Skip to content

KTP-Migration: Migration Guide

"The best protocol is worthless if no one can adopt it. Migration must be incremental, reversible, and demonstrably valuable at each stage."


At a Glance

Property Value
Status Draft
Version 0.1
Dependencies KTP-Core, KTP-Legacy
Required By KTP-Federation, KTP-Governance

The Problem

Organizations have massive investments in existing identity infrastructure (OAuth 2.0, SAML, API Keys). Ripping and replacing these systems is impossible. KTP must offer a path that allows for coexistence and gradual adoption.

The Solution: Progressive Enforcement

KTP-Migration defines a 5-stage process that moves from passive observation to full enforcement, ensuring that business operations are never disrupted by the transition.

The 5-Stage Path

Passive Telemetry. Deploy KTP sensors and Oracles, but do not enforce any rules.

  • Goal: Establish baselines for \(E_{base}\) and \(R\).
  • Action: Log all trust scores; no blocking.

Virtual Enforcement. KTP evaluates every request and logs the decision it would have made.

  • Goal: Identify false positives and tune policy.
  • Action: Compare KTP decisions vs. Legacy decisions.

Hybrid Operation. KTP adds "risk headers" to requests, but the legacy system makes the final call.

  • Goal: Give applications visibility into trust levels.
  • Action: X-KTP-Risk: High header added to requests.

Selective Blocking. Enforce KTP rules on a small subset of traffic (e.g., 1% of users or specific non-critical endpoints).

  • Goal: Validate enforcement logic in production.
  • Action: Real blocking for test groups.

Physics-Based Auth. KTP becomes the primary authorization engine. Legacy systems are relegated to identity provision only.

  • Goal: Complete transition.
  • Action: \(A \leq E\) enforced for all traffic.

Legacy Integration Patterns

OAuth 2.0 Token Enrichment

KTP claims can be embedded directly into JWTs, allowing existing Resource Servers to consume trust data without code changes.

{
  "sub": "user-123",
  "scope": "read write",
  "exp": 1732550400,
  "ktp": {
    "e_base": 72,
    "e_trust": 68,
    "tier": "analyst",
    "trajectory_hash": "sha256:abc...",
    "oracle": "https://oracle.example.com"
  }
}

Dual-Stack Architecture

Running KTP alongside legacy auth allows for a "belt and suspenders" approach during transition.

graph TD
    Client -->|Request| Gateway
    Gateway -->|1. Validate OAuth| Legacy[Legacy AuthZ]
    Gateway -->|2. Check Trust Score| KTP[KTP Oracle]

    Legacy -->|Allow| Decision
    KTP -->|Allow| Decision

    Decision{Both Allow?}
    Decision -->|Yes| Service
    Decision -->|No| Block

Core Components

Trust Bootstrapping

Assigning initial trust scores to existing users based on historical logs and role tenure.

Shadow Mode Logging

A standardized log format for comparing Legacy vs. KTP decisions to detect anomalies.

Rollback Procedures

"Emergency Fallback" protocols to instantly disable KTP enforcement if a critical business process is blocked.

Success Metrics

KPIs for migration health: False Positive Rate, Latency Impact, and Trust Score Stability.


Related Specifications
  • KTP-Core — The foundational protocol and the Zeroth Law (\(A \leq E\)).
  • KTP-Legacy — Bridging the gap between static credentials and kinetic trust.
  • KTP-Federation — Cross-zone cryptographic trust establishment.
  • KTP-Governance — The human-in-the-loop and algorithmic governance framework.

Official RFC Document

View Complete RFC Text (ktp-migration.txt)
Kinetic Trust Protocol                                      C. Perkins
Specification Draft                                           NMCITRA
Version: 0.1                                             November 2025


            Kinetic Trust Protocol (KTP) - Migration Guide
                Adoption Pathways from Legacy Systems

Abstract

   This document specifies migration patterns for adopting the Kinetic
   Trust Protocol in existing environments. It covers integration with
   legacy authorization systems (OAuth 2.0, SAML, API keys, mTLS),
   progressive deployment strategies, trust bootstrapping, hybrid
   operation during transition, and success metrics.

   The specification acknowledges that no organization will adopt KTP
   through wholesale replacement. Migration must be incremental,
   reversible, and demonstrably valuable at each stage.

Status of This Memo

   This document is a draft specification developed by the New Mexico
   Cyber Intelligence & Threat Response Alliance (NMCITRA). It has not
   been submitted to the IETF and does not represent an Internet
   Standard or consensus of any standards body.

   Feedback and contributions are welcome at:
   https://github.com/nmcitra/ktp-rfc

Copyright Notice

   Copyright (c) 2025 Chris Perkins / NMCITRA. This work is licensed
   under the Apache License, Version 2.0.

