This document specifies Global Digital Identity Scheme (GDIS) Core as a web-first profile for physical-to-digital identity binding evidence.

It defines deterministic subject-binding outcomes, governance-policy binding, and verifier-checkable issuance evidence that can be evaluated without implementation-specific assumptions.

This specification does not create legal recognition or qualified status by itself. Legal effect is an external policy and governance decision.

This is an unofficial draft.

Document authority: this text is not a legal instrument and does not create jurisdictional recognition effects.

AI assistance disclosure: this draft used OpenAI GPT-5 Codex for drafting support, structure proposals, and editorial rewrites. Human editor review determined normative intent, accepted/rejected changes, and final wording.

Source currency note: linked source pages were checked on February 17, 2026.

The key words MUST, MUST NOT, REQUIRED, SHALL, SHALL NOT, SHOULD, SHOULD NOT, RECOMMENDED, MAY, and OPTIONAL in this document are to be interpreted as described in BCP 14 [RFC2119] [RFC8174] when, and only when, they appear in all capitals.

Conforming implementations MUST satisfy all requirements for at least one conformance class in Conformance Classes.

Unless explicitly overridden, data-model terms such as list, set, tuple, and byte sequence are interpreted according to Infra [INFRA]. JSON payload and array semantics are interpreted according to [RFC8259].

This specification defines externally observable data models, verification invariants, and deterministic processing outcomes. It does not define implementation architecture, runtime internals, or optimization strategy.

End-to-end machine verifiability is mandatory: any acceptance decision, legal-status claim, or policy-compatibility claim MUST be backed by machine-verifiable artifacts and explicit source references.

Conformance in this specification is outcome-based: required verifier outputs and security/privacy invariants are normative; implementation strategy remains implementation-defined.

This document does not define programming-language implementations or API usage recipes.

NOTE: The openapi.yaml contracts are indicative and are not yet normative. Official schemas will be finalized after the first reference implementation.

Scope

This specification covers:

This specification does not:

Positioning and Adoption Model

This specification defines web-native, verifier-checkable device-assurance evidence for signature-creation security outcomes. Adoption is expressed by stakeholder action chains: goal -> required artifact/interface -> verifier behavior -> adoption pathway.

Implementing specifications may profile this core for platform-specific delivery while preserving the same conformance and verification semantics.

Stakeholder Goal Required artifact/interface Verifier behavior Adoption pathway
Device and platform manufacturers Ship signer-controlled key-custody and intent-assurance controls Device evidence records, attestation outputs, and discovery metadata Verify key non-exportability, approval binding, and state evidence against policy Publish conformance targets and implementation profiles for assessed configurations
Wallet and app implementers Deliver end-user controlled signing and attestation flows User-approved-object binding artifacts and verifiable signing-event evidence Reject signing results lacking deterministic proof and payload equality evidence Publish profile conformance evidence and avoid remote-by-default custody patterns
Standards development organizations (SDOs) Create interoperable profiles and test suites Profile specifications, test assertions, and registry/discovery rules Run deterministic pass/fail checks against declared profile requirements Standardize profile work items and reuse common terminology and evidence formats
Governments and regulators Support recognition procedures without conflating legal status and cryptographic validity Authoritative registries/discovery endpoints and status publication procedures Separate technical verification output from legal-recognition determination Publish compatibility-profile rules over the web profile baseline
Auditors, CABs, and assessors Evaluate implementation evidence with machine-verifiable checks Test assertions, evaluation procedures, and evidence corpora Validate cryptographic proofs and reproducible requirement mappings Issue assessment outcomes bound to reproducible artifacts instead of narrative-only claims
Verifiers and relying parties Make deterministic acceptance/rejection decisions Evidence records, discovery metadata, and policy input independent of UI labels Verify every security claim cryptographically and report explicit failure reasons Adopt classed conformance verification and policy overlays per jurisdiction

