<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE rfc [
  <!ENTITY nbsp    "&#160;">
  <!ENTITY zwsp   "&#8203;">
  <!ENTITY nbhy   "&#8209;">
  <!ENTITY wj     "&#8288;">
]>
<rfc version="3" ipr="trust200902" submissionType="IETF" category="info"
     docName="draft-yossif-psea-01" consensus="true"
     xmlns:xi="http://www.w3.org/2001/XInclude">

  <front>
    <title abbrev="PSEA">Post-Session Execution Assurance (PSEA): A Security Model for Verifying Authority at the Moment of Action</title>

    <seriesInfo name="Internet-Draft" value="draft-yossif-psea-01"/>

    <author fullname="Mohamad Khalil Yossif" initials="M. K." surname="Yossif">
      <organization>Yuthent</organization>
      <address>
        <email>mohamad@yuthent.com</email>
        <uri>https://yuthent.com/psea</uri>
      </address>
    </author>

    <date year="2026" month="May" day="5"/>

    <area>Security</area>
    <workgroup>Internet Engineering Task Force</workgroup>

    <keyword>PSEA</keyword>
    <keyword>execution assurance</keyword>
    <keyword>session security</keyword>
    <keyword>authentication</keyword>
    <keyword>authority verification</keyword>

    <abstract>
      <t>Modern security architectures assume that trust established at login can safely extend to all
      subsequent actions within a session. This assumption is fundamentally flawed. Sessions preserve the
      memory of authentication but not the certainty of authority. Post-Session Execution Assurance
      (PSEA) is an architectural security model that addresses this gap by requiring cryptographic proof of
      real human presence, device trust, and execution authority at the exact moment a sensitive action is
      approved -- independent of prior authentication or session state. This paper defines the PSEA model,
      its core principles, its distinction from existing security paradigms, and its implications for regulated
      and mission-critical systems.</t>
    </abstract>
  </front>

  <middle>
    <section anchor="introduction" numbered="true" toc="default">
      <name>Introduction</name>

      <t>This document defines Post-Session Execution Assurance (PSEA), an architectural
      security model for verifying human authority at the moment a sensitive action is
      executed. PSEA addresses a structural gap in session-based security, as defined in the Internet Security Glossary <xref target="RFC4949"/>: the assumption
      that authentication established at login extends safely to all subsequent actions
      within a session. PSEA does not replace authentication; it requires cryptographic
      proof of authority at the moment of execution, independent of session state.</t>

      <t>This document is Informational. It defines the PSEA model and its core
      principles. It does not specify a wire protocol or mandate a specific
      implementation. A foundational description of the model is provided in <xref target="PSEA"/>;
      a reference specification with formal artifacts is maintained at
      <eref target="https://github.com/yuthent/psea-spec"/>.</t>

      <section anchor="terminology" numbered="true" toc="default">
        <name>Requirements Language</name>

        <t>The key words "MUST", "MUST NOT", "REQUIRED", "SHALL", "SHALL NOT",
        "SHOULD", "SHOULD NOT", "RECOMMENDED", "NOT RECOMMENDED", "MAY", and
        "OPTIONAL" in this document are to be interpreted as described in
        BCP&nbsp;14 <xref target="RFC2119"/> <xref target="RFC8174"/> when, and
        only when, they appear in all capitals, as shown here.</t>
      </section>
    </section>

    <section anchor="broken-assumption" numbered="true" toc="default">
      <name>The Broken Assumption of Sessions</name>

      <t>For decades, session-based security has operated on a single foundational assumption: that a
      successful authentication event at login time can be trusted to represent the user's identity and
      authority for the duration of the session. This assumption was reasonable when systems were simple,
      sessions were short, and interactions were linear. This document is published as an Informational
      Internet-Draft and does not define a standard.</t>

      <t>It is no longer reasonable.</t>

      <t>Modern systems operate in environments where actions occur long after the initial authentication
      event. Context drifts continuously -- devices change hands, network environments shift, and
      authorization states evolve. Sessions persist across these changes without re-evaluating whether the
      conditions that justified the original trust decision still hold.</t>

      <t>The problem is structural. Sessions are designed to reduce friction by avoiding repeated
      authentication. In doing so, they create an implicit trust window during which any actor -- human or
      automated -- operating within that session inherits the authority of the original authenticator. This
      inheritance is unconditional. It does not account for elapsed time, changes in device posture,
      delegation of access, or environmental degradation.</t>

