The Operational Profile defines a TSMM implementation that can support routine trust-relevant decision flows in a live system.
| Requirement | Description |
|---|---|
| Minimal Profile baseline | All Minimal Profile requirements |
| Governance context | Explicit context for policy interpretation |
| Profile and requirements | Defined requirement bundle or baseline |
| Lifecycle tracking | Suspension, revocation, or expiry handling |
| Verification path | One or more verification processes |
| Threat awareness | At least a documented threat set or failure taxonomy |
| Publication surface | A discoverable publication pattern for trust-relevant system state, profile references, or evaluation outputs |
An implementation claiming the Operational Profile should be able to show, in machine-readable or replayable form, at least the following:
An Operational Profile implementation can do real work without pretending runtime legitimacy is solved by vibes and a dashboard.