API key inventory + per-key scope list. Contributes to CC6.1; full criterion also requires documented access policy, provisioning/de-provisioning procedures, periodic access reviews, and SSO/MFA enforcement.
| prefix | name | tier | scopes | last used | revoked |
|---|---|---|---|---|---|
hld_sew4YTR2 | compliance-demo | free | * | never | no |
Vault uses AES-256-GCM with AAD binding to (tenant_id, secret_name); ciphertext is non-portable across tenants. Contributes to CC6.7; full criterion also requires documented encryption standards, key-management procedures, and TLS-in-transit evidence.
tenant_id || secret_nameSHA-256 hash chain over every recorded agent action. Contributes to CC7.2 by producing tamper-evident logs an auditor can spot-check. Full criterion also requires documented anomaly detection and incident-response procedures.
—e3b0c44298fc1c149afbf4c8.../v1/audit/inclusion-proof/<entry_id>/v1/audit/consistency-proof?first=N&second=MPer-session spend caps + payment-authorization records with remaining-budget snapshots. Contributes to CC5.2 by proving risk limits are enforced at the platform layer.
Approval-request lifecycle (created → approved/denied with note) for agent actions. Contributes to CC8.1 as evidence of human-in-the-loop controls; full criterion covers software change management more broadly (code review, test coverage, deploy approvals).
Outbound webhook deliveries (per-attempt status, retries, backoff) proving the alerting channels Haldir fires are operational. Contributes to CC7.3; full criterion also requires documented incident-response procedures.
Verify by re-issuing this evidence pack against the same period and comparing the digest above to the one returned by /v1/compliance/evidence/manifest.