This document specifies the VSC Trust Framework Template: a customizable, machine-readable governance template that any supply chain network can adopt to establish the roles, accreditation rules, trust registry structure, credential policies, and compliance criteria governing the issuance and consumption of VSC-conformant Verifiable Credentials.

The template is the third major deliverable of the Verifiable Supply Chain Community Group. It builds on the requirements established in [[VSC-REQUIREMENTS]], the interoperability definitions in [[VSC-INTEROP]], and the governance metamodels of the Trust over IP Foundation ([[TOIP-GOVERNANCE]], [[TOIP-METAMODEL]]) and EBSI ([[EBSI-TRUST-MODEL]]). It draws further on the [[CREDENTIAL-ENGINE-GOV]] governance framework for issuer identity registries (June 2025) and the [[UK-DIATF]].

An organization adopting this template fills in the highlighted placeholders to create a sector-specific or network-specific governance framework document that is immediately operational with the [[VSC-INTEROP]] Toolkit.

This document is a Community Group Draft produced by the Verifiable Supply Chain Community Group. It is not a W3C Standard and is not on the W3C Standards Track. It may be updated, replaced, or obsoleted at any time. Version history is tracked in the CHANGELOG.

Feedback is welcome via the GitHub issue tracker or the public-vsc mailing list. See the Contributing section for guidelines.

This specification is aligned with the Trust over IP Foundation's [[TOIP-GOVERNANCE]] (December 2022), the [[TOIP-ISSUER-GUIDE]] (April 2024), the [[EBSI-TRUST-MODEL]] v3, and the [[CREDENTIAL-ENGINE-GOV]] (June 2025) published by Credential Engine and MIT Digital Credentials Consortium. Where those sources conflict, this specification takes precedence for VSC-specific supply chain contexts.

Introduction

This section is non-normative.

Why a Trust Framework Template?

Cryptographic verifiability — the ability to prove who signed a Verifiable Credential — is necessary but not sufficient for supply chain trust. A verifier also needs to know:

A Trust Framework answers all four questions. This template provides the structure; adopting networks supply the sector-specific content. The design draws on three proven models:

Document Structure

Conformance

The key words MUST, MUST NOT, REQUIRED, SHALL, SHALL NOT, SHOULD, SHOULD NOT, RECOMMENDED, NOT RECOMMENDED, MAY, and OPTIONAL are to be interpreted as described in [[RFC2119]] and [[RFC8174]] when, and only when, they appear in all capitals.

A VSC-conformant Trust Framework Document (TFD) is one that satisfies all MUST requirements in this specification and declares conformance to it. The TFD itself is a governance document, not software; conformance is assessed by a human auditor or by automated validation of the machine-readable TFD artefact (see Machine-Readable Trust Framework Document).

Terminology

Terms from [[VSC-REQUIREMENTS]] and [[VSC-INTEROP]] retain their established meanings. Governance-specific terms follow.

Trust Framework (TF)
A governance document that defines the roles, rules, technical requirements, accreditation criteria, and legal obligations governing participants in a specific VSC-based supply chain ecosystem. A Trust Framework is instantiated from this template by a Governance Authority for a specific sector or network.
Trust Framework Document (TFD)
The formal, versioned artefact that records the Trust Framework for a specific network. A TFD MUST include both a human-readable narrative section and a machine-readable JSON-LD section conformant with Machine-Readable Trust Framework Document.
Governance Authority (GA)
The legal entity or consortium that authors, publishes, maintains, and enforces a Trust Framework. The Governance Authority MUST hold a [[DID-CORE]] identifier serving as the Root Trusted Accreditation Organization for the trust chain, following the model established in [[EBSI-TRUST-MODEL]]. Examples include a sector consortium, a national standards body, or a regulatory agency.
Root Trusted Accreditation Organization (Root TAO)
The apex of the trust hierarchy within a Trust Framework. The Root TAO has full control of its Trust Chain and is the sole entity that may accredit TAOs. The Root TAO is identified by a [[DID-CORE]] URI and its accreditation credential is self-issued or issued by an external root authority (e.g., a government PKI or GS1 registry). Modelled after [[EBSI-TRUST-MODEL]].
Trusted Accreditation Organization (TAO)
An organization accredited by the Root TAO or another TAO to govern a segment of the Trust Chain: specifically, to evaluate and accredit Trusted Issuers within their domain. A TAO may only pass accreditation authority equal to or less than its own. TAOs are typically sector bodies, national associations, or regulatory agencies.
Trusted Issuer (TI)
A supply chain actor accredited by a TAO to issue specific types of VSC Credentials within defined business contexts. Each Trusted Issuer MUST hold a [[DID-CORE]] identifier registered in the Trusted Issuers Registry with a valid Verifiable Accreditation. Modelled after [[EBSI-TRUST-MODEL]].
Trusted Verifier
An entity explicitly recognized by the Trust Framework as authorized to request and receive presentations of specific VSC Credential types. Trusted Verifier status MAY be governed separately from Trusted Issuer status or combined in the same entity.
Trust Chain
A hierarchical, directed graph of accreditation credentials linking the Root TAO through one or more TAOs to all Trusted Issuers in a Trust Framework. Every credential in the chain is a Verifiable Accreditation signed by its issuing node. A verifier traverses the chain to establish that a specific Trusted Issuer is authorized to have issued a given VSC Credential.
Verifiable Accreditation
A Verifiable Credential issued by a Root TAO or TAO granting a specific entity the permission to accredit (if issued to a TAO) or to issue specific credential types (if issued to a Trusted Issuer). Verifiable Accreditations are stored in the Trusted Issuers Registry and are publicly resolvable by any verifier. Modelled after [[EBSI-TRUST-MODEL]] VerifiableAccreditationToAccredit and VerifiableAccreditationToAttest.
Trusted Issuers Registry (TIR)
A publicly resolvable, machine-readable registry of all Trusted Issuers and TAOs participating in a Trust Framework, indexed by their [[DID-CORE]] identifiers and linked Verifiable Accreditations. The TIR MUST be queryable by any verifier at any time, consistent with [[EBSI-TRUST-MODEL]] and the [[TOIP-GOVERNANCE]] Trust Registry specification.
Accreditation Scope
The bounded set of VSC Credential types, [[EPCIS20]] event types, [[CBV20]] bizStep values, commodity categories, or geographic regions for which a Trusted Issuer is authorized to issue credentials under their Verifiable Accreditation. Accreditation scope is always a subset of the authorizing TAO's scope and MUST NOT be extended beyond it.
Governance Document
A controlled, versioned document referenced by the Trust Framework Document that specifies policies, procedures, or standards for a specific aspect of the framework (e.g., a Key Management Policy, an Audit Procedure, a Dispute Resolution Procedure). Governance Documents are externally linked from the machine-readable TFD.
Supply Chain Actor
A legal entity that participates in one or more supply chain events and may hold one or more roles defined by the Trust Framework, including but not limited to manufacturer, distributor, carrier, inspector, or auditor.
Credential Status
The current state of a Verifiable Credential as indicated by its credentialStatus property, typically managed via [[VC-BITSTRING-STATUS]]. Possible states include active, suspended, and revoked.

