Governed Execution

Nothing ships without
its evidence.

Panaptico runs the rollout on rails. Evidence-gated completion. Approvals routed with context. Dependencies that actually block downstream work. A complete chain of accountability — by default.

RUN · TASK-0412Enforce KMS auto-rotation · 14 finance-domain CMKs
Held · 2 gates

Evidence gate

2 / 3 captured

KMS ListKeys · pre-snapshot

312 keys

CloudTrail RotateKey · 14 events

14 rows

Job telemetry · 48h post-bake

24h remaining

Approval gate

1 / 2 signed

D. Park

· VP Data Platform

Approved · 2026-04-21 14:22Z

Routed because: Owns cost envelope & perf SLO

M. Alvarez

· Security Engineering

Awaiting · routed 14:26Z

Routed because: KMS policy changes → SOC2 CC6.7

Dependency gate

3 / 3 cleared
TASK-0408Snapshot secret refs
TASK-0410Confirm Secrets Manager usage
TASK-0411CHG-00582 approved

Blocked downstream: 2 tasks, 4 evidence artifacts

Mark complete · lockedUnlocks when 1 evidence artifact arrives + 1 approval returns
Confidence 98% · 2,840 facts

The gap

Execution is
ungoverned chaos.

Tasks are marked done without proof. Approvals happen over Slack or email with no record. Dependencies are tracked manually — or not at all. When something goes wrong, nobody can trace what happened, who approved it, or what evidence existed. Zero accountability, zero visibility.

1

“LGTM 👍” is not an approval

Critical changes get signed off in a DM and forgotten. Six months later audit asks who approved it — and nobody knows.

2

Done without proof

Someone checks the box, the sprint closes, the evidence never existed. The rollback path is already broken.

3

Dependencies by memory

The upstream task isn't really done — but the downstream team already started. The next incident is already baked in.

Evidence-gated completion

You can't mark it done
without the proof.

Every task defines its evidence requirements upfront — screenshots, config exports, test results, telemetry windows. The “complete” action is physically locked until the bundle is captured.

Checkbox cultureTypical

Rotate KMS keys

Evidence:

Approved by: (Slack DM)

Rollback plan:

Ships on vibes. Nothing captured, nothing signed. Audit says “prove it” — you can't.

Evidence-gatedSealed

Enforce KMS auto-rotation · 14 CMKs

kms-pre-post.jsonl · 312 → 312 keys
cloudtrail-rotatekey.ndjson · 14 rows
job-telemetry-28.csv · 48h green
CHG-00582.pdf · approval chain

Every exit criterion ties to a file. Bundle sealed, sha256 recorded, replay-able six quarters from now.

Approval routing

Approvals with context.
Decisions with rationale.

CHG-00582KMS auto-rotation window · finance CMKs
Routing · 1 of 2 signed

Signature chain

D. Park· VP Data Platform

Routed · owns cost envelope + performance SLO for domain

2026-04-21 14:22Z

Rotation window lands in low-traffic hours. Cost delta contained to the finance envelope. Reversal trigger: any job failure > 2% rolls back auto-rotation at the CMK level.

M. Alvarez· Security Engineering

Routed · KMS policy change intersects SOC2 CC6.7 + ISO 27001 A.10.1.2

Awaiting · 38m

CTO council· Ratification

Routed · touches > 10 production systems

Queued · auto-post 2 sigs

Context pack attached

Impact · 14 CMKs, 28 dep jobs
Workload diff · pre/post plan
Change window · 2026-05-04 02:00Z
Posture scope · finance-critical tag

Reversal trigger

Rolls back at CMK level if > 2% of dependent jobs fail in the 48h bake window.

Dependency enforcement

Downstream work
stays put until it shouldn't.

Prerequisite not verified → the gate holds. The moment upstream seals its bundle, the gate clears and the dependent tasks move on. No one starts early because a standup said “good to go.”

GATE · PLAN-04911 upstream held · 2 downstream blocked
Gate closed
TASK-0412 · ACTIVEKMS auto-rotation · 14 CMKs2 of 3 evidence capturedGATEholds until sealedTASK-0414 · BLOCKEDRevoke 42 Databricks SPswaits on TASK-0412 sealedTASK-0418 · BLOCKEDMigrate 11 Jenkins pipelineswaits on TASK-0412 sealedWAVE EXITevidence bundlewaits on all 3 tasks
Active upstreamGate heldBlocked downstreamGate opens the moment TASK-0412 seals its evidence bundle · auto-notify 14 owners

Step-by-step guidance

Panaptico guides.
Humans decide.

Your team drives the rollout with clear instructions — inspect, verify, act. Every step shows the check to run, the expected result, and a Pass / Fail handoff that records the outcome into the task record.

RUNBOOK · TASK-0412 · step 3 of 6Verify rotation flag on each CMK
Owner: M. Alvarez
3

For each of the 14 CMKs in the finance scope, confirm rotation = enabled with period 365d.

Panaptico has already pulled the current state. Review the diff, then mark each key pass or fail. Any fail opens a sub-task automatically.

Verification check

pulled 2.4s ago
arn:aws:kms:us-east-1:412…:key/4a12enabled365dpass
arn:aws:kms:us-east-1:412…:key/8f21enabled365dpass
arn:aws:kms:us-east-1:412…:key/c04aenabled365dpass
arn:aws:kms:us-east-1:412…:key/7d88enabled365dpass
arn:aws:kms:us-east-1:412…:key/2e19disabledfail

+ 9 more · 13 pass / 1 fail

Your call

Every outcome is written into the task record · timestamped, attributed, replay-able

Run the rollout on rails.

Evidence before completion. Approvals with context. Dependencies that actually block. Accountability by default.