System Design and Implementation
1. System Components
1.1 Authorization Package Service
The signed-manifest model and endorsement structure produced by this service are documented in Authorization Package. Service responsibilities:
- Create signed authorization package manifests
- Bind identity, aircraft, operation, token, and policy references
- Collect and seal multi-authority endorsements
- Version, amend, and revoke packages
- Store package in audit ledger
- Support offline capsule generation
1.2 Identity Verification Service
The identity substrates this service consumes are documented in Pilot Identity (OIDC / login.gov / PIV / VC) and Aircraft Hardware Identity (TPM / dual-chain / PCR). Service responsibilities:
- Validate pilot/operator identity
- Validate operator organization
- Validate aircraft identity (TPM attestation challenge per Flight Lifecycle §1)
- Support software-validated (L4) and hardware-backed (L5) identity tiers
- Manage credential lifecycle
- Support federation-ready identity assertions for future external trust relationships
1.3 Public Token Service
Responsibilities:
- Create authorization-bound public aircraft token
- Keep token stable within a single authorization by default
- Rotate token across authorizations
- Support stricter token rotation for protected missions
- Prevent public reverse lookup
- Support authorized internal resolution
- Detect duplicate token use
1.4 Protected Field Encryption Service
The envelope-encryption model this service implements is documented in Authorization Package §6. Service responsibilities:
- Encrypt protected identity fields
- Manage key policy
- Support online brokered disclosure
- Support offline field disclosure capsules
- Support field-level disclosure, not all-or-nothing disclosure
- Support key rotation and revocation
- Support purpose-bound access
- Support audit hooks for every disclosure
The default online model should be brokered disclosure through ATOMx. ATOMx may decrypt protected fields inside controlled services after policy approval and return only the permitted fields to authorized users or systems.
Recipient-side encryption should be supported selectively for high-assurance, offline, federal, or special deployment environments, but it should not be the default API integration model because it would complicate common operating picture integrations without necessarily improving practical security.
1.5 Disclosure Policy Engine
Responsibilities:
- Evaluate requester identity
- Evaluate requester organization
- Evaluate role and authority
- Evaluate jurisdiction/geography
- Evaluate event or incident context
- Evaluate purpose code
- Evaluate time window
- Evaluate mission sensitivity
- Determine field-level release permissions
- Record disclosure decision
- Deny, redact, or minimize responses when access is insufficient
Example access inputs
- User credential
- Device credential
- Organization credential
- Role
- Jurisdiction
- Assigned event perimeter
- Incident number or event context
- Purpose code
- Requested fields
- Aircraft/operation geography
- Current operational state
Example purpose codes
- Active airspace incident
- Aviation safety concern
- Critical infrastructure protection
- Public safety response
- Security investigation
- Enforcement action
- Training or test event
- After-action review
For emergency field use, purpose code selection should be one-tap and plain-language. A written narrative can be required later if policy requires it.
1.6 Conformance Engine
Responsibilities:
- Compare telemetry against approved flight plan or operating area
- Evaluate route, area, altitude, time, mission volume, and dynamic restrictions
- Generate conformance state
- Generate reason codes
- Track amendment/revocation compliance
- Support protected mission location-generalization policy
- Support local verification logic for offline mode
Conformance should be evaluated against the approved operation. The approved operation may be:
- Specific route
- Waypoint plan
- Operating polygon
- Altitude band
- Mission volume
- Time window
- Response area
- Patrol area
- Emergency operating area
1.7 Telemetry Ingest and Fusion Layer
Responsibilities:
- Ingest primary operator/control-system telemetry
- Ingest aircraft-originated telemetry
- Ingest broadcast observations
- Ingest third-party cooperative data
- Ingest non-cooperative sensor observations where available
- Deduplicate tracks
- Assign provenance
- Assign source confidence
- Detect mismatch, stale data, duplicate token use, replay, and suspicious divergence
Default rule: Primary telemetry comes from the operator/control system or aircraft. ATOMx uses corroborating feeds to validate, cross-check, downgrade confidence, or generate alerts when reported and observed telemetry diverge. Telemetry confidence should affect authorized-user state, not public state.