Table of Contents

   1. Introduction  . . . . . . . . . . . . . . . . . . . . . . . .   2
      1.1.  The Adoption Problem  . . . . . . . . . . . . . . . . .   2
      1.2.  Migration Principles  . . . . . . . . . . . . . . . . .   3
   2. Terminology . . . . . . . . . . . . . . . . . . . . . . . . .   4
   3. Legacy System Integration . . . . . . . . . . . . . . . . . .   5
      3.1.  OAuth 2.0 / OIDC  . . . . . . . . . . . . . . . . . . .   5
      3.2.  SAML 2.0  . . . . . . . . . . . . . . . . . . . . . . .   8
      3.3.  API Keys  . . . . . . . . . . . . . . . . . . . . . . .  10
      3.4.  Mutual TLS (mTLS) . . . . . . . . . . . . . . . . . . .  12
      3.5.  Service Mesh Identity . . . . . . . . . . . . . . . . .  14
   4. Deployment Stages . . . . . . . . . . . . . . . . . . . . . .  16
      4.1.  Stage 0: Observation  . . . . . . . . . . . . . . . . .  16
      4.2.  Stage 1: Shadow Mode  . . . . . . . . . . . . . . . . .  18
      4.3.  Stage 2: Advisory Mode  . . . . . . . . . . . . . . . .  20
      4.4.  Stage 3: Canary Enforcement . . . . . . . . . . . . . .  22
      4.5.  Stage 4: Progressive Enforcement  . . . . . . . . . . .  24
      4.6.  Stage 5: Full Enforcement . . . . . . . . . . . . . . .  26
   5. Trust Bootstrapping . . . . . . . . . . . . . . . . . . . . .  27
      5.1.  Initial Trust Assignment  . . . . . . . . . . . . . . .  27
      5.2.  Historical Behavior Import  . . . . . . . . . . . . . .  29
      5.3.  Sponsorship Chains  . . . . . . . . . . . . . . . . . .  30
   6. Hybrid Operation  . . . . . . . . . . . . . . . . . . . . . .  31
      6.1.  Dual-Stack Authorization  . . . . . . . . . . . . . . .  31
      6.2.  Boundary Enforcement  . . . . . . . . . . . . . . . . .  33
      6.3.  Gradual Perimeter Expansion . . . . . . . . . . . . . .  34
   7. Rollback Procedures . . . . . . . . . . . . . . . . . . . . .  35
      7.1.  Stage Regression  . . . . . . . . . . . . . . . . . . .  35
      7.2.  Emergency Fallback  . . . . . . . . . . . . . . . . . .  36
      7.3.  Data Preservation . . . . . . . . . . . . . . . . . . .  37
   8. Success Metrics . . . . . . . . . . . . . . . . . . . . . . .  38
   9. Security Considerations . . . . . . . . . . . . . . . . . . .  40
   10. References . . . . . . . . . . . . . . . . . . . . . . . . .  41
   Authors' Addresses . . . . . . . . . . . . . . . . . . . . . . .  42

1. Introduction

1.1.  The Adoption Problem

   The best protocol is worthless if no one can adopt it.

   KTP proposes a fundamentally different approach to authorization:
   physics-based constraints rather than policy enforcement, Trust
   Scores derived from environmental sensors, Silent Veto that cannot be
   overridden. This is a significant departure from OAuth tokens, RBAC
   policies, and API key validation.

   Organizations considering KTP face real barriers:

   - Existing investment in identity infrastructure
   - Integration contracts with vendors and partners
   - Compliance requirements tied to current systems
   - Operational expertise in current tooling
   - Risk of disruption during transition

   No organization will abandon working systems for an unproven
   alternative. Migration must be:

   - Incremental: Value delivered at each stage
   - Reversible: Easy rollback if problems arise
   - Observable: Clear visibility into behavior before enforcement
   - Compatible: Works alongside existing systems during transition

   This document provides the adoption pathway that makes KTP practical,
   not just theoretical.

1.2.  Migration Principles

   Principle 1: Observe Before Enforce

      Never enforce KTP constraints until you have observed their
      impact in your specific environment. Shadow mode lets you see
      what would have happened without affecting production.

   Principle 2: Coexist, Don't Replace

      KTP should run alongside existing authorization during
      transition. Dual-stack operation allows comparison and provides
      fallback. Full replacement comes only after confidence is
      established.

   Principle 3: Earn Trust for the System

      Ironically, KTP itself must earn trust before organizations will
      trust it. Each migration stage builds confidence through
      demonstrated reliability and value.

   Principle 4: Preserve Optionality

      Every stage should be reversible. Design migration so that
      rollback is straightforward and data is preserved regardless
      of direction.

   Principle 5: Start Small, Expand Gradually

      Begin with a single service, a single API, a single team. Prove
      value in a constrained scope before expanding. Island of Blue
      in a sea of Wild.

2. Terminology

   Advisory Mode: A deployment stage where KTP evaluates requests and
   reports recommendations, but legacy authorization makes final
   decisions.

   Bootstrap Trust: Initial Trust Score assigned to existing identities
   when joining KTP, based on historical behavior and role.

   Canary Enforcement: Selective enforcement of KTP constraints on a
   small percentage of traffic while the remainder uses legacy
   authorization.

   Dual-Stack: Operating both legacy authorization and KTP
   simultaneously, with configurable priority and fallback.

