6. Examples
6. Examples
← Validation | Index | Next →
6.1 Invariant Example
Well-Formed Invariant:
This invariant demonstrates:
| Property | Value |
|---|---|
| Numbered | Invariant 3 |
| Uses RFC 2119 | MUST, MAY |
| Falsifiable | Yes—finding a secret outside Vault violates it |
| Has rationale | Explains consequences of violation |
6.2 Trust Boundary Example
This diagram shows:
| Element | Meaning |
|---|---|
| Enterprise Boundary | External identity authority |
| Platform Boundary | Internal identity system |
| Crossing point | Where validation occurs |
| Arrows | Data flow direction |
6.3 Rejected Alternative Example
This example demonstrates:
| Component | Presence |
|---|---|
| Description | ✓ |
| Why Attractive | ✓ (3 genuine benefits) |
| Why Rejected | ✓ (4 specific reasons) |
| Invariant Violation | ✓ (Invariant 2) |
| Conclusion | ✓ |
6.4 Component Documentation Example
6.5 Design Goal Example
6.6 Non-Goal Example
6.7 Data Flow Example
End of Section 6 — RFC-RFCSTD-0002