      <t>In practice, this means that a session authenticated by a legitimate user at 9:00 AM carries identical
      authority at 3:00 PM, even if the device has been compromised, the user has stepped away, or an
      automated process has assumed control of the session. The session does not know. It was not designed
      to know.</t>

      <t>This is not a vulnerability in any particular implementation. It is a structural flaw in the session model
      itself.</t>
    </section>

    <section anchor="authority-gap" numbered="true" toc="default">
      <name>The Authority Gap</name>

      <t>Authentication and execution authority are fundamentally different concepts, though they are
      routinely conflated in security architecture.</t>

      <t>Authentication answers the question: "Did this entity present valid credentials at some point in time?"
      It establishes identity at the moment of login. It does not, and cannot, establish who is performing a
      specific action at a later point in time.</t>

      <t>Execution authority answers a different question: "Is the authorized human -- present, verified, and
      operating from a trusted device -- approving this specific action right now?"</t>

      <t>The gap between these two questions is where risk materializes. In banking, a fraudulent wire transfer
      is executed not at login, but minutes or hours later, within a valid session. In healthcare, an
      unauthorized prescription is signed within a session that was legitimately established. In government
      systems, classified actions are approved by sessions that may have been delegated, replayed, or
      hijacked after the original authentication.</t>

      <t>In each case, the authentication was valid. The session was valid. But the authority to execute the
      specific action at that specific moment was never verified.</t>

      <t>This gap -- between authentication and execution authority -- is the central problem that existing
      security models fail to address. Multi-factor authentication strengthens the login boundary. Session
      management extends or restricts session duration. Continuous authentication monitors behavioral
      signals over time. None of these mechanisms provide cryptographic proof that a specific human is
      authorizing a specific action at the moment it is executed.</t>

      <t>The authority gap is not theoretical. It is the operational reality of every system that relies on sessions
      to authorize sensitive actions.</t>
    </section>

    <section anchor="definition" numbered="true" toc="default">
      <name>Definition of Post-Session Execution Assurance</name>

      <blockquote>
        <t>Post-Session Execution Assurance (PSEA) is an architectural security model that requires
        cryptographic proof of real human presence, device trust, and execution authority at the
        exact moment a sensitive action is approved -- independent of prior authentication or
        session state.</t>
      </blockquote>

      <t>This definition establishes PSEA as a model concerned exclusively with the moment of execution. It
      does not replace authentication, session management, or access control. It addresses the specific
      problem of verifying authority when an action is approved -- a problem that existing models leave
      unresolved.</t>

      <t>The term "post-session" does not imply that sessions are absent. It means that the assurance provided
      by PSEA operates independently of session state. Whether a session is active, expired, or absent, the
      execution assurance requirement remains the same: cryptographic proof of human presence, device
      trust, and authority at the moment of action.</t>
    </section>

    <section anchor="core-principles" numbered="true" toc="default">
      <name>Core Principles of PSEA</name>

      <t>The PSEA model is built on five core principles. Each addresses a specific dimension of the authority
      gap.</t>

      <section anchor="execution-time-proof" numbered="true" toc="default">
        <name>Execution-Time Proof</name>

        <t>Authority must be validated at the moment an action is executed, not at any prior point. A proof
        generated at login time, or at any time before the action, does not satisfy this requirement. The
        temporal binding between proof and action is non-negotiable.</t>
      </section>

      <section anchor="human-presence" numbered="true" toc="default">
        <name>Human Presence Assurance</name>

        <t>The model requires verification that a real human being is present and actively approving the action.
        This is distinct from identity recall, where a system infers human presence from a prior authentication
        event. Presence must be demonstrated, not assumed.</t>
      </section>

      <section anchor="device-bound-trust" numbered="true" toc="default">
        <name>Device-Bound Trust</name>

        <t>Execution approval must be bound to a specific, trusted device state. The device from which the
        approval originates must be verified as part of the assurance chain. An approval that cannot be tied to
        a known, trusted device does not meet the PSEA requirement.</t>
      </section>

      <section anchor="cryptographic-proof" numbered="true" toc="default">
        <name>Cryptographic Proof</name>

        <t>Trust is established through cryptographic mechanisms, not inferred from session tokens, cookies, or
        bearer credentials. The proof must be independently verifiable and resistant to replay, forgery, and
        delegation.</t>
      </section>