   Full Enforcement: Complete reliance on KTP for authorization
   decisions, with legacy systems retired or relegated to identity
   provision.

   Green Zone: KTP zone type with minimal enforcement, suitable as
   transition boundary between Wild (no KTP) and Blue (full KTP).

   Legacy System: Existing authorization infrastructure (OAuth, SAML,
   API keys, etc.) operating before KTP adoption.

   Migration Stage: A defined phase in the transition from legacy
   authorization to KTP enforcement, each with specific characteristics
   and success criteria.

   Observation Mode: Initial deployment stage focused on collecting
   telemetry and establishing baselines without any KTP evaluation.

   Progressive Enforcement: Gradual expansion of KTP enforcement scope
   (services, actions, agents) based on demonstrated success.

   Shadow Mode: A deployment stage where KTP evaluates all requests but
   does not affect authorization decisions. Results are logged for
   comparison with legacy system decisions.

   Trust Bridging: The process of translating legacy credentials (OAuth
   tokens, SAML assertions) into KTP Trust Proofs during hybrid
   operation.

3. Legacy System Integration

3.1.  OAuth 2.0 / OIDC Integration

   OAuth 2.0 and OpenID Connect are the most common authorization
   frameworks for modern applications. KTP can integrate at multiple
   points.

3.1.1.  Token Enrichment

   The simplest integration adds KTP claims to existing OAuth tokens:

   Standard OAuth Token:

      {
        "sub": "user-123",
        "scope": "read write",
        "exp": 1732550400
      }

   KTP-Enriched Token:

      {
        "sub": "user-123",
        "scope": "read write",
        "exp": 1732550400,
        "ktp": {
          "e_base": 72,
          "e_trust": 68,
          "tier": "analyst",
          "trajectory_hash": "sha256:abc...",
          "oracle": "https://oracle.example.com",
          "proof_exp": 1732547000
        }
      }

   Token enrichment preserves OAuth compatibility while adding KTP
   context. Resource servers can:

   - Ignore KTP claims (full backward compatibility)
   - Use KTP claims for additional constraints (hybrid mode)
   - Require KTP claims (forward migration)

3.1.2.  Authorization Server Extension

   The OAuth Authorization Server can be extended to:

   1. Query Trust Oracle during token issuance
   2. Embed Trust Proof in access token
   3. Adjust token lifetime based on Trust Score
   4. Limit scopes based on Trust Tier

   Example flow:

   1. Client requests token with scopes [read, write, admin]
   2. AuthZ Server authenticates user
   3. AuthZ Server queries Trust Oracle for user's Trust Proof
   4. Trust Oracle returns E_trust = 68, tier = analyst
   5. AuthZ Server filters scopes: [read, write] (admin requires
      operator)
   6. AuthZ Server issues token with KTP claims and filtered scopes

3.1.3.  Resource Server Enforcement

   Resource servers can enforce KTP constraints independently:

   Request arrives with OAuth token:

   1. Validate OAuth token signature and expiration
   2. Extract KTP claims (if present)
   3. If KTP claims present:
      a. Verify Trust Proof signature against known Oracle
      b. Check Trust Proof expiration
      c. Evaluate A <= E_trust for requested action
      d. If KTP denies, return 403 with KTP error
   4. If KTP claims absent:
      a. Evaluate OAuth scopes per legacy logic
      b. Optionally query Trust Oracle for real-time proof

   This approach allows gradual enforcement:

   - Phase 1: Accept requests with or without KTP claims
   - Phase 2: Require KTP claims, use OAuth as fallback
   - Phase 3: Require KTP claims, OAuth for identity only

3.1.4.  OIDC UserInfo Extension

   The OIDC UserInfo endpoint can be extended to provide Trust Score:

   Standard UserInfo Response:

      {
        "sub": "user-123",
        "name": "Alice Smith",
        "email": "alice@example.com"
      }

   KTP-Extended UserInfo Response:

      {
        "sub": "user-123",
        "name": "Alice Smith",
        "email": "alice@example.com",
        "ktp_trust_score": {
          "e_base": 72,
          "e_trust": 68,
          "tier": "analyst",
          "trajectory_url":
            "https://oracle.example.com/trajectory/user-123",
          "proof_url":
            "https://oracle.example.com/proof/user-123"
        }
      }

3.2.  SAML 2.0 Integration

   SAML remains common in enterprise environments. KTP integrates
   through attribute extensions.