Trust Hierarchy and Dual-Stack Architecture

This section is non-normative.

Dual-Stack Model

Consistent with [[TOIP-GOVERNANCE]], a VSC Trust Framework operates as a dual stack: a Technical Stack and a Governance Stack that must both be present for end-to-end trust.

GOVERNANCE STACK Ecosystem Governance Framework Accreditation Governance (TAO rules) Issuer Obligations (audit, key management) Credential Policy (disclosure, expiry) TECHNICAL STACK Trust Framework Document (JSON-LD) Verifiable Accreditation Credentials VSC Credential Schemas + Proof Rules Credential Policies per Type

Figure 1 — VSC dual-stack trust architecture, aligned with [[TOIP-GOVERNANCE]] and the [[EBSI-TRUST-MODEL]].

Trust Chain Hierarchy

A VSC Trust Chain MUST contain exactly three tiers, following [[EBSI-TRUST-MODEL]]. Each tier is identified by a [[DID-CORE]] URI and holds a Verifiable Accreditation from the tier above it.

ROOT TAO — Tier 0 Governance Authority · VerifiableAuthorisationForTrustChain TAO — Pharma Sector Body · Tier 1 TAO — Food Sector Body · Tier 1 TAO — Minerals Sector Body · Tier 1 Trusted Issuers Manufacturers · Tier 2 Trusted Issuers Wholesalers · Carriers · Tier 2 Trusted Issuers Inspectors · Customs · Tier 2 VerifiableAccreditationToAccredit VerifiableAccreditationToAccredit VerifiableAccreditationToAccredit VerifiableAccreditationToAttest VerifiableAccreditationToAttest VerifiableAccreditationToAttest VerifiableAccreditationToAttest All Verifiable Accreditations are stored in the Trusted Issuers Registry (TIR)

Figure 2 — VSC three-tier trust chain. Each downward arrow represents a Verifiable Accreditation stored in the Trusted Issuers Registry.

Accreditation Flow Sequence

TI Applicant TAO TIR Verifier Submit Application Legal identity evidence DID · proof of key control · KMP · self-assessment Vet applicant (ROLE-TAO2) Issue Accreditation VerifiableAccreditationToAttest validFrom/validUntil · scope defined Register Issuer DID · legalName · LEI · scope Issue VSC Credential (includes AccreditationPolicy in termsOfUse) Query Accreditation Status: active · in-scope Validate Trust Chain Resolve DID · Verify proof Check status · Confirm scope Credential Accepted

Figure 3 — Accreditation application, issuance, and verification flow.

Required Structure of a VSC Trust Framework Document

A VSC-conformant Trust Framework Document MUST include each of the sections listed below. Sections marked REQUIRED must be present and non-empty. Sections marked RECOMMENDED must be present if the framework governs a regulated industry. The ordering follows the structure established by [[TOIP-METAMODEL]] and [[CREDENTIAL-ENGINE-GOV]].