      <section anchor="connectivity-independence" numbered="true" toc="default">
        <name>Connectivity Independence</name>

        <t>PSEA is designed to function in environments with intermittent, degraded, or absent network
        connectivity. The model does not depend on real-time communication with a central authority for the
        generation of execution proof. Verification may be deferred, but the proof itself must be generated at
        execution time regardless of connectivity state.</t>
      </section>
    </section>

    <section anchor="what-psea-is-not" numbered="true" toc="default">
      <name>What PSEA Is Not</name>

      <t>Clarity about the boundaries of PSEA is essential to prevent conflation with existing security
      paradigms.</t>

      <t>PSEA is not Multi-Factor Authentication. MFA strengthens the login boundary by requiring multiple
      credential types. It does not address authority at execution time. Once MFA is completed, the resulting
      session carries the same inherited trust as any other session.</t>

      <t>PSEA is not Continuous Authentication. Continuous authentication monitors behavioral or biometric
      signals throughout a session to detect anomalies. It is a monitoring and risk-scoring mechanism. It
      does not require proof of authority at the moment of a specific action.</t>

      <t>PSEA is not Session Hardening. Session hardening techniques such as those described in <xref target="RFC6819"/> -- short timeouts, token rotation,
      binding to IP addresses -- reduce the window of exposure. They do not verify who is executing an
      action within that window.</t>

      <t>PSEA is not Risk-Based Authentication. Risk-based systems evaluate contextual signals to adjust
      authentication requirements dynamically. They operate at or near the login boundary. They do not
      provide execution-time proof.</t>

      <t>PSEA is not a rebranding of Zero Trust. Zero Trust architectures reduce implicit trust between system
      components and enforce verification at network and application boundaries. PSEA addresses a
      different problem: the absence of verified authority at the point of action execution, which persists
      even within Zero Trust environments.</t>

      <t>Each of these paradigms addresses a legitimate security concern. None of them solve the specific
      problem that PSEA defines: the absence of cryptographic, human-verified, device-bound proof of
      authority at execution time.</t>
    </section>

    <section anchor="implications" numbered="true" toc="default">
      <name>Implications for Regulated and Mission-Critical Systems</name>

      <t>The authority gap has acute consequences in regulated and mission-critical environments where the
      cost of unauthorized execution is severe.</t>

      <section anchor="banking" numbered="true" toc="default">
        <name>Banking and Financial Services</name>

        <t>Financial systems process high-value transactions within authenticated sessions. Fraud, insider
        misuse, and session compromise result in unauthorized transactions that are technically valid from the
        session's perspective. Regulatory frameworks increasingly require proof that specific individuals
        authorized specific transactions. PSEA provides the architectural basis for such proof.</t>
      </section>

      <section anchor="government" numbered="true" toc="default">
        <name>Government and Defense</name>

        <t>Government systems handle classified operations, policy decisions, and infrastructure controls.
        Delegation of authority, shared workstations, and long-duration sessions create conditions where
        session-based trust is insufficient. PSEA addresses the requirement for verifiable human authority
        over specific actions in these environments.</t>
      </section>

      <section anchor="healthcare" numbered="true" toc="default">
        <name>Healthcare</name>

        <t>Healthcare systems authorize prescriptions, access to patient records, and clinical decisions. Shared
        terminals, shift-based workflows, and emergency access create scenarios where the authenticated user
        may not be the person executing the action. PSEA provides a mechanism for binding execution
        authority to a verified human at the point of action.</t>
      </section>

      <section anchor="critical-infrastructure" numbered="true" toc="default">
        <name>Critical Infrastructure</name>

        <t>Industrial control systems, energy grids, and transportation networks require human authorization for
        sensitive operational changes. These environments frequently operate in degraded connectivity
        conditions. PSEA's connectivity-independent design addresses the need for execution-time authority
        verification even when centralized systems are unreachable.</t>
      </section>
    </section>

    <section anchor="implementations" numbered="true" toc="default">
      <name>Relationship to Implementations</name>

      <t>PSEA is an architectural model, not a product specification. It defines what must be proven at
      execution time without prescribing how the proof is generated, transmitted, or verified.</t>

      <t>A reference specification with formal semantics, deterministic test vectors, and minimal verifier
      implementations is maintained at <xref target="PSEA-SPEC"/>. The reference specification provides:</t>