3.2.1.  Attribute Statement Extension

   SAML Assertions can include KTP attributes:

      <saml:AttributeStatement>
        <saml:Attribute Name="ktp:e_base">
          <saml:AttributeValue>72</saml:AttributeValue>
        </saml:Attribute>
        <saml:Attribute Name="ktp:e_trust">
          <saml:AttributeValue>68</saml:AttributeValue>
        </saml:Attribute>
        <saml:Attribute Name="ktp:tier">
          <saml:AttributeValue>analyst</saml:AttributeValue>
        </saml:Attribute>
        <saml:Attribute Name="ktp:proof">
          <saml:AttributeValue>[base64-encoded Trust Proof]
          </saml:AttributeValue>
        </saml:Attribute>
      </saml:AttributeStatement>

3.2.2.  Identity Provider Extension

   The SAML IdP can query Trust Oracle during assertion generation:

   1. User authenticates to IdP
   2. IdP queries Trust Oracle for user's current Trust Proof
   3. IdP includes KTP attributes in SAML Assertion
   4. SP receives assertion with embedded Trust Proof
   5. SP validates both SAML signature and KTP Trust Proof

3.2.3.  Service Provider Enforcement

   SPs can enforce KTP constraints on SAML-authenticated sessions:

   1. Validate SAML Assertion per standard SAML processing
   2. Extract KTP attributes from AttributeStatement
   3. Verify embedded Trust Proof against known Oracle
   4. For each request during session:
      a. Evaluate A <= E_trust
      b. Enforce tier-appropriate constraints
   5. Optionally refresh Trust Proof periodically during session

3.3.  API Key Integration

   API keys remain common for service-to-service communication and
   developer access. KTP can enhance API key systems without replacing
   them.

3.3.1.  API Key to Agent Mapping

   Each API key maps to a KTP agent identity:

      {
        "api_key_hash": "sha256:xyz...",
        "agent_id": "agent:service:payment-processor",
        "created": "2024-01-15T00:00:00Z",
        "owner": "team:payments",
        "ktp_binding": {
          "oracle": "https://oracle.example.com",
          "e_base": 65,
          "lineage": "tethered",
          "sponsor": "agent:persistent:payments-team-lead"
        }
      }

   When a request arrives with an API key:

   1. Validate API key exists and is active
   2. Look up associated agent_id
   3. Query Trust Oracle for current Trust Proof
   4. Evaluate request against Trust Score

3.3.2.  Key-Embedded Trust Proofs

   For reduced latency, Trust Proofs can be embedded in enhanced API key
   format:

   Traditional API key:

      X-API-Key: abc123xyz

   KTP-enhanced header:

      X-API-Key: abc123xyz
      X-KTP-Proof: eyJhbGciOiJFUzI1NiIs... [JWT Trust Proof]

   Or combined format:

      X-API-Key: abc123xyz.eyJhbGciOiJFUzI1NiIs...

   The client is responsible for refreshing the Trust Proof component
   before expiration.

3.3.3.  Tiered API Keys

   API keys can be issued with tier constraints:

      {
        "api_key_hash": "sha256:xyz...",
        "agent_id": "agent:service:readonly-analytics",
        "tier_cap": "observer",
        "allowed_actions": ["read_public", "read_internal"],
        "max_action_risk": 30
      }

   Even if the agent's Trust Score would permit higher capabilities, the
   key itself constrains what can be done. This allows:

   - Production keys with full capability
   - Staging keys with reduced capability
   - Read-only keys for analytics
   - Emergency keys with minimal access

3.4.  Mutual TLS (mTLS) Integration

   mTLS provides strong cryptographic identity for services. KTP
   complements mTLS with dynamic trust.

3.4.1.  Certificate to Agent Mapping

   X.509 certificates map to KTP agent identities:

      {
        "certificate_fingerprint": "sha256:abc...",
        "subject_dn": "CN=payment-service,O=Example,C=US",
        "agent_id": "agent:service:payment-processor",
        "ktp_binding": {
          "oracle": "https://oracle.example.com",
          "e_base": 85,
          "lineage": "persistent"
        }
      }

   Certificate identity establishes WHO; KTP establishes WHAT they can
   do right now.

3.4.2.  TLS Extension for Trust Proof

   A TLS extension can carry Trust Proof during handshake:

   Extension Type: ktp_trust_proof (TBD by IANA)
   Extension Data: Serialized Trust Proof

   This allows trust evaluation at connection establishment, before any
   application data is exchanged.

3.4.3.  Post-Handshake Trust Updates

   For long-lived connections, Trust Proofs can be updated via:

   1. Application-layer refresh (HTTP header on each request)
   2. TLS post-handshake authentication with new proof
   3. Periodic trust channel messages (WebSocket, gRPC stream)

3.5.  Service Mesh Identity (SPIFFE/SPIRE)

   SPIFFE provides service identity in cloud-native environments. KTP
   integrates naturally with SPIFFE identities.

3.5.1.  SPIFFE ID to Agent Mapping

   SPIFFE IDs map directly to KTP agent identities:

   SPIFFE ID: spiffe://example.com/service/payment-processor

   KTP Agent ID: agent:spiffe:example.com:service:payment-processor

   The mapping is deterministic, requiring no separate registry.

