Skip to content

Pack Governance & Approval Process

Version: 1.0.0 Last Updated: 2025-10-01 Owner: Compliance & Platform Governance Team Classification: Internal


Purpose

This document establishes the governance framework for RulePacks and WorkflowPacks in the CORTX Platform, including approval workflows, versioning policies, certification tiers, and quality standards.


Governance Principles

1. Quality Over Speed

  • Thoroughly tested packs prevent downstream issues
  • Quality gates cannot be bypassed
  • Technical debt is addressed proactively

2. Compliance First

  • All packs must align with regulatory requirements
  • Compliance officer review is mandatory for regulated industries
  • Audit trails for all changes

3. Transparency

  • All pack changes are publicly visible in Git
  • Review feedback is documented
  • Rejection reasons are clear and actionable

4. Community Collaboration

  • Pack authors can be internal or external
  • Community feedback drives improvements
  • Knowledge sharing through documentation

Pack Lifecycle

┌──────────┐
│  Draft   │  Author creates pack
└────┬─────┘
     │
     ▼
┌──────────┐
│  Review  │  Business analyst reviews
└────┬─────┘
     │
     ▼
┌──────────┐
│Compliance│  Compliance officer certifies
└────┬─────┘
     │
     ▼
┌──────────┐
│  Testing │  QA validates with test data
└────┬─────┘
     │
     ▼
┌──────────┐
│ Approval │  Admin approves for deployment
└────┬─────┘
     │
     ▼
┌──────────┐
│Deployment│  Pushed to production registry
└────┬─────┘
     │
     ▼
┌──────────┐
│ Active   │  Available for use
└──────────┘

Approval Workflow

Stage 1: Draft

Owner: Pack Author

Activities: - Create pack (RulePack JSON or WorkflowPack YAML) - Write documentation (README, USAGE, CHANGELOG) - Create test cases - Validate against schema

Quality Gates: - [ ] Schema validation passes - [ ] Basic test cases exist - [ ] Documentation complete

Transition: Submit for review via Pull Request


Stage 2: Business Review

Owner: Business Analyst / Functional Lead

Activities: - Review functional correctness - Validate business rules align with requirements - Check error messages are clear and actionable - Verify test coverage is adequate

Quality Gates: - [ ] Business requirements met - [ ] Rules/steps logically correct - [ ] Error messages user-friendly - [ ] Edge cases handled

Duration: 2-3 business days

Outcomes: - Approved: Move to compliance review - Needs Changes: Return to author with feedback - Rejected: Close PR with explanation


Stage 3: Compliance Review

Owner: Compliance Officer

Activities: - Verify regulatory alignment - Check compliance tags are accurate - Validate control mappings (NIST, HIPAA, etc.) - Ensure audit trail requirements met

Quality Gates: - [ ] Compliance frameworks correctly tagged - [ ] Control references accurate - [ ] Regulatory requirements satisfied - [ ] Audit logging adequate

Duration: 3-5 business days

Outcomes: - Certified: Move to testing - Conditional Approval: Minor changes required - Rejected: Non-compliant, return to author


Stage 4: Testing

Owner: QA Lead

Activities: - Execute test cases - Performance testing (RulePacks: 1M records <30s) - Security scanning (no code injection, secrets) - Integration testing with platform

Quality Gates: - [ ] All test cases pass - [ ] Performance benchmarks met - [ ] No security vulnerabilities - [ ] Integration tests successful

Duration: 3-5 business days

Outcomes: - Passed: Move to final approval - Failed: Return to author with test results


Stage 5: Final Approval

Owner: Platform Admin

Activities: - Review all prior approvals - Verify pack metadata - Check versioning is correct - Approve deployment

Quality Gates: - [ ] All prior stages approved - [ ] Version number correct - [ ] Deployment plan documented - [ ] Rollback plan exists

Duration: 1-2 business days

Outcomes: - Approved: Deploy to production - Rejected: Rare; address final concerns


Stage 6: Deployment

Owner: DevOps / Platform Team

Activities: - Tag release in Git - Deploy to production registry - Update documentation - Notify stakeholders

Quality Gates: - [ ] Git tag created - [ ] Production registry updated - [ ] Documentation published - [ ] Announcement sent


Stage 7: Active

Owner: Pack Maintainers

Ongoing Activities: - Monitor pack usage - Address bug reports - Plan future enhancements - Deprecate when obsolete


