var img = document.createElement('img'); img.src = "https://analytics.zks-standard.org/matomo.php?idsite=1&rec=1&url=https://zks-standard.org" + location.pathname; img.style = "border:0"; img.alt = "tracker"; var s = document.getElementsByTagName('script')[0]; s.parentNode.insertBefore(img,s);
Skip to main content
Version: 1.0-RC1 / CANDIDATE STANDARD

ZKS Comprehensive Test Catalog

Reference Workbook for ZKS-1.0 Compliance

Version: 1.1
Status: Comprehensive Guide (Extends ZKS-1.0 Appendix D)
Standard: ZKS-1.0


Overview

This workbook defines the comprehensive conformance tests for verifying ZKS compliance. It includes:

  1. Normative Tests - The tests defined in ZKS-1.0 Appendix D (mandatory reference)
  2. Extended Tests - Additional tests recommended for thorough compliance verification

Test Categories

CategoryCodeDescription
StructuralT-STRArchitecture and component mapping
Observable BehaviorT-OBSRuntime behavior verification
Capability AnalysisT-CAPProvider capability constraints
Revocation BoundaryT-REVDecryptability preservation
ExtendedT-EXTAdditional recommended tests

Compliance Levels

LevelDescription
MUSTRequired for any ZKS compliance claim
SHOULDRequired for ZKS-Enhanced and above
MAYRecommended for ZKS-Enterprise

Part I: Normative Tests (ZKS-1.0 Appendix D)

The following tests are defined in the normative reference table of ZKS-1.0 Appendix D. All implementations claiming ZKS compliance MUST address these tests.

Normative Reference Table

Test IDTest NameAssertion/InvariantSection Reference
T-STR-1Component MappingAll3.2–3.4, Appendix C
T-STR-2Plane AlignmentA5, INV-33.3, 4, Appendix C
T-OBS-1Ciphertext-Only Data PlaneA1, A23.5.2, 3.6, 7.5.2 E1
T-OBS-2OP Key-Plane BlindnessA53.5.5, 4.5, 5.3.4
T-OBS-3KCS/UKRS BlindnessA93.5.3, 4.10, 7.4.3
T-CAP-1Provider Infrastructure AccessA2, A37.5.2 E2, 5.3.3
T-CAP-2Collusion TestA3, Tenet 45.3.6, 7.5.2 E4
T-CAP-3Opaque Enforcement PointA126.2.4, 7.4.3
T-CAP-4Binary Transparency VerificationA2, A35.3.1, 7.4.4, 7.5.2
T-REV-1Availability vs DecryptabilityA4, INV-42.2.6, 4.6, 5.3.2, 7.5.2 E3
T-REV-2UKRS Denial TestA4, A94.10, 7.4.3, 7.5.2 E3

Structural Tests (T-STR)

T-STR-1: Component Mapping

Requirement: The implementation MUST document all system components and their relationship to the Client Sovereignty Domain (CSD).

AspectVerification
Procedure1. Document all system components.
2. Classify each as "Inside CSD" or "Outside CSD".
3. Map components to the reference architecture (Appendix C).
4. Verify all decryption-capable components are inside CSD.
EvidenceArchitecture diagram with explicit boundary annotation; component inventory.
Pass CriteriaAll components mapped; all decryption keys and engines reside exclusively within the CSD.
Maps ToSections 3.2–3.4, Appendix C, All Assertions

T-STR-2: Plane Alignment

Requirement: The implementation MUST demonstrate correct alignment of components to Data Plane, Key Plane, and Control Plane.

AspectVerification
Procedure1. Map each component to its plane(s).
2. Identify any component spanning multiple planes.
3. Verify no external component spans both Data Plane and Key Plane.
4. Verify Orchestration Plane (OP) alignment per Section 3.5.5.
EvidencePlane separation diagram; component-to-plane mapping table.
Pass CriteriaAll components correctly aligned; no single external component spans Data Plane and Key Plane.
Maps ToSection 3.3, Section 4, A5, INV-3, Appendix C

Observable Behavior Tests (T-OBS)

T-OBS-1: Ciphertext-Only Data Plane

Requirement: Transfers to the Ciphertext Storage Substrate (CSS) MUST NOT include plaintext or unwrapped keys.