3.5.2.  SVID Enhancement

   SPIFFE Verifiable Identity Documents (SVIDs) can include KTP claims
   in the x509-svid or jwt-svid:

   JWT-SVID with KTP claims:

      {
        "sub": "spiffe://example.com/service/payment-processor",
        "aud": ["spiffe://example.com/service/api-gateway"],
        "exp": 1732550400,
        "ktp": {
          "e_base": 85,
          "e_trust": 78,
          "tier": "operator",
          "proof_sig": "sig:oracle:abc..."
        }
      }

3.5.3.  Trust Oracle as SPIRE Plugin

   SPIRE can be extended with a Trust Oracle plugin:

   1. Workload requests SVID from SPIRE Agent
   2. SPIRE Agent attests workload identity
   3. SPIRE Agent queries Trust Oracle plugin
   4. Trust Oracle returns current Trust Proof for workload
   5. SPIRE Agent issues SVID with embedded KTP claims
   6. Workload presents enhanced SVID to peers

   This integrates KTP into existing SPIFFE/SPIRE deployments with
   minimal architectural change.

4. Deployment Stages

4.1.  Stage 0: Observation

   Purpose: Establish baselines without any KTP evaluation.

   Duration: 2-4 weeks minimum

   Activities:

   - Deploy Context Tensor sensors
   - Collect environmental telemetry
   - Identify agents and action patterns
   - Establish normal operating ranges
   - No Trust Oracle, no Trust Proofs

   Deliverables:

   - Sensor coverage map
   - Environmental baseline report
   - Agent inventory
   - Action classification draft
   - Risk assessment for Stage 1

   Success Criteria:

   - All target sensors reporting
   - < 1% data gaps in telemetry
   - Agent inventory > 95% complete
   - Baseline variance understood

   What You Learn:

   - What is "normal" for your environment
   - Which sensors are reliable/noisy
   - How to classify your actions by risk
   - Where the boundaries should be

4.1.1.  Sensor Deployment

   Stage 0 sensor deployment focuses on observability:

   Minimum sensors:

   - CPU/memory utilization (Heat component)
   - Network throughput (Momentum component)
   - Active connections (Mass component)
   - Error rates (Heat component)
   - Request latency (Momentum component)

   Do NOT deploy:

   - Trust Oracle (not ready)
   - Policy Enforcement Points (nothing to enforce)
   - Flight Recorder (no decisions to record)

4.1.2.  Agent Discovery

   Identify all entities that will become KTP agents:

   - Service accounts
   - API clients
   - Human users (via SSO)
   - Automated jobs
   - Third-party integrations

   For each, capture:

   - Current authorization method
   - Typical action patterns
   - Peak usage times
   - Historical incidents

4.2.  Stage 1: Shadow Mode

   Purpose: Evaluate KTP decisions without enforcement.

   Duration: 4-8 weeks minimum

   Activities:

   - Deploy Trust Oracle (non-authoritative)
   - Generate Trust Proofs for all agents
   - Evaluate every request against KTP
   - Compare KTP decision to legacy decision
   - Log discrepancies for analysis

   Deliverables:

   - Shadow decision log
   - Discrepancy analysis report
   - False positive rate
   - False negative rate
   - Tuning recommendations

   Success Criteria:

   - KTP evaluation on > 99% of requests
   - False positive rate < 5%
   - False negative rate < 1%
   - No production impact

   What You Learn:

   - How KTP decisions compare to current authorization
   - Where Trust Scores need calibration
   - Which action risk classifications need adjustment
   - Likely impact of enforcement

4.2.1.  Shadow Architecture

   Shadow mode runs KTP in parallel:

                    ┌─────────────────┐
                    │  Incoming       │
                    │  Request        │
                    └────────┬────────┘
                    ┌────────▼────────┐
                    │  API Gateway    │
                    │  (Dual Eval)    │
                    └────────┬────────┘
              ┌──────────────┼──────────────┐
              │              │              │
              ▼              ▼              ▼
      ┌───────────┐  ┌───────────┐  ┌───────────┐
      │  Legacy   │  │   KTP     │  │  Shadow   │
      │  AuthZ    │  │  Eval     │  │  Logger   │
      └─────┬─────┘  └─────┬─────┘  └───────────┘
            │              │              ▲
            │              └──────────────┘
            │                (log only)
      ┌───────────┐
      │  Backend  │
      │  Service  │
      └───────────┘

   Legacy authorization remains authoritative. KTP evaluates but does
   not affect the request. Discrepancies are logged.

4.2.2.  Discrepancy Analysis

   For each request, log:

      {
        "timestamp": "2025-11-25T14:30:00Z",
        "request_id": "req-abc-123",
        "agent": "service:payment-processor",
        "action": "write_transaction",
        "legacy_decision": "allow",
        "legacy_reason": "scope:write present",
        "ktp_decision": "deny",
        "ktp_reason": "A(65) > E_trust(58)",
        "ktp_context": {
          "e_base": 72,
          "e_trust": 58,
          "risk_factor": 0.19,
          "action_risk": 65,
          "tier": "analyst",
          "tier_max_risk": 60
        },
        "discrepancy": true,
        "discrepancy_type": "legacy_allow_ktp_deny"
      }

   Aggregate discrepancies by:

   - Agent (which agents are most affected?)
   - Action (which actions are most contentious?)
   - Time (are there temporal patterns?)
   - Environmental state (high-risk times?)

4.3.  Stage 2: Advisory Mode

   Purpose: Present KTP recommendations to operators without automatic
   enforcement.