1.8 Trust State Engine
Responsibilities:
- Produce public trust state
- Produce authorized operational state
- Keep authorization, identity trust, and security alert state separate
- Apply mission protection policy
- Apply public visibility policy
- Prevent over-classification of cooperative aircraft as threats
The public trust state should never expose detailed telemetry confidence, reason codes, protected identity, or security-alert details.
1.9 Audit and Evidence Ledger
Responsibilities:
- Preserve authorization package creation
- Preserve package versions and amendments
- Preserve public token assignment
- Preserve telemetry history
- Preserve conformance history
- Preserve protected disclosure events
- Preserve revocation/amendment instructions
- Preserve compliance response
- Preserve offline reveal events once synchronized
- Preserve security alerts and investigation events
- Preserve API access logs
The audit model should be tamper-evident. It should support incident reconstruction, regulatory review, dispute resolution, enforcement, and internal debugging.
1.10 API Gateway
ATOMx should be API-first. Responsibilities:
- Provide trust state feeds
- Provide conformance feeds
- Provide protected disclosure endpoints
- Provide telemetry confidence metadata to authorized systems
- Provide audit access where permitted
- Integrate with existing common operating pictures, public safety tools, airspace-management systems, and security platforms
- Support the ATOMx operational airspace awareness interface
API responses must be field-level policy filtered. The same aircraft may produce different API responses depending on requester role, geography, purpose, and authority.
1.11 Operational Airspace Awareness Interface
Responsibilities:
- Provide native awareness for organizations without a mature common operating picture
- Show public trust state and authorized operational detail based on user permissions
- Support protected disclosure workflows
- Support one-tap purpose code selection
- Support incident and after-action workflows
- Support investigation workflows
- Support audit review where permitted
This interface should not be described as replacing every customer COP. It is the native ATOMx operational interface for users who need a lower-cost or purpose-built airspace awareness capability.
1.12 Offline Verification Module
The capsule format, RF broadcast layering, and field-verification flow this module implements are documented in Disconnected Operations. Module responsibilities:
- Verify authorization package or offline capsule signatures
- Validate validity window (with monotonic-counter time anchoring per Threat Model §5)
- Validate scoped field-user credential
- Validate managed device credential
- Validate geographic scope
- Validate purpose code
- Decrypt permitted protected fields
- Locally compare broadcast aircraft telemetry against signed approved operation
- Generate signed disclosure receipt
- Reconcile disclosure, telemetry, and verification events when connectivity returns
2. Connected Mode Flow
Service-architecture view. The connected runtime is documented in detail in Flight Lifecycle — that page is the canonical reference for Phase 0 (drone onboarding), Phase 1 (pre-flight authorization), Phase 2 (in-flight telemetry binding), mid-flight events, and reconciliation. The sequence diagrams here describe the service interaction shape behind that runtime, which is the engineering view this page owns.
2.1 Pre-flight or Pre-operation
sequenceDiagram
autonumber
participant Op as Operator
participant Auth as Authority Workflow
participant ATOMx
participant KMS as Encryption / KMS
participant Tok as Public Token Service
participant Led as Audit Ledger
participant Cons as Approved Consumers
Op->>Auth: Submit flight plan / operating area
Auth->>ATOMx: Validated identities + approval context
ATOMx->>ATOMx: Build signed Authorization Package manifest
ATOMx->>KMS: Encrypt protected claims
ATOMx->>Tok: Generate authorization-bound token
ATOMx->>ATOMx: Attach trust, disclosure, conformance policies
ATOMx->>Led: Persist package + version
ATOMx-->>Cons: Operational view (policy-filtered)
- Pilot/operator submits flight plan or operating area through an approved workflow.
- Aircraft identity and pilot/operator identity are validated.
- Approval context is established by the appropriate authority or authorization workflow.
- ATOMx creates a signed authorization package manifest.