AspectVerification
Procedure1. Capture network traffic to/from CSS.
2. Audit storage logs.
3. Verify payloads are high-entropy (encrypted).
4. Confirm no plaintext or key material in Data Plane traffic.
EvidenceNetwork capture (PCAP) or storage inspection report; entropy analysis.
Pass CriteriaNo plaintext or key material detected in Data Plane traffic.
Maps ToSection 3.5.2, Section 3.6, 7.5.2 E1, A1, A2

T-OBS-2: OP Key-Plane Blindness

Requirement: The Orchestration Plane (OP) MUST NOT observe, log, or retain key material.

AspectVerification
Procedure1. Trigger synchronization/device-pairing events.
2. Inspect OP logs and traffic.
3. Verify OP handles only opaque references, not key content.
4. Confirm OP possesses zero cryptographic state.
EvidenceOP log sample; API specification; traffic analysis.
Pass CriteriaOP possesses zero cryptographic state; no key material in OP logs or traffic.
Maps ToSection 3.5.5, Section 4.5, Section 5.3.4, A5

T-OBS-3: KCS/UKRS Blindness

Requirement: External Key Custody Services (KCS) and User-Controlled Key Recovery Services (UKRS) MUST be cryptographically blind.

AspectVerification
Procedure1. Audit KCS/UKRS storage format.
2. Verify keys are wrapped by KEK held only in CSD.
3. Verify KCS/UKRS has no access to unwrapping keys.
4. Confirm service cannot decrypt stored key material.
EvidenceCryptographic protocol review; KCS/UKRS database schema; key wrapping analysis.
Pass CriteriaService handles only wrapped/encrypted key packets; cannot unwrap.
Maps ToSection 3.5.3, Section 4.10, Section 7.4.3, A9

Capability Analysis Tests (T-CAP)

T-CAP-1: Provider Infrastructure Access

Requirement: The provider MUST NOT possess the technical capability to decrypt user data, even with full administrative access to provider infrastructure.

AspectVerification
Procedure1. Assume root/admin access to all provider databases and servers.
2. Attempt to decrypt a specific user record.
3. Attempt to unwrap user keys using only provider-held assets.
4. Document why decryption is technically impossible.
EvidenceThreat model "Red Team" analysis; cryptographic proof of impossibility.
Pass CriteriaProvider cannot produce plaintext from held assets under any circumstance.
Maps ToSection 5.3.3, 7.5.2 E2, A2, A3

T-CAP-2: Collusion Test

Requirement: No colluding set of external parties MUST be able to derive decryptability.

AspectVerification
Procedure1. Identify all external components (OP, CSS, KCS, etc.).
2. Combine all data accessible to external parties.
3. Analyze if the combination yields the "Complete Set of Components" for decryption.
4. Document why collusion is insufficient.
EvidenceCollusion analysis document; component data inventory.
Pass CriteriaSum of all external knowledge < Decryptability; collusion cannot succeed.
Maps ToSection 5.3.6, 7.5.2 E4, A3, Tenet 4

T-CAP-3: Opaque Enforcement Point

Requirement: Where Policy Enforcement Points (PEPs) exist, they MUST operate on opaque (encrypted) data without access to plaintext or decryption capability.

AspectVerification
Procedure1. Identify all Policy Enforcement Points in the architecture.
2. Verify PEPs operate only on encrypted data or metadata.
3. Confirm PEPs have no access to decryption keys.
4. Verify policy decisions do not require plaintext inspection.
EvidencePEP architecture documentation; data flow analysis showing opacity.
Pass CriteriaAll PEPs operate without plaintext access; enforcement based on metadata or encrypted attributes only.
Maps ToSection 6.2.4, Section 7.4.3, A12

T-CAP-4: Binary Transparency Verification

Requirement: The system MUST ensure that all distributed client binaries are recorded in a public, append-only transparency log, and the client software MUST verify its own inclusion in this log to prevent targeted, unlogged malicious updates.

AspectVerification
Procedure1. Log Inspection: Access the declared public transparency log and verify it is accessible and structurally sound (append-only).
2. Inclusion Check: Hash the currently deployed client binary. Query the log to verify that this specific hash is present.
3. Client Verification Logic Test: In a test environment, deploy a modified or "dummy" update binary that is not submitted to the log. Attempt to force the client to update to or run this binary.
4. Targeted Attack Simulation: Block the client's access to the log server (or return a fake response) and verify:
- The client refuses to install or update to any new binary
- The client MAY continue operating with its current verified binary
- The client SHOULD alert the user to the verification failure.
EvidenceURL of the public log; Cryptographic inclusion proofs for current releases; Network captures showing the client performing the verification lookup; Client logs showing rejection of unverified binaries.
Pass Criteria1. The specific binary hash is found in the public log.
2. The client refuses to install or execute any binary that lacks a valid inclusion proof.
3. The log infrastructure is append-only with cryptographic integrity guarantees. Witness cosigning is RECOMMENDED for enhanced tamper resistance.
NoteFor multi-platform deployments, all platform-specific binaries (Windows, macOS, Linux, mobile) MUST be independently logged and verified.
Maps ToSection 5.3.1, 7.5.2 (E1/E4)