   Duration: 2-4 weeks

   Activities:

   - Surface KTP recommendations in admin UI
   - Alert on high-risk requests that KTP would deny
   - Allow operators to manually apply KTP constraints
   - Gather operator feedback on recommendations

   Deliverables:

   - Operator feedback report
   - Recommendation accuracy assessment
   - UI/UX refinements
   - Enforcement readiness assessment

   Success Criteria:

   - Operators find recommendations useful
   - > 80% of KTP denials validated by operators
   - < 10% of recommendations overridden
   - Operators comfortable with enforcement

4.3.1.  Advisory Dashboard

   The advisory dashboard shows:

   - Current environmental state (Context Tensor)
   - Agent Trust Scores (real-time)
   - Recent KTP recommendations
   - Discrepancy trend (improving?)
   - Projected enforcement impact

   Operators can:

   - Acknowledge recommendations
   - Override with justification (logged)
   - Adjust Trust Scores (within bounds)
   - Tune action risk classifications

4.3.2.  Alert Integration

   Advisory mode integrates with existing alerting:

   - PagerDuty: High-risk requests KTP would deny
   - Slack: Summary of recommendations
   - SIEM: All KTP evaluations for correlation
   - Dashboard: Real-time Trust Score display

4.4.  Stage 3: Canary Enforcement

   Purpose: Enforce KTP on small percentage of traffic.

   Duration: 2-4 weeks per increment

   Activities:

   - Enable KTP enforcement for 1% of traffic
   - Monitor for unexpected denials
   - Compare business metrics (latency, errors, conversions)
   - Gradually increase percentage

   Deliverables:

   - Canary performance report
   - Business metric comparison
   - Incident log (if any)
   - Expansion readiness assessment

   Success Criteria:

   - No unexpected outages
   - Business metrics within tolerance
   - Denial rate matches shadow predictions
   - Team confidence for expansion

4.4.1.  Canary Selection

   Canary traffic can be selected by:

   - Random sampling (1%, 5%, 10%, etc.)
   - Specific agents (start with lowest risk)
   - Specific actions (start with read-only)
   - Specific time windows (off-peak first)
   - Specific user segments (internal first)

   Recommended progression:

   1. 1% random, read-only actions
   2. 5% random, read-only actions
   3. 10% random, all actions
   4. 25% random, all actions
   5. 50% random, all actions
   6. Stage 4 (progressive by service)

4.4.2.  Canary Metrics

   Monitor during canary:

   - Request success rate (KTP vs legacy cohort)
   - P50/P95/P99 latency (KTP overhead)
   - Denial rate (expected vs actual)
   - False positive reports (user complaints)
   - Business conversion (if applicable)

4.5.  Stage 4: Progressive Enforcement

   Purpose: Expand KTP enforcement service by service.

   Duration: 1-2 weeks per service

   Activities:

   - Enable full KTP enforcement for one service
   - Monitor and validate
   - Move to next service
   - Repeat until all services covered

   Deliverables:

   - Per-service enforcement report
   - Cross-service dependency validation
   - Full coverage timeline
   - Legacy deprecation plan

   Success Criteria:

   - Each service stable under KTP enforcement
   - Cross-service calls function correctly
   - No rollbacks required
   - Team operating confidently

4.5.1.  Service Ordering

   Order services for progressive enforcement by:

   1. Dependency depth (leaves first, then parents)
   2. Risk level (low-risk first)
   3. Traffic volume (low-traffic first for learning)
   4. Team readiness (willing teams first)

   Example ordering:

   - Week 1: Internal tools, documentation services
   - Week 2: Analytics, reporting services
   - Week 3: Customer-facing read APIs
   - Week 4: Customer-facing write APIs
   - Week 5: Payment processing
   - Week 6: Core platform services

4.5.2.  Boundary Management

   During progressive enforcement, manage boundaries between:

   - KTP-enforced services (Blue)
   - Legacy-authorized services (Wild)

   Cross-boundary calls:

   - Blue -> Wild: Include Trust Proof (Wild may ignore)
   - Wild -> Blue: Require Trust Proof or bridge

   Trust bridging at boundary:

   - Wild service presents OAuth token
   - Gateway validates OAuth, queries Trust Oracle
   - Gateway issues Trust Proof based on OAuth identity
   - Request proceeds with bridged Trust Proof

4.6.  Stage 5: Full Enforcement

   Purpose: Complete KTP enforcement across all services.

   Duration: Ongoing

   Activities:

   - Retire legacy authorization for covered services
   - Operate Trust Oracle as authoritative
   - Full Flight Recorder logging
   - Continuous tuning and improvement

   Deliverables:

   - Legacy deprecation complete
   - Full KTP operational runbook
   - Incident response procedures
   - Ongoing metrics and reporting

   Success Criteria:

   - All services under KTP enforcement
   - Legacy authorization retired or identity-only
   - Operational stability demonstrated
   - Team fully trained and confident

4.6.1.  Legacy Retirement

   After full enforcement, legacy systems can be:

   - Retired completely (ideal for API keys)
   - Reduced to identity-only (OAuth for authn, KTP for authz)
   - Maintained as emergency fallback (temporary)

   Do NOT maintain parallel authorization long-term. This creates:

   - Confusion about authoritative source
   - Maintenance burden
   - Potential bypass vectors
   - Inconsistent audit trail

5. Trust Bootstrapping

   New agents entering KTP need initial Trust Scores. For migration,
   existing identities need bootstrap trust based on historical
   behavior.

