International Data Space Component Certification

Is my product IDS-ready?

The International Data Space (IDS) initiative aims to create a secure data space that enables companies across industries and of all sizes to manage their data assets sovereignly. Within the IDS, data can be exchanged securely while being subject to usage restrictions. Ensuring acceptance of the IDS in the context of exchanging business-critical data is crucial. To achieve this, the certification process plays a central role.

Overview of the Training »International Data Space Component Certification«

Training Type In-house seminar
Format On-site
Certificate Certificate of participation
Prerquisites  Knowledge of the IDS reference architecture model, ideally membership in the IDSA
Dates

By arrangement

Duration 3 to 5 days on-site or online, depending on the complexity and maturity of the product
Language German
Target Audience
  • Companies: Manufacturers of IDS core components
  • Participants: Technicians, developers, product owners
Participation Fee By arrangement

This training will be held in German. 

Challenge & Solution

Challenge: Building Trust and Acceptance for Your Products

Do you want to offer or process data within the International Data Space (IDS) or enable your customers to do so? Are you planning to develop your own components for this purpose and have them certified for participation in the IDS? In this workshop, you will learn what is required for successful certification and participation in the IDS and can directly compare this with your current development status.

The Solution: Certification of Core Technical Components for a Secure Data Space

The International Data Space (IDS) initiative aims to create a secure data space that enables companies across industries and of all sizes to sovereignly manage their data assets. Within the IDS, data should be exchanged securely and subject to usage restrictions. To achieve this, a trusted environment must be established to enforce usage policies. Ensuring the acceptance of the IDS in the exchange of business-critical data is crucial. Certification plays a central role in achieving this goal. In addition to certifying participating companies, all core technical components of the IDS must undergo a rigorous certification process based on strict criteria. This workshop provides an in-depth explanation of the IDS certification requirements. Together with the experts, you will evaluate your product based on these criteria.

At the end of this three- to five-day workshop, you will receive a comprehensive assessment of which IDS-required functionalities and security features have already been implemented and which areas require further work. Based on this analysis, a concrete roadmap will be developed, outlining the necessary steps for IDS certification.

Your Advantages at a Glance

After the Workshop, You Will Be Able To:

  • Understand component certification in the IDS on a technical level.
  • Assess the certifiability of your own product.
  • Evaluate the advantages, benefits, and risks of IDS certification.
  • Realistically estimate the effort required for IDS certification for your product.

This Workshop Provides You With:

  • A decision-making basis for the IDS certification of your product.
  • An assessment of how well your product meets the existing IDS certification criteria.
  • A concrete roadmap outlining the remaining steps toward IDS certification after the workshop.
The Trainers

Nadja Menz

Nadja Menz is a research associate in the Digital Public Services business unit at Fraunhofer Institute FOKUS. She is an expert in IT security, specializing in quality assurance and certification. At Fraunhofer FOKUS, she leads the CertLab, which supports evaluation bodies in certification processes for IT security products based on the Common Criteria standard. Within the International Data Spaces Association (IDSA), Nadja Menz heads the Certification Working Group, which is responsible for designing and developing the IDS certification scheme—including certification requirements and criteria, roles, and certification levels.

 

Sascha Wessel

Sascha Wessel studied Computer Science at Friedrich-Alexander University in Erlangen and has authored over 20 scientific publications. His research focuses on systems security, with an emphasis on integrity protection, virtualization, and operating systems, particularly Linux security. Since 2013, Sascha Wessel has led the Secure Operating Systems research department at the Fraunhofer Institute for Applied and Integrated Security (AISEC) in Garching near Munich. At Fraunhofer AISEC, the IDS Trusted Connector was developed and released as open source.

All Units at a Glance

Module 0 (2-hour preparatory web session)

  • Clarification of product complexity and maturity
  • Objective: Define the content and scope of the workshop.

Modul 1 (1 Day)

  • Introduction to the IDS Certification Scheme
  • Explanation of the similarities and differences between IDS certification and IEC 62443-4-2
  • Overview of the criteria catalog
  • Product presentation by the customer

Module 2 (1-3 Days, as Needed)

Discussion of the criteria

  • IDS-specific criteria
  • 62443-4-2 criteria
    • IAC: Identification and authentication control
    • UC: Use Control
    • SI: System integrity
    • DC: Data confidentiality
    • RDF: Restricted data flow
    • TRE: Timely response to events
    • RA: Resource availability
    • NDR: Network device requirements
  • Development-specific criteria

Module 3 (1 Day)

  • Summary of the findings and evaluation.
  • Next steps for IDS certification.

Contact

Contact Press / Media

Anne Halbich

Fraunhofer Institute for Open Communication Systems
Kaiserin-Augusta-Allee 31
10589 Berlin, Germany

Phone +493034637346