Revocation Boundary Tests (T-REV)

T-REV-1: Availability vs Decryptability

Requirement: Service denial (Availability Failure) MUST NOT revoke decryptability for data already held by the user.

AspectVerification
Procedure1. Ensure user has local copies of ciphertext and keys.
2. Disconnect CSD from internet (simulate total provider outage).
3. Attempt to decrypt locally cached ciphertext.
4. Verify decryption succeeds without any provider contact.
Evidence"Unplugged" test video or log; offline decryption demonstration.
Pass CriteriaDecryption succeeds without calling home; availability ≠ decryptability.
Maps ToSection 2.2.6, Section 4.6, Section 5.3.2, 7.5.2 E3, A4, INV-4

T-REV-2: UKRS Denial Test

Requirement: Denial of UKRS service MUST NOT permanently revoke decryptability if the user possesses sovereign restoration artifacts.

AspectVerification
Procedure1. Ensure user has sovereign restoration artifacts (backup, mnemonic, recovery key).
2. Delete local keys from all devices.
3. Simulate UKRS denial ("Account Suspended" or service unavailable).
4. Execute Sovereign Restoration using only user-held artifacts.
5. Verify full functionality restored with zero provider cooperation.
EvidenceIndependent restoration test results; step-by-step documentation.
Pass CriteriaUser can restore full decryptability solely from user-held artifacts.
Maps ToSection 4.10, Section 7.4.3, 7.5.2 E3, A4, A9, Appendix B

Part II: Extended Tests (Recommended)

The following tests extend the normative catalog with additional verification procedures. These tests are RECOMMENDED for comprehensive compliance assessment but are not part of the normative Appendix D.

Extended tests use the prefix T-EXT followed by the category code.


Extended Structural Tests (T-EXT-STR)

T-EXT-STR-1: Sovereignty Boundary Identification

Requirement: The implementation SHOULD explicitly document the sovereignty boundary with formal definition.

AspectVerification
Procedure1. Define the precise sovereignty boundary.
2. Document trust assumptions at the boundary.
3. Identify all crossing points (data flows across boundary).
EvidenceSovereignty boundary specification document.
Pass CriteriaBoundary clearly defined; all crossings documented and justified.
ExtendsT-STR-1 (Component Mapping)

T-EXT-STR-2: Component Classification & Exposure

Requirement: All external components SHOULD have explicit data exposure classifications.

AspectVerification
ProcedureFor each external component, document exactly what data types (ciphertext, metadata, wrapped keys) it handles and under what conditions.
EvidenceComponent exposure matrix.
Pass CriteriaAll exposures documented; no unexpected data handling.
ExtendsT-STR-1, T-STR-2

T-EXT-STR-3: Coexistence Analysis

Requirement: The implementation SHOULD demonstrate that no provider-controlled infrastructure holds both ciphertext and key material.

AspectVerification
Procedure1. For each storage location, document what is stored.
2. Identify any coexistence of data types.
3. Verify separation is maintained across all provider components.
EvidenceStorage inventory with data classification; coexistence analysis.
Pass CriteriaNo provider storage contains both ciphertext AND any form of key material.
ExtendsT-CAP-1, Tenet 3

Extended Observable Behavior Tests (T-EXT-OBS)

T-EXT-OBS-1: Metadata Exposure Audit

Requirement: External components SHOULD NOT accumulate metadata enabling derivation of decryptability.

AspectVerification
Procedure1. Document all metadata visible to each external component.
2. Analyze correlation potential across components.
3. Verify metadata minimization controls.
EvidenceMetadata inventory; logging configuration audit.
Pass CriteriaNo component accumulates sufficient metadata to derive decryption capability.
ExtendsA7, INV-6

T-EXT-OBS-2: Decryption Location Verification

Requirement: All decryption operations SHOULD be verified to occur exclusively within the CSD.

