Skip to content

Latest commit

 

History

History
383 lines (248 loc) · 10.4 KB

File metadata and controls

383 lines (248 loc) · 10.4 KB

Data Flow & Trust Boundaries


1. Purpose of This Document

This document formally describes the data flows, execution control planes, and trust boundaries implemented within the MonCore Financial Operating System (“MonCore”).

It is intended for:

  • Issuer sponsors
  • Safeguarding institutions
  • Scheme partners
  • Regulatory reviewers
  • Platform partners
  • Fintech product builders
  • Infrastructure integrators

The objective is to demonstrate how MonCore:

  • Controls regulated state transitions
  • Enforces authority separation
  • Isolates external providers and tenants
  • Preserves immutable audit and reconciliation evidence

This document is intentionally provider-agnostic and describes MonCore as a regulated financial kernel independent of any specific issuer, processor, card scheme, or identity vendor.


2. Architectural Positioning

MonCore operates as a financial operating system and regulated execution kernel.

It is not a single consumer product. It is a multi-tenant operating framework capable of powering regulated financial products under issuer and regulatory governance.

Key architectural principles:

  • The kernel is the single authority for financial state
  • External providers never mutate balances
  • All enforcement is inline and transactional
  • All evidence is immutable and auditable
  • Sandbox and production operate with identical control paths

3. Core Control Planes

MonCore is organised into the following independent but coordinated planes:

  1. Client & Device Plane – mobile and web clients, authenticated sessions
  2. Product Execution Plane – transfers, payments, cards, QR, top-ups
  3. Kernel Control Plane – orchestration and authority enforcement
  4. AML & Risk Enforcement Plane – inline AML, velocity, sanctions, tier limits
  5. Identity & KYB Advisory Plane – external identity and business verification
  6. Ledger Authority Plane – single authoritative financial state store
  7. Database Immutability Plane – physical enforcement of append-only and state machines
  8. Settlement & Reconciliation Plane – issuer, scheme, and clearing reconciliation
  9. Tenant Governance Plane – multi-tenant isolation and partner mediation
  10. Regulatory Evidence Plane – immutable audit chains and regulator-safe projections

No plane may bypass another. Authority increases as execution approaches regulated financial state.


4. Trust Boundary Model

MonCore enforces a layered trust boundary model. Each boundary reduces privilege and constrains mutation authority.

4.1 Boundary A — Client Authentication Boundary

Controls:

  • Cryptographically verified access tokens
  • Forced logout via issuance timestamp invalidation
  • Device fingerprinting and login throttling

Only authenticated and active sessions may enter execution flows.


4.2 Boundary B — Tenant & Jurisdiction Boundary

Before execution:

  • Tenant context is mandatory
  • Tenant status (ACTIVE / SUSPENDED / TERMINATED) enforced
  • Jurisdiction and country restrictions applied
  • Capability flags verified per contract

Issuer-dependent domains remain contract-gated until onboarding is completed.


4.3 Boundary C — Kernel Authority Boundary

The MonCore kernel is the sole transaction orchestrator.

Properties:

  • Atomic database transactions for all financial mutations
  • Exactly-once execution via idempotency and correlation identifiers
  • No API, partner, or provider may post directly to balances

Only the kernel may authorise ledger entries.


4.4 Boundary D — AML & Risk Enforcement Boundary

All execution flows pass inline regulatory enforcement before ledger mutation:

  • Tier-aware exposure limits
  • Rolling velocity limits
  • Sanctions and geographic restrictions
  • Multi-dimensional AML risk scoring

AML enforcement executes inside the same transaction as ledger posting and may:

  • Block execution
  • Freeze accounts
  • Open AML cases
  • Escalate for review

No transaction may commit without passing this boundary.


4.5 Boundary E — Identity & KYB Advisory Boundary

External identity and KYB providers operate as advisory sources only.

Controls:

  • Cryptographic webhook verification
  • Raw payload integrity enforcement
  • Kernel-mediated tier and status changes
  • Full audit logging

Providers cannot directly change tiers, freeze accounts, or mutate balances.


4.6 Boundary F — Ledger Authority Boundary

The kernel ledger is the single authoritative financial record.

Controls:

  • Append-only ledger model
  • No deletions permitted (database-level enforcement)
  • Reversals recorded as compensating entries
  • Unique constraints prevent duplicate postings

All balances are derived exclusively from ledger history.


4.7 Boundary G — Database Immutability Boundary

Physical enforcement is applied at database level:

  • Ledger deletions blocked by triggers
  • Settlement state rollback prevented by state-machine guards
  • Export audit logs protected against update or deletion

This ensures:

  • Financial history cannot be erased
  • Settlement lifecycles cannot be corrupted
  • Regulatory exports are tamper-proof

4.8 Boundary H — Settlement & Reconciliation Boundary

Issuer and scheme settlement flows are isolated from kernel authority.

