---
vault_clearance: KETER
halo:
  classification: RESTRICTED
  confidence: MEDIUM
  front: "15_Project_ShadowsOfSight — BOOK"
  custodian: "The Architect"
  created: 2026-03-30
  updated: 2026-03-28
  wing: CONDITIONAL
  containment: "BOOK — bibliography + methods registry; not README / WORLDLINE / BOUNTY"
---

# ShadowsOfSight — BOOK

Canonical bibliography and methods registry for **15_Project_ShadowsOfSight** (integrity suite — concepts without keys). Convention: [`BOOK_Protocol.md`](../BOOK_Protocol.md). Orientation: [`README.md`](README.md). Open work: [`BOUNTY_BOARD.md`](BOUNTY_BOARD.md) · [`WORLDLINE.md`](WORLDLINE.md). Paradigm map: [`FORM.md`](FORM.md).


### Local registry slice (EYE / STAFF / STARS)

| Surface | Pointers |
|---------|----------|
| **EYEs** | Runs: [`README.md`](README.md) / [`WORLDLINE.md`](WORLDLINE.md) (if present). Registry: [`EYE_PROTOCOL.md`](../EYE_PROTOCOL.md) |
| **STAFF** | Runnable tools: [`STAFF_catalogue.json`](../STAFF_catalogue.json) — filter `project_dir` for this folder. |
| **STARS** | This file; rules: [`BOOK_Protocol.md`](../BOOK_Protocol.md). |
| **Audit sheet** | [`LOGGING_AND_REGISTRY_CHECKLIST.md`](../99_Archive/root_reports/2026-04/LOGGING_AND_REGISTRY_CHECKLIST.md) |


---

## 1. Integrity, attestation, and trusted execution (curate)

| ID | Kind | Note | Identifier |
|----|------|------|------------|
| SOS-B1 | Stub | TPM / remote attestation, transparency logs, sigstore-class patterns — add when threat model cites them | *See BOUNTY_BOARD* |
| SOS-T1 | Guidance | ENISA — EU cybersecurity agency publications (threat landscape, baseline guidance) | [https://www.enisa.europa.eu/publications](https://www.enisa.europa.eu/publications) |
| SOS-T2 | Regulation | eIDAS — EU framework for qualified trust services / electronic signatures | [https://digital-strategy.ec.europa.eu/en/policies/eidas-regulation](https://digital-strategy.ec.europa.eu/en/policies/eidas-regulation) |

---

## 2. Cryptographic agility and key ceremony (curate)

| ID | Kind | Note | Identifier |
|----|------|------|------------|
| SOS-B2 | Stub | Cross-ref Words of Tomorrow policy where encryption overlaps | [`../11_Project_WordsOfTomorrow/BOOK.md`](../11_Project_WordsOfTomorrow/BOOK.md) |

---

## 3. Bounty → start here

| Workstream | Start with |
|------------|------------|
| Integrity design | [`README.md`](README.md), [`FORM.md`](FORM.md) |

---

## STARS — US and international anchors

**US** complements §1 (ENISA, eIDAS): identity standards, supply-chain signing, threat knowledge base.

### How to read STARS (context)

**STARS** here are **identity, signing, and threat-knowledge** anchors. They **support integrity design**; **organizational policy** still decides adoption and scope.

| ID | What this STAR denotes | Typical use in this BOOK | Not / caveats |
|----|-------------------------|--------------------------|---------------|
| SOS-S1 | NIST SP 800-63 | US **digital identity** guidelines (IAL/AAL/FAL) | Revise with agency-specific overlays (e.g. federal profiles). |
| SOS-S2 | Sigstore | **Artifact signing** and transparency ecosystem | Project and policy evolve; read current docs for prod use. |
| SOS-S3 | MITRE ATT&CK | **Threat-informed** tactics/techniques knowledge base | Model, not telemetry; map to your environment. |

| ID | Region | Kind | Note | Identifier |
|----|--------|------|------|------------|
| SOS-S1 | US | Digital identity guidelines | NIST SP 800-63 Digital Identity Guidelines | [pages.nist.gov/800-63-3](https://pages.nist.gov/800-63-3/) |
| SOS-S2 | US / open | Artifact signing | Sigstore | [sigstore.dev](https://www.sigstore.dev/) |
| SOS-S3 | US | Threat-informed defense | MITRE ATT&CK | [attack.mitre.org](https://attack.mitre.org/) |

---

*BOOK revision: 2026-04-01 — STARS context table.*