AspectVerification
Procedure1. Trace all decryption code paths.
2. Verify execution location for each path.
3. Confirm no decryption occurs on provider infrastructure.
EvidenceCode audit; execution trace analysis.
Pass CriteriaAll decryption code paths execute within CSD.
ExtendsT-OBS-1, A1

Extended Capability Analysis Tests (T-EXT-CAP)

T-EXT-CAP-1: Coercion Resistance Assessment

Requirement: The implementation SHOULD document provider capability under legal compulsion scenarios.

AspectVerification
Procedure1. Analyze provider capability under subpoena/court order.
2. Document what provider can and cannot produce.
3. Verify technical impossibility of compliance with decryption demands.
EvidenceCoercion analysis document; legal-technical review.
Pass CriteriaProvider cannot produce plaintext even if legally compelled.
ExtendsT-CAP-1, Section 5.2.3, Tenet 2

T-EXT-CAP-2: Future Decryptability Analysis

Requirement: The implementation SHOULD assess "Harvest Now, Decrypt Later" risk.

AspectVerification
Procedure1. Analyze what provider retains over time.
2. Assess risk if current cryptography is broken in future.
3. Document retention policies and cryptographic shelf-life.
EvidenceRetention analysis; cryptographic shelf-life assessment.
Pass CriteriaProvider retention policies minimize long-term accumulation risk.
ExtendsT-CAP-1, Section 5.3.2, Tenet 3

T-EXT-CAP-3: Component Control Analysis

Requirement: The implementation SHOULD document control relationships for all components handling sensitive data.

AspectVerification
Procedure1. For each component, determine who controls it.
2. Document what each controlled component holds.
3. Verify no single controller has both ciphertext and key material.
EvidenceControl matrix.
Pass CriteriaNo single party controls components containing both ciphertext AND key material.
ExtendsT-CAP-2, Tenet 3, A2, A3

Extended Revocation Boundary Tests (T-EXT-REV)

T-EXT-REV-1: Provider Termination Resilience

Requirement: The implementation SHOULD remain functional if the provider ceases operations.

AspectVerification
Procedure1. Analyze user capability if provider terminates business.
2. Document dependencies on provider services.
3. Verify user retains all keys and data access.
EvidenceContinuity/Exit Plan analysis.
Pass CriteriaUser retains full decryptability after provider termination.
ExtendsT-REV-1, T-REV-2, A4

T-EXT-REV-2: Topology Independence

Requirement: Users SHOULD be able to relocate data without provider permission.

AspectVerification
Procedure1. Export ciphertext from current storage.
2. Migrate to alternative storage (different provider or local).
3. Verify decryption still works without re-encryption.
EvidenceMigration test results.
Pass CriteriaUser can relocate all data without provider cooperation or re-encryption.
ExtendsA6, INV-5

Part III: Profile-Specific Tests

ZKS-Enhanced Requirements

Test IDRequirementProcedure & Verification
T-ENH-1Update TransparencyProcedure: Verify that client software updates are logged in a public transparency log or use multi-party signing.
Pass Criteria: Malicious updates cannot be targeted at specific users without detection.
T-ENH-2Metadata MinimizationProcedure: Audit all external logs.
Pass Criteria: Logs contain NO semantic identifiers (e.g., filenames, contact names) even in encrypted form if correlation is possible.
T-ENH-3Binary IntegrityProcedure: Verify that the client binary is reproducible or cryptographically verifiable against the public manifest.
Pass Criteria: User can independently verify the running code matches the published source/release.

ZKS-Enterprise Requirements

Test IDRequirementProcedure & Verification
T-ENT-1Split TopologyProcedure: Verify that CSS (Storage) and OP (Signal) are operated by distinct legal/technical entities.
Pass Criteria: No single provider sees both traffic streams.
T-ENT-2Enterprise DelegationProcedure: Test admin workflows.
Pass Criteria: Enterprise admins can manage access policies but CANNOT decrypt user data or impersonate users to obtain keys.
T-ENT-3On-Premise OptionProcedure: Verify availability of self-hosted Key/Control plane components.
Pass Criteria: Organization can host critical sovereignty components internally.
T-ENT-4Independent AuthProcedure: Verify that Key Recovery requires authentication independent of the primary IdP (e.g., separate OOB token).
Pass Criteria: Compromise of primary corporate IdP does not yield decryptability.

