PRIVACY-BP-B. RECOMMENDED TECHNOLOGY ENFORCEMENT

INTEROP-BP-D. RECOMMENDED PROCESS MODELS

INTEROP-BP-B. RECOMMENDED EXCHANGE STANDARDS

SECURE-15. SECURITY AUDITS

SECURE-14. SECURITY LOGS

SECURE-13. REVOCATION

SECURE-12. RECOVERY AND REISSUANCE

SECURE-10. UPTIME

SECURE-5. CREDENTIAL ISSUANCE

SECURE-3. CREDENTIAL REPRODUCTION