Restructure solution layout by module
This commit is contained in:
14
src/__Libraries/StellaOps.Cryptography.Kms/AGENTS.md
Normal file
14
src/__Libraries/StellaOps.Cryptography.Kms/AGENTS.md
Normal file
@@ -0,0 +1,14 @@
|
||||
# KMS & Key Management Guild Charter
|
||||
|
||||
## Mission
|
||||
Provide key management abstractions and drivers (file, cloud KMS, HSM, FIDO2) for signing and verification workflows.
|
||||
|
||||
## Scope
|
||||
- Key store interfaces, secure configuration loading, and audit logging.
|
||||
- Drivers for file-based development keys, cloud KMS providers, PKCS#11 HSMs, and FIDO2 devices.
|
||||
- Key rotation, revocation, and attestation for keys used in signing.
|
||||
|
||||
## Definition of Done
|
||||
- KMS API supports signing, verification, key metadata, rotation, and revocation.
|
||||
- Drivers pass integration tests and security review.
|
||||
- CLI/Console can manage keys using these abstractions.
|
||||
13
src/__Libraries/StellaOps.Cryptography.Kms/TASKS.md
Normal file
13
src/__Libraries/StellaOps.Cryptography.Kms/TASKS.md
Normal file
@@ -0,0 +1,13 @@
|
||||
# KMS Task Board — Epic 19: Attestor Console
|
||||
|
||||
## Sprint 72 – Abstractions & File Driver
|
||||
| ID | Status | Owner(s) | Depends on | Description | Exit Criteria |
|
||||
|----|--------|----------|------------|-------------|---------------|
|
||||
| KMS-72-001 | TODO | KMS Guild | — | Implement KMS interface (sign, verify, metadata, rotate, revoke) and file-based key driver with encrypted at-rest storage. | Interface + file driver operational; unit tests cover sign/verify/rotation; lint passes. |
|
||||
| KMS-72-002 | TODO | KMS Guild | KMS-72-001 | Add CLI support for importing/exporting file-based keys with password protection. | CLI commands functional; docs updated; integration tests pass. |
|
||||
|
||||
## Sprint 73 – Cloud & HSM Integration
|
||||
| ID | Status | Owner(s) | Depends on | Description | Exit Criteria |
|
||||
|----|--------|----------|------------|-------------|---------------|
|
||||
| KMS-73-001 | TODO | KMS Guild | KMS-72-001 | Add cloud KMS driver (e.g., AWS KMS, GCP KMS) with signing and key metadata retrieval. | Cloud driver tested with mock; configuration documented; security review sign-off. |
|
||||
| KMS-73-002 | TODO | KMS Guild | KMS-72-001 | Implement PKCS#11/HSM driver plus FIDO2 signing support for high assurance workflows. | HSM/FIDO2 drivers tested with hardware stubs; error handling documented. |
|
||||
Reference in New Issue
Block a user