security
Intended Documentation
Enforcement Lineage
Prove enforcement lineage — every authorization decision can be traced from policy through evaluation to token and enforcement.
Enforcement Lineage#
Every authorization decision in Intended produces a cryptographically verifiable chain from policy definition through evaluation to token issuance and enforcement. This lineage guarantees that no decision exists without a traceable origin, and no enforcement occurs without a recorded evaluation.
Why Lineage Matters#
Enterprise AI execution demands more than access control. Regulators, auditors, and security teams need to answer a single question: why was this action permitted?
Enforcement lineage provides that answer by linking four stages into an unbroken chain:
- Policy — the rule that governs the decision
- Evaluation — the runtime assessment against that rule
- Decision token — the cryptographic artifact encoding the outcome
- Enforcement — the point where the decision was applied
Info
Enforcement lineage is immutable once recorded. The chain cannot be modified after the fact, which makes it suitable for regulatory audits and compliance reporting.
The Lineage Chain#
Stage 1: Policy Origin#
Every decision traces back to a specific policy version. Policies are versioned and immutable once activated, so the exact rule set that governed a decision is always recoverable.
The policy_hash is a content-addressable hash of the policy definition at the version that was active during evaluation. This prevents retroactive policy modification from invalidating audit trails.
Stage 2: Evaluation Record#
When an intent is submitted, the policy engine evaluates it against all applicable policies and produces an evaluation record.
The evaluation record captures the full input context so the decision can be replayed deterministically against the same policy version.
Stage 3: Decision Token#
The evaluation result is encoded into a signed decision token — a short-lived, cryptographically verifiable artifact that carries the authorization outcome.
Warning
Decision tokens are intentionally short-lived (default: 5 minutes). A token that outlives its TTL is rejected at enforcement, even if the signature is valid. This limits the blast radius of token exfiltration.
Stage 4: Enforcement Point#
The enforcement point validates the decision token before permitting the action. It records:
- Token signature verification result
- TTL validity at enforcement time
- The specific action that was gated
- Whether enforcement succeeded or was denied
Querying Lineage#
You can traverse the lineage chain in either direction using the Audit API.
Forward trace (policy to enforcement)#
Start from a policy and find all enforcement actions it authorized:
Reverse trace (enforcement to policy)#
Start from an enforcement event and walk back to the originating policy:
The response includes all four stages with their timestamps and identifiers.
Lineage Integrity Verification#
Intended provides a built-in verification command to validate that a lineage chain is intact:
This command checks:
- The policy hash matches the recorded version
- The evaluation references the correct policy
- The decision token was signed by the evaluation service
- The enforcement point validated the token before the TTL expired
Danger
A broken lineage chain indicates either a system fault or a potential tampering attempt. Broken chains trigger an automatic alert to the tenant's security contact.
Retention and Export#
Lineage records follow the tenant's configured retention policy. By default, records are retained for 90 days. For compliance use cases, you can configure extended retention or continuous export to an external SIEM.
See Audit API for export endpoint details.
Related Resources#
- Fail-Closed Controls — what happens when lineage cannot be established
- Trust Model — the security foundation that lineage builds on
- Audit API — query and export lineage records programmatically