Certification

Certification: the basis of trust

Our goal is to establish data spaces that guarantee data sovereignty and safe collaboration between partners. The foundation of IDS is trust, which must be established through a rigorous, transparent certification process.

Entrusting data to IDS

If you’re participating in IDS, then you know your data is valuable and vulnerable. So you need to be sure your partners and collaborators in data sharing are bound by the rules you set regarding what can be used, how it can be used, for how long and at what price. Certification of participants and core components in IDS is what provides you and your partners with that confidence and it’s mandatory for participating in IDS.

Building trust on two levels

The participants in the data space collaborate by sharing their valuable data. The success of this collaboration depends on trust among all parties involved, and this, in turn, is guaranteed by a transparent certification of the environment and components. This two-pronged approach provides a high level of trust and security.

Core component certification

We evaluate and certify the core components of IDS based on whether they provide the required functionality and security.

Operational environment certification

This evaluation provides an assessment of the trustworthiness of the physical environment, defined processes, and organizational rules.

Low barriers to certification

To minimize the effort for organizations, IDS certification is compatible with commonly used security standards like ISO 27001 and IEC 62443. This way, existing documentation and setups can be reused for IDS certification.

More

Leaflet

How to get IDS_certified! 

Blog

The plugfest as a driver for a vital IDS ecosystem 

Position Paper

IDS certification explained

Any questions? Contact us!

Your contact person:
Sonia Jimenez
Senior Consultant Programme Management

become a member

Benefit from all current developments: Become a member of the International Data Spaces Association now!