Section Status Purpose
1. Preamble and ScopeREQUIREDIdentifies the framework, Governance Authority, version, effective date, and the supply chain sector(s) governed.
2. Controlled Documents IndexREQUIREDAn enumeration of all Governance Documents incorporated by reference, with their URIs, version hashes, and status (normative / informative).
3. DefinitionsREQUIREDNetwork-specific terms not defined in [[VSC-REQUIREMENTS]] or this specification. MUST reference this document for terms shared with the base VSC vocabulary.
4. Roles and ParticipantsREQUIREDEnumerates the Root TAO, all TAOs, and categories of Trusted Issuers with their DIDs, Accreditation Scopes, and onboarding criteria.
5. Trust Chain StructureREQUIREDA diagram and textual description of the three-tier trust chain as instantiated for this network.
6. Accreditation LifecycleREQUIREDProcedures for applying for, granting, suspending, revoking, and renewing accreditation. See Accreditation Lifecycle.
7. Trusted Issuers RegistryREQUIREDThe URI, query API, and update procedure of the TIR for this framework. See Trusted Issuers Registry.
8. Credential PoliciesREQUIREDPer-credential-type policies: required fields, validity period, selective disclosure rules, revocation obligations. See Credential Policies.
9. Technical RequirementsREQUIREDRequired conformance class(es) from [[VSC-INTEROP]], required proof formats, DID methods, and API versions.
10. Legal Basis and LiabilityRECOMMENDED for regulated sectorsRegulatory references (e.g., [[DSCSA]], [[EUDR]]), jurisdiction, liability allocation, and data protection basis.
11. Dispute ResolutionRECOMMENDEDProcess for challenging a revocation, disputing a credential, or appealing an accreditation decision.
12. Auditing and EnforcementRECOMMENDEDAudit schedule, auditor qualification requirements, and enforcement mechanisms. See Compliance, Auditing, and Enforcement.
13. Machine-Readable TFDREQUIREDA JSON-LD document conformant with the VSC TFD schema defined in Machine-Readable Trust Framework Document.

Section 1 — Preamble Template

The following is the normative fill-in template for Section 1. Adopting networks complete all highlighted placeholders.

// SECTION 1: PREAMBLE AND SCOPE

Trust Framework Name: [Full legal name of the Trust Framework]
Short Name: [machine-readable slug, e.g., "pharma-dscsa-us-v1"]
Version: [MAJOR.MINOR, e.g., "1.0"]
Effective Date: [ISO 8601 date, e.g., "2026-07-01"]
Supersedes: [URI of prior version, or "none"]

Governance Authority: [Legal name]
GA DID (Root TAO): [did:web: or did:key: URI]
GA Contact: [email address or URI]
GA Jurisdiction: [e.g., "United States", "European Union", "Global"]

Governed Sectors: [e.g., "Pharmaceutical distribution", "Food and agriculture"]
Regulatory Context: [e.g., "DSCSA 582", "EUDR Art. 3", "EU-DPP Battery Regulation"]
Geographic Scope: [e.g., "US domestic", "EU import/export", "Global"]

Base Specification: https://w3c-cg.github.io/vsc-trust-framework/ (this document)
Interop Toolkit: https://w3c-cg.github.io/vsc-interop-toolkit/
Conformance Profile: [e.g., "pharmaceuticals-dscsa"]

Roles and Responsibilities

GA Governance Authority

ROLE-GA1 — DID Publication

The Governance Authority MUST publish a [[DID-CORE]] document at a stable, publicly resolvable URI. This DID serves as the Root TAO DID for the Trust Chain and MUST be referenced in the machine-readable TFD.

ROLE-GA2 — TFD Publication and Versioning

The GA MUST publish the Trust Framework Document at a stable URI and MUST version it using MAJOR.MINOR versioning. A new MAJOR version MUST be issued for any change that affects existing Verifiable Accreditations or invalidates credentials issued under the prior version. A changelog MUST be maintained.

ROLE-GA3 — Root Accreditation Issuance

The GA MUST issue a VerifiableAuthorisationForTrustChain credential (self-issued or from an external root, per [[EBSI-TRUST-MODEL]]) anchoring the trust chain. This credential MUST be publicly accessible and included in the TIR.

ROLE-GA4 — Governance Document Maintenance

The GA MUST maintain, version, and publish each Governance Document referenced in the TFD. All Governance Documents MUST include a last-modified date and a stable URI. Links MUST NOT rot; retired documents MUST redirect to their successors.

TAO Trusted Accreditation Organization

ROLE-TAO1 — Accreditation Scope Inheritance

A TAO MUST NOT grant a Verifiable Accreditation whose Accreditation Scope exceeds its own. All scope constraints from the accrediting party MUST be inherited and, where appropriate, further restricted. This prevents privilege escalation within the trust chain.

ROLE-TAO2 — Applicant Vetting

Before issuing a VerifiableAccreditationToAttest to a Trusted Issuer applicant, the TAO MUST:

  1. Verify the applicant's legal identity using a recognized national business registry or equivalent process.
  2. Confirm the applicant holds a resolvable [[DID-CORE]] identifier with key material suitable for the required proof format(s).
  3. Confirm the applicant meets the sector-specific requirements defined in the TFD Section 4 for their intended issuer category.
  4. Record the vetting evidence and its outcome in a durable, auditable log.
ROLE-TAO3 — Registry Maintenance

The TAO MUST update the Trusted Issuers Registry within 5 business days of any accreditation grant, suspension, revocation, or renewal. The TAO MUST NOT allow an entry to remain in the TIR for an entity whose accreditation has been revoked.

TI Trusted Issuer

ROLE-TI1 — Scope Compliance

A Trusted Issuer MUST only issue VSC Credentials whose type and Accreditation Scope fall within the bounds of their Verifiable Accreditation. Credentials issued outside this scope MUST be rejected by conformant verifiers.

ROLE-TI2 — Key Management

A Trusted Issuer MUST maintain a written Key Management Policy (a Governance Document) that specifies: key generation algorithm, key storage (FIPS 140-2 Level 2 hardware security module RECOMMENDED for production issuance), key rotation schedule (RECOMMENDED: 12 months maximum), and key compromise response procedure. The Key Management Policy MUST be referenced in the TFD.

