Certification: the basis of trust

Our goal is to establish data spaces that guarantee data sovereignty and safe collaboration between partners. The foundation of IDS is trust, which must be established through a rigorous, transparent certification process.

Entrusting data to IDS

If you’re participating in IDS, then you know your data is valuable and vulnerable. So you need to be sure your partners and collaborators in data sharing are bound by the rules you set regarding what can be used, how it can be used, for how long and at what price. Certification of participants and core components in IDS is what provides you and your partners with that confidence and it’s mandatory for participating in IDS.

Building trust on two levels

The participants in the data space collaborate by sharing their valuable data. The success of this collaboration depends on trust among all parties involved, and this, in turn, is guaranteed by a transparent certification of the environment and components. This two-pronged approach provides a high level of trust and security.

Operational environment certification

The operational environment includes the physical environment, defined processes and organizational rules. This evaluation is based on international standards and provides an assessment of the trustworthiness of the operational environment along two dimensions, the evaluation depth and the extent of the security requirement.

Core Component Certification

We evaluate and certify core components based on whether they provide the required functionality and security with regard to the security profiles. As core components are developed by different companies for a wide variety of industries and usage scenarios, core component certification differs, providing assurance levels and security profiles that may be applied based on the needs of the data provider and data consumer. The core component certification includes interoperability testing to ensure the interoperability and compatibility of all components in the IDS.

Low Barriers to certification

To minimize the effort for organizations, IDS certification is compatible with commonly used security standards like ISO 27001 and IEC 62443. This way, existing documentation and setups can be reused for IDS certification.


Collaboration among partners is the core of IDS and key to a thriving data economy. Successful collaboration demands total trust. We designed a process that will establish this trust: IDS certification. By defining a standardized level of security related to technical and organizational aspects in an entirely transparent process, IDS certification ensures security for everyone. It’s foundational to trustworthy and sovereign data exchange.



How to get IDS_certified! 


The plugfest as a driver for a vital IDS ecosystem 

Position Paper

IDS certification explained

Any questions? Contact us!

Your contact person:
Natalia Simon
Project & Community Manager 

become a member

Benefit from all current developments: Become a member of the International Data Spaces Association now!