TRQP-TSPP

SAD-1 security and privacy expectations (TSPP)

SAD-1 (Sovereign Authoritative Directory) is a registry-agnostic profile used by the TRQP ecosystem to evaluate authoritative directories, including sovereign registries.

This document defines the security and privacy expectations that TSPP contributes when SAD-1 is used.

Threat model focus

Authoritative directories are high-leverage attack surfaces:

TSPP control families that apply

Publication authenticity and replay resistance

Operators MUST provide verifier-first integrity for published directory artifacts:

Administrative action security

Directory updates are administrative actions and MUST be protected:

Transparency, accountability, and redress

At AL3/AL4, a directory MUST provide:

Privacy constraints

Directory entries SHOULD minimize personal data exposure:

Evidence bundle expectations

When evaluating a directory under SAD-1, an evidence bundle SHOULD include:

See also: docs/evidence_bundles.md and docs/requirements.md.

Identity anchoring extension (DIA / IDR)

Authoritative directories may bind directory subjects (registrars, facilities, products, trademarks, etc.) to an identity anchoring mechanism so that relying parties can independently verify issuer identity and resolve identifiers.

When UNTP Digital Identity Anchor (DIA) and Identity Resolver (IDR) patterns are used, the directory evaluation scope is the composite trust system: directory governance + directory publication integrity + identity anchoring.

Requirements

SAD-1-ANCHOR-01: If the directory publishes identity anchors, it MUST declare the anchor mechanism and version (for example UNTP_DIA_0.6.1).

SAD-1-ANCHOR-02: Anchor credentials MUST be referenceable using the correct JSON-LD context URL for the declared anchor mechanism.

SAD-1-ANCHOR-03: If issuer identifiers are DIDs, the directory operator MUST document the DID method(s) supported and the resolution approach (direct DID resolution, registry-based, or hybrid via an Identity Resolver).

SAD-1-ANCHOR-04: If revocation or status is supported, the directory MUST publish status pointers and lifecycle rules, and MUST ensure revocation state propagates to the directory status feed within defined SLAs.

Evidence

Normative references: