Theory → operations → measurement
A layered canon for systems built under instability: foundational theory, operational translation, and measurement & audit.
Disambiguation: this is a protective computing framework, not the political science Overton Window concept.
Teams building for real-world vulnerability (coercion risk, low trust, degraded operations) often inherit security language that is compliance-shaped or too abstract to implement.
The canon exists to make protective system-building legible and testable: define the theory, translate it into operator reality, then measure outcomes with an audit-ready rubric.
Layer 1 (Overton Framework): defines protective computing as an engineered discipline, with explicit threat boundaries and legitimacy requirements.
Layer 2 (Field Guide): translates the theory into field-usable practices and decision patterns under constraint.
Layer 3 (PLS rubric): turns the discipline into audit-ready measurement so systems can be assessed without hand-waving.