-
Notifications
You must be signed in to change notification settings - Fork 1
docs: add COGSEC-HUMAN-SIM-001 guardrail and human-simulation redress lane #22284
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Changes from all commits
File filter
Filter by extension
Conversations
Jump to
Diff view
Diff view
There are no files selected for viewing
| Original file line number | Diff line number | Diff line change |
|---|---|---|
| @@ -0,0 +1,75 @@ | ||
| # Cognitive Security Human Simulation Guardrail | ||
| # Governs collection and model-building activities involving identifiable persons. | ||
|
|
||
| policy_id: COGSEC-HUMAN-SIM-001 | ||
| status: active | ||
| owner: governance | ||
| last_reviewed: "2026-03-31" | ||
|
|
||
| scope: | ||
| applies_to: | ||
| - osint_connectors | ||
| - ingestion_pipelines | ||
| - model_training_jobs | ||
| - agentic_persona_tools | ||
|
|
||
| prohibited: | ||
| - id: no_persona_clone_without_authority | ||
| rule: "deny" | ||
| when: | ||
| target_type: identifiable_person | ||
| activity: | ||
| - persona_simulation | ||
| - predictive_vote_or_behavior_model | ||
|
Contributor
There was a problem hiding this comment. Choose a reason for hiding this commentThe reason will be displayed to describe this comment to others. Learn more. Splitting combined activity types into separate list items ensures that the policy engine can match against individual activity tags accurately. Using a single string like - predictive_vote
- behavior_model |
||
| authority_basis: | ||
| not_in: | ||
| - statutory_authority | ||
| - explicit_written_consent | ||
| rationale: "Do not build human digital twins from public traces without legal authority or consent." | ||
|
|
||
| - id: no_unbounded_public_record_scrape | ||
| rule: "deny" | ||
| when: | ||
| collection_mode: scrape | ||
| evidence_budget: | ||
| missing: true | ||
|
Comment on lines
+34
to
+35
There was a problem hiding this comment. Choose a reason for hiding this commentThe reason will be displayed to describe this comment to others. Learn more.
The Useful? React with 👍 / 👎. |
||
| rationale: "All human-targeted collection requires bounded scope and explicit evidence budget." | ||
|
|
||
| required_controls: | ||
| - id: require_case_binding | ||
| rule: "allow_only_if" | ||
| condition: | ||
| case_id: present | ||
| lawful_purpose: present | ||
| retention_policy_id: present | ||
|
Comment on lines
+42
to
+44
Contributor
There was a problem hiding this comment. Choose a reason for hiding this commentThe reason will be displayed to describe this comment to others. Learn more. The use of case_id: { missing: false }
lawful_purpose: { missing: false }
retention_policy_id: { missing: false } |
||
|
|
||
| - id: require_human_oversight | ||
| rule: "allow_only_if" | ||
| condition: | ||
| reviewer_role: governance_agent_or_human_dri | ||
|
Contributor
There was a problem hiding this comment. Choose a reason for hiding this commentThe reason will be displayed to describe this comment to others. Learn more. If the intention is to allow either the reviewer_role:
- governance_agent
- human_dri |
||
| review_outcome: approved | ||
|
Comment on lines
+49
to
+50
There was a problem hiding this comment. Choose a reason for hiding this commentThe reason will be displayed to describe this comment to others. Learn more.
Useful? React with 👍 / 👎. |
||
|
|
||
| - id: require_observability | ||
| rule: "allow_only_if" | ||
| condition: | ||
| audit_log_fields: | ||
| - case_id | ||
| - prompt_hash | ||
| - policy_version | ||
| - decision_trace_id | ||
|
|
||
| governed_exception: | ||
| allowed: true | ||
| process: "Document in DecisionLedger + legal sign-off before execution." | ||
| expiry_days: 30 | ||
|
|
||
| rollback: | ||
| trigger: | ||
| - policy_violation_detected | ||
| - missing_case_binding | ||
| - consent_revoked | ||
| actions: | ||
| - suspend_collection_job | ||
| - quarantine_artifacts | ||
| - open_redress_ticket | ||
| - notify_governance | ||
| Original file line number | Diff line number | Diff line change | ||||
|---|---|---|---|---|---|---|
|
|
@@ -22,3 +22,13 @@ Applies to any automated or manual action that results in: | |||||
|
|
||||||
| ## 4. Logging | ||||||
| All appeals and outcomes must be logged in the `Governance Evidence Pack` (`EVD-COGSEC-GOV-001`). | ||||||
|
|
||||||
|
|
||||||
| ## 5. Human Simulation Appeals (COGSEC-HUMAN-SIM-001) | ||||||
| If a person asserts the platform built or used a behavioral/persona simulation without authority: | ||||||
| 1. **Immediate Freeze**: Suspend the associated collection/model job within 24 hours. | ||||||
|
Contributor
There was a problem hiding this comment. Choose a reason for hiding this commentThe reason will be displayed to describe this comment to others. Learn more. There is a contradiction between the term Immediate Freeze and the within 24 hours timeframe. For cognitive security incidents involving unauthorized human simulation, a 24-hour window may be too long for a response labeled as 'immediate'. Consider shortening this timeframe to reflect the urgency of the redress path.
Suggested change
|
||||||
| 2. **Authority Check**: Verify statutory authority or explicit written consent tied to the case. | ||||||
| 3. **Artifact Quarantine**: Move related datasets/models into quarantine pending review. | ||||||
| 4. **Outcome**: | ||||||
| * **Authorized**: Reinstate only with Governance sign-off and updated evidence trail. | ||||||
| * **Unauthorized**: Delete artifacts, record a DecisionLedger entry, and issue written remediation. | ||||||
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
This policy is declared
active, but the cogsec gate script (ci/scripts/cogsec_rights_gate.py) only requires the older four governance files and does not reference this new guardrail, so CI will not fail if it is removed or bypassed. That leaves COGSEC-HUMAN-SIM-001 as a non-enforced artifact rather than a guaranteed control. Add it to required policy checks or a runtime loader assertion.Useful? React with 👍 / 👎.