This document specifies the VSC Trust Framework Template: a customizable, machine-readable governance template that any supply chain network can adopt to establish the roles, accreditation rules, trust registry structure, credential policies, and compliance criteria governing the issuance and consumption of VSC-conformant Verifiable Credentials.
The template is the third major deliverable of the Verifiable Supply Chain Community Group. It builds on the requirements established in [[VSC-REQUIREMENTS]], the interoperability definitions in [[VSC-INTEROP]], and the governance metamodels of the Trust over IP Foundation ([[TOIP-GOVERNANCE]], [[TOIP-METAMODEL]]) and EBSI ([[EBSI-TRUST-MODEL]]). It draws further on the [[CREDENTIAL-ENGINE-GOV]] governance framework for issuer identity registries (June 2025) and the [[UK-DIATF]].
An organization adopting this template fills in the highlighted placeholders to create a sector-specific or network-specific governance framework document that is immediately operational with the [[VSC-INTEROP]] Toolkit.
This document is a Community Group Draft produced by the Verifiable Supply Chain Community Group. It is not a W3C Standard and is not on the W3C Standards Track. It may be updated, replaced, or obsoleted at any time. Version history is tracked in the CHANGELOG.
Feedback is welcome via the GitHub issue tracker or the public-vsc mailing list. See the Contributing section for guidelines.
This specification is aligned with the Trust over IP Foundation's [[TOIP-GOVERNANCE]] (December 2022), the [[TOIP-ISSUER-GUIDE]] (April 2024), the [[EBSI-TRUST-MODEL]] v3, and the [[CREDENTIAL-ENGINE-GOV]] (June 2025) published by Credential Engine and MIT Digital Credentials Consortium. Where those sources conflict, this specification takes precedence for VSC-specific supply chain contexts.
This section is non-normative.
Cryptographic verifiability — the ability to prove who signed a Verifiable Credential — is necessary but not sufficient for supply chain trust. A verifier also needs to know:
A Trust Framework answers all four questions. This template provides the structure; adopting networks supply the sector-specific content. The design draws on three proven models:
The key words MUST, MUST NOT, REQUIRED, SHALL, SHALL NOT, SHOULD, SHOULD NOT, RECOMMENDED, NOT RECOMMENDED, MAY, and OPTIONAL are to be interpreted as described in [[RFC2119]] and [[RFC8174]] when, and only when, they appear in all capitals.
A VSC-conformant Trust Framework Document (TFD) is one that satisfies all MUST requirements in this specification and declares conformance to it. The TFD itself is a governance document, not software; conformance is assessed by a human auditor or by automated validation of the machine-readable TFD artefact (see Machine-Readable Trust Framework Document).
Terms from [[VSC-REQUIREMENTS]] and [[VSC-INTEROP]] retain their established meanings. Governance-specific terms follow.
VerifiableAccreditationToAccredit
and VerifiableAccreditationToAttest.
credentialStatus property, typically managed via
[[VC-BITSTRING-STATUS]]. Possible states include active,
suspended, and revoked.
This section is non-normative.
Consistent with [[TOIP-GOVERNANCE]], a VSC Trust Framework operates as a dual stack: a Technical Stack and a Governance Stack that must both be present for end-to-end trust.
Figure 1 — VSC dual-stack trust architecture, aligned with [[TOIP-GOVERNANCE]] and the [[EBSI-TRUST-MODEL]].
A VSC Trust Chain MUST contain exactly three tiers, following [[EBSI-TRUST-MODEL]]. Each tier is identified by a [[DID-CORE]] URI and holds a Verifiable Accreditation from the tier above it.
Figure 2 — VSC three-tier trust chain. Each downward arrow represents a Verifiable Accreditation stored in the Trusted Issuers Registry.
Figure 3 — Accreditation application, issuance, and verification flow.
