Continuity Chains & Enforcement Receipts
A continuity chain is a hash-linked sequence of enforcement receipts that forms a tamper-evident history. Each enforcement receipt records a governance decision, links to the previous receipt, and is signed by the enforcement boundary.
- ■Creates tamper-evident audit trail for governance actions
- ■Enables offline chain-of-custody validation
- ■Supports forensic reconstruction after incidents
What is a continuity chain?
A continuity chain is an append-only sequence of receipts where each receipt contains the hash of the previous receipt. This creates a cryptographic link that makes tampering detectable. If anyone modifies a receipt in the middle, all subsequent hashes break.
Receipt #1 Receipt #2 Receipt #3 ┌─────────────┐ ┌─────────────┐ ┌─────────────┐ │ prev: 0000 │───▶│ prev: abc1 │───▶│ prev: def2 │ │ hash: abc1 │ │ hash: def2 │ │ hash: ghi3 │ │ sig: ... │ │ sig: ... │ │ sig: ... │ └─────────────┘ └─────────────┘ └─────────────┘
The first receipt has a null previous hash (often represented as zeros). Each subsequent receipt computes prev_hash from the previous receipt's this_receipt_hash. A verifier walks the chain and confirms every link.
What is an enforcement receipt?
An enforcement receipt is a signed record documenting a governance decision. It contains the policy artifact reference, the action taken, a reason code explaining why, timestamps, and the chain linkage. The receipt is signed by the enforcement boundary's key.
{
"receipt_v": "1",
"receipt_id": "sha256:...",
"run_id": "run_abc123",
"counter": 42,
"timestamp": "2024-01-15T10:30:00Z",
"event_type": "ENFORCED",
"decision": {
"action": "BLOCK_EXECUTION",
"reason_code": "DRIFT_DETECTED",
"details": "Config hash mismatch"
},
"policy": { "policy_id": "sha256:..." },
"chain": {
"prev_receipt_hash": "sha256:def2...",
"this_receipt_hash": "sha256:ghi3..."
},
"signer": {
"key_id": "abc123",
"signature": "Ed25519:..."
}
}How do receipts form chain-of-custody?
Each receipt proves what the governance boundary observed and decided at a specific point. The chain links prove the sequence. Together, they form an audit trail that an auditor can verify independently. The chain proves custody of the governance state.
- ■Integrity: Signatures prevent receipt tampering
- ■Ordering: Hash links prove sequence
- ■Completeness: Monotonic counters detect gaps
- ■Non-repudiation: Signer key binds receipts to the boundary
How does offline validation work?
The evidence bundle contains the full receipt chain. A verifier loads the bundle, iterates through receipts in order, validates each signature, confirms each prev_hash link, checks for counter gaps, and emits a verdict. No network calls required.
- 1.Load receipts from bundle in counter order
- 2.For each receipt: validate schema, recompute hashes, verify signature
- 3.Confirm prev_receipt_hash matches previous receipt's this_receipt_hash
- 4.Check counter is monotonically increasing with no gaps
- 5.Validate chain_head matches last receipt
- 6.Emit PASS if all checks succeed; FAIL with specific error otherwise
Frequently asked questions
Isn't this just blockchain?
No. Blockchains are distributed consensus systems. Continuity chains are local, single-writer append-only logs. There's no mining, no tokens, no distributed consensus. The cryptographic structure (hash-linking) is similar, but the operational model is completely different.
What if the system clock is wrong?
Receipts can include TSA (Time-Stamping Authority) tokens for trusted timestamps. If TSA is unavailable, the receipt marks time as DEGRADED_LOCAL. The verifier reports this in its verdict. Monotonic counters prove ordering regardless of clock.
How do we validate chains offline?
The evidence bundle contains everything needed. The verifier loads it from disk, checks all signatures against embedded public keys, validates all hash links, and emits a deterministic verdict. No network required.
Deep dive topics
Receipt Schema
Required fields, timestamps, policy references, and signing rules
Chain-of-Custody Offline
Proving custody without network access
Continuity Chain Validation
Ordering, gaps, forks, and resolution patterns
Checkpoints & Anchoring
Preventing history rewrite with periodic anchors
Enforcement Receipts Explained
Action semantics, reason codes, and linking to policy
Audit Readiness Playbook
Evidence packages, review workflows, and pilot metrics
Related Pillars
Learn More
Continuity chains and enforcement receipts are core to enterprise deployments. Contact us to learn more about your governance needs.
Contact Us