Versioning Policy

Semantic Versioning

Format: MAJOR.MINOR.PATCH

MAJOR Version (X.0.0): - Breaking changes to pack structure - Rule operator changes - Workflow step type changes - Requires re-certification

MINOR Version (x.Y.0): - Backward-compatible additions - New rules or workflow steps - Optional field additions - Standard review process

PATCH Version (x.y.Z): - Bug fixes - Error message improvements - Documentation updates - Fast-track approval

Examples:

1.0.0 → 1.0.1: Fixed typo in error message (PATCH)
1.0.1 → 1.1.0: Added 5 new rules (MINOR)
1.1.0 → 2.0.0: Changed rule operator from '==' to 'matches' (MAJOR)

Version Compatibility

Backward Compatibility: - MINOR and PATCH versions must be backward compatible - Existing integrations must not break - Default behavior unchanged

Breaking Changes: - Require MAJOR version bump - Documented in CHANGELOG - Migration guide provided - Deprecation notice (if replacing older pack)

Deprecation Policy

Deprecation Timeline: 1. Announce: Deprecation notice 90 days before removal 2. Mark: Tag pack as deprecated in metadata 3. Migrate: Provide migration guide to newer version 4. Remove: After 90 days, remove from active registry

Example:

{
  "metadata": {
    "pack_id": "legacy-gtas-v1",
    "version": "1.0.0",
    "deprecated": true,
    "deprecated_at": "2025-10-01",
    "replacement": "federal-gtas-v2",
    "deprecation_reason": "Replaced by v2 with enhanced validation"
  }
}

Certification Tiers

Tier 1: Official Packs

Definition: Created and maintained by regulatory authorities or Sinergy Solutions

Criteria: - Source: Treasury, IRS, CMS, Sinergy platform team - Funding: Government contracts or platform core - Pricing: Free (publicly funded) - Support: Official support SLA

Examples: - federal-gtas-v1: Treasury-verified GTAS rules - hipaa-security-v1: Official HIPAA compliance pack - nist-800-53-ac: NIST access control mapping

Badge: ✅ Official


Tier 2: Certified Packs

Definition: Community-created packs that passed rigorous certification

Criteria: - Source: Third-party developers, consultancies - Testing: Comprehensive test suite (>90% coverage) - Review: Passed all governance stages - Support: Author provides support - Pricing: Author-defined (70/30 revenue split)

Certification Requirements: - [ ] All test cases pass - [ ] Documentation complete (README, USAGE, CHANGELOG) - [ ] Compliance review passed - [ ] Security scan clean - [ ] Performance benchmarks met - [ ] Author support commitment (email, SLA)

Examples: - healthcare-claims-verification-v1: Third-party healthcare pack - realestate-title-search-v1: Certified title verification

Badge: 🏆 Certified


Tier 3: Community Packs

Definition: User-contributed packs, not certified

Criteria: - Source: Any community member - Testing: Basic schema validation - Review: Automated checks only - Support: Best-effort by author - Pricing: Author-defined (70/30 split)

Requirements: - [ ] Schema validation passes - [ ] Basic test cases exist - [ ] No critical security issues - [ ] Documentation present

Examples: - custom-agency-workflow-v1: Agency-specific workflow - experimental-ml-validation-v1: Experimental features

Badge: 🧪 Community


Tier 4: Private Packs

Definition: Enterprise or agency-specific packs (not in public marketplace)

Criteria: - Source: Enterprise customer or agency - Visibility: Private to tenant/agency - Pricing: Enterprise license - Support: Dedicated account team

Use Cases: - Proprietary business logic - Sensitive compliance rules - Custom integrations - Trade secrets

Badge: 🔒 Private


Quality Standards

RulePack Quality Standards

Schema Compliance: - [ ] Valid JSON format - [ ] Matches RulePack JSON Schema - [ ] All required fields present

Rule Quality: - [ ] Unique rule IDs - [ ] Clear, actionable error messages - [ ] Appropriate severity levels (FATAL/WARNING/INFO) - [ ] Compliance references included - [ ] Safe operators only (no code injection)

Testing: - [ ] Minimum 10 test cases per pack - [ ] Edge cases covered (null, empty, special chars) - [ ] Performance tested (1M records <30s) - [ ] All test cases pass

Documentation: - [ ] README with overview and use cases - [ ] USAGE guide with examples - [ ] CHANGELOG with version history


WorkflowPack Quality Standards

Schema Compliance: - [ ] Valid YAML format - [ ] Matches WorkflowPack schema - [ ] All required fields present