ROLE-TI3 — Credential Quality Obligations

A Trusted Issuer MUST ensure that every VSC Credential it issues accurately reflects the underlying [[EPCIS20]] event data as observed or recorded by the issuer's own systems. A Trusted Issuer MUST NOT issue credentials for events it did not observe or for which it lacks authoritative first-hand data, except as explicitly authorized by the TFD (e.g., a customs authority re-asserting an inspection result).

ROLE-TI4 — Accreditation Reference in Credentials

Each VSC Credential issued by a Trusted Issuer MUST include a reference to the issuer's Verifiable Accreditation in the credential's termsOfUse property, as specified in Credential Policies. This enables verifiers to traverse the Trust Chain programmatically.

ROLE-TI5 — Incident Reporting

A Trusted Issuer MUST report to its accrediting TAO within 48 hours of any: key compromise or suspected key compromise; issuance of a credential known to be erroneous; or any security incident affecting the integrity of its credential-issuing system.

TV Trusted Verifier

ROLE-TV1 — Verification Obligations

A Trusted Verifier MUST perform full Trust Chain traversal for every received VSC Credential before accepting it. This includes: resolving the issuer's [[DID-CORE]] identifier, verifying the cryptographic proof, checking Credential Status via [[VC-BITSTRING-STATUS]], and confirming the issuer's Verifiable Accreditation is valid and in scope.

ROLE-TV2 — No Substitution of Out-of-Band Trust

A Trusted Verifier MUST NOT accept a VSC Credential solely on the basis of an out-of-band relationship with the issuer (e.g., a pre-existing business relationship). The Trust Chain traversal in ROLE-TV1 is required regardless of any bilateral familiarity with the issuer.

TFD Section 4 Fill-in Template — Participants

// SECTION 4: ROLES AND PARTICIPANTS

4.1 Root TAO
  Legal name: [Full legal name]
  DID: [did:web: URI]
  TIR endpoint: [https://...]

4.2 Trusted Accreditation Organizations
  [Repeat for each TAO]
  Name: [Organization name]
  DID: [did:web: URI]
  Accreditation VC URI: [https://...]
  Governed sectors: [e.g., "pharmaceutical wholesale"]
  Geo scope: [e.g., "US", "EU", "Global"]

4.3 Trusted Issuer Categories
  [Repeat for each category]
  Category name: [e.g., "Licensed pharmaceutical manufacturer"]
  Accrediting TAO: [TAO name from 4.2]
  Required credential types: [e.g., "VSCTransactionEvent"]
  Required bizStep values: [CBV URIs]
  Vetting requirements: [e.g., "FDA Establishment Registration"]
  Key management requirement: [e.g., "HSM required", "Software key permitted"]

Accreditation Lifecycle

1. ApplicationApplicant submits identity evidence and capability declaration to TAO
2. VettingTAO verifies legal identity, technical readiness, and sector requirements
3. IssuanceTAO issues VerifiableAccreditationToAttest; TI registers in TIR
4. ActiveTI issues VSC Credentials within Accreditation Scope; annual surveillance audit
5. RenewalTI reapplies before expiry; TAO performs renewal vetting
6. Suspension / RevocationTAO suspends or revokes; TIR updated within 5 days
Start Application Vetting Issuance Active Renewal Suspended Revoked End TI submits TAO acknowledges Success Remediation required TIR confirmed 60 days before expiry Renewal approved Denied Non-compliance Remediation complete Critical violation Fraud / key compromise

Figure 4 — Accreditation lifecycle state machine showing all valid state transitions.

Application Process

ACC-A1 — Application Package

An applicant for Trusted Issuer status MUST submit to the accrediting TAO an application package containing:

  1. Legal identity evidence (business registration number, LEI, or equivalent).
  2. The applicant's [[DID-CORE]] identifier and proof of key control (a signed challenge response).
  3. A completed self-assessment against the technical requirements in TFD Section 9.
  4. A Key Management Policy (see ROLE-TI2).
  5. Evidence of compliance with any sector-specific prerequisites defined in TFD Section 4.3.
ACC-A2 — Application Response Time

The TAO MUST acknowledge receipt of a complete application within 5 business days and MUST issue an accreditation decision (grant or reasoned rejection) within [TF-specific SLA, e.g., 30 calendar days]. A rejection MUST include a written statement of the specific criteria not met and MAY include a remediation pathway.

Accreditation Credential Issuance

ACC-I1 — VerifiableAccreditationToAttest Schema

Upon successful vetting, the TAO MUST issue a VerifiableAccreditationToAttest credential conformant with the following schema. This schema follows [[EBSI-TRUST-MODEL]] conventions and is encoded as a [[VC-DATA-MODEL]] credential:

{
  "@context": [
    "https://www.w3.org/ns/credentials/v2",
    "https://w3c-cg.github.io/vsc/contexts/v1"
  ],
  "type": ["VerifiableCredential", "VerifiableAccreditationToAttest"],
  "id": "https://tir.example-consortium.org/accreditations/abc-123",
  "issuer": "did:web:tao.example-consortium.org",
  "validFrom": "2026-07-01T00:00:00Z",
  "validUntil": "2027-07-01T00:00:00Z",
  "credentialSubject": {
    "id": "did:web:issuer.example-company.com",
    "accreditedFor": [
      {
        "vscCredentialTypes": ["VSCTransactionEvent", "VSCObjectEvent"],
        "epcisEventTypes": ["TransactionEvent", "ObjectEvent"],
        "bizSteps": [
          "https://ref.gs1.org/cbv/BizStep-shipping",
          "https://ref.gs1.org/cbv/BizStep-receiving"
        ],
        "commodityCategories": ["pharmaceutical"],
        "geoScope": ["US"],
        "trustFramework": "https://w3c-cg.github.io/vsc-trust-framework/instances/pharma-dscsa-us-v1"
      }
    ]
  },
  "termsOfUse": [{
    "type": "AccreditationPolicy",
    "parentAccreditation": "https://tir.example-consortium.org/root/rtao-chain",
    "rootTAO": "did:web:governance.example-consortium.org"
  }],
  "credentialStatus": {
    "id": "https://tir.example-consortium.org/status/1#42",
    "type": "BitstringStatusListEntry",
    "statusListIndex": "42",
    "statusListCredential": "https://tir.example-consortium.org/status/1"
  },
  "proof": { /* Data Integrity Proof */ }
}
      