5.1.  Initial Trust Assignment

   Bootstrap trust is assigned based on:

   1. Role category
   2. Historical behavior (if available)
   3. Sponsorship relationship
   4. Service criticality

5.1.1.  Role-Based Bootstrap

   Default initial E_base by role category:

   +----------------------+---------+------------+
   | Role Category        | E_base  | Tier       |
   +----------------------+---------+------------+
   | Infrastructure/Admin | 70      | Analyst    |
   | Production Service   | 60      | Analyst    |
   | Internal Tool        | 50      | Observer   |
   | External Integration | 40      | Observer   |
   | New/Unknown          | 30      | Observer   |
   | Probationary         | 20      | Hibernation|
   +----------------------+---------+------------+

   These are starting points. Trust increases through demonstrated
   reliable operation.

5.1.2.  Behavioral Import

   For identities with historical data, adjust bootstrap based on:

   - Incident history (reduce for past issues)
   - Operational tenure (increase for long stable operation)
   - Access patterns (increase for consistent patterns)
   - Compliance record (increase for clean audits)

   Example adjustment:

      base_bootstrap = 60 (production service)
      tenure_bonus = +5 (3+ years stable operation)
      incident_penalty = -10 (major incident in past year)
      compliance_bonus = +3 (clean SOC 2 audit)

      final_bootstrap = 60 + 5 - 10 + 3 = 58

5.2.  Historical Behavior Import

   If historical logs are available, construct synthetic trajectory:

   1. Extract access events from legacy logs
   2. Classify each event by action risk
   3. Identify any incidents or anomalies
   4. Calculate what Trust Score would have been
   5. Use terminal value as bootstrap E_base

   This gives agents "credit" for historical good behavior.

5.2.1.  Log Sources for Import

   - SIEM logs (authentication, authorization events)
   - Application logs (API calls, database queries)
   - Cloud provider logs (AWS CloudTrail, GCP Audit)
   - Network logs (flow data, firewall events)
   - Incident management (PagerDuty, ServiceNow)

5.2.2.  Import Limitations

   Historical import has limits:

   - Cannot reconstruct environmental context (R unknown)
   - Action risk classification may differ from current
   - Legacy systems may not log all relevant events
   - Time window affects reliability (recent > old)

   Treat imported history as approximation, not truth.

5.3.  Sponsorship Chains

   For agents without sufficient history, sponsorship provides bootstrap
   trust:

   1. Established agent sponsors new agent
   2. Sponsor stakes portion of their own trust
   3. New agent receives bootstrap from sponsor
   4. New agent operates as Tethered until sufficient history

   Sponsorship during migration:

   - Infrastructure team sponsors production services
   - Service owners sponsor their integrations
   - Security team sponsors security tooling
   - No agent bootstraps without sponsor

6. Hybrid Operation

6.1.  Dual-Stack Authorization

   During migration, both systems operate simultaneously:

   Request evaluation:

   1. Legacy system evaluates (OAuth scope, RBAC policy, etc.)
   2. KTP evaluates (A <= E_trust, tier constraints)
   3. Final decision based on configuration:
      - "legacy_primary": Legacy decides, KTP logged
      - "ktp_primary": KTP decides, legacy fallback
      - "unanimous": Both must allow
      - "either": Either allowing is sufficient

   Recommended progression:

   - Stage 1-2: legacy_primary
   - Stage 3: unanimous (most restrictive, safest)
   - Stage 4: ktp_primary
   - Stage 5: KTP only

6.2.  Boundary Enforcement

   During migration, clear boundaries define where KTP is enforced:

   - KTP Zone: Full KTP enforcement (Blue/Cyan)
   - Legacy Zone: Legacy authorization only (Wild)
   - Boundary Zone: Dual-stack, trust bridging (Green)

   Boundary PEPs handle translation:

      ┌─────────────────┐    ┌─────────────────┐
      │    KTP Zone     │    │   Legacy Zone   │
      │                 │    │                 │
      │  ┌───────────┐  │    │  ┌───────────┐  │
      │  │ Service A │◄─┼────┼──│ Service X │  │
      │  └───────────┘  │    │  └───────────┘  │
      │       │         │    │       │         │
      │       ▼         │    │       ▼         │
      │  ┌───────────┐  │    │  ┌───────────┐  │
      │  │ Service B │──┼────┼─►│ Service Y │  │
      │  └───────────┘  │    │  └───────────┘  │
      │                 │    │                 │
      └────────┬────────┘    └────────┬────────┘
               │                      │
               └──────────┬───────────┘
                  ┌───────▼───────┐
                  │ Boundary PEP  │
                  │ (Trust Bridge)│
                  └───────────────┘