- Protected fields are encrypted.
- Public aircraft token is generated and bound to the authorization.
- Public trust policy and disclosure policy are attached.
- Conformance policy is attached.
- Authorization package is stored in the audit ledger.
- Approved systems receive the appropriate operational view through API or UI.
2.2 In-flight Connected Operation
- Aircraft or operator system streams telemetry.
- ATOMx compares telemetry against approved operation.
- ATOMx produces conformance state.
- ATOMx produces public trust state where policy allows.
- ATOMx produces authorized operational state for approved users and systems.
- Corroborating sources validate or challenge telemetry.
- Telemetry confidence and mismatch indicators are generated for authorized users.
- Protected fields remain encrypted unless disclosure is approved.
- Every status change and disclosure event is logged.
2.3 Protected Disclosure
sequenceDiagram
autonumber
participant Req as Authorized Requester
participant API as API Gateway
participant Pol as Disclosure Policy Engine
participant Enc as Protected Field Encryption
participant Led as Audit Ledger
Req->>API: Request protected fields (purpose, role, geo, event)
API->>Pol: Evaluate request context
alt Approved
Pol->>Enc: Decrypt permitted fields only
Enc-->>API: Released field values
API-->>Req: Field-level filtered response
else Denied / Redacted
Pol-->>API: Decision + redaction
API-->>Req: Denied or minimized response
end
API->>Led: Log disclosure event (requester, purpose, fields, decision)
- Authorized user or system requests protected field access.
- Disclosure Policy Engine evaluates identity, role, geography, purpose, authority, time, and incident context.
- ATOMx releases only approved fields.
- Disclosure event is logged with requester, purpose, fields released, time, operation, and policy decision.
2.4 Amendment or Revocation
- ATOMx receives or creates an operational change, such as a new restriction, emergency event, priority operation, or safety conflict.
- ATOMx determines affected authorizations.
- ATOMx amends or revokes the relevant authorization state.
- ATOMx sends machine-readable compliance instruction to the operator/control system.
- Suggested actions may include exit, hold, land, reroute, or refile.
- Where possible, ATOMx provides a pre-deconflicted route out of the affected area.
- Operator/control system accepts, modifies, or executes the response.
- ATOMx tracks whether the aircraft is complying.
- Cooperative compliance does not downgrade identity trust.
- Non-compliance becomes an authorized-user investigation cue.
Direct aircraft or autopilot execution should be treated as an approved integration path, not the default assumption. OEM and aircraft integrations are critical for future automated execution but should not be required for the core connected governance model.
3. Disconnected Mode Flow
Disconnected verification is not the primary operational mode, but the architecture must support it. The full flow — capsule provisioning, RF broadcast over the Remote ID Authentication Message, local authorized verification, time-tampering mitigations, and reconciliation — is documented in Disconnected Operations. The architectural implications for the services in §1 are:
| Service | Disconnected-mode requirement |
|---|---|
| Authorization Package Service | Emit a compact, self-contained Offline Capsule alongside the manifest |
| Protected Field Encryption Service | Wrap claims with per-recipient keys (aircraft + authority field devices) |
| Conformance Engine | Run identical evaluation logic in the field-device’s Offline Verification Module (§1.12) |
| Audit and Evidence Ledger | Accept post-hoc reconciliation of signed disclosure receipts and signed flight logs |
| Public Token Service | Detect duplicate-token use across reconciled records, not just live ones |
4. API Model
4.1 API design principle
All API responses must be policy-filtered. The API should not have one universal aircraft detail response. It should return the maximum information permitted for the requesting user/system, geography, purpose, and event context.
