TRQP-TSPP

TRQP Assurance Program Playbook

This document explains why the TRQP assurance toolchain exists, who it is for, and how to adopt it without needing to become a protocol historian.

It is written for program owners, product leaders, platform teams, and governance functions. Technical details live elsewhere.

The problem this solves

TRQP enables interoperable discovery and use of authoritative registries, trust lists, and recognition assertions.

In practice, deployments fail to scale for three predictable reasons:

  1. Interoperability is underspecified in production: teams pass a “demo conformance” bar but drift on edge cases, error semantics, and profile expectations.
  2. Security and privacy posture is not comparable: two implementations can both “support TRQP” while producing radically different risk surfaces.
  3. Evidence is not portable: adopters cannot produce the same audit-ready artifacts across environments, vendors, and change cycles.

The result is avoidable friction: stalled procurement, slow onboarding, repeated assessments, and expensive incident response.

The outcome

The TRQP assurance toolchain turns protocol intent into a repeatable assurance program:

The aim is not bureaucracy. The aim is cost containment and trust at scale.

Who this is for

What you get (repo map)

The TRQP assurance toolchain is intentionally decentralized (not a monorepo). Each repo has a clear job.

  1. TRQP Assurance Hub (this repo)
    • The “front door” and operating model
    • Canonical Assurance Levels (AL1–AL4)
    • Cross-repo guidance: profiles, evidence expectations, compatibility policy
  2. TRQP Conformance Suite (CTS)
    • Conformance profiles and tests
    • Evidence bundle outputs for interoperability results
  3. TRQP Security & Privacy Baseline (TSPP)
    • Security and privacy baseline requirements and checks
    • Evidence bundle outputs for baseline posture

How to adopt (30 / 60 / 90 day path)

First 30 days: baseline proof

Next 60 days: make it operational

Next 90 days: raise assurance

Where to start

Compatibility snapshot

As of this release line:

For “known-good” pairings, see docs/policies/compatibility.md.

Standards hooks for operating at scale (informative)

If your security team asks “what program does this map to?”, point them to:


Methodology references

Publication path

After a TSPP run, operators SHOULD bind the posture report into a Combined Assurance Manifest and publish the resulting evidence through the Assurance Hub Trust Registry reference service alongside the selected machine-readable assurance profile.