A VSC-conformant Trust Framework Document MUST include each of the sections listed below. Sections marked REQUIRED must be present and non-empty. Sections marked RECOMMENDED must be present if the framework governs a regulated industry. The ordering follows the structure established by [[TOIP-METAMODEL]] and [[CREDENTIAL-ENGINE-GOV]].
| Section | Status | Purpose |
|---|---|---|
| 1. Preamble and Scope | REQUIRED | Identifies the framework, Governance Authority, version, effective date, and the supply chain sector(s) governed. |
| 2. Controlled Documents Index | REQUIRED | An enumeration of all Governance Documents incorporated by reference, with their URIs, version hashes, and status (normative / informative). |
| 3. Definitions | REQUIRED | Network-specific terms not defined in [[VSC-REQUIREMENTS]] or this specification. MUST reference this document for terms shared with the base VSC vocabulary. |
| 4. Roles and Participants | REQUIRED | Enumerates the Root TAO, all TAOs, and categories of Trusted Issuers with their DIDs, Accreditation Scopes, and onboarding criteria. |
| 5. Trust Chain Structure | REQUIRED | A diagram and textual description of the three-tier trust chain as instantiated for this network. |
| 6. Accreditation Lifecycle | REQUIRED | Procedures for applying for, granting, suspending, revoking, and renewing accreditation. See Accreditation Lifecycle. |
| 7. Trusted Issuers Registry | REQUIRED | The URI, query API, and update procedure of the TIR for this framework. See Trusted Issuers Registry. |
| 8. Credential Policies | REQUIRED | Per-credential-type policies: required fields, validity period, selective disclosure rules, revocation obligations. See Credential Policies. |
| 9. Technical Requirements | REQUIRED | Required conformance class(es) from [[VSC-INTEROP]], required proof formats, DID methods, and API versions. |
| 10. Legal Basis and Liability | RECOMMENDED for regulated sectors | Regulatory references (e.g., [[DSCSA]], [[EUDR]]), jurisdiction, liability allocation, and data protection basis. |
| 11. Dispute Resolution | RECOMMENDED | Process for challenging a revocation, disputing a credential, or appealing an accreditation decision. |
| 12. Auditing and Enforcement | RECOMMENDED | Audit schedule, auditor qualification requirements, and enforcement mechanisms. See Compliance, Auditing, and Enforcement. |
| 13. Machine-Readable TFD | REQUIRED | A JSON-LD document conformant with the VSC TFD schema defined in Machine-Readable Trust Framework Document. |
The following is the normative fill-in template for Section 1. Adopting networks complete all highlighted placeholders.
A TAO MUST NOT grant a Verifiable Accreditation whose Accreditation Scope exceeds its own. All scope constraints from the accrediting party MUST be inherited and, where appropriate, further restricted. This prevents privilege escalation within the trust chain.
Before issuing a VerifiableAccreditationToAttest to a Trusted Issuer applicant, the TAO MUST:
The TAO MUST update the Trusted Issuers Registry within 5 business days of any accreditation grant, suspension, revocation, or renewal. The TAO MUST NOT allow an entry to remain in the TIR for an entity whose accreditation has been revoked.
A Trusted Issuer MUST only issue VSC Credentials whose type and Accreditation Scope fall within the bounds of their Verifiable Accreditation. Credentials issued outside this scope MUST be rejected by conformant verifiers.
A Trusted Issuer MUST maintain a written Key Management Policy (a Governance Document) that specifies: key generation algorithm, key storage (FIPS 140-2 Level 2 hardware security module RECOMMENDED for production issuance), key rotation schedule (RECOMMENDED: 12 months maximum), and key compromise response procedure. The Key Management Policy MUST be referenced in the TFD.
A Trusted Issuer MUST ensure that every VSC Credential it issues accurately reflects the underlying [[EPCIS20]] event data as observed or recorded by the issuer's own systems. A Trusted Issuer MUST NOT issue credentials for events it did not observe or for which it lacks authoritative first-hand data, except as explicitly authorized by the TFD (e.g., a customs authority re-asserting an inspection result).
Each VSC Credential issued by a Trusted Issuer MUST include a reference to the issuer's Verifiable Accreditation in the credential's termsOfUse property, as specified in Credential Policies. This enables verifiers to traverse the Trust Chain programmatically.
A Trusted Issuer MUST report to its accrediting TAO within 48 hours of any: key compromise or suspected key compromise; issuance of a credential known to be erroneous; or any security incident affecting the integrity of its credential-issuing system.
A Trusted Verifier MUST perform full Trust Chain traversal for every received VSC Credential before accepting it. This includes: resolving the issuer's [[DID-CORE]] identifier, verifying the cryptographic proof, checking Credential Status via [[VC-BITSTRING-STATUS]], and confirming the issuer's Verifiable Accreditation is valid and in scope.
A Trusted Verifier MUST NOT accept a VSC Credential solely on the basis of an out-of-band relationship with the issuer (e.g., a pre-existing business relationship). The Trust Chain traversal in ROLE-TV1 is required regardless of any bilateral familiarity with the issuer.
