Governance

Governance Framework

The NEPA governance framework defines the structural controls that ensure inspection outputs are attributable, reproducible, and defensible. This documentation is intended for regulatory reviewers, compliance stakeholders, and enterprise procurement teams conducting technical due diligence.

01 — Inspection Run Version Control

Inspection Run Version Control

Every inspection run is assigned a unique, immutable run identifier that binds together all components of the system state at the time of execution. This binding is cryptographic and cannot be modified after the run is initiated.

  • 01Run ID Generation — a unique run identifier is generated at initialisation, incorporating timestamp, engine version, and configuration hash
  • 02Engine Version Binding — the SHA-256 fingerprint of the deployed binary is recorded in the run manifest before the first frame is processed
  • 03Configuration Contract Binding — the versioned configuration contract is hashed and locked; no parameter modification is possible after binding
  • 04Operator Authentication Record — the authenticated operator identity is bound to the run manifest via signed token
  • 05Hardware Attestation — the inspection node's hardware identity and sensor calibration certificates are recorded in the run manifest
# Run Manifest — Sealed
run_id: "nepa-2026-03-17-HK"
engine_version: "2.4.1"
engine_sha: "a7f3c8d4..."
config_contract: "v2.4.1-stable"
config_hash: "e2b9f1c3..."
operator_token: "SIGNED"
manifest_seal: IMMUTABLE

Configuration Immutability

The analytical configuration governing each inspection run is sealed at run-start and cannot be modified during execution. This property is enforced at the architecture level, not by access controls.

Pre-Run Parameter Locking

All analytical parameters — detection thresholds, lane weights, fusion coefficients, and confidence bounds — are hashed and sealed before the first frame enters the pipeline.

Immutability Enforcement

Parameter modification after run-start is architecturally prevented. Any attempt to alter parameters mid-run is logged as a critical governance violation and terminates the run.

Configuration Versioning

Every configuration contract is stored under a versioned identifier. The full history of configuration changes is maintained with structured diffs and approval records.

03 — Audit Logging Structure

Audit Logging Structure

The NEPA audit log is an append-only, hash-linked record of all system events from run initialisation to evidence archival. It is designed to support independent forensic analysis without requiring access to internal tooling.

The audit log is designed to be self-describing. An authorised third-party auditor with access to the log, the run manifest, and the replay package has sufficient information to independently validate any finding without further access to internal systems.

Evidence Retention Model

All inspection evidence is retained in a structured, queryable archive with defined retention periods, access controls, and integrity verification schedules.

Evidence TypeRetention PeriodIntegrity CheckAuditor Access
Raw Sensor FramesOriginal camera, LiDAR, thermal data7 yearsWeekly SHA-256 verificationAvailable
Processed Spike RepresentationsNeuromorphic encoded data7 yearsWeekly SHA-256 verificationAvailable
Inspection FindingsDerived defect records with confidence scoresIndefiniteDaily integrity scanAvailable
Audit Chain LogsComplete event logs with hash linkageIndefiniteContinuous chain validationAvailable
Configuration ContractsVersioned analytical parameter recordsIndefiniteOn-access hash verificationAvailable
Replay Attestation PackagesThird-party auditor evidence packages10 yearsOn-generation signingAvailable
05 — Change Management Discipline

Change Management Discipline

All changes to the NEPA platform — including engine updates, configuration modifications, and infrastructure changes — follow a structured change management process designed to maintain the integrity of the audit and evidence systems.

ControlStatus
Determinism Policy DocumentationActive
Change Control ProcessActive
Parameter Locking EnforcementActive
Fault Injection Test SuiteActive
Readiness Matrix ReviewIn Progress
Third-Party Audit ProgramAvailable on Request

Governance Documentation Available

Full governance documentation packages are available for regulatory reviewers and enterprise procurement teams upon formal request.

Request Documentation Technical Architecture