      <ul>
        <li>Formal definitions of the four enforcement tiers (Passive, Silent, Explicit, Authoritative)</li>
        <li>Canonical proof token structure with JSON Schema</li>
        <li>State machine for trust state transitions</li>
        <li>STRIDE-based threat model</li>
        <li>Test vectors with deterministic test keys generated per RFC 6979</li>
        <li>OpenAPI 3.0 contract for verification endpoints</li>
        <li>Reference verifier implementations in Python and TypeScript</li>
      </ul>

      <t>These materials are intended to enable independent implementations to verify conformance with the
      PSEA model. The reference specification does not replace this Internet-Draft; rather, it provides the
      operational artifacts that a conforming implementation would consume.</t>

      <t>Implementations of PSEA may vary in their choice of biometric modalities, cryptographic schemes,
      device attestation mechanisms, and verification architectures. The model is intentionally agnostic to
      these choices, provided the core principles are satisfied.</t>

      <t>Yuthent is one implementation of the PSEA model, designed for regulated and mission-critical
      environments. It is not the only possible implementation. The PSEA model exists independently of
      any specific product or vendor.</t>

      <t>Organizations adopting PSEA may implement it through existing infrastructure, custom development,
      or third-party solutions. The requirement is adherence to the model's principles, not adoption of a
      specific technology.</t>
    </section>

    <section anchor="conclusion" numbered="true" toc="default">
      <name>Conclusion</name>

      <t>The security architecture of modern systems contains a structural gap between authentication and
      execution. Sessions bridge this gap with inherited trust -- a mechanism that was adequate for simpler
      systems but is fundamentally insufficient for environments where authority must be verified at the
      moment of action.</t>

      <t>Post-Session Execution Assurance defines the requirement that this gap be closed. It is not a feature,
      not a product category, and not a rebranding of existing security paradigms. It is an architectural
      correction: a formal recognition that authority is temporal, context-dependent, and must be proven --
      not assumed -- at the moment it is exercised.</t>

      <t>The absence of execution-time authority verification is not a theoretical concern. It is the operational
      reality that enables fraud, insider misuse, and unauthorized actions across banking, healthcare,
      government, and critical infrastructure. PSEA provides the conceptual and architectural foundation for
      addressing this reality.</t>
    </section>

    <section anchor="security-considerations" numbered="true" toc="default">
      <name>Security Considerations</name>

      <t>This document describes an architectural security model. It does not introduce new
      protocol mechanisms and does not modify existing security protocols. The security
      implications of PSEA derive from its requirements rather than from a specific
      implementation.</t>

      <t>An implementation of the PSEA model inherits the security properties of its
      underlying cryptographic primitives, biometric verification mechanisms, and device
      attestation infrastructure. The strength of any PSEA-conformant system is bounded by
      the weakest of these components.</t>

      <t>The model assumes the existence of a hardware-backed trust anchor capable of
      generating non-exportable cryptographic material and performing verified biometric
      checks. Compromise of this trust anchor invalidates the assurances provided by PSEA.
      Implementations SHOULD use platform-attested hardware-backed key storage (such as
      Trusted Execution Environments or Secure Elements) to bound this risk.</t>

      <t>PSEA does not address threats outside the moment of action approval. Specifically,
      PSEA does not protect against: phishing or social engineering that induces a
      legitimate user to approve an unintended action; coercion of the legitimate user;
      compromise of the channel through which the action request is delivered to the trust
      anchor; or attacks that occur before initial enrollment of the trust anchor.</t>

      <t>The connectivity-independence requirement (<xref target="connectivity-independence"/>) introduces an asymmetry
      between proof generation and proof verification. Implementations MUST ensure that
      deferred verification does not permit replay of stale proofs or admission of proofs
      whose binding to the action being approved cannot be cryptographically established.</t>
    </section>

    <section anchor="iana-considerations" numbered="true" toc="default">
      <name>IANA Considerations</name>

      <t>This document has no IANA actions.</t>
    </section>
  </middle>

  <back>
    <references>
      <name>References</name>

      <references>
        <name>Normative References</name>

        <reference anchor="RFC2119" target="https://www.rfc-editor.org/info/rfc2119">
          <front>
            <title>Key words for use in RFCs to Indicate Requirement Levels</title>
            <author fullname="S. Bradner" initials="S." surname="Bradner"/>
            <date year="1997" month="March"/>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="2119"/>
          <seriesInfo name="DOI" value="10.17487/RFC2119"/>
        </reference>

