← A³RA Foundations

The SCG Responsibility Model

How Security, Compliance, and Governance divide responsibility to make trustworthy action enforceable at scale

Introduction

In this series, we established A3RA as the test for trustworthy action and introduced the Security, Compliance, and Governance (SCG) Framework as an architectural model for passing that test at scale, with minimal cost and complexity.

The SCG Framework assumes that Compliance is the most commercially valuable capability to automate—and therefore the practical objective of the design.

A compliance objective may include:

In this model, connected product Security is not an end in itself, but the essential foundation in service of compliance objectives. Governance updates policy, prioritizes remediation, and ensures accountability—also in service of compliance objectives.

Compliance itself is a comparative function: it evaluates the Security Posture of connected products against regulations, standards, and policy obligations. Because multiple compliance objectives will exist simultaneously, the SCG Framework is designed to scale in complexity over time.

Critically, compliance objectives are enforced across the two logical planes where cyber-physical actions take place:

The SCG Framework is also designed so that the center of gravity for each letter in the acronym maps to natural physical or logical abstractions in connected service design: the Edge (Security), the Operational Cloud (Compliance), and the Policy Cloud (Governance).

In practice these responsibilities are not mutually exclusive, but the division of labor serves as a useful mental model. Collectively, SCG makes the principles of A3RA—admissible, attributable, auditable, and recoverable action—a commercially viable, technically enforceable reality.

Layer 1: Security at the Edge — “The Actor”

The device/edge layer is where actions physically occur. This is the Actor in the model, operating in the real world. For this layer to be both safe and effective, it must be an empowered and responsible agent.

Primary role: Local admissibility & attributable action

Implementation design

In the SCG Framework, the Edge is principally responsible for the Security of the device.

Security is the verifiable, machine-observable description of a connected product’s actual state at a point in time. It consists of immutable or slow-changing properties, dynamic states, and local policy that collectively express integrity, identity, and operational condition. This is captured as the device’s Security Posture.

The Security Posture may be managed directly on the device, or managed on behalf of the device by a gateway, depending on topology and whether the architecture is retrofitting brownfield devices or implementing a greenfield design.

Security in SCG is descriptive, not evaluative. It answers: “What is this device, and what state is it in right now?”

Security does not determine whether a state is acceptable, legal, or permitted—that responsibility belongs to Compliance. Instead, Security provides the ground truth on which all compliance decisions and governance actions depend.

Typical security properties include firmware identity, cryptographic credentials, configuration state, execution mode, and attested measurements originating from the device or its trusted runtime.

Layer 2: Compliance in the Operational Cloud — “The Arbiter”

The Operational Cloud serves as the compliance engine for a fleet of connected products. This is the Arbiter: it compares each device’s Security Posture against a contextual definition of compliance. It inherits policy definitions and access rights from the Policy Cloud and re-hydrates context needed to evaluate whether posture is within an acceptable range for one or more compliance objectives.

Primary role: Defining admissibility & observing compliance

Implementation design

Rather than enforcing a single static configuration (which often breaks industrial operations), the compliance engine evaluates whether a device’s current posture falls within a permitted set of values:

Compliance(Device) = for all properties P in Posture(Device):
                     Value(P) ∈ AcceptableRange(P)

For each property in the Security Posture, define an acceptable range that can be dynamic and contextual:

AcceptableRange(P) may include:
- allowed_values:   e.g., permitted firmware versions
- allowed_min/max:  e.g., certificate age windows, patch-level dates, utilization thresholds
- context_rules:    e.g., site/operator constraints, maintenance mode exceptions, safe-mode status

This model is intrinsically dynamic. It allows multiple valid firmware versions, varying certificate expiry windows, and exception states (for example: maintenance mode) to exist simultaneously in a compliant fleet. That flexibility enables automation at fleet scale while accommodating the messy reality of operations.

The Arbiter’s job is to ensure the right rules are in the right hands—and to be the first to know when those rules are not being followed.

Layer 3: Governance in the Policy Cloud — “The Authority”

Governance is where human intent meets the system. It is where leaders define mission objectives and where ultimate accountability resides. It defines who is authorized to change posture, what happens when compliance fails, and how remediation is prioritized. This is the Authority.

Primary role: Setting intent & owning accountability

Implementation design

The Policy Cloud owns global governance logic and policy enforcement. It pushes policies southbound to the Operational Cloud, defining:

Industrial assets—especially mobile ones—often operate in denied environments where connectivity is intermittent. For this reason, SCG relies on cached governance at the Edge.

Defining clear scopes of authority

A key function of Governance is recognizing that authority is not one-size-fits-all. The framework accounts for this by defining clear scopes of authority so the right people have the right level of control.

Authority can be geographic: a fleet manager for Europe has authority over European assets but cannot change rules for devices in North America.

Authority can be role-based: a support technician may be authorized to view diagnostics but not to issue firmware updates. That power is reserved for qualified roles.

This enforces least privilege at the highest level of the system and creates a clear audit trail showing not just what policy changed, but who had correctly scoped authority to change it.

The Governance layer is where authority originates—and where the buck stops.

Why this separation matters

Resilience and safety by design

Because the edge has its own understanding of admissibility, it can continue operating safely—even if it loses connection to the cloud. This is foundational to resilient systems.

Agility and scalability

The cloud is freed from being a transactional bottleneck. By focusing on defining rules and observing exceptions, it can manage a fleet of millions as effectively as a fleet of one hundred. When regulations change, the Arbiter distributes new rules—without requiring firmware updates or fleet-wide downtime.

Auditability without ambiguity

This architecture provides a clear, defensible audit trail. When an incident occurs, the questions are simple and the answers are clear:

This transforms A3RA from a concept into an implementable and defensible architecture.

Conclusion

The SCG Framework is more than a technical architecture; it is a model for operationalizing trust.

By defining responsibilities across Security (the Actor), Compliance (the Arbiter), and Governance (the Authority), it provides a clear path to achieving and maintaining a trustworthy posture for connected products at scale. It turns the abstract principles of A3RA into a commercially viable and technically enforceable reality.

It recognizes that the edge must be an empowered, responsible agent—not a dumb endpoint. It treats compliance as dynamic, not a checkbox. And it addresses disconnected operations through resilient cached governance.

This is how organizations move beyond treating security and compliance as a tax and begin to leverage them as a competitive advantage—unlocking market access, building customer confidence, and enabling innovation with a foundation of verifiable trust.

Now that the architecture and its core responsibilities are defined, we can turn to the data that brings it to life.

Next: the essential pillars of a device’s Security Posture—what a device must provide to prove its own trustworthiness and enable the compliance, governance, and remediation cycle this framework makes possible.

← Previous: Foundation 3 — The Commercial Argument for the SCG Framework Next: Foundation 5 — The Security Posture Model →