Part IV: Test Evidence Requirements

Documentation Requirements

Evidence TypeDescriptionRequired For
Architecture DiagramSovereignty boundary and component mappingAll (T-STR-1)
Plane Separation DiagramData/Key/Control plane mappingAll (T-STR-2)
Threat AnalysisProvider capability and collusion analysisAll (T-CAP-1, T-CAP-2)
Protocol SpecificationKey management and encryption protocolsAll
API DocumentationExternal service interfacesAll
Test ResultsExecution of T-REV testsAll (T-REV-1, T-REV-2)

Attestation Requirements

AttestationDescriptionRequired For
Self-AssessmentVendor attestation of complianceZKS-Core
Peer ReviewWorking Group member reviewZKS-Enhanced
Third-Party AuditIndependent security assessmentZKS-Enterprise

Part V: Test Result Classification

Pass/Fail Criteria

ResultMeaning
PASSRequirement fully satisfied.
CONDITIONALSatisfied with documented constraints (must be disclosed).
FAILRequirement not satisfied (non-compliant).
N/ARequirement not applicable (e.g., no KCS/UKRS used).

Conditional Pass Requirements

A CONDITIONAL pass requires:

  1. Clear documentation of the constraint
  2. Explanation of why full compliance is not achieved
  3. Assessment that the constraint does not undermine sovereignty
  4. User disclosure of the limitation

Part VI: Compliance Determination

Minimum Requirements

ProfilePass Requirements
ZKS-CoreAll normative tests (T-STR, T-OBS, T-CAP, T-REV) pass; no FAIL on any assertion
ZKS-EnhancedZKS-Core + all T-ENH tests pass
ZKS-EnterpriseZKS-Enhanced + all T-ENT tests pass

Non-Compliance Indicators

Any of the following results in immediate non-compliance:

IndicatorTest Reference
Provider can decrypt user dataT-CAP-1 FAIL
Collusion enables decryptabilityT-CAP-2 FAIL
PEPs have plaintext accessT-CAP-3 FAIL
Unlogged binaries accepted by clientT-CAP-4 FAIL
Service denial revokes decryptabilityT-REV-1 FAIL
No sovereign restoration pathwayT-REV-2 FAIL
Components not properly mappedT-STR-1 FAIL
Plane separation violatedT-STR-2 FAIL

Appendix: Test ID Quick Reference

Normative Tests (ZKS-1.0 Appendix D)

Test IDTest NameCategory
T-STR-1Component MappingStructural
T-STR-2Plane AlignmentStructural
T-OBS-1Ciphertext-Only Data PlaneObservable Behavior
T-OBS-2OP Key-Plane BlindnessObservable Behavior
T-OBS-3KCS/UKRS BlindnessObservable Behavior
T-CAP-1Provider Infrastructure AccessCapability Analysis
T-CAP-2Collusion TestCapability Analysis
T-CAP-3Opaque Enforcement PointCapability Analysis
T-CAP-4Binary Transparency VerificationCapability Analysis
T-REV-1Availability vs DecryptabilityRevocation Boundary
T-REV-2UKRS Denial TestRevocation Boundary
Test IDTest NameExtends
T-EXT-STR-1Sovereignty Boundary IdentificationT-STR-1
T-EXT-STR-2Component Classification & ExposureT-STR-1, T-STR-2
T-EXT-STR-3Coexistence AnalysisT-CAP-1
T-EXT-OBS-1Metadata Exposure AuditA7
T-EXT-OBS-2Decryption Location VerificationT-OBS-1
T-EXT-CAP-1Coercion Resistance AssessmentT-CAP-1
T-EXT-CAP-2Future Decryptability AnalysisT-CAP-1
T-EXT-CAP-3Component Control AnalysisT-CAP-2
T-EXT-REV-1Provider Termination ResilienceT-REV-1, T-REV-2
T-EXT-REV-2Topology IndependenceA6

Profile-Specific Tests

Test IDTest NameProfile
T-ENH-1Update TransparencyZKS-Enhanced
T-ENH-2Metadata MinimizationZKS-Enhanced
T-ENH-3Binary IntegrityZKS-Enhanced
T-ENT-1Split TopologyZKS-Enterprise
T-ENT-2Enterprise DelegationZKS-Enterprise
T-ENT-3On-Premise OptionZKS-Enterprise
T-ENT-4Independent AuthZKS-Enterprise

This catalog is a comprehensive guide supporting the normative ZKS-1.0 Standard. Part I reproduces the normative test table from Appendix D for convenience. Parts II–VI provide extended guidance for thorough compliance assessment.