ACC-I2 — TIR Registration

The TAO MUST register the issued accreditation credential in the Trusted Issuers Registry within 2 business days of issuance. The TI MUST NOT begin issuing VSC Credentials until the TIR entry is confirmed.

Suspension and Revocation

ACC-SR1 — Mandatory Revocation Triggers

A TAO MUST revoke a Trusted Issuer's accreditation upon any of the following:

  • Confirmed key compromise (reported by the TI per ROLE-TI5 or detected externally).
  • Confirmed issuance of materially false or fraudulent VSC Credentials.
  • Legal entity dissolution, insolvency, or loss of required operating license.
  • Failure to remediate a critical audit finding within the prescribed timeframe.
  • Written request from the TI to voluntarily withdraw.
ACC-SR2 — Revocation Execution

Revocation MUST be executed by setting the TI's [[VC-BITSTRING-STATUS]] entry to revoked and updating the TIR entry to reflect the revocation date and reason code. The TAO MUST notify the TI of the revocation in writing (via registered email or equivalent) simultaneously with or before the registry update.

ACC-SR3 — Credential Continuity

Revocation of an issuer's accreditation does NOT automatically invalidate VSC Credentials already issued by that TI and in the possession of legitimate holders. However, verifiers SHOULD treat credentials issued after the revocation date as untrustworthy. The TFD MUST specify a policy for the treatment of pre-revocation credentials in the affected sector.

Renewal

ACC-R1 — Renewal Timeline

Trusted Issuer accreditations MUST have a defined validity period specified in the TFD. The default is 12 months. A TI MUST initiate renewal no later than 60 days before expiry. A TAO MUST complete a renewal review before the expiry date to avoid a gap in the TI's active status.

Trusted Issuers Registry (TIR)

Registry Requirements

TIR-1 — Public Availability

The Trusted Issuers Registry MUST be publicly readable without authentication. Any party MUST be able to query the TIR to verify whether a given [[DID-CORE]] identifier holds a valid Verifiable Accreditation at any time. Write access MUST require authentication and authorization (OAuth 2.0 or equivalent).

TIR-2 — Query API

The TIR MUST expose the following REST query endpoints. Responses MUST be returned as application/json using [[RFC9457]] for errors:

MethodPathDescription
GET/tir/v1/issuers/{did}Returns the TIR entry and current Verifiable Accreditation for the specified DID.
GET/tir/v1/issuersReturns all active TIR entries, paginated. Supports filtering by ?sector=, ?eventType=, and ?status=active|suspended|revoked.
GET/tir/v1/chain/{did}Returns the complete Trust Chain from the specified DID up to the Root TAO, as an ordered array of Verifiable Accreditation credentials.
GET/tir/v1/.well-known/tir-configurationReturns TIR metadata including root TAO DID, supported sectors, and framework URI.
TIR-3 — Availability and SLA

The TIR MUST meet a minimum availability of 99.5% per calendar month (approximately 3.6 hours downtime). Planned maintenance windows MUST be announced at least 48 hours in advance via the TFD's status page. Downtime affects the ability of verifiers to confirm issuer status; implementations SHOULD implement a TTL-based cache (RECOMMENDED: 24-hour TTL for read endpoints).

TIR-4 — Implementation Options

Adopting networks MAY implement the TIR using any of the following technology patterns. The TFD MUST document the chosen pattern and its trade-offs:

PatternDescriptionSuitability
Static JSON-LD Registry A versioned JSON-LD file hosted at a well-known URI, signed by the Root TAO DID Small networks (fewer than 50 issuers), low-cost, easy to audit
did:web DID Document Fragments Each issuer's accreditation is embedded in or linked from their [[DID-WEB]] document Federated; no central infrastructure needed
REST API with database backend A managed REST service (this spec's TIR-2 endpoints) backed by a relational or document store Medium to large networks; real-time revocation
Smart Contract Registry Accreditations stored as on-chain records (e.g., EBSI TIR model, [[EBSI-TRUST-MODEL]]) High-assurance, tamper-evident; requires ledger governance

TIR Entry Schema

Each TIR entry MUST contain the following fields, validated against the VSC TIR [[JSON-SCHEMA]] published at https://w3c-cg.github.io/vsc-trust-framework/schemas/tir-entry.json:

{
  "did": "did:web:issuer.example-company.com",
  "legalName": "Example Company Ltd.",
  "lei": "529900HNOAA1KXQJUQ27",         // Legal Entity Identifier (optional but RECOMMENDED)
  "gs1CompanyPrefix": "0614141",    // GS1 Company Prefix (where applicable)
  "status": "active",                     // "active" or "suspended" or "revoked"
  "accreditationCredential": "https://tir.example-consortium.org/accreditations/abc-123",
  "accreditedFor": [
    {
      "vscCredentialTypes": ["VSCTransactionEvent"],
      "bizSteps": ["https://ref.gs1.org/cbv/BizStep-shipping"],
      "geoScope": ["US"]
    }
  ],
  "validFrom": "2026-07-01T00:00:00Z",
  "validUntil": "2027-07-01T00:00:00Z",
  "accreditingTAO": "did:web:tao.example-consortium.org",
  "keyManagementPolicyURI": "https://issuer.example-company.com/policies/kmp-v1.pdf",
  "lastUpdated": "2026-07-01T09:00:00Z"
}
    

Credential Policies

Credential policies govern how individual VSC Credential types are issued, presented, and consumed within a Trust Framework. Each TFD MUST define a policy for every VSC Credential type that Trusted Issuers in that framework are authorized to issue.