Workflow Quality: - [ ] Unique step IDs - [ ] Logical step ordering - [ ] Error handling defined - [ ] Compensation logic (for sagas) - [ ] Environment variables for secrets

Testing: - [ ] Simulation tests pass - [ ] Integration tests pass (dev environment) - [ ] Error scenarios tested - [ ] Performance benchmarks met

Documentation: - [ ] README with workflow description - [ ] Step-by-step USAGE guide - [ ] Architecture diagram (for complex workflows) - [ ] CHANGELOG with version history


Review Guidelines

For Business Analysts

Focus Areas: - Functional correctness - Business rule accuracy - User experience (error messages) - Test coverage completeness

Checklist: - [ ] Business requirements documented - [ ] Rules/steps match specifications - [ ] Error messages are clear - [ ] Edge cases identified and handled - [ ] Test cases validate requirements

Approval Criteria: - All checklist items satisfied - No critical functional issues - Author responsive to feedback


For Compliance Officers

Focus Areas: - Regulatory alignment - Compliance tagging accuracy - Control mapping correctness - Audit trail adequacy

Checklist: - [ ] Compliance frameworks correctly identified - [ ] Control references accurate (NIST, HIPAA, etc.) - [ ] Regulatory requirements satisfied - [ ] Audit logging implemented - [ ] Data privacy considerations addressed

Approval Criteria: - Compliance requirements met - No regulatory risks - Adequate documentation


For QA Leads

Focus Areas: - Test coverage - Performance - Security - Integration

Checklist: - [ ] All test cases pass - [ ] Code coverage >80% - [ ] Performance benchmarks met - [ ] No security vulnerabilities - [ ] Integration tests successful

Approval Criteria: - All tests pass - No critical issues - Performance acceptable


Marketplace Governance

Submission Process

1. Prepare Pack: - Complete all documentation - Add examples and test cases - Ensure quality standards met

2. Submit for Review:

cortx marketplace submit <pack-id> \
  --tier certified \
  --category compliance \
  --pricing free

3. Automated Checks: - Schema validation - Security scanning - Test execution - Documentation completeness

4. Human Review: - Compliance certification (if applicable) - Quality review - Pricing review

5. Approval/Rejection: - Approved: Published to marketplace - Rejected: Feedback provided, resubmit allowed


Revenue Model

Certified Packs (Paid): - Author: 70% of revenue - Platform: 30% of revenue

Free Packs: - No revenue (official or free certified packs)

Private Packs: - Enterprise licensing (custom pricing)

Payment Schedule: - Monthly payouts for authors - Minimum payout threshold: $100 - Payment via Stripe, PayPal, or ACH


Monitoring & Metrics

Pack Health Metrics

Usage: - Downloads per month - Active installations - Execution count - Error rate

Quality: - User ratings (1-5 stars) - Bug reports - Support tickets - Test pass rate

Performance: - Average execution time - p95/p99 latency - Resource consumption

Dashboards

Pack Author Dashboard: - Usage analytics - Revenue tracking (if paid) - User feedback - Issue tracker

Platform Dashboard: - Total packs by tier - Certification pipeline status - Quality metrics across all packs - Security vulnerability trends


Incident Response

Security Vulnerability

Process: 1. Report: User or security scan detects vulnerability 2. Triage: Security team assesses severity 3. Notify: Author notified within 24 hours 4. Fix: Author provides patch within SLA 5. Redeploy: Patched version deployed 6. Communicate: Users notified of update

SLA: - Critical: 24-hour patch - High: 3-day patch - Medium: 7-day patch - Low: 30-day patch


Pack Failure

Process: 1. Detect: Monitoring alerts on high error rate 2. Investigate: Root cause analysis 3. Mitigate: Rollback or hotfix 4. Communicate: Users notified 5. Postmortem: Document lessons learned


Appeals Process

If Pack Rejected: 1. Review rejection reason 2. Address feedback 3. Resubmit with changes documented 4. Escalate to governance committee (if disagreement)

Governance Committee: - Platform architect - Compliance officer - QA lead - Product manager


Contact

Pack Governance Team: - Email: pack-governance@sinergysolutions.ai - Slack: #pack-governance - Office Hours: Fridays 1-2 PM ET


Document Control - Version: 1.0.0 - Last Updated: 2025-10-01 - Review Cycle: Quarterly - Next Review: 2026-01-01 - Approvers: Compliance & Platform Governance Team