4.2 Core API domains
- Authorization Packages
- Public Tokens
- Telemetry
- Conformance
- Trust State
- Protected Disclosure
- Security Alerts
- Restrictions and Amendments
- Audit and Evidence
- Offline Capsule Reconciliation
- Field Device Credentialing
4.3 Example response categories
Public or low-access response
- Public aircraft token
- Public trust state
- Public aircraft location or generalized location
- Broad authority class, if policy allows
- Validity indication, if policy allows
Authorized operational response
- Public aircraft token
- Permanent aircraft identity, if permitted
- Pilot/operator identity, if permitted
- Control-station location, if permitted
- Approved operation, if permitted
- Conformance status
- Reason codes
- Telemetry confidence
- Security alerts
- Revocation/amendment state
- Compliance instruction state
Disclosure response
- Requested field
- Released field value or redacted/null
- Release decision
- Purpose code
- Policy basis
- Disclosure event ID
5. Engineering Data Model Sketch
5.1 AuthorizationPackageManifest
package_idpackage_versionissuing_system_idoperation_idpublic_token_idaircraft_identity_refaircraft_assembly_cert(fingerprint)aircraft_assurance(structured:key_storage,tpm_manufacturer,pcr_verified,secure_boot,attested_at— see Aircraft Hardware Identity)operator_identity_refpilot_identity_ref(optional depending on mission model)approved_operation_refvalidity_startvalidity_endpurposeendorsements[](array of:authority_id,scope,segment,time_window,decision,signature— see Authorization Package §3)public_claims_hashprotected_claims_hashdisclosure_policy_refconformance_policy_refrevocation_policy_refoffline_capsule_ref(optional)audit_chain_refsignaturesignature_algorithmcreated_atupdated_at
5.2 PublicToken
public_token_idpackage_idtoken_valuetoken_validity_starttoken_validity_endrotation_policytoken_statustoken_binding_hashcreated_at
5.3 ProtectedClaims
protected_claims_idpackage_idencrypted_operator_identityencrypted_pilot_identityencrypted_control_station_locationencrypted_permanent_aircraft_identityencrypted_mission_detailsencrypted_approved_operation_details(if protected)encryption_policy_idkey_policy_idclaims_hashcreated_at
5.4 ApprovedOperation
approved_operation_idoperation_typeroute_geometryoperating_area_geometryaltitude_minaltitude_maxtime_window_starttime_window_endmission_volumepriority_classprotected_mission_modelocation_generalization_policydynamic_restriction_constraintsconformance_thresholdscreated_at
5.5 ConformanceEvent
conformance_event_idpackage_idpublic_token_idevent_timeingest_timeconformance_statereason_codetelemetry_source_idtelemetry_confidencegeometry_deltaaltitude_deltatime_deltacreated_at
5.6 DisclosureEvent
disclosure_event_idpackage_idrequester_identity_idrequester_organization_idrequester_device_idrequester_rolerequester_geographypurpose_coderequested_fieldsreleased_fieldsdenied_fieldspolicy_decision_idbreak_glass_flagevent_timeingest_timecreated_at
5.7 SecurityAlert
security_alert_idpackage_idpublic_token_idalert_typeseverityevidence_refstelemetry_refsaffected_tracksduplicate_token_refsstatuscreated_atresolved_at
6. Product Requirements
6.1 Core requirements
- ATOMx shall bind pilot/operator identity, aircraft identity, and approved flight plan or operating area into an authorization package.
- ATOMx shall use a signed manifest model for the authorization package.
- ATOMx shall expose an authorization-bound public aircraft token instead of permanent aircraft identity.
- ATOMx shall keep pilot/operator identity and control-station location out of the public view.
- ATOMx shall encrypt protected identity fields.
- ATOMx shall disclose protected fields only through policy-controlled access.
- ATOMx shall log all protected disclosures.
- ATOMx shall support three public trust states: Within Authorization, Not Within Authorization, and Not Publicly Verifiable.
- ATOMx shall clearly distinguish Not Publicly Verifiable from unauthorized.
- ATOMx shall maintain separate authorization, identity trust, and security alert states.
- ATOMx shall support connected conformance monitoring.
- ATOMx shall support API-first integrations into existing operational systems.
- ATOMx shall provide its own operational airspace awareness interface.
- ATOMx shall preserve a tamper-evident audit record.
- ATOMx shall support disconnected verification as an architectural path.
