Continuous Verification

A certificate that cannot age honestly is not much of a certificate.

OpenCompliance treats certificates as revocable state, not static PDFs. The lifecycle layer maps source changes to impacted controls, plans a delta recheck, and either marks trust stale or revokes it before anyone can compose that stale result into a larger artifact.

Current Synthetic Reference

One issued corridor, one drift event

The current public lifecycle pack starts from the issued ExampleCo corridor and applies a normalized source-change event: the scheduled cloud-logging export is missing in the next sync window. That one change maps cleanly to the logging control, one proof claim, and the issued certificate that depended on it.

Policy Choice

Reverify or revoke

The same source change can be expressed in two policy modes. A cautious mode marks the certificate re_verification_required. A fail-closed mode revokes it immediately. In both cases, the child certificate is blocked from further composition until trust is restored.

Lifecycle chain

issued certificate
  -> normalized source-change event
  -> impacted controls and claims
  -> delta recheck plan
  -> re-verification-required or revoked
  -> composition blocked until trust is restored
Drift Mapping

No hand-wavy blast radius

The lifecycle artifact records the exact impacted control refs and impacted claims. In the current pack, only oc.log-01 and EX-CLAIM-202 move, so the recheck plan does not pretend the whole corridor changed.

Delta Recheck

Reuse what did not change

The lifecycle event keeps a list of recheckClaims and a separate list of reusedClaims. That makes the “continuous” part legible: only the impacted claim should be rerun first.

Lineage

Historical state stays visible

The lifecycle record keeps the original certificate issuance entry and the later stale or revoked state in one lineage trail. Silent mutation is not acceptable; state transitions have to be artifacts too.

Composition

Children can poison the parent

The public pack also includes two synthetic issued component certificates and a composed higher-level certificate. The rule is strict: composition only works while every child remains issued and aligned on organisation and framework intent.

What exists today

Available Now
  • A public drift event over the issued ExampleCo corridor.
  • Lifecycle artifacts for both re_verification_required and revoked policies.
  • A delta-recheck plan that isolates only the impacted claim.
  • A composed certificate artifact built from two aligned synthetic component certificates.
Still Missing
  • No live connector event stream yet.
  • No scheduler that reruns impacted corridors automatically.
  • No signer-bound publication model for lifecycle decisions yet.
  • No production-grade composition policy beyond the current synthetic alignment rules.