Controls:

  • Daily reconciliation between issuer balances and kernel ledger
  • Explicit mismatch detection and recording
  • Settlement batches and clearing items tracked
  • Adjustments recorded separately

No issuer settlement is blindly trusted without reconciliation.


4.9 Boundary I — Tenant Governance Boundary

Tenant and partner actions are mediated through governed workflows:

  • Partners cannot freeze or close accounts directly
  • Action requests submitted for kernel adjudication
  • All tenant actions audited

This prevents delegated operators from mutating regulated state.


4.10 Boundary J — Regulatory Evidence Boundary

All operational and financial activity is recorded in a unified forensic audit ledger:

  • Hash-chained audit events
  • Immutable export audit logs
  • Regulator-safe read-only projections

Evidence is cryptographically tamper-evident and lifecycle complete.


5. Core Data Flow Paths

5.1 Internal Transfer Flow

  1. Client submits transfer request
  2. Authentication and tenant validation applied
  3. Kernel opens atomic transaction
  4. AML, velocity, and tier limits enforced
  5. Sender balance locked
  6. Ledger debit and credit entries created
  7. Before/after balance snapshots recorded
  8. Audit events written
  9. Transaction committed

No external system participates in internal balance movement.


5.2 Card Authorisation & Settlement Flow

  1. Card authorisation received from execution provider
  2. Webhook cryptographically verified
  3. Kernel validates account state and limits
  4. Authorisation hold posted to ledger
  5. Clearing and settlement events reconciled
  6. Final settlement posted as compensating ledger entry
  7. Fees and FX recorded
  8. Audit lifecycle preserved

External processors never mutate balances directly.


5.3 Card Top-Up Flow

  1. Client initiates card top-up
  2. Payment intent created with execution provider
  3. Provider webhook verified
  4. Kernel enforces AML, velocity, and limits
  5. Ledger credit posted
  6. Audit and correlation recorded

5.4 Open-Banking / Bank Top-Up Flow

  1. User initiates bank payment
  2. Raw provider payload persisted
  3. Provider confirmation webhook verified
  4. Kernel posts ledger credit after enforcement
  5. Reconciliation scheduled

5.5 Bank Withdrawal Flow

  1. User submits withdrawal request
  2. Kernel enforces AML, limits, and sanctions
  3. Ledger debit posted
  4. Withdrawal enters settlement lifecycle
  5. State transitions enforced by database state machine
  6. Issuer confirmation reconciled

Illegal rollback of settlement states is physically blocked.


5.6 Chargeback & Dispute Flow

  1. Chargeback event received
  2. Kernel verifies linkage to original transaction
  3. Temporary hold or reversal posted
  4. Dispute lifecycle events audited
  5. Final resolution reconciled

5.7 Reconciliation Flow

  1. Daily issuer and scheme balances imported
  2. Kernel computes ledger-derived balances
  3. Differences detected and recorded
  4. Mismatches escalated
  5. Adjustments posted as explicit entries
  6. Reconciliation report finalised and audited

6. Tenant Isolation & Multi-Entity Governance

MonCore operates strict tenant isolation:

  • Every user belongs to exactly one tenant
  • Tenant credentials isolated by environment
  • Partner users restricted to tenant scope
  • Cross-tenant access is physically impossible

Tenant financial exposure is computed exclusively from the kernel ledger.

Partner actions (freeze, close, identity recheck) require kernel adjudication.


7. Audit, Evidence & Export Controls

MonCore implements a multi-layer audit model:

  • Global forensic audit ledger (hash-chained)
  • Admin action projections
  • Compliance timelines
  • Transaction lifecycle views
  • Export audit ledger with file fingerprints

All exports (CSV / PDF / JSON) are:

  • Logged
  • Hash-fingerprinted
  • Immutable
  • Non-modifiable

8. Sandbox = Production Parity

MonCore operates identical control paths in sandbox and production:

  • Same kernel code
  • Same enforcement logic
  • Same audit chains
  • Same reconciliation flows

Only credentials and connectivity differ.

This enables pre-issuer technical and compliance review without architecture changes.


9. Security & Physical Enforcement Summary

MonCore enforces authority at multiple layers:

  • Application orchestration
  • Inline AML and limits
  • Ledger authority
  • Database triggers and constraints
  • Immutable audit chains

No operator, partner, or provider can bypass kernel authority.


10. Conclusion

MonCore implements a regulator-grade financial kernel with:

  • Strict authority separation
  • Inline compliance enforcement
  • Append-only ledger authority
  • Physical immutability controls
  • Daily issuer reconciliation
  • Full forensic audit trails
  • Multi-tenant governance

This architecture is designed to meet the expectations of issuer sponsors, safeguarding institutions, and financial regulators for production-grade regulated deployment.