6.2 Disclosure requirements
- Disclosure decisions shall be based on user, role, organization, geography, purpose, time window, authority, and event context.
- Disclosure shall be field-level, not all-or-nothing.
- Pilot/operator identity and control-station location should be disclosed together when the requester has approved need-to-know access.
- Purpose code selection shall be simple and fast for emergency or field users.
- Break-glass access shall be logged, marked, scoped, and reviewed.
6.3 Conformance requirements
- ATOMx shall compare telemetry against the approved operation.
- ATOMx shall support route, operating area, altitude, time, and mission-volume conformance.
- ATOMx shall distinguish amended/revoked authorization from identity trust degradation.
- ATOMx shall track whether aircraft comply with exit, hold, land, reroute, or refile instructions.
- ATOMx shall provide reason codes to authorized users and systems.
6.4 Telemetry requirements
- ATOMx shall ingest primary telemetry from operator/control system or aircraft.
- ATOMx shall support corroborating telemetry and sensor observations.
- ATOMx shall assign telemetry confidence for authorized users.
- ATOMx shall detect stale telemetry, mismatched telemetry, duplicate public tokens, possible replay, and possible spoofing.
- Telemetry confidence shall not change the public state directly, but may change the authorized operational state.
6.5 Offline requirements
- Offline verification shall use pre-cleared authorization packages or compact offline capsules.
- Offline reveal shall require person-bound authority credential, managed device credential, and purpose code.
- Offline reveal shall be geographically scoped by default.
- Offline devices shall create signed disclosure receipts.
- Offline events shall reconcile with ATOMx when connectivity returns.
- Offline verification shall support local comparison of aircraft telemetry against signed approved operation.
7. Open Engineering Decisions
These decisions do not block the product concept but need technical design.
| Decision | Recommended Direction |
|---|---|
| Manifest encoding | Use compact signed structured object. Evaluate CBOR/COSE-style patterns for constrained environments and JSON/JWS-style patterns for APIs. |
| Protected field encryption | Use envelope encryption with KMS/HSM-backed key policy. Support field-level encryption. |
| Offline capsule size | Keep compact enough for constrained broadcast/pointer patterns. Full protected bundle should be retrievable or carried by approved device where practical. |
| Field-device credentialing | Managed device identity plus person-bound credential. Support short-lived offline grants. |
| Public token rotation | Stable per authorization, rotate across authorizations. Sensitive mission override. |
| Generalized location | Policy-driven geometry degradation by mission class and authority. |
| Revocation propagation | Connected revocation through ATOMx. Offline revocation through cached revocation lists or short validity windows. |
| Hardware-backed identity | Future stronger tier for aircraft and possibly field devices. |
| OEM integration | Not required for initial governance model. Needed for direct aircraft execution of reroute/land/hold. |
| Federation | Keep out of early product story. Architect participation requirements for future trusted issuers and data contributors. |
8. Deployment, SLOs, and Operational Concerns
8.1 Deployment Topology
ATOMx services run on managed Kubernetes in the DroneUp shared-platform foundation. Per-service responsibilities (§1) map to discrete deployments with horizontal scaling. Stateless services (Classification Engine, Conformance Engine, Trust State Engine) scale by request volume; stateful services (Audit Ledger, Authorization Package store) scale read replicas with leader-driven writes.