Terminology

governance area
A legal and administrative domain that issues and governs identity items and their verification rules.
delegated PID issuer
An issuance delegate that a governance area has legally authorized to issue PID-bound identity evidence under governance policy.
remote eID provider
A network-mediated identity service used for PID issuance or delegation workflows (for example SIM-based or bank-mediated issuance), distinct from direct physical identity-item issuance.
physical identity item
A physical identity document or token issued under a governance area and recognized by that area for identity purposes.
chip-backed private key
Private-key material whose generation, storage, and signing operations are enforced by secure hardware boundaries.
governance verification endpoint
A network endpoint exposing discovery and/or status information needed to validate document legitimacy within a governance area. In this profile, those endpoints are exposed under /.well-known/gidas/.
list
Data concept used as defined by Infra [INFRA].
set
Data concept used as defined by Infra [INFRA].
byte sequence
Data concept used as defined by Infra [INFRA].
tuple
Data concept used as defined by Infra [INFRA].
tuple expression
Canonical serialized tuple string. In this specification, tuple expressions use : as the component delimiter, without leading/trailing whitespace around components.
PID identification endpoint
A governance-recognized endpoint that publishes normative machine-readable PID requirements for a jurisdiction, including the required MRZ-derived fields and field-level validation patterns.
PID field set
A list of PID requirement entries for a governance area, serialized as a JSON array [RFC8259]. Membership semantics are a set keyed by fieldId (that is, fieldId values are unique). Each entry identifies a physical identity item field (as extracted from MRZ-compatible data), whether it is required, and the regular expression constraint that determines syntactic validity.
MRZ
Machine Readable Zone data defined in ICAO Doc 9303 [ICAO-9303] [ICAO-9303-P3].
PID (person identification data)
A set of data that identifies a person under applicable law or standards contexts.
PID binding value
Deterministic subject-binding value derived from canonicalized PID fields extracted from MRZ-compatible document data. Profiles MAY realize this value as a hash, commitment, or hidden proof input, provided verifier outcomes are deterministic and auditable.
GDIS binding credential
A verifiable credential binding a PID binding value (or equivalent hidden proof input) to a subject DID, issuer evidence, and governance verification material.
GDIS subject DID
Subject DID in a GDIS binding credential, controlled by a GQSCD-class controller.
GQSCD controller
DID controller profile requiring protected key custody and signer-intent controls as defined by GQSCD Core [GQSCD-CORE].
decentralized event log
Open-participation publication layer used to replicate GDIS verification material across many origins. Transport and host participation semantics are defined by the declared host profile (for example GQTS), not by this specification.
host profile
External specification that defines host role semantics, admission, transport, replication, and consistency behavior for publication participants (for example GQTS). [GQTS-CORE].
mandatory minimum hosts
Governance-required publication targets in the selected host profile that define a minimum publication floor and not an exclusive publication ceiling.
publication set
Union of mandatory governance publication targets and person-selected additional targets to which subject materials are published.
asOf query parameter
URI query parameter whose value is an RFC 3339 date-time selecting the policy version that was effective at that instant [RFC3339].
physical validity method profile
Governance-declared method profile describing how physical identity item authenticity and validity are checked (for example MRZ-only or MRZ plus NFC chip checks), including deterministic verifier acceptance/failure rules.
governance trust source reference
Machine-readable reference to an authoritative governance source used in physical-validity or recognition checks (for example a trusted list, registry, or official legal publication endpoint).
physical validity evidence artifact
An evidence artifact proving which physical validity method profile was applied, which evidence checks were executed, and which governance trust source reference values were used.
evidence artifact
A signed or hashed machine-verifiable artifact used by issuers, host-profile operators, or verifiers to substantiate a security or status claim.
conformance report
Implementation report that states conformance class coverage, policy assumptions, test outputs, and produced or consumed evidence artifact types.
verification result
Deterministic output object produced by a verifier after executing the normative processing rules in this specification.
zero-trust verification model
Imported term from [GQSCD-CORE].
mechanical validity
Imported term from [GQTS-CORE].
recognition status
Imported term from [GQTS-CORE].
web profile
Imported term from [GQSCD-CORE].
EU compatibility profile
Imported term from [GQSCD-CORE].

