Q&As — Build / Runtime / Governance
Direct answers to questions engineers ask, organized by lifecycle phase. Build covers SDLC, CI/CD, and build-time integrations. Runtime covers state, variables, DB access, middleware, observability. Governance covers accessibility, auditability, and evidence packaging.
Build
B1 How does Essence fit into our existing SDLC?
What Stays
- Version control, branching, and code review practices
- CI orchestration — Jenkins, GitHub Actions, GitLab CI
- Artifact repositories — Nexus, Artifactory, container registries
- Scanning tools — SAST, DAST, dependency, license
- Deployment targets — cloud, on-prem, edge
What Gets Added
- Intent-driven specification as a source-of-truth input
- Optional certification bundles attached to releases
- Optional governed runtime for selected workloads
B2 What CI/CD tooling is supported out of the box?
- Git, GitHub, GitLab, Bitbucket
- Jenkins, GitHub Actions, GitLab CI, Azure DevOps
- Maven, Gradle, CMake, Ninja, Bazel
- Docker, BuildKit, GHCR, ECR, GCR, ACR
- SAST / DAST / dependency / license / SBOM tooling
- Sigstore / cosign / SLSA / in-toto provenance
See CI/CD & DevSecOps for the complete compatibility matrix.
B3 How do we handle versions, branches, and forks?
- Source control: Wantware intent files live in the repo alongside conventional source
- Branching: standard branch / merge workflows apply
- Lineage: InfoSigns carry version and fork history for referenced assets
- Reproducibility: the same inputs produce verifiable outputs via signed build attestations
B4 Can we generate SBOMs and provenance data?
- SBOM formats: CycloneDX and SPDX
- Signing: cosign, Sigstore
- Provenance: in-toto, SLSA-level attestations
- Bundling: all of the above package into certification bundles per release
Runtime
R1 How is state and variable handling managed?
State Management
- Persistent state in existing storage systems (RDBMS, KV stores, object storage)
- Transient state handled by runtime with lifecycle bounded by declared purpose
- Event-sourced workflows supported where state needs replay semantics
Variable Handling
- Value ranges, precision, and type constraints declared in meaning, not guessed by compiler
- Runtime enforces declared bounds (e.g., financial values carry rounding and concurrency rules)
- See Meaning Coordinates for the encoding model
R2 How does database integration work?
- RDBMS: PostgreSQL, MySQL, SQL Server, Oracle via standard drivers
- NoSQL: MongoDB, DynamoDB, Cassandra, Redis
- Analytics: Snowflake, BigQuery, Redshift, Databricks
- Graph: Neo4j and compatible graph stores
- Access to regulated data can be scoped by declared purpose (e.g., "analytics, read-only, no PII export")
R3 How are middleware and integration patterns handled?
- Message queues: Kafka, RabbitMQ, Pulsar, SQS, Service Bus
- API gateways: Kong, Apigee, AWS API Gateway, Azure API Management
- Service mesh: Istio, Linkerd, Consul Connect
- Load balancers: HAProxy, Nginx, cloud LBs
R4 How does observability work at runtime?
- Traces: OpenTelemetry trace IDs flow end-to-end
- Metrics: Prometheus and OTLP metrics feed the usual dashboards
- Logs: structured JSON events flow to SIEM and log stores
- Audit events: policy-linked records with declared-purpose and authority context
See Audit Telemetry for the event schema.
R5 How are scaling and autoscaling handled?
- Kubernetes HPA, VPA, cluster autoscaler
- Cloud autoscaling (AWS, GCP, Azure, OCI)
- Serverless execution targets (Lambda, Functions, Cloud Run)
- Policy can bound scale behavior — e.g., "never cross regions", "cap compute spend"
R6 What happens when a runtime policy denies an action?
See the Audit Telemetry page for the event schema and example records, and Policy & Purpose for the enforcement model.
Governance
G1 Does the platform support WCAG and Section 508 accessibility?
- Standard ARIA and semantic HTML in generated outputs
- Compatible with axe-core, WAVE, Lighthouse accessibility audits
- Accessibility requirements expressible as part of intent rather than bolt-on
G2 How are evidence bundles generated and delivered?
- Contents: SBOM, scan reports, signed artifacts, policy snapshots, integrity manifest, bundle signature
- Formats: ZIP, OCI
- Delivery: artifact repository, SFTP, customer portal, audit handoff
- Verification: external verifiers check signatures and hashes without live access
G3 How are access controls and authorization audited?
- Policy decisions logged with rule version and decision reason
- Identity events correlate with existing IdP audit (Okta, Entra, Ping, Auth0)
- Access review reports derived from event stream rather than ad-hoc queries
G4 How do we handle regulatory reviews and auditor requests?
See Regulatory Alignment for how bundles map to specific frameworks, and Trust Certification for bundle composition.
G5 What's the story for incident response?
- Event streams with policy and purpose context for the affected window
- Per-version bundles describing what was running and how it was built
- Correlation traces that bind build, deploy, and runtime together
- Optional incident-scoped bundle delivery for partners and regulators