| Environment | Purpose | Boundary |
|---|---|---|
dev | Active development; ephemeral data | DroneUp engineering |
sandbox | Customer-evaluation, integration testing | Per-tenant isolation |
prod | Production, commercial customers | Multi-tenant with org-level isolation |
fedramp-prod | FedRAMP-authorized boundary for federal customers | Single-tenant or FedRAMP-aligned multi-tenant; ITAR posture as required |
8.2 SLOs and SLIs
Indicative targets — calibrated against early-deployment telemetry:
| Service / Operation | SLI | Target SLO |
|---|---|---|
| Authorization Package issuance | p99 latency from “all endorsements collected” to “package issued” | < 500 ms |
| Trust State resolution | p99 latency from telemetry ingest to classification published | < 1 s |
| Disclosure decision | p99 latency from authorized request to field-level response | < 750 ms |
| Audit Ledger write | Durability | 99.999999% |
| Classification stream | Availability | 99.95% |
| Authority signing | Availability during NSSE windows | 99.99% with pre-warmed capacity |
8.3 Observability
- Metrics: per-service Prometheus-compatible metrics; per-tenant cardinality budgeted to avoid blow-up
- Traces: OpenTelemetry; trace IDs propagated through Authorization Package issuance, telemetry binding, disclosure decisions
- Logs: structured JSON; correlation by
package_id,disclosure_event_id,org_id - Audit ledger: separate from operational logs; tamper-evident; never deleted, only archived
- Customer-visible health: per-tenant status dashboard; SLO compliance reports
8.4 API and Schema Versioning
- API versioning: URL-path versioned (
/v1/,/v2/); minimum 12-month deprecation window for breaking changes; partner notification via versioning portal - Schema versioning: every signed manifest carries
package_version(per-package) and a separateschema_version(manifest-format version); verifiers MUST handle olderschema_versionvalues for the deprecation window - Event-stream versioning: schema-registry-backed; consumers subscribe to a specific version range; broadcasts include schema URI
8.5 Multi-Tenancy Isolation
Operator orgs and Authority orgs are isolated at the data layer:
- Per-tenant logical schema; queries filtered by
org_id - Per-tenant signing keys for authority endorsements (HSM partition per authority)
- Per-tenant audit-ledger partition; cross-tenant queries require explicit access grant
- Operator org cannot enumerate other operators; authority org cannot enumerate flights outside its jurisdiction
8.6 Disaster Recovery
- Audit ledger replicated across regions with synchronous primary + async secondary
- Configuration-as-code allows rebuild of services from a known-good state in hours
- HSM keys held in dual-region custody; ceremony-witnessed migration available
- Annual DR exercise validates rebuild time
9. Recommended MVP Boundary
The most logical first implementation should focus on connected operations and API/UI disclosure. Offline should be designed into the model but not made the critical path.
MVP should include:
- Authorization package manifest
- Public token service
- Protected claims object
- Basic encryption and brokered disclosure
- Public trust state
- Authorized operational state
- Connected conformance engine
- Primary telemetry ingest
- Basic telemetry confidence
- Disclosure policy engine
- Disclosure audit logs
- API-first feed
- Operational airspace awareness interface
- Revocation/amendment state model
MVP should not require:
- Direct aircraft command
- Autopilot integration
- Hardware-backed aircraft identity
- Full offline reveal
- Multi-party recipient-side encryption for every COP integration
- Broad federation with external issuers
- Public consumer app
- Full standards compliance claim
10. Target Architecture Summary
ATOMx should be implemented as a policy-controlled trust broker for low-altitude airspace.
The architecture centers on a signed Authorization Package Manifest that binds aircraft, pilot/operator, approved operation, public token, protected claims, conformance policy, disclosure policy, and audit references.
In connected mode, ATOMx is authoritative for conformance and protected disclosure. It compares telemetry against the approved operation, produces public and authorized trust states, and releases protected fields only after policy approval.
In disconnected mode, approved local verifiers can use pre-cleared packages, scoped credentials, and managed devices to validate permitted details locally, then reconcile disclosure and telemetry records once connectivity returns.
This creates the internal implementation foundation for the customer-facing promise: ATOMx reduces unnecessary public exposure of pilot/operator identity and control-station location while increasing the operational value of the identity signal. It moves the system from public identity broadcast to authorization-bound cooperative trust.
11. Bottom Line for Product and Engineering
Build ATOMx around the authorization package, not around Remote ID.
Remote ID becomes one possible transport or compatibility surface. The product is the trust layer that binds identity, aircraft, approved operation, telemetry, conformance, disclosure, and audit into one operational system.
