# Context Continuity Layer (CCL) — contextcontinuitylayer.org > CCL is a post-authentication governance layer that preserves, governs, and propagates contextual state across distributed systems and AI agents. It is neutral context infrastructure — vendor-agnostic, tokenization-first, audit-ready, and built for the agentic AI era. ## About Context Layer Systems builds CCL: a structured middleware layer that sits between authentication and downstream system access. Where identity providers verify *who* a user is, CCL governs *what context* any system or AI agent can see, use, and act upon — and produces cryptographic proof that governance was enforced. CCL is designed to answer three questions any compliance officer, auditor, or AI regulator will ask: - Can you prove what context your AI saw before it made a decision? - Can you show that consent governed every data propagation? - Can you demonstrate erasure across every connected system? ## Key Concepts - **Context Continuity Layer (CCL)**: The middleware layer that governs contextual state from authentication through AI agent inference, ensuring policy compliance at every propagation point. - **Context Continuity**: The property that contextual data remains consistent, governed, and auditable as it flows across distributed systems and AI agents. - **Post-authentication governance**: A control layer that activates after identity verification — governing what context is propagated, to whom, under what policy, and for what declared purpose. - **Context Envelope**: A cryptographically signed, AES-256-GCM encrypted bundle containing 7 structured context layers, issued per session, scoped by policy. - **CCL Context Token**: A signed JWT (RS256) carrying the context envelope, used for adapter handshakes. Analogous to an access token, but for contextual state rather than identity. - **Cryptographic Erasure**: The destruction of an AES key that encrypted a subject's context envelope — rendering the payload permanently inaccessible across all adapters, with per-adapter HMAC proof of deletion. - **Consent Lifecycle**: Full tracking of consent grants, revocations, purpose-basis changes, and propagation receipts across all connected systems. - **Policy Enforcement Engine**: A CCL Rego-based rules engine that evaluates every context access request against declared purpose, consent status, risk score, and jurisdictional rules before permitting propagation. - **Context Propagation**: The controlled delivery of scoped context to downstream adapters (CRM, data warehouse, AI agents, analytics platforms) under verified consent and active policy. - **Audit Trail**: An append-only, HMAC-signed ledger of every CCL operation — identity ingestion, envelope construction, policy evaluation, context propagation, and key rotation. - **STACC**: A related product by Context Layer Systems — a structured context accumulation layer. Separate from CCL. ## The 7 Context Layers CCL assembles context into a 7-layer envelope, each layer governed independently: 1. **Identity** — Subject reference, org domain, assurance level, IdP issuer binding 2. **Behavioral** — Access patterns, risk score, anomaly flags, device fingerprint 3. **Temporal** — Issue time, TTL, clock confidence, causality vector 4. **Transactional** — Workflow ID, idempotency key, state version, approval chain 5. **Relational** — Org domain, memberships, delegated-to list, cross-entity constraints 6. **Regulatory** — Jurisdiction, consent basis, retention policy, GDPR lawful basis 7. **Predictive** — Model version, feature flags, uncertainty score, drift indicators ## The 8-Phase CCL Lifecycle The full CCL flow from authentication to cryptographic erasure: 1. **Identity Provider (IdP & SSO)** — Ingests identity from Okta, Azure AD, Google Workspace, Auth0, Ping, SAML, or GitHub. Normalizes to CCL's schema. 2. **Capture & Normalize** — Converts the raw IdP assertion into a structured CCL event stream. Produces normalized lines for envelope assembly. 3. **Consent Capture** — Records the subject's consent grants by purpose (functional, analytics, personalization, AI inference, audit compliance, behavioral profiling, cross-session). Lawful basis captured per GDPR Art. 6. 4. **Context Envelope Construction** — Assembles all 7 layers into a signed, encrypted context envelope. Issues a CCL Context Token (JWT, RS256). Encrypts at rest with AES-256-GCM under a per-tenant key. 5. **Policy Evaluation** — Evaluates the context token against the active CCL Rego policy. Decides ALLOW, DENY, or SCOPE_REDUCE per adapter and per context domain. 6. **Context Propagation** — Delivers scoped context to downstream adapters (CRM, data warehouse, AI agent, analytics). Each adapter receives only the domains and fields permitted by policy and consent. 7. **Audit Trail** — Streams all session events to the append-only ledger. Events are HMAC-signed and retained independently of the context payload. 8. **Cryptographic Erasure** — On deletion request, rotates and destroys the AES key. Payload becomes permanently inaccessible. Each adapter confirms erasure with an HMAC-signed receipt. ## Compliance Reports CCL generates five categories of pre-built compliance evidence: - **Consent Lifecycle Audit** — Full history of consent grants, revocations, and propagation receipts. Mapped to GDPR Art. 7, GDPR Art. 5(2), CCPA. - **AI Decision Provenance** — End-to-end trace of what context an AI agent received, what was denied, and the decision output hash. Mapped to EU AI Act Art. 14, FDA AI/ML Guidance, NIST AI RMF. - **Cross-System Access Log** — Per-adapter access log showing which system accessed what context, when, under what policy, for what declared purpose. Mapped to SOC 2 Type II, HIPAA §164.312, ISO 27001. - **Erasure Verification** — Cryptographic proof of deletion with per-adapter HMAC receipts. Mapped to GDPR Art. 17, CCPA Right to Delete. - **Policy Enforcement Summary** — Aggregate policy decision metrics, top rules by fire count, anomaly flags, and policy version history. Mapped to EU AI Act Art. 9, SOC 2 CC6.1. ## Regulatory Framework Coverage CCL is designed to produce auditable evidence for: - GDPR (General Data Protection Regulation) — Arts. 5, 6, 7, 17, 25 - EU AI Act — Arts. 9, 14 - CCPA (California Consumer Privacy Act) - HIPAA §164.312 (Technical Safeguards) - SOC 2 Type II (CC6.1, CC6.3) - ISO/IEC 27001 - NIST AI Risk Management Framework (AI RMF) - FDA AI/ML-Based Software Action Plan ## Supported Identity Providers Okta, Azure Active Directory, Google Workspace, Auth0, Ping Identity, SAML 2.0, GitHub, Apple (Sign in with Apple), Google (consumer) ## Key Differentiators - Vendor-neutral: CCL sits between IdP and downstream systems — it does not replace any existing tool - Tokenization-first: context is always tokenized, scoped, and signed before delivery - Cryptographic proof at every layer: consent, propagation, and erasure all produce verifiable receipts - AI-agent native: purpose-built for the multi-agent, multi-system access patterns of agentic AI - Regulatory-ready: generates auditor-ready reports from immutable audit trail data ## Pages - [https://contextcontinuitylayer.org/](https://contextcontinuitylayer.org/) — Main presentation site: CCL architecture, the 7-layer model, use cases, and positioning - [https://contextcontinuitylayer.org/demo](https://contextcontinuitylayer.org/demo) — Interactive 8-phase MVP demo: password-protected walkthrough of the full CCL lifecycle from IdP ingestion through cryptographic erasure, with live compliance report generation