy (schemas/trace coupling)
204+ - CI gates documentation (TYPE=IDX/STD) + workflow artifacts (linked)
205+ - Auditability proof path (TYPE=RPT)
206+ - Evidence pack index + evidence links register (TYPE=IDX/TRC)
207+ - Decision minutes + approvals log (TYPE=MIN/LOG)
208+
209+ ---
99210
100211## 8) Dependencies / Risks
101- - Dependency on ** K13** for signing/key management and secure artifact handling.
102- - Dependency on ** K01** if authorities impose specific trace/evidence formats.
103- - Risk: uncontrolled proliferation of “new IDs/schemas” if CI is not enforced early.
212+
213+ ### Dependencies
214+ - ** ATA 99** (namespace registry + dedup enforcement)
215+ - ** ATA 91** (schema registry + versioning)
216+ - ** ATA 93** (trace semantics + evidence links)
217+ - ** K13** (signing/key management) for any “signed export pack” requirement (ATA 98 coupling)
218+
219+ ### Risks (principal “uncertainty knots”)
220+ - ** Shadow registries** : parallel ID/schema lists outside the master inventory.
221+ - ** Namespace collisions** : duplicate IDs across ATAs without enforcement.
222+ - ** Stale evidence links** : closure claimed but evidence has drifted or is unverifiable.
223+ - ** Governance bypass** : PRs merging governance-impacting changes without CM approvals.
224+ - ** Tooling drift** : validators and schemas diverge from normative standards if not baselined.
104225
0 commit comments