Mandatory termsOfUse Property

CP-1 — AccreditationPolicy in termsOfUse

Every VSC Credential issued by a Trusted Issuer MUST include a termsOfUse entry of type AccreditationPolicy containing:

  • parentAccreditation: URI of the issuer's Verifiable Accreditation in the TIR.
  • rootTAO: DID of the Root TAO for the applicable Trust Framework.
  • trustFramework: URI of the published Trust Framework Document.

This property is the machine-readable hook that enables automated Trust Chain traversal by verifiers (ROLE-TV1). It is modelled after the AccreditationPolicy in [[EBSI-TRUST-MODEL]].

Validity Period Policies

CP-2 — Default Validity Periods

The TFD MUST specify a default validUntil period for each VSC Credential type. The following defaults apply unless overridden by the TFD's sector-specific rules:

Credential typeDefault validityRationale
VSCObjectEvent (commissioning, inspection)7 years from validFromAligns with typical product liability and regulatory record-retention periods
VSCTransactionEvent (custody transfer)7 years from validFromDSCSA, EUDR, and CBAM record-keeping obligations
VSCTransformationEvent10 years from validFromExtended for manufacturing liability and product recall investigations
VSCAggregationEvent7 years from validFromPallet/container records
VSCAssociationEvent (IoT device binding)Duration of device operational lifecycleSensor data interpretation requires active device registration
VerifiableAccreditationToAttest12 months from validFromAnnual renewal cycle per Renewal

Selective Disclosure Policies

CP-3 — Minimum Disclosure Sets

The TFD MUST define a Minimum Disclosure Set (MDS) for each verifier category. The MDS specifies the minimum fields that MUST be disclosed for a credential to satisfy a verifier's legitimate need, without requiring unnecessary fields. Verifiers MUST NOT request fields beyond their defined MDS. Example:

Verifier categoryMinimum Disclosure Set (TransactionEvent)
Customs authorityepcList, bizStep, eventTime, bizLocation, issuer DID
Downstream trading partnerepcList, bizStep, eventTime, disposition
Regulatory auditor (DSCSA)All mandatory DSCSA fields per [[GS1-DSCSA-GUIDE]]
ESG/sustainability reportergeoLocation, certificationReference, carbonFootprint

TFD Section 8 Fill-in Template — Credential Policy

// SECTION 8: CREDENTIAL POLICIES — repeat for each credential type

Credential type: [e.g., "VSCTransactionEvent"]
Authorized bizStep values: [CBV URIs, comma-separated]
Required credentialSubject fields: [field names]
Optional credentialSubject fields: [field names]
Default validUntil: [duration, e.g., "P7Y"]
Revocation required: [yes/no]
Selective disclosure required: [yes/no; if yes, specify fields]
Proof format: [e.g., "eddsa-rdfc-2022"]
Predecessor link required: [yes/no; if yes, specify predecessor type]
Regulatory basis: [e.g., "DSCSA 582(a)"]
Minimum Disclosure Set — customs: [field list]
Minimum Disclosure Set — trading partner: [field list]

Compliance, Auditing, and Enforcement

This section specifies the minimum auditing and enforcement requirements for a VSC-conformant Trust Framework. The approach is informed by the seven governance areas of [[CREDENTIAL-ENGINE-GOV]]: transparency, accountability, accuracy, privacy, security, interoperability, and sustainability.

Audit Schedule

AUDIT-1 — Annual Surveillance

Every Trusted Issuer MUST undergo at minimum an annual surveillance audit conducted by or on behalf of their accrediting TAO. The audit MUST assess at minimum:

  • Key management practice compliance with ROLE-TI2.
  • Accuracy of issued credentials against source event records (sample-based review).
  • Timely incident reporting compliance with ROLE-TI5.
  • Continued compliance with sector-specific requirements in TFD Section 4.3.
  • [[VSC-INTEROP]] conformance class claimed in current implementation.
AUDIT-2 — Auditor Qualification

Auditors conducting surveillance audits MUST hold qualifications appropriate to the sector. For frameworks governed by regulated industries, auditors SHOULD hold relevant national qualifications (e.g., ISO 27001 lead auditor for information security aspects, [[ISO-27001]]). The TFD MUST specify acceptable auditor qualifications in its Section 12.

