Files
the_order/docs/governance/procedures/root-key-ceremony.md
defiQUG 6a8582e54d feat: comprehensive project structure improvements and Cloud for Sovereignty landing zone
- Add Cloud for Sovereignty landing zone architecture and deployment
- Implement complete legal document management system
- Reorganize documentation with improved navigation
- Add infrastructure improvements (Dockerfiles, K8s, monitoring)
- Add operational improvements (graceful shutdown, rate limiting, caching)
- Create comprehensive project structure documentation
- Add Azure deployment automation scripts
- Improve repository navigation and organization
2025-11-13 09:32:55 -08:00

6.3 KiB
Raw Blame History

Root Key Ceremony Runbook

Date: Friday, December 5, 2025, 10:0013:00 PT
Location: Secure facility (airgapped room), dualcontrol entry
Status: Scheduled


Roles & Responsibilities

Ceremony Officer

  • Leads the ceremony
  • Ensures all steps are followed
  • Documents all actions
  • Coordinates with witnesses

Key Custodians (3)

  • Multi-party control (2-of-3)
  • Participate in HSM initialization
  • Witness key generation
  • Verify backup procedures

Auditor

  • Independent verification
  • Reviews all procedures
  • Validates artifacts
  • Signs off on completion

Witnesses (2)

  • External observers
  • Verify procedures
  • Sign witness statements
  • Maintain independence

Video Scribe

  • Records the ceremony
  • Documents all actions
  • Creates tamper-evident archive
  • Provides notarization support

Pre-Ceremony Checklist

Week Before

  • Confirm all participants
  • Verify secure facility access
  • Test HSM equipment
  • Prepare tamper-evident bags
  • Schedule notary
  • Prepare ceremony scripts

Day Before

  • Room sweep & security check
  • Device inventory
  • Hash baseline of all equipment
  • Verify air-gap status
  • Test recording equipment
  • Prepare backup media

Day Of (Pre-Ceremony)

  • Final room sweep
  • Verify all participants present
  • Check recording equipment
  • Verify HSM status
  • Confirm air-gap maintained
  • Begin video recording

Ceremony Steps

1. Room Sweep & Hash Baseline

Duration: 15 minutes

Actions:

  1. Verify room is secure and air-gapped
  2. Inventory all devices and equipment
  3. Create hash baseline of all equipment
  4. Document all serial numbers
  5. Verify no unauthorized devices

Artifacts:

  • Device inventory list
  • Hash baseline document
  • Room security checklist

2. HSM Initialization (M of N)

Duration: 30 minutes

Actions:

  1. Initialize Thales Luna HSM
  2. Configure multi-party control (2-of-3)
  3. Verify key custodian access
  4. Test HSM functionality
  5. Document HSM configuration

Artifacts:

  • HSM configuration document
  • Key custodian access logs
  • HSM test results

3. Generate Root Key

Duration: 45 minutes

Actions:

  1. Generate root key pair in HSM
  2. Verify key generation
  3. Extract public key
  4. Create Certificate Signing Request (CSR)
  5. Document key parameters

Artifacts:

  • Root key generation log
  • Public key certificate
  • CSR document
  • Key parameters document

4. Seal Backups

Duration: 30 minutes

Actions:

  1. Create encrypted backups
  2. Seal backups in tamper-evident bags
  3. Label all backups
  4. Verify backup integrity
  5. Store backups in secure location

Artifacts:

  • Backup inventory
  • Tamper-evident bag log
  • Backup integrity checks
  • Storage location record

5. Sign Issuing CA

Duration: 30 minutes

Actions:

  1. Generate Issuing CA certificate
  2. Sign with root key
  3. Verify certificate signature
  4. Publish certificate
  5. Document certificate details

Artifacts:

  • Issuing CA certificate
  • Certificate signature verification
  • Certificate publication record
  • Certificate details document

6. Publish Fingerprints

Duration: 20 minutes

Actions:

  1. Calculate certificate fingerprints
  2. Publish fingerprints publicly
  3. Create DID documents (offline)
  4. Prepare for online publication
  5. Document publication process

Artifacts:

  • Fingerprint document
  • DID documents
  • Publication record
  • Online bridge preparation

7. Record & Notarize Minutes

Duration: 30 minutes

Actions:

  1. Compile ceremony minutes
  2. Have all participants sign
  3. Notarize minutes
  4. Create tamper-evident archive
  5. Store original minutes

Artifacts:

  • Ceremony minutes
  • Participant signatures
  • Notarized document
  • Tamper-evident archive
  • Storage record

Artifacts Checklist

Required Artifacts

  • Root CSR
  • CP/CPS v1.0
  • Offline DID documents
  • Hash manifest
  • Sealed tamper-evident bags
  • Ceremony minutes
  • Participant signatures
  • Notarized document
  • Video recording
  • Backup media

Verification

  • All artifacts present
  • All signatures collected
  • Video recording complete
  • Backups verified
  • Certificates published
  • DID documents prepared

Post-Ceremony Tasks

Immediate (Day Of)

  • Secure all artifacts
  • Verify backup storage
  • Publish fingerprints
  • Notarize minutes
  • Archive video recording

Week After

  • Publish DID documents online
  • Update certificate registry
  • Distribute artifacts to custodians
  • Create ceremony report
  • Schedule audit review

Month After

  • External audit review
  • Update CP/CPS if needed
  • Publish ceremony report
  • Schedule next ceremony review
  • Update procedures based on lessons learned

Security Measures

Physical Security

  • Air-gapped room
  • Dual-control entry
  • No unauthorized devices
  • Continuous video recording
  • Witnessed procedures

Cryptographic Security

  • HSM-protected keys
  • Multi-party control
  • Encrypted backups
  • Tamper-evident seals
  • Hash verification

Procedural Security

  • Scripted procedures
  • Independent verification
  • Witnessed actions
  • Documented steps
  • Notarized records

Incident Response

Key Compromise

  1. Immediately halt ceremony
  2. Document incident
  3. Notify all participants
  4. Secure all artifacts
  5. Begin investigation
  6. Reschedule ceremony

Equipment Failure

  1. Document failure
  2. Verify no key exposure
  3. Replace equipment
  4. Resume from last verified step
  5. Update procedures

Procedural Error

  1. Document error
  2. Assess impact
  3. Correct if possible
  4. Restart affected step
  5. Update procedures

Contacts

Ceremony Officer

  • Name: [TBD]
  • Email: [TBD]
  • Phone: [TBD]

Key Custodians

  • Custodian 1: [TBD]
  • Custodian 2: [TBD]
  • Custodian 3: [TBD]

Auditor

  • Name: [TBD]
  • Email: [TBD]
  • Phone: [TBD]

Witnesses

  • Witness 1: [TBD]
  • Witness 2: [TBD]

Video Scribe

  • Name: [TBD]
  • Email: [TBD]
  • Phone: [TBD]

Revision History

Version Date Author Changes
1.0 2025-11-10 Ceremony Officer Initial runbook

Approval

Ceremony Officer: _________________ Date: _________

CISO: _________________ Date: _________

Founding Council: _________________ Date: _________