6.3.  Gradual Perimeter Expansion

   Expand KTP enforcement perimeter gradually:

   Phase 1: Single service island

   - One service fully KTP-enforced
   - All dependencies via boundary PEP
   - Prove concept, build confidence

   Phase 2: Service cluster

   - Group of related services under KTP
   - Internal calls KTP-native
   - External calls via boundary

   Phase 3: Domain coverage

   - Entire domain (payments, users, etc.) under KTP
   - Cross-domain calls via boundary
   - Boundary shrinks as coverage expands

   Phase 4: Full coverage

   - All services under KTP
   - Boundary only at external edge
   - Legacy retired internally

7. Rollback Procedures

7.1.  Stage Regression

   If problems arise, regress to previous stage:

   - Stage 5 -> 4: Re-enable legacy for problematic services
   - Stage 4 -> 3: Reduce to canary percentage
   - Stage 3 -> 2: Disable enforcement, advisory only
   - Stage 2 -> 1: Disable recommendations, shadow only
   - Stage 1 -> 0: Disable KTP evaluation entirely

   Rollback should be:

   - Pre-planned (runbook ready)
   - Fast (< 5 minutes to execute)
   - Safe (no data loss)
   - Reversible (can re-advance when ready)

7.2.  Emergency Fallback

   For critical incidents:

   1. Disable KTP enforcement at gateway (single config change)
   2. All requests fall back to legacy authorization
   3. KTP continues logging (shadow mode) for analysis
   4. Investigate root cause
   5. Fix and re-enable

   Emergency fallback configuration:

      {
        "enforcement_mode": "emergency_fallback",
        "legacy_authoritative": true,
        "ktp_evaluation": "shadow",
        "alert": "security-team",
        "auto_restore_after": null,
        "requires_manual_restore": true
      }

7.3.  Data Preservation

   During rollback, preserve:

   - Trust Scores (don't reset agent progress)
   - Trajectory chains (maintain history)
   - Flight Recorder logs (audit continuity)
   - Configuration (restore point)

   Rollback affects enforcement, not data. When re-advancing, agents
   retain earned trust.

8. Success Metrics

   Track these metrics throughout migration:

8.1.  Adoption Metrics

   - Sensor coverage (% of environment instrumented)
   - Agent coverage (% of identities with Trust Scores)
   - Request coverage (% of requests KTP-evaluated)
   - Enforcement coverage (% of requests KTP-enforced)

8.2.  Accuracy Metrics

   - False positive rate (KTP denied, should have allowed)
   - False negative rate (KTP allowed, should have denied)
   - Discrepancy rate (KTP differs from legacy)
   - Override rate (operators overriding KTP)

8.3.  Performance Metrics

   - Evaluation latency (KTP overhead per request)
   - Oracle response time (Trust Proof generation)
   - PEP throughput (requests per second)
   - System availability (Oracle, PEP uptime)

8.4.  Security Metrics

   - Incidents prevented (Silent Veto in action)
   - Time to detect (anomaly identification)
   - Blast radius reduction (compared to legacy)
   - Audit completeness (Flight Recorder coverage)

8.5.  Business Metrics

   - Request latency (user-facing impact)
   - Error rate (failed requests)
   - Conversion rate (if applicable)
   - Operational cost (compared to legacy)

9. Security Considerations

9.1.  Migration-Specific Risks

   Dual-Stack Bypass: Attackers may target the weaker of two systems
   during hybrid operation. Ensure legacy system remains hardened.

   Trust Bootstrap Manipulation: Attackers may attempt to manipulate
   historical data to inflate bootstrap Trust Scores. Verify import
   sources.

   Boundary Exploitation: Attackers may exploit trust bridging at zone
   boundaries. Apply principle of least privilege at boundaries.

   Rollback Exploitation: Attackers may trigger conditions that cause
   rollback, then exploit legacy weaknesses. Monitor for patterns.

9.2.  Mitigations

   - Maintain legacy security posture during migration
   - Verify historical data integrity before import
   - Apply KTP constraints at boundaries even during bridging
   - Require approval for rollback, investigate triggers
   - Monitor for migration-aware attack patterns

10. References

10.1.  Normative References

   [KTP-CORE]
              Perkins, C., "Kinetic Trust Protocol - Core
              Specification", NMCITRA, November 2025.

   [KTP-ZONES]
              Perkins, C., "Kinetic Trust Protocol - Blue Zone
              Specification", NMCITRA, November 2025.

   [RFC6749]  Hardt, D., Ed., "The OAuth 2.0 Authorization Framework",
              RFC 6749, October 2012.

10.2.  Informative References

   [SAML2]    OASIS, "Security Assertion Markup Language (SAML) 2.0",
              March 2005.

   [SPIFFE]   SPIFFE Project, "Secure Production Identity Framework for
              Everyone", https://spiffe.io/

Authors' Addresses

   Chris Perkins
   New Mexico Cyber Intelligence & Threat Response Alliance (NMCITRA)

   Email: cperkins@nmcitra.org