Enforcement Ladder

Stage Trigger Consequence Timeframe
1. Advisory Notice Minor non-conformance; low risk Written notice with remediation plan required within 30 days TAO decision within 10 business days
2. Formal Warning Repeated minor or single significant non-conformance Written warning; corrective action plan required within 15 days; progress review at 30 days TAO decision within 5 business days
3. Suspension Failure to remediate after Formal Warning; serious non-conformance with no immediate safety risk TIR entry marked suspended; TI may not issue new credentials; existing credentials remain valid Immediate; TAO notifies TI simultaneously
4. Revocation Confirmed fraud, key compromise, sustained non-compliance, or serious safety risk TIR entry marked revoked; accreditation credential revoked via [[VC-BITSTRING-STATUS]] Immediate upon confirmation

Dispute Resolution Framework

DISPUTE-1 — Appeal Right

Any Trusted Issuer subject to a Formal Warning, Suspension, or Revocation decision MUST be afforded a right of appeal to the Governance Authority within 15 business days of notification. The GA MUST render a decision on the appeal within 30 calendar days. The TFD MUST specify whether appeal has suspensive effect (i.e., whether the TI may continue issuing during the appeal period).

DISPUTE-2 — Credential Challenge

Any holder or verifier that believes a VSC Credential was issued in error or fraudulently MAY file a credential challenge with the issuer's TAO. The TFD MUST define a challenge procedure that includes: a structured challenge submission form, a response timeline (RECOMMENDED: 10 business days), and an escalation path to the Governance Authority if unresolved.

Sector-Specific Trust Framework Profiles

The following profiles instantiate the template for specific regulated sectors. Each is a starting point; adopting networks must complete all placeholders before publishing a production TFD.

Profile: Pharmaceuticals — DSCSA (pharma-dscsa-us)

AttributeValue
Governance Authority typeIndustry consortium or GS1 US authorized body
Root TAOGA DID (did:web:)
TAO(s)State pharmacy boards, FDA-recognized ATP registrars
Trusted Issuer categoriesLicensed manufacturer, licensed wholesale distributor, licensed dispenser (per [[DSCSA]] 581)
Vetting requirementsFDA Establishment Registration Number; DEA Schedule II license where applicable; GS1 Company Prefix
Mandatory credential typesVSCTransactionEvent (shipping, receiving); VSCObjectEvent (commissioning, decommissioning)
Accreditation scope restrictionMust specify SGTIN EPC class; US geographic scope
Proof formateddsa-rdfc-2022 or VC-JWT ES256
Key managementHSM required for manufacturing tier; software key permitted for dispensers
Regulatory obligations[[DSCSA]] 582; [[GS1-DSCSA-GUIDE]] R1.3
TIR implementationREST API (recommended); must support real-time revocation
Audit frequencyAnnual surveillance + triggered audit on incident report

Profile: Food and Agriculture — EUDR (food-eudr-eu)

AttributeValue
Governance Authority typeEU Member State competent authority or recognized industry body
TAO(s)National forest authorities; organic certification bodies; EU-recognized third-party auditors
Trusted Issuer categoriesLand-owner / producer; processor; first-place-of-sale operator
Vetting requirements[[EUDR]] due diligence system registration; geolocation proof of land ownership or lease
Mandatory credential typesVSCObjectEvent (commissioning with geo-polygon); VSCTransactionEvent (shipping)
Mandatory credential fieldsgeoLocation (GeoJSON polygon per [[EUDR]] Art. 9); harvestDate; speciesIdentifier
Selective disclosureSD-JWT required; supplier identity MUST be independently disclosable from geo-coordinates
Regulatory obligations[[EUDR]] Art. 3, 8, 10; due-diligence statement requirement
Audit frequencyAnnual surveillance; triggered audit on deforestation risk signal

Profile: Critical Minerals and Manufacturing — CBAM / DPP (critical-minerals-cbam)

AttributeValue
Governance Authority typeIndustry consortium or EU-recognized body (e.g., Battery Pass consortium)
TAO(s)National geological surveys; ISO 17025-accredited testing laboratories; EU notified bodies for DPP
Trusted Issuer categoriesMine operator; smelter/refiner; component manufacturer; battery manufacturer
Vetting requirements[[CBAM]] declarant registration; [[EU-DPP]] economic operator registration; OECD Due Diligence Guidance compliance declaration
Mandatory credential typesVSCTransformationEvent (bill-of-materials); VSCObjectEvent (commissioning)
Mandatory credential fieldscarbonFootprint (kg CO2e per unit); countryOfOrigin; hsCode; cbamDeclarantId
Regulatory obligations[[CBAM]] Art. 4 to 6; [[EU-DPP]] Battery Regulation (EU) 2023/1542; OECD Minerals Guidance
Multi-tier linkageTier-2 and Tier-3 TransformationEvent credentials MUST be linked via vscPredecessor

Machine-Readable Trust Framework Document

Every Trust Framework Document MUST include a machine-readable section serialized as a [[VC-DATA-MODEL]]-conformant JSON-LD document published at a stable, versioned URI. This document is the authoritative source for automated verifier policy loading and Trust Chain traversal.