Normative Interface Surface

ReSpec prose in this specification defines interface invariants and processing behavior. It does not restate wire-format field contracts.

During the provisional phase, openapi.yaml provides the indicative interface surface (suuntaa antavia) for implementation trials and interoperability testing.

Normative requirements in this specification remain authoritative for verification behavior, failure semantics, and conformance outcomes until schema finalization.

Normative Source Constraints

External Fact Layer

This section states legal/standards facts as external constraints. GDIS does not redefine these facts; it models and references them.

Physical Issuance and Governance Recognition

A GDIS root identity anchor MUST be a physical identity item issued under a governance area. Any claim that such an item is mandated, recognized, qualified, notified, or trusted MUST be backed by authoritative registries or legal texts for that governance area, such as EUR-Lex acts, trusted lists, or official notification dashboards [EU-910/2014] [EU-2024/1183] [EU-TRUSTED-LISTS] [EU-QSCD-NOTIFICATIONS].

A governance area MUST designate legally valid PID issuance authorities and, if delegation exists, MUST designate each delegated PID issuer and publish machine-verifiable authority chain references.

Governance profiles that support or require remote eID provider issuance as the default path are NOT RECOMMENDED due to centralization risk. Remote delegation MAY be allowed only as a documented fallback when direct physical identity-item issuance is infeasible in the applicable governance context.

Governance profiles SHOULD include a direct path for binding PID-derived identity evidence to a DID without mandatory dependence on a remote issuance service, and SHOULD maximize availability of proper physical identity items for that path.

EU Terminology Constraints

If implementers use EU eIDAS vocabulary (for example "electronic identification", "electronic identification means", "person identification data"), those usages SHOULD be anchored to Article 3 definitions and related amendments [EU-910-CONS] [EU-2024/1183].

MRZ Source Constraints

MRZ semantics are defined by ICAO Doc 9303 and MUST NOT be replaced by ad hoc field interpretations [ICAO-9303] [ICAO-9303-P3].

If a governance profile requires chip-assisted authenticity checks (for example NFC reads), the profile MUST publish a physical validity method profile and authoritative trust-source inputs through the normative PID policy contract.

Architecture

Architecture Layer

This section is the technical design proposal for GDIS. It defines how physical identity anchors become portable cryptographic evidence.

Actors

Lifecycle

  1. A physical item is inspected and chip/authenticity data is read under governance verification procedures, including NFC chip reads where required by policy.
  2. PID fields are extracted from MRZ-compatible data, canonicalized, and transformed into profile-defined subject-binding evidence.
  3. Governance verification endpoint data is normalized and transformed into profile-defined endpoint-binding evidence.
  4. The derived PID binding value is bound to endpoint evidence and physical validity evidence artifact outputs for issuer and verifier checks.
  5. An issuer creates a GDIS binding credential addressed to a GDIS subject DID with GQSCD controller evidence.
  6. Verification material, status material, and publication proofs are published to a publication set in the selected host profile network.
  7. Verifiers validate publication evidence under the declared host profile and evaluate binding validity, status, and freshness.

End-to-End Lifecycle Walkthrough (Informative)

High-level GIDAS lifecycle from governance issuance to verifier decision and revocation handling.
End-to-end flow overview. Host replication semantics remain defined by the declared host profile.
  1. A governance-recognized issuer validates PID evidence from a physical identity item and binds it to a user-controlled GQSCD-class controller context using the declared physical validity method profile.
  2. The issuer outputs a binding credential addressed to a subject DID, with issuer proof material and governance-policy references needed by independent verifiers.
  3. DID resolution material, status material, and key-history evidence are published across replicated hosts under the declared host profile (for example GQTS), enabling cross-origin consistency checks.
  4. The user wallet executes signing and presentation flows from the end-user device boundary; verifier transactions check proof validity, physical-validity evidence, freshness, and policy inputs.
  5. Revocation and key-state transitions are published as signed, timestamped status events so verifiers can reject claims outside the valid interval.