The near-term implementation should be connected, API-first, policy-controlled, and auditable. The architecture should preserve a path to disconnected verification, stronger aircraft identity, and approved OEM integrations without making those dependencies required for the initial product.
Implementation Readiness — Open Questions
Each entry below identifies a decision not yet locked. Items marked (ADR) should be formalized as an Architecture Decision Record before implementation begins. Items marked (blocking) must be resolved before the relevant feature can be built.
| # | Question | Owner | ADR? | Blocking? |
|---|---|---|---|---|
| 1 | Confirm the 12-service boundary set in §1 — several responsibilities overlap (e.g. Conformance vs. Telemetry Ingest, Disclosure vs. Audit Ledger). Lock the canonical service list and ownership before any repo scaffolding. | Engineering | Yes — “ATOMx Service Topology” | Yes |
| 2 | Primary OLTP database: Cloud SQL Postgres vs. Spanner. Spanner gives multi-region strong consistency for authorization state; Postgres is cheaper and more familiar. | Engineering + SRE | Yes — “ATOMx Primary Datastore” | Yes |
| 3 | Audit ledger backing technology: append-only Postgres + hash chain, Merkle DAG on object storage, or a managed immutable ledger (e.g. QLDB-equivalent). Affects tamper-evidence guarantees and FedRAMP story. | Engineering + Security | Yes — “Audit Ledger Storage and Tamper Evidence” | Yes |
| 4 | Event-stream backbone: GCP Pub/Sub (managed, at-least-once, our stack default) vs. Kafka (ordering, replay, higher op cost). Drives telemetry ingest and disclosure-event fan-out design. | Engineering + SRE | Yes — “Event Backbone for ATOMx” | Yes |
| 5 | API design language: OpenAPI 3.1 only, or also GraphQL for partner-facing read APIs? Locks SDK generation, gateway selection, and contract-test tooling. | Engineering + Product | Yes — “External API Surface” | No |
| 6 | Service-to-service auth: mTLS via service mesh vs. signed JWT via Okta workload identity. User-facing OAuth on Okta appears assumed but not locked. | Security + Engineering | Yes — “ATOMx AuthN/AuthZ Model” | Yes |
| 7 | Tenancy isolation strength: logical (shared cluster + row-level tenancy) vs. physical (per-tenant namespaces or projects) for government / FedRAMP tenants. | Security + SRE | Yes — “Tenancy Isolation Model” | Yes |
| 8 | FedRAMP boundary scope and which GCP services are in-boundary (Assured Workloads region, KMS, logging sinks). Determines acceptable managed services for every other ADR. | Security | Yes — “FedRAMP Boundary and Authorized Services” | Yes |
| 9 | Deployment region strategy: single region + DR vs. active-active multi-region. Drives Spanner/Postgres choice, Pub/Sub config, and RPO/RTO targets. | SRE | Yes — “ATOMx Region and DR Topology” | No |
| 10 | SLO ownership and error-budget burn process — who owns availability/latency SLOs per service, and what triggers a release freeze. | SRE + Engineering | No (runbook) | No |
| 11 | IaC tooling — confirm Terraform via Terraform Cloud is the sole provisioning path; clarify Helm-chart vs. Config-Connector split for in-cluster resources. | SRE | No (standards already exist) | No |
| 12 | CI/CD constraints for regulated tenants: signed artifacts, SLSA level, deploy-from-trunk-only, separation-of-duties on prod promotion. | SRE + Security | Yes — “Regulated CI/CD Pipeline Controls” | No |
| 13 | Observability vendor: stay on current stack (Cloud Logging + Cloud Monitoring + Tempo/Grafana?) or adopt a unified vendor (Datadog/Honeycomb). Affects FedRAMP boundary and per-tenant log isolation. | SRE | Yes — “Observability Stack” | No |
| 14 | Disconnected-mode key material: how scoped, short-lived credentials are issued to managed verifier devices, and how reconciliation events are signed on return-to-online. | Security + Engineering | Yes — “Disconnected Verifier Credentialing and Reconciliation” | Yes (for §3 work) |