← Back to Home Legitimacy & Evidence Independent Review

RFC Process

Protective Computing now has a public process for proposing changes. The purpose is to make disagreements inspectable, evidence-gated, and version-bound rather than founder-routed or ad hoc.

What requires an RFC

Proposal Classes

ClassExamplesMinimum evidenceVersion impact
Documentation clarificationSharper wording, better examples, narrower non-claim languageConfusion source and exact proposed clarificationMinor or no version bump
Threat-boundary correctionNew threat class, out-of-scope correction, evidence correctionReproducible scenario or evidence packetUsually v1.1+
Control or mapping adjustmentCrosswalk change, audit evidence requirement update, rubric logic refinementArtifact diff plus rationale and reviewer impactMinor or release-note tracked
Normative changeNew MUST/SHOULD behavior, level criteria change, principle-level changeStrong evidence plus review and dissent handlingPotential major version impact

Workflow

  1. Open an RFC issue using the public template.
  2. State proposal class, scope, evidence, and exact affected artifacts.
  3. Collect at least one reviewer response or record that none arrived within the stated review window.
  4. Close as accepted, rejected, deferred, or superseded with written rationale.
  5. Bind accepted RFCs to versioned docs and release notes.

Release Binding

Accepted RFCs are not complete until they are recorded in the public release trail. Every accepted RFC should produce a visible release-history entry or update an existing one.

Review States

StateMeaning
DraftProposal opened but evidence or scope still incomplete.
ReviewOpen for external or internal critique.
AcceptedApproved with rationale and bound to a version target.
RejectedNot accepted; rationale published.
DeferredValuable, but postponed to a later cycle.
SupersededReplaced by a later RFC.

Acceptance Criteria

Evidence Sources

Open RFC Proposal Release History Review Template