Scope boundary: this walkthrough describes technical evidence flow in GDIS. Legal qualification outcomes are external policy-layer decisions.

Subject and Endpoint Binding Outcomes

GDIS v1 defines binding outcomes, not one mandated implementation. Conforming profiles MUST define deterministic verifier behavior for the binding tuple: (subjectBindingValue, endpointBindingValue).

If a profile uses hash-derived identifiers, it MUST define deterministic serialization (for example tuple expression format), canonicalization rules, and verifier failure semantics.

  1. Normalize MRZ text to ICAO-compatible uppercase machine-readable form and extract profile-defined PID fields from MRZ-compatible document data.
  2. Derive subjectBindingValue from canonicalized PID input using a profile-declared deterministic construction.
  3. Derive endpointBindingValue from normalized endpoint input using a profile-declared deterministic construction.
  4. Produce verifiable binding evidence that ties subjectBindingValue and endpointBindingValue to issuer identity, governance policy version, and issuance time.
  5. Publicly replicated artifacts MUST NOT require globally reusable person-identifying handles for verifier correctness. Profiles SHOULD use blinded or verifier-scoped handles by default.
  6. Profiles MUST publish deterministic verifier algorithms and test vectors that yield behaviorally equivalent outputs for equivalent inputs, independent of implementation internals.

Credential Binding Model

The binding MUST be materialized as a W3C VC [VC-DM2] issued to a DID [DID-CORE] and signed using Data Integrity or JOSE-compatible proof suites [VC-DI] [RFC7515].

{
  "@context": [
    "https://www.w3.org/ns/credentials/v2"
  ],
  "type": ["VerifiableCredential", "GDISBindingCredential"],
  "issuer": "did:example:governance-issuer",
  "credentialSubject": {
    "id": "did:example:subject",
    "subjectBinding": {
      "mode": "profile-defined-hidden-binding",
      "policyId": "EX-GOV-001-pid-v4"
    },
    "endpoint": "https://registry.example.gov/.well-known/gidas/verify",
    "endpointBindingValue": "profile:v1:K7xJ8G2y9N....",
    "governanceArea": "EX-GOV-001"
  },
  "evidence": [{
    "type": "IssuerEvidenceBundle",
    "statusList": "https://registry.example.gov/.well-known/gidas/status",
    "discovery": "https://registry.example.gov/.well-known/gidas/discovery"
  }],
  "proof": {"type": "DataIntegrityProof"}
}

Decentralized Publication Model

GDIS requires publication of verification material to a decentralized event log, but transport, replication, ordering, and distribution semantics are delegated to the declared host profile. This specification defines publication obligations and identity-binding semantics; it does not define host network internals. [GQTS-CORE]

Data Model

Conforming implementations MUST produce and process explicit evidence artifact objects. Artifact schemas MAY evolve by profile version, but required semantics and verification checks in this section are stable.

Artifact Required Fields Produced By Validated By Freshness or Retention Rule
Binding credential artifact issuer, subject DID, subject-binding evidence reference, endpoint reference, proof Issuer Verifier Retain until superseded or revoked.
physical validity evidence artifact physicalValidityProfileId, input-channel result (for example mrz-only or mrz-plus-nfc), governance trust source references, checkedAt timestamp, integrity proof Issuer or delegated inspection authority Issuer and Verifier MUST be valid for the effective policy interval and verifier decision time.
Endpoint status artifact endpoint URI, status payload, timestamp, signer data Governance endpoint operator Verifier MUST satisfy verifier freshness policy at decision time.
Publication evidence artifact hostProfileId, publication target URI, published artifact digest, and publication receipt proof (profile-defined) Issuer or Subject agent Verifier MUST be verifiable against the declared host profile semantics.
Verification transcript artifact challenge, audience, evaluated inputs, decision output Verifier Auditor, governance review process SHOULD be retained per governance audit policy.