Figure 4 — Accreditation lifecycle state machine showing all valid state transitions.
An applicant for Trusted Issuer status MUST submit to the accrediting TAO an application package containing:
The TAO MUST acknowledge receipt of a complete application within 5 business days and MUST issue an accreditation decision (grant or reasoned rejection) within [TF-specific SLA, e.g., 30 calendar days]. A rejection MUST include a written statement of the specific criteria not met and MAY include a remediation pathway.
Upon successful vetting, the TAO MUST issue a VerifiableAccreditationToAttest credential conformant with the following schema. This schema follows [[EBSI-TRUST-MODEL]] conventions and is encoded as a [[VC-DATA-MODEL]] credential:
{
"@context": [
"https://www.w3.org/ns/credentials/v2",
"https://w3c-cg.github.io/vsc/contexts/v1"
],
"type": ["VerifiableCredential", "VerifiableAccreditationToAttest"],
"id": "https://tir.example-consortium.org/accreditations/abc-123",
"issuer": "did:web:tao.example-consortium.org",
"validFrom": "2026-07-01T00:00:00Z",
"validUntil": "2027-07-01T00:00:00Z",
"credentialSubject": {
"id": "did:web:issuer.example-company.com",
"accreditedFor": [
{
"vscCredentialTypes": ["VSCTransactionEvent", "VSCObjectEvent"],
"epcisEventTypes": ["TransactionEvent", "ObjectEvent"],
"bizSteps": [
"https://ref.gs1.org/cbv/BizStep-shipping",
"https://ref.gs1.org/cbv/BizStep-receiving"
],
"commodityCategories": ["pharmaceutical"],
"geoScope": ["US"],
"trustFramework": "https://w3c-cg.github.io/vsc-trust-framework/instances/pharma-dscsa-us-v1"
}
]
},
"termsOfUse": [{
"type": "AccreditationPolicy",
"parentAccreditation": "https://tir.example-consortium.org/root/rtao-chain",
"rootTAO": "did:web:governance.example-consortium.org"
}],
"credentialStatus": {
"id": "https://tir.example-consortium.org/status/1#42",
"type": "BitstringStatusListEntry",
"statusListIndex": "42",
"statusListCredential": "https://tir.example-consortium.org/status/1"
},
"proof": { /* Data Integrity Proof */ }
}
The TAO MUST register the issued accreditation credential in the Trusted Issuers Registry within 2 business days of issuance. The TI MUST NOT begin issuing VSC Credentials until the TIR entry is confirmed.
A TAO MUST revoke a Trusted Issuer's accreditation upon any of the following:
Revocation MUST be executed by setting the TI's [[VC-BITSTRING-STATUS]] entry to revoked and updating the TIR entry to reflect the revocation date and reason code. The TAO MUST notify the TI of the revocation in writing (via registered email or equivalent) simultaneously with or before the registry update.
Revocation of an issuer's accreditation does NOT automatically invalidate VSC Credentials already issued by that TI and in the possession of legitimate holders. However, verifiers SHOULD treat credentials issued after the revocation date as untrustworthy. The TFD MUST specify a policy for the treatment of pre-revocation credentials in the affected sector.
Trusted Issuer accreditations MUST have a defined validity period specified in the TFD. The default is 12 months. A TI MUST initiate renewal no later than 60 days before expiry. A TAO MUST complete a renewal review before the expiry date to avoid a gap in the TI's active status.
The Trusted Issuers Registry MUST be publicly readable without authentication. Any party MUST be able to query the TIR to verify whether a given [[DID-CORE]] identifier holds a valid Verifiable Accreditation at any time. Write access MUST require authentication and authorization (OAuth 2.0 or equivalent).
The TIR MUST expose the following REST query endpoints. Responses MUST be returned as application/json using [[RFC9457]] for errors:
| Method | Path | Description |
|---|---|---|
| GET | /tir/v1/issuers/{did} | Returns the TIR entry and current Verifiable Accreditation for the specified DID. |
| GET | /tir/v1/issuers | Returns all active TIR entries, paginated. Supports filtering by ?sector=, ?eventType=, and ?status=active|suspended|revoked. |
| GET | /tir/v1/chain/{did} | Returns the complete Trust Chain from the specified DID up to the Root TAO, as an ordered array of Verifiable Accreditation credentials. |
| GET | /tir/v1/.well-known/tir-configuration | Returns TIR metadata including root TAO DID, supported sectors, and framework URI. |
The TIR MUST meet a minimum availability of 99.5% per calendar month (approximately 3.6 hours downtime). Planned maintenance windows MUST be announced at least 48 hours in advance via the TFD's status page. Downtime affects the ability of verifiers to confirm issuer status; implementations SHOULD implement a TTL-based cache (RECOMMENDED: 24-hour TTL for read endpoints).
