Protocol proposal · IETF draft

A new web standard so systems can prove compliance to each other.

RuleMesh has submitted a draft specification to the IETF. It is called HCAP: the HTTP Compliance Authorization Protocol.

descriptionRead the IETF draftarrow_outward
draft-nyakiso-hcap-00·2026-04-20·9 min read
The problem

Compliance still runs on email attachments.

Two companies want to connect their systems. One of them handles personal data, processes payments, or serves a regulated industry. Before they can do business, somebody has to answer: does the other side actually meet the compliance requirements we are obliged to enforce?

Today, that question is answered like this:

  1. 01A vendor questionnaire is emailed around.
  2. 02A Data Processing Agreement is negotiated.
  3. 03A SOC 2 report is shared on a drive.
  4. 04A security review happens at contract time.
  5. 05Then the integration goes live, and nobody checks again for a year.

The evidence is prose. The verification is manual. It happens once, at contract time — not at request time. And there is no runtime signal that the partner on the other end of the wire actually still meets the policies they claimed to meet when the contract was signed.

This is how trillions of dollars of B2B traffic move across the internet every day.

The proposal

Compliance moved into the HTTP layer.

HCAP moves compliance verification out of email and into the same layer where the web already handles identity, encryption, and authorization.

01Resource server

Declare

An API provider publishes a machine-readable manifest of the compliance requirements a caller must meet to use a given endpoint.

02Trusted registry

Obtain

The caller fetches a signed Compliance Credential from a trusted registry stating which requirements it satisfies. Portable across providers.

03HTTP layer

Present

On every request, the caller presents the credential in a standard Authorization header. The provider verifies it cryptographically, in milliseconds, without phoning home.

Think of it as what TLS did for transport security, applied to compliance. TLS turned “is this connection secure?” from a manual review into a cryptographic check the browser performs automatically. HCAP does the same for “does this caller meet our regulatory requirements?”

The result

Four properties TLS gave us, now available for compliance.

Declarative

Published in a machine-readable manifest, not negotiated in legal prose and email attachments.

Portable

A credential earned once can be reused with any provider that trusts the same ruleset.

Runtime-verifiable

Checked on every protected request, not once at contract signing.

Offline-verifiable

Cryptographic signatures let providers verify without a live call back to the registry.

Why the IETF

The same playbook that made HTTPS the default.

The IETF is the standards body responsible for the protocols that actually run the internet: HTTP, TLS, TCP/IP, DNS, OAuth. Submitting a draft to the IETF is a public commitment — compliance verification should be open infrastructure, implementable by anyone, interoperable across vendors, governed by the community of internet operators rather than by any single company.

This is the same playbook that turned HTTPS from a niche feature into the default state of the web. The vendors that built their businesses on that open foundation — certificate authorities, CDN operators, cloud providers — did not suffer from the standardisation. They thrived on it.

We believe the same arc is available for compliance.

Today

The economics of B2B software change the moment compliance stops being paperwork.

Faster integrations

Compliance checks that take weeks of back-and-forth complete in milliseconds on the first request.

Continuous assurance

Verified every time a protected endpoint is called — not once, then forgotten until the next annual review.

Portable trust

A credential earned once can be reused with any provider that trusts the same ruleset.

Auditable by design

Every protected request carries a signed record of which requirements were checked and satisfied.

For regulated industries — financial services, healthcare, data processing, critical infrastructure — this is not a nice-to-have. The cost of today's manual compliance verification is paid by every API provider in security review overhead and every API consumer in sales-cycle friction. HCAP removes both.

What comes next

None of this can run on email attachments.

The web is about to change shape. AI agents are making API calls on behalf of humans. Autonomous software is transacting with other autonomous software. Machine-to-machine traffic is growing faster than human-to-machine traffic.

robot_2Autonomous agents

An AI agent cannot wait three weeks for a Data Processing Agreement to be negotiated before it completes a task. When one software system asks another “can I trust you with this?”, the answer has to be machine-readable, cryptographically verifiable, and available at request time.

dnsThe shape of Web 3.0 compliance

Not blockchain hype, but a web where trust between autonomous systems is established at the protocol level rather than in legal prose. HCAP is the near-term fix for today's HTTP traffic. It is also the foundation for the agent-driven traffic that is already beginning to dominate.

What RuleMesh is building

HCAP is the protocol. The governance layer is where RuleMesh operates.

Layer · ProtocolOpen · IETF

HCAP

The wire format. Defines how compliance credentials are requested, issued, presented, and verified on the web. Implementable by anyone. Interoperable across vendors.

Layer · GovernanceRuleMesh

Structured regulatory knowledge

The protocol does not specify what evidence underlies a given claim. That is the layer RuleMesh operates at.

GDPRNIS2DORAAI ActCRA

Compliance is about to stop being paperwork.

We are building the infrastructure for what replaces it.

If you are an API provider tired of questionnaire fatigue, or an operator thinking about how AI agents will interact with your regulated systems — we would like to hear from you.

Read the IETF draftarrow_outwardBack to reports

HCAP · Individual Submission · Lawrance Nyakiso · trust200902