Normative Requirements

REQ-GDIS-01 1. Physical Anchor Requirements

REQ-GDIS-02 2. MRZ-Derived Subject Binding Requirements

REQ-GDIS-03 3. Verification Endpoint Requirements

The provisional interface description in openapi.yaml is suuntaa antavia (indicative). This requirement defines normative endpoint invariants and conformance outcomes [OAS-3.1.2].

REQ-GDIS-04 4. VC to DID Binding and Controller Requirements

REQ-GDIS-05 5. Publication Profile Binding

REQ-GDIS-06 6. Replay and Freshness Controls

REQ-GDIS-07 7. Cryptographic Agility and Profile Constraints

REQ-GDIS-10 8. Physical Validity Evidence Requirements

Cross-Spec Clause References (Informative)

This table provides clause-level cross-references for deployments that profile GDIS with GQSCD-Core and GQTS-Core. It is intended for conformance audit traceability.

GDIS Clause External Spec Referenced Clauses Binding Context
REQ-GDIS-04 [GQSCD-CORE] REQ-GQSCD-06, REQ-GQSCD-17, REQ-GQSCD-26, REQ-GQSCD-27, REQ-GQSCD-28, REQ-GQSCD-29 Controller evidence, user-intent binding, and verifier-checkable signing-control semantics.
REQ-GDIS-05 [GQTS-CORE] REQ-GQTS-01, REQ-GQTS-02, REQ-GQTS-03, REQ-GQTS-04, REQ-GQTS-05, REQ-GQTS-06, REQ-GQTS-07 Host discovery, publication, append-only event retrieval, and event-address integrity.
REQ-GDIS-10 [GQSCD-CORE] REQ-GQSCD-06, REQ-GQSCD-24, REQ-GQSCD-29 Deterministic zero-trust validation of physical-validity evidence and governance-source checks.

Processing Model

REQ-GDIS-08 Issuer Processing Rules

  1. The issuer MUST verify the physical anchor evidence, including governance issuance context, before producing any GDIS binding credential.
  2. The issuer MUST resolve the governance PID identification endpoint policy, include all required fields, and validate each extracted field value against its declared regular expression before subject-binding derivation.
  3. The issuer MUST produce and integrity-protect a physical validity evidence artifact aligned with the resolved policy's physical validity method profile, including required input-channel and trust-source checks.
  4. The issuer MUST compute PID binding value and endpoint-binding values exactly as defined by the active profile's deterministic binding rules.
  5. The issuer MUST include enough evidence references for a verifier to check issuer authenticity, status freshness, and replay resistance.
  6. The issuer MUST sign issuance artifacts with currently authoritative keys and publish verification material with publication evidence compatible with the declared host profile.

REQ-GDIS-09 Verifier Processing Rules and Output Contract

A verifier MUST execute REQ-GDIS-03, REQ-GDIS-05, REQ-GDIS-06, REQ-GDIS-07, and REQ-GDIS-10 before returning a decision. The verifier output MUST be an explicit, machine-consumable verification result.