Schema

{
  "@context": [
    "https://www.w3.org/ns/credentials/v2",
    "https://w3c-cg.github.io/vsc/contexts/v1"
  ],
  "type": ["VerifiableCredential", "VSCTrustFrameworkDocument"],
  "id": "https://w3c-cg.github.io/vsc-trust-framework/instances/pharma-dscsa-us-v1",
  "issuer": "did:web:governance.example-consortium.org",
  "validFrom": "2026-07-01T00:00:00Z",
  "validUntil": "2027-07-01T00:00:00Z",
  "credentialSubject": {
    "id": "https://w3c-cg.github.io/vsc-trust-framework/instances/pharma-dscsa-us-v1",
    "name": "Example Pharma DSCSA Trust Framework v1.0",
    "version": "1.0",
    "baseSpecification": "https://w3c-cg.github.io/vsc-trust-framework/",
    "interopToolkit": "https://w3c-cg.github.io/vsc-interop-toolkit/",
    "conformanceProfile": "pharmaceuticals-dscsa",
    "rootTAO": "did:web:governance.example-consortium.org",
    "trustedIssuersRegistry": "https://tir.example-consortium.org/tir/v1/",
    "taos": [
      {
        "did": "did:web:tao.pharma-body.org",
        "name": "Example Pharma Sector Body",
        "accreditationCredential": "https://tir.example-consortium.org/root/tao-001",
        "sectors": ["pharmaceutical"],
        "geoScope": ["US"]
      }
    ],
    "governanceDocuments": [
      {
        "type": "KeyManagementPolicy",
        "uri": "https://docs.example-consortium.org/kmp-v1.0.pdf",
        "digestSRI": "sha256-BASE64ENCODED",
        "status": "normative"
      },
      {
        "type": "AuditProcedure",
        "uri": "https://docs.example-consortium.org/audit-v1.0.pdf",
        "digestSRI": "sha256-BASE64ENCODED",
        "status": "normative"
      }
    ],
    "credentialPolicies": [
      {
        "vscCredentialType": "VSCTransactionEvent",
        "defaultValidityDuration": "P7Y",
        "requiredFields": ["epcList", "bizStep", "bizTransactionList", "sourceList", "destinationList"],
        "requiredProofFormat": "eddsa-rdfc-2022",
        "predecessorLinkRequired": true,
        "revocationRequired": true
      }
    ]
  },
  "proof": { /* Data Integrity Proof by Root TAO */ }
}
    

Discovery

MRTFD-1 — Well-Known URI

The machine-readable TFD MUST be discoverable at: https://{governance-authority-domain}/.well-known/vsc-trust-framework.json

Additionally, the Root TAO's [[DID-WEB]] document SHOULD include a service entry of type VSCTrustFramework pointing to this URI.

Security Considerations

All security considerations from [[VC-DATA-MODEL]], [[VC-DI]], and [[VSC-INTEROP]] apply. Trust framework-specific considerations:

Root TAO Key Compromise

A compromise of the Root TAO signing key would invalidate the entire Trust Chain. The Governance Authority MUST use hardware-stored keys for the Root TAO DID. A documented key compromise response procedure MUST be included in the TFD. The procedure MUST include notification to all TAOs and all verifiers within 24 hours.

Stale TIR Cache Exploitation

An attacker whose accreditation has been revoked may exploit verifier caches to continue having credentials accepted until the cache TTL expires. Verifiers processing high-value or safety-critical credentials MUST NOT rely on cached TIR data older than 1 hour. The TIR SHOULD support push notification of revocation events to subscribed verifiers (RECOMMENDED, using WebSub or equivalent).

Governance Document Integrity

TFD Governance Document links MUST include a digestSRI hash. Automated policy loaders MUST verify the hash before applying the governance document. Link rot or hash mismatch MUST be treated as a framework integrity failure.

TAO Privilege Escalation

As specified in ROLE-TAO1, a TAO MUST NOT grant accreditation scope beyond its own. Verifier implementations MUST traverse the full Trust Chain to detect any scope escalation at any tier. Any chain where a descendant's scope exceeds its ancestor's MUST be rejected.

Sybil Issuer Registration

An adversary may attempt to register multiple DIDs as Trusted Issuers using fabricated identity evidence. TAOs MUST verify legal entity identity through at least one authoritative external source (national business registry, LEI, or equivalent) that cannot be self-asserted.

Privacy Considerations

TIR Entry Data Minimisation

TIR entries MUST contain only the data necessary for verifier trust decisions. Fields such as individual employee names or internal system identifiers MUST NOT be included in public TIR entries. Only organization-level identifiers (DID, LEI, GS1 prefix) are appropriate for public listing.

Audit Log Handling

TAO vetting records, audit reports, and enforcement decision logs contain commercially sensitive information. These MUST be treated as confidential governance records and MUST NOT be published without the affected TI's consent, except as required by applicable law or as explicitly provided for in the TFD's dispute resolution procedure.

Credential-Level Privacy

The AccreditationPolicy termsOfUse entry (CP-1) links an issued credential to the issuer's accreditation record. This link is public information and does not constitute a privacy risk per se, but verifiers SHOULD NOT log this information beyond what is needed for the specific verification purpose.

Correlation Across Frameworks

An issuer's DID may appear in multiple trust frameworks. If the same DID is used, verifiers from different ecosystems could correlate cross-sector issuing activity. The TFD SHOULD advise issuers operating in multiple frameworks to use distinct DIDs per framework where commercial confidentiality between sectors is required.

Contributing to this Specification

This section is non-normative.

All contributions welcome — no W3C Membership required.

Join at w3.org/community/vsc (free, requires W3C account and CLA acceptance). Submit feedback via the GitHub issue tracker or the public-vsc mailing list.

Issue Labels

Adding a New Sector Profile

To propose a new sector-specific Trust Framework profile, open an issue with label sector-profile and include:

Publishing a Conformant TFD

Organizations that have published a Trust Framework Document conformant with this specification are invited to register it in the VSC TFD Registry by submitting a pull request with the TFD's URI, Governance Authority name, sector(s), and a link to the machine-readable TFD.

Registration in the VSC TFD Registry is voluntary and informative; it does not constitute endorsement by the W3C or the VSC Community Group.

Editorial Style

Acknowledgments

The editors thank participants of the Verifiable Supply Chain Community Group. This specification draws on: