From pilot to go‑live in your VPC
Follow this guided path to stand up TrustPlane as your governed request‑path control plane. The outcome: a canary live in ≤ 7 days, audit exporting to your SIEM, and policy packs your teams can reuse.
How TrustPlane governs a request
In your VPC • No public ingressApps, agents, or humans send requests through the TrustPlane gateway running in your VPC/VNet.
Identity, residency, budget, and evaluation contracts enforced before any side-effects.
Golden sets, drift monitors, and reviewer feedback captured for every promotion gate.
COSE-signed attestation minted with policy hash, approvals, rollout scope, and telemetry references.
Applications, data stores, and automation hooks verify certificates locally before executing writes.
OpenTelemetry spans stream to Splunk/Datadog for audit, FinOps showback, and incident response.
- Cloud: AWS, GCP, or Azure account
- SSO: Okta, Microsoft Entra ID, or Ping
- Optional: Snowflake / Databricks; ServiceNow / Jira; Slack / Microsoft Teams
- SIEM/Observability: Splunk or Datadog (for audit export)
Install packages before wiring connectors. Versions align with the snippets below and emit Action Certificate telemetry by default.
npm install @trustplane/sdk # or yarn add @trustplane/sdk # or pnpm add @trustplane/sdk
pip install trustplane-sdk # or poetry add trustplane-sdk
// build.gradle.kts implementation("cloud.trustplane:control-plane-sdk:1.+") // Maven pom.xml <dependency> <groupId>cloud.trustplane</groupId> <artifactId>control-plane-sdk</artifactId> <version>1.+</version> </dependency>30-sec check: Paste this into your REPL to confirm the SDK wiring before you connect any systems.
const ok = await verifyCertificate(sampleCertificate, {
expectedPolicyHash: 'sha256:…',
requiredApprovals: ['security', 'finops', 'data-owner']
});
if (!ok.valid) throw new Error(ok.reason);Mirrors the /verify checks; full flow below.
- Week 1: Gateway deployed in VPC/VNet, SSO/SCIM approved, no public ingress.
- Week 2: Read-first connectors live against production data; Learning Controls drafted.
- Week 4: Evaluation contract and drift monitors streaming to SIEM; cost/showback wired.
- Week 6: First controlled rollout (governed canary) at ≤10%; certificate verification hooks blocking writes.
- Week 9: Certificate-verified production with Action Certificates required for every write.
- Week 12: Additional governed automations reusing approved boundary (3–5 per quarter).
- 1) Deploy the gateway in your VPC
The gateway/sidecar runs in your account. You can start with a single region and expand later. Use marketplace images or Terraform modules; no public ingress required for private modes.
# Terraform (example sketch) module "trustplane" { source = "trustplane-oss/gateway/<provider>" version = "~> 1" region = "us-east-1" # networking + egress controls vpc_id = var.vpc_id private_subnet_ids = var.private_subnet_ids outbound_egress_allowed = false } - 2) Wire up identity (SSO) & provisioning (SCIM)
Set SAML SSO with your IdP and enable SCIM for lifecycle. Approvers and operators are least‑privilege roles.
# trustplane-idp.json (IdP app hints) { "saml": { "acsUrl": "https://gw.internal/auth/saml/acs", "entityId": "urn:trustplane" }, "scim": { "baseUrl": "https://gw.internal/scim", "bearer": "…managed secret…" }, "roles": ["owner", "approver", "operator"] } - 3) Add read‑first connectors (Snowflake, ServiceNow, Slack…)
Start read‑only with dry‑run. Promotion to writes requires explicit approvals and minting an Action Certificate.
# connectors.yaml snowflake: mode: read_first role: ANALYST servicenow: mode: write_gated slack: mode: read_first
- 4) Declare policy & Learning Controls
Define latency, reliability, budget, data boundary, approval gates, and Learning Controls (evaluation contracts, drift triggers, reviewer coverage). Hashes are embedded in every certificate.
# TrustPlane.slo.yaml slo: { latency_p95_ms: 1200, availability: "99.9%" } budget: { monthly_usd: 25000, rps: 5 } data: { residency: [us, eu], kms: byok, egress: deny_by_default, pii: redact } policy: writes: { approvals: [security, finops] } canary: { pct: 10, eval: "golden:v1", rollback_on: { drift_p95: ">5%" } } connectors: { snowflake: read_first, servicenow: write_gated } - 5) Run the read-first path
// app/api/example/route.ts import { NextResponse } from 'next/server'; import { createClient } from '@trustplane/sdk'; const tp = createClient({ sloManifestPath: 'TrustPlane.slo.yaml' }); export async function POST() { const resp = await tp.chat({ model: 'auto', // TrustPlane picks model + region + hardware input: 'Summarize Q2 risk reports for the board', team: 'risk-ops', trace: true }); return NextResponse.json(resp); }Reads run without side-effects. Promotion to writes requires approvals and a valid Action Certificate.
- 6) Observe cost, SLOs & policy adherence
Every request emits latency, availability, and cost per team; guardrails and redactions are auditable and exportable.
- Per‑team cost/showback & budget guardrails
- SLO adherence (p95 latency, availability)
- Policy hits, PII redactions, audit export (OTel → Splunk/Datadog)
- Certificate verification hooks before writes
- 7) Verify certificates before writes, then promote
Downstream systems should block writes unless the certificate is valid. Use the verifier helper before calling
promote.import { TrustPlane, verifyCertificate } from '@trustplane/sdk'; const tp = new TrustPlane({ policy: 'prod-us-1' }); const result = await tp.promote('ap-matching', { percent: 25, approvals: ['security', 'finops', 'data-owner'] }); const ok = await verifyCertificate(result.certificate, { expectedPolicyHash: 'sha256:9c73…f5a0', requiredApprovals: ['security', 'finops', 'data-owner'], maxCanaryPercent: 30 }); if (!ok.valid) throw new Error(`Blocked — ${ok.reason}`); // Attach Action Certificate to downstream writes (ServiceNow, Snowflake, etc.)Paste the sample certificate into /verify to see signature and policy-hash checks pass.
Optional evaluation contracts (golden sets, guardrail metrics) act as gates for canary → production.
Policy hashes, lineage, and per‑action certificates export directly to your auditors (EU AI Act, NIST AI RMF).