# KMS & Key Management Guild Charter ## Mission Provide key management abstractions and drivers (file, cloud KMS, HSM, FIDO2) for signing and verification workflows. ## Scope - Key store interfaces, secure configuration loading, and audit logging. - Drivers for file-based development keys, cloud KMS providers, PKCS#11 HSMs, and FIDO2 devices. - Key rotation, revocation, and attestation for keys used in signing. ## Definition of Done - KMS API supports signing, verification, key metadata, rotation, and revocation. - Drivers pass integration tests and security review. - CLI/Console can manage keys using these abstractions. ## Required Reading - `docs/modules/platform/architecture-overview.md` ## Working Agreement - 1. Update task status to `DOING`/`DONE` in both correspoding sprint file `/docs/implplan/SPRINT_*.md` and the local `TASKS.md` when you start or finish work. - 2. Review this charter and the Required Reading documents before coding; confirm prerequisites are met. - 3. Keep changes deterministic (stable ordering, timestamps, hashes) and align with offline/air-gap expectations. - 4. Coordinate doc updates, tests, and cross-guild communication whenever contracts or workflows change. - 5. Revert to `TODO` if you pause the task without shipping changes; leave notes in commit/PR descriptions for context.