Adopting networks MAY implement the TIR using any of the following technology patterns. The TFD MUST document the chosen pattern and its trade-offs:
| Pattern | Description | Suitability |
|---|---|---|
| Static JSON-LD Registry | A versioned JSON-LD file hosted at a well-known URI, signed by the Root TAO DID | Small networks (fewer than 50 issuers), low-cost, easy to audit |
| did:web DID Document Fragments | Each issuer's accreditation is embedded in or linked from their [[DID-WEB]] document | Federated; no central infrastructure needed |
| REST API with database backend | A managed REST service (this spec's TIR-2 endpoints) backed by a relational or document store | Medium to large networks; real-time revocation |
| Smart Contract Registry | Accreditations stored as on-chain records (e.g., EBSI TIR model, [[EBSI-TRUST-MODEL]]) | High-assurance, tamper-evident; requires ledger governance |
Each TIR entry MUST contain the following fields, validated against
the VSC TIR [[JSON-SCHEMA]] published at
https://w3c-cg.github.io/vsc-trust-framework/schemas/tir-entry.json:
{
"did": "did:web:issuer.example-company.com",
"legalName": "Example Company Ltd.",
"lei": "529900HNOAA1KXQJUQ27", // Legal Entity Identifier (optional but RECOMMENDED)
"gs1CompanyPrefix": "0614141", // GS1 Company Prefix (where applicable)
"status": "active", // "active" or "suspended" or "revoked"
"accreditationCredential": "https://tir.example-consortium.org/accreditations/abc-123",
"accreditedFor": [
{
"vscCredentialTypes": ["VSCTransactionEvent"],
"bizSteps": ["https://ref.gs1.org/cbv/BizStep-shipping"],
"geoScope": ["US"]
}
],
"validFrom": "2026-07-01T00:00:00Z",
"validUntil": "2027-07-01T00:00:00Z",
"accreditingTAO": "did:web:tao.example-consortium.org",
"keyManagementPolicyURI": "https://issuer.example-company.com/policies/kmp-v1.pdf",
"lastUpdated": "2026-07-01T09:00:00Z"
}
Credential policies govern how individual VSC Credential types are issued, presented, and consumed within a Trust Framework. Each TFD MUST define a policy for every VSC Credential type that Trusted Issuers in that framework are authorized to issue.
Every VSC Credential issued by a Trusted Issuer MUST include a termsOfUse entry of type AccreditationPolicy containing:
parentAccreditation: URI of the issuer's Verifiable Accreditation in the TIR.rootTAO: DID of the Root TAO for the applicable Trust Framework.trustFramework: URI of the published Trust Framework Document.This property is the machine-readable hook that enables automated Trust Chain traversal by verifiers (ROLE-TV1). It is modelled after the AccreditationPolicy in [[EBSI-TRUST-MODEL]].
The TFD MUST specify a default validUntil period for each VSC Credential type. The following defaults apply unless overridden by the TFD's sector-specific rules:
| Credential type | Default validity | Rationale |
|---|---|---|
| VSCObjectEvent (commissioning, inspection) | 7 years from validFrom | Aligns with typical product liability and regulatory record-retention periods |
| VSCTransactionEvent (custody transfer) | 7 years from validFrom | DSCSA, EUDR, and CBAM record-keeping obligations |
| VSCTransformationEvent | 10 years from validFrom | Extended for manufacturing liability and product recall investigations |
| VSCAggregationEvent | 7 years from validFrom | Pallet/container records |
| VSCAssociationEvent (IoT device binding) | Duration of device operational lifecycle | Sensor data interpretation requires active device registration |
| VerifiableAccreditationToAttest | 12 months from validFrom | Annual renewal cycle per Renewal |
The TFD MUST define a Minimum Disclosure Set (MDS) for each verifier category. The MDS specifies the minimum fields that MUST be disclosed for a credential to satisfy a verifier's legitimate need, without requiring unnecessary fields. Verifