Governance and Approvals
ByteOr enforces policy-gated governance for production deployments and replay execution. This page explains the governance model, how approvals work, and what the platform verifies.
Governance Model
Governance in ByteOr is environment-scoped. Each environment defines its posture:
- Which actions require approval
- What capabilities must be covered
- Whether dry-run replay is allowed without approval
- Whether execute-mode replay requires elevated coverage
The governance model is not a single global policy. It is a per-environment decision that the platform enforces consistently.
Approval Credentials
Approvals are cryptographic credentials that bind:
- A spec hash — the exact pipeline version being approved
- An environment — the target deployment or replay environment
- A scope — the set of capabilities being authorized
- An expiry — time-limited validity
- A signing key — verified against known key sets
Verification Rules
The platform rejects approval credentials when:
- The signing key is unknown
- The signature is invalid
- The approval does not match the spec hash
- The approval targets the wrong environment
- The credential has expired
- The capabilities are insufficient
These verification paths are release-blocking test coverage.
Deployment Approvals
Before approving a deployment, verify:
- The pipeline version is the expected canonical build
- The config bundle matches the intended environment
- The deployment target environment is correct
- The approval scope covers the deployment action
Replay Approvals
Execute-mode replay reuses deployment-style approval checks. Reviewers should confirm:
- The source artifact came from the expected environment
- The resolved pipeline version matches the incident spec hash
- The approval scope is valid for replay execution
Dry-run replay can be used for investigation without execute privileges.
Audit Trails
Every approval-sensitive action creates audit records answering:
- Who initiated the action
- What environment and project were affected
- Whether approval was required
- Which approval was provided
- Which capabilities were required
Audit records are immutable once written. Missing audit trails for approval-sensitive actions are treated as product defects.
Operational Guidance
- Prefer short-lived approvals over broad standing coverage
- Use dry-run replay first when investigating incidents
- Verify the spec hash and environment before requesting approval
- Review audit records after high-risk actions