Protective Computing now has a public process for proposing changes. The purpose is to make disagreements inspectable, evidence-gated, and version-bound rather than founder-routed or ad hoc.
| Class | Examples | Minimum evidence | Version impact |
|---|---|---|---|
| Documentation clarification | Sharper wording, better examples, narrower non-claim language | Confusion source and exact proposed clarification | Minor or no version bump |
| Threat-boundary correction | New threat class, out-of-scope correction, evidence correction | Reproducible scenario or evidence packet | Usually v1.1+ |
| Control or mapping adjustment | Crosswalk change, audit evidence requirement update, rubric logic refinement | Artifact diff plus rationale and reviewer impact | Minor or release-note tracked |
| Normative change | New MUST/SHOULD behavior, level criteria change, principle-level change | Strong evidence plus review and dissent handling | Potential major version impact |
Accepted RFCs are not complete until they are recorded in the public release trail. Every accepted RFC should produce a visible release-history entry or update an existing one.
| State | Meaning |
|---|---|
| Draft | Proposal opened but evidence or scope still incomplete. |
| Review | Open for external or internal critique. |
| Accepted | Approved with rationale and bound to a version target. |
| Rejected | Not accepted; rationale published. |
| Deferred | Valuable, but postponed to a later cycle. |
| Superseded | Replaced by a later RFC. |