PRIVACY-BP-B. RECOMMENDED TECHNOLOGY ENFORCEMENT
INTEROP-BP-D. RECOMMENDED PROCESS MODELS
INTEROP-BP-B. RECOMMENDED EXCHANGE STANDARDS
SECURE-15. SECURITY AUDITS
SECURE-14. SECURITY LOGS
SECURE-13. REVOCATION
SECURE-12. RECOVERY AND REISSUANCE
SECURE-10. UPTIME
SECURE-5. CREDENTIAL ISSUANCE
SECURE-3. CREDENTIAL REPRODUCTION