  1. The verifier MUST validate the credential proof material and issuer authenticity according to the declared cryptographic suites.
  2. The verifier MUST resolve applicable governance PID policy and validate required extracted fields against declared regular expressions before accepting derived subject-binding claims.
  3. The verifier MUST validate the physical validity evidence artifact against the declared physical validity method profile and required governance trust source reference inputs.
  4. The verifier MUST validate publication evidence using the declared host profile semantics.
  5. The verifier MUST apply replay and freshness checks before producing final decision output.
  6. The verifier output MUST report mechanical validity and recognition status as separate values.
  7. Implementations MAY use different internal algorithms and data structures for performance, but MUST produce behaviorally equivalent results.
{
  "subjectHandle": "aud:merchant.example:2f1f7e6f9a3e",
  "linkabilityClass": "verifier-scoped",
  "mechanicalValidity": "pass",
  "recognitionStatus": "accepted",
  "decision": "valid",
  "status": "active",
  "evaluatedAt": "2026-02-17T12:34:56Z",
  "physicalValidity": {
    "physicalValidityProfileId": "EX-GOV-001-physical-v2",
    "channel": "mrz-plus-nfc",
    "verified": true
  },
  "issuerKeyState": "trusted",
  "freshness": {
    "endpointOk": true,
    "withinPolicyWindow": true
  },
  "publicationEvidence": {
    "hostProfileId": "https://z-base.github.io/gqts/",
    "accepted": true
  },
  "replayCheck": {
    "nonceBound": true,
    "audienceBound": true
  }
}

If decision is not valid, verifiers MUST return an explicit failure reason code and MUST NOT collapse all failures into one opaque error.

Requirement Traceability Matrix

Requirement Unit Primary Artifact Producer Primary Checker
REQ-GDIS-01 Physical anchor Issuer anchor evidence artifact Issuer Verifier
REQ-GDIS-02 MRZ-derived subject binding Canonicalization and binding transcript Issuer Verifier
REQ-GDIS-03 Endpoint verification Endpoint status artifact Endpoint operator Verifier
REQ-GDIS-05 Publication profile binding Publication evidence artifact Issuer Verifier
REQ-GDIS-06 Replay/freshness Verifier transcript artifact Verifier Auditor or policy authority
REQ-GDIS-04 VC to DID binding Binding credential artifact Issuer Verifier
REQ-GDIS-07 Cryptographic agility Cryptographic profile declaration Issuer Verifier
REQ-GDIS-08 Issuer processing Issuance transcript and evidence bundle Issuer Verifier
REQ-GDIS-09 Verifier processing Verification result and failure reason outputs Verifier Auditor or policy authority
REQ-GDIS-10 Physical validity evidence Physical validity evidence artifact Issuer or delegated inspection authority Verifier

Conformance Classes

Class Required Sections
GDIS Issuer REQ-GDIS-01, REQ-GDIS-02, REQ-GDIS-03, REQ-GDIS-04, REQ-GDIS-05, REQ-GDIS-06, REQ-GDIS-07, REQ-GDIS-08, and REQ-GDIS-10.
GDIS Verifier REQ-GDIS-03, REQ-GDIS-05, REQ-GDIS-06, REQ-GDIS-07, REQ-GDIS-09, and REQ-GDIS-10.

Conformance Reporting

A conformance claim MUST be accompanied by a machine-readable conformance report with at least the following fields.

Report Field Requirement
Implementation identifier and version MUST be declared.
Conformance class set MUST list all claimed classes.
Requirement coverage MUST list satisfied and excluded REQ-GDIS-xx identifiers.
Profile and schema versions MUST identify the evaluated profile versions and contract revision.
Host profile declarations MUST declare host profile URI and version pinning when publication evidence is evaluated.
Cryptographic suite declaration MUST declare mandatory suites and key constraints.
Test evidence MUST include pass/fail results and artifact samples.
Determinism vectors MUST include canonicalization and URI-normalization compatibility vectors.
Policy evaluation evidence MUST include PID policy source references, physical-validity profile outputs, and delegated-issuance posture outputs.
Security assumptions MUST declare clock/freshness policy values and trust-anchor inputs.

Reports SHOULD include machine-readable fields so independent tooling can compare behavior across implementations.

