Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Fine grained Policy workflow certification labels #4534

Open
anvabr opened this issue Jan 9, 2025 · 0 comments
Open

Fine grained Policy workflow certification labels #4534

anvabr opened this issue Jan 9, 2025 · 0 comments

Comments

@anvabr
Copy link
Collaborator

anvabr commented Jan 9, 2025

Problem description

It is often difficult for industry practitioners to evaluate the conformity of Policy implementations of methodologies with 'official' methodology definitions usually published as pdf documents. #3408 enables users to correlate calculations implemented in the policy with mathematical formulas in these documents. Additionally, specialist 'certification' organisations with both technical and methodology knowledge could offer such assurances by reviewing policies and their corresponding methodologies and publishing their assessments as tags. At present these tags can be assigned to the policy as a whole or some structural elements of the policy such as:

  • Modules
  • Tools
  • Schemas

This granularity is insufficient in some cases as sections of workflows (which bind together schemas, modules, tools, sequences of steps and various conditions/rules) should also be gradable. This is because they often represent individually significant activities and project types.

Requirements

Introduce the capability to select arbitrary sections of Policy workflows and then assign tags to them, which should result in these tags being visible whenever the policy sections or any artefacts produced in these sections are viewed by users such that:

  • Policy sections can be selected and assessed/tagged after the policy is published
  • Assessment/tagging can be done by users who are not policy authors
  • Tags then applied retrospectively to artefacts produced by the 'target' section of the Policy (where the tag has been applied)
  • Tags are visible whenever users view artefacts and/or policy in Guardian and Indexer, including trustchain view

Definition of done

  • The requirements above are fulfilled
  • The functionality is documented
  • At least one practical example exists in the policies in the Guardian github repository

Acceptance criteria

Users can get more clarity on the scope of methodology coverage of a Policy by examining the 'certification' tags on its sections, elements and/or policy as a whole.

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

No branches or pull requests

1 participant