        <reference anchor="RFC8174" target="https://www.rfc-editor.org/info/rfc8174">
          <front>
            <title>Ambiguity of Uppercase vs Lowercase in RFC 2119 Key Words</title>
            <author fullname="B. Leiba" initials="B." surname="Leiba"/>
            <date year="2017" month="May"/>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="8174"/>
          <seriesInfo name="DOI" value="10.17487/RFC8174"/>
        </reference>
      </references>

      <references>
        <name>Informative References</name>

        <reference anchor="RFC4949" target="https://www.rfc-editor.org/info/rfc4949">
          <front>
            <title>Internet Security Glossary, Version 2</title>
            <author fullname="R. Shirey" initials="R." surname="Shirey"/>
            <date year="2007" month="August"/>
          </front>
          <seriesInfo name="RFC" value="4949"/>
          <seriesInfo name="DOI" value="10.17487/RFC4949"/>
        </reference>

        <reference anchor="RFC6819" target="https://www.rfc-editor.org/info/rfc6819">
          <front>
            <title>OAuth 2.0 Threat Model and Security Considerations</title>
            <author fullname="T. Lodderstedt" initials="T." surname="Lodderstedt" role="editor"/>
            <author fullname="M. McGloin" initials="M." surname="McGloin"/>
            <author fullname="P. Hunt" initials="P." surname="Hunt"/>
            <date year="2013" month="January"/>
          </front>
          <seriesInfo name="RFC" value="6819"/>
          <seriesInfo name="DOI" value="10.17487/RFC6819"/>
        </reference>

        <reference anchor="PSEA" target="https://yuthent.com/psea">
          <front>
            <title>Post-Session Execution Assurance (PSEA): A Security Model for Verifying Authority at the Moment of Action</title>
            <author fullname="Mohamad Khalil Yossif" initials="M. K." surname="Yossif">
              <organization>Yuthent</organization>
            </author>
            <date year="2026" month="February"/>
          </front>
          <seriesInfo name="Version" value="1.0"/>
        </reference>

        <reference anchor="PSEA-SPEC" target="https://github.com/yuthent/psea-spec">
          <front>
            <title>Post-Session Execution Assurance -- Reference Specification, Test Vectors, and OpenAPI Contract</title>
            <author>
              <organization>Yuthent</organization>
            </author>
            <date year="2026" month="May"/>
          </front>
        </reference>
      </references>
    </references>

    <section anchor="citation" numbered="true" toc="default">
      <name>Citation and Reference</name>

      <t>To reference this document, use the following citation:</t>

      <t>Khalil Yossif, M. (2026). Post-Session Execution Assurance (PSEA): A
      Security Model for Verifying Authority at the Moment of Action (Version
      1.0). Yuthent. https://yuthent.com/psea</t>

      <t>Canonical URL: https://yuthent.com/psea</t>

      <t>GitHub: https://github.com/yuthent/psea-spec</t>
    </section>

    <section anchor="conformance" numbered="true" toc="default">
      <name>Conformance</name>

      <t>An implementation conforms to the PSEA model if it satisfies all five core principles defined in
      <xref target="core-principles"/> and successfully verifies the reference test vectors published at <xref target="PSEA-SPEC"/>.</t>

      <t>Conformance to the test vectors is a necessary but not sufficient condition. An implementation MUST
      also satisfy the normative requirements in <xref target="execution-time-proof"/> through
      <xref target="connectivity-independence"/>. Specifically:</t>

      <ul>
        <li>An implementation MUST generate execution-time proof bound to the specific action being approved.</li>
        <li>An implementation MUST verify human presence through hardware-attested biometric or equivalent mechanisms.</li>
        <li>An implementation MUST bind execution approval to a verified device state.</li>
        <li>An implementation MUST use cryptographic mechanisms resistant to replay, forgery, and delegation.</li>
        <li>An implementation MUST function in environments with intermittent or absent network connectivity, deferring verification rather than gating proof generation.</li>
      </ul>

      <t>Reference verifiers in Python and TypeScript are provided at <xref target="PSEA-SPEC"/> to demonstrate
      the minimum logic required for verification of compliant proofs.</t>
    </section>
  </back>
</rfc>