Interoperability Profiles

Web Profile

Implementations MUST treat web standards as the primary interoperability baseline (web profile):

EU Compatibility Profile

EU compatibility profile requirements are mapping layers on top of the primary web profile and do not replace web-profile baseline semantics.

Compatibility Concern Web Profile Baseline EU Mapping Reference
Wallet integrity and secure components Controller and key custody evidence in VC/DID artifacts [EU-2024/2979]
Protocol and interface interoperability HTTP + VC/DID transport and data model constraints [EU-2024/2982]
PID and electronic attribute issuance semantics Credential claims, PID mapping, and issuer evidence handling [EU-2024/2977]
EU wallet protocol alignment details Profile mappings MUST document which protocol families and data interfaces are implemented. [EU-2024/2982] [ISO-18013-5] [ISO-18013-7]
Legal status determination Verifier-side cryptographic validity checks [EU-910-CONS] [EU-TRUSTED-LISTS]

EU to Web Conceptual Mapping (Informative)

This subsection is a discussion aid for cross-community alignment. It is conceptual and does not, by itself, establish legal status.

Concept bridge showing EU signature, seal, and attestation concepts mapped to DID and VC expressions.
Conceptual bridge only. Legal qualification remains an external policy decision.
EU Concept Closest Web/GIDAS Expression Important Boundary
Electronic Signature (natural-person intent act) DID-controller signing act with explicit user-intent evidence (for example GQSCD-class controller evidence and verifier challenge binding). Signature is an act by a signing subject. A DID-based proof can represent this act if intent and key-control evidence are present.
Electronic Seal (issuer/legal-entity integrity act) Issuer proof over a VC or other signed artifact, where issuer identity and key authority are independently verifiable. A VC is a data container; the proof over it is the cryptographic act that is closest to sealing.
Electronic Attestation of Attributes VC claims bound to issuer proof material and verifier-checkable evidence references. Attribute semantics and legal effect remain policy-layer outputs, separate from cryptographic validity.
Qualified status labels (QES/QSeal/EAA qualification) Recognition-status output derived from trusted lists, supervisory registries, and profile policy inputs. Cryptographic validity is necessary but not sufficient for legal qualification status.

Security Considerations

Threat Model

Implementations MUST assume hostile client/network environments unless security boundaries are cryptographically enforced.

Verifier behavior MUST follow a zero-trust verification model: each acceptance decision MUST be based on explicit, cryptographically checkable artifacts and declared policy inputs.

At minimum, conforming designs MUST model key exfiltration attempts, endpoint spoofing, replay attempts, and policy abuse where governance minimum host requirements are misused as maximum exclusivity constraints.

Threat Required Control Evidence Type
Key exfiltration Hardware-backed non-exportability + controller attestation Device or controller evidence chain
Endpoint spoofing Endpoint hash binding + TLS + issuer signatures Bound endpoint hash and signed metadata
Replay of proof artifacts Nonce/audience/timestamp checks Verifier transcript and challenge log
Adversarial or compromised issuer Rotation lineage enforcement + compromise status handling + registry-backed issuer validation Issuer status evidence and key-state transition artifacts
Adversarial governance endpoint operator Signed endpoint responses + key pinning policy + independent corroboration where profile requires Endpoint signature chain and mismatch audit transcript
Governance over-closure of host set Mandatory host sets treated only as publication floor Publication policy and host-distribution record
Centralization by default remote-eID issuance dependency Physical-item-primary issuance policy + fallback-only remote delegation + issuer-authority chain verification PID policy delegated-issuance object and authority-chain evidence

"Approved software lists" or governance labels alone MUST NOT be treated as technical guarantees without cryptographic enforcement.

Conformance reports SHOULD list which threats were tested directly and which threats are mitigated by inherited platform controls.

Privacy Considerations

References

Core Standards and Law

Infra and API Baselines

Web Credentials and Identity

Security and Trust Context

Verifiable History Inputs

GQSCD Framework Inputs