RFC-WF-0031
Deployment & Environment Separation Requirements (DESR)
Status: Draft Standard
Version: 1.0.0
Date: 20 Nov 2025
Category: Standards Track
Author: FullAgenticStack Initiative
Dependencies: RFC-WF-0004 (ACSM), RFC-WF-0011 (CATS), RFC-WF-0015 (PPGP), RFC-WF-0018 (SMCL), RFC-WF-0019 (DRPC), RFC-WF-0020 (RAOS), RFC-WF-0025 (CABM)
License: Open Specification (Public, Royalty-Free)
Abstract
This document specifies Deployment & Environment Separation Requirements (DESR) for WhatsApp-first systems. DESR defines normative requirements for separating dev/test/staging/prod environments, isolating tenants, controlling policy packs per environment, enforcing sandbox safety, and preventing cross-environment evidence/telemetry leakage. DESR ensures that WhatsApp-first systems remain auditable and safe across deployments, and that compliance attestations (CABM) are environment-specific and verifiable.
Index Terms— environment separation, staging vs production, sandbox tenants, policy isolation, audit safety, operational governance.
I. Introduction
WhatsApp-first systems make it easy to operate production flows conversationally—which also makes it easy to accidentally operate production when you meant to test. DESR defines the minimum separation and safeguards needed to:
- avoid cross-environment contamination (evidence, telemetry, data)
- ensure sandbox testing for CATS/TVRS does not affect production
- prevent “policy drift” between staging and prod
- keep compliance claims meaningful (attestation must specify environment)
II. Scope
DESR specifies:
- environment classification and required invariants
- tenant isolation requirements across environments
- policy pack/profile binding by environment
- sandbox execution constraints for tests and PoCs
- evidence and telemetry isolation requirements
- deployment safety checks for high-impact operations
- attestation environment scoping requirements
DESR does not prescribe CI/CD pipelines; it defines constraints.
III. Normative Language
MUST, MUST NOT, SHOULD, SHOULD NOT, MAY are normative.
IV. Definitions
Environment: A deployment context such as dev, test, staging, or prod.
Sandbox Tenant: A tenant reserved for non-production conformance tests and demos.
Policy Drift: Untracked divergence between policy packs across environments.
Cross-Environment Leakage: Evidence, telemetry, or data accessible across environments.
V. Design Goals
DESR MUST ensure:
- G1. Safety: testing cannot mutate production state.
- G2. Isolation: evidence and telemetry are environment-scoped.
- G3. Governance: policies are explicit per environment and auditable.
- G4. Verifiable Claims: attestations identify environment and validity window.
- G5. Operational Clarity: conversation responses clearly indicate environment in privileged views.
VI. Environment Model (Normative)
Implementations MUST classify deployments into:
devteststagingprod
Each evidence artifact MUST include system.environment (EAS).
VII. Tenant Isolation Across Environments
A. Hard Isolation Requirement
A tenant in one environment MUST NOT share:
- databases
- evidence stores
- caches
- message queues
- connector credentials
with a tenant in another environment, unless explicitly designed and audited with strict separation mechanisms.
B. Identifier Scoping
Tenant identifiers SHOULD be namespaced by environment (e.g., prod:tenant_1) to prevent accidental cross-use.
VIII. Policy Packs by Environment (PPGP Alignment)
A. Explicit Binding
Each environment MUST bind a specific policy pack version + profile (PPGP). The binding MUST be auditable.
B. Fail-Closed in Production
In prod, missing policies for high-impact actions MUST fail closed (no execution).
C. Drift Detection
Systems SHOULD provide an OoC query for privileged users to report:
- active policy pack id/version
- active profile
- last policy change evidence reference
IX. Sandbox Mode Requirements (CATS/TVRS Safety)
A. Sandbox Tenant
Systems MUST provide a sandbox tenant (or equivalent mode) where:
- destructive operations are either blocked or redirected to mock resources
- financial connectors use test-mode providers
- data retention is shorter and clearly labeled (optional)
B. Guardrails
In sandbox mode:
- confirmation/approval flows MUST still be enforced (don’t “cheat” the spec)
- evidence MUST still be emitted (EAS)
- OoC and RCP must remain functional
C. Preventing Accidental Production Calls
Sandbox mode MUST NOT hold production secrets or production connector credentials.
X. Evidence and Telemetry Isolation
A. Evidence Store Separation
Evidence stores MUST be environment-scoped. Evidence queries MUST not return artifacts from other environments.
B. Telemetry Separation
Logs/metrics/traces MUST be environment-scoped. If a shared observability backend is used, environment partitioning MUST be enforced.
C. Retention Differences
DRPC retention policies MAY differ per environment, but MUST be explicit and auditable.
XI. Deployment Safety Checks
A. High-Impact Actions in Prod
For S3/R3 actions in prod, the system SHOULD:
- require stronger step-up or approvals (HAPF profile)
- require explicit environment acknowledgement in the preview (“PROD”)
- log the environment label in evidence
B. Lockdown and Maintenance
RAOS lockdown mode SHOULD be available in prod via WhatsApp admin controls, and MUST be evidenced.
XII. Attestation Requirements (CABM Alignment)
Any compliance attestation MUST include:
environmenttenant_scope- discovery URL (WKD)
- validity window
Attestations MUST NOT be reused across environments.
XIII. Conformance Requirements
An implementation is DESR-compliant if it:
- tags all evidence with environment
- prevents cross-environment evidence access
- binds and audits policy packs per environment
- supports sandbox tenant/test mode for conformance checks
- prevents sandbox credentials from invoking production connectors
- produces environment-scoped attestations
XIV. Security Considerations
Cross-environment leakage is a frequent real-world failure mode. DESR reduces blast radius by enforcing hard separation. The main risk is operational complexity; tooling should make environment visibility explicit in OoC and previews to prevent human mistakes.
XV. Conclusion
DESR ensures WhatsApp-first systems remain safe and auditable across deployment environments. By enforcing environment tagging, tenant isolation, policy pack separation, sandbox guardrails, and environment-scoped attestations, DESR prevents “testing by accident in prod” and keeps compliance claims meaningful.
References
[1] RFC-WF-0004, Administrative Command Security Model (ACSM).
[2] RFC-WF-0011, Compliance Audit Toolkit Spec (CATS).
[3] RFC-WF-0015, Policy Packs & Governance Profiles (PPGP).
[4] RFC-WF-0018, State Model & Command Lifecycle (SMCL).
[5] RFC-WF-0019, Data Retention, Redaction & Privacy over Conversation (DRPC).
[6] RFC-WF-0020, Rate Limits, Abuse Controls & Operational Safety (RAOS).
[7] RFC-WF-0025, Certification Attestation & Badge Metadata (CABM).
Concepts and Technologies
Environment scoping, sandbox tenants, policy drift detection, evidence/telemetry isolation, production guardrails, connector credential separation, environment-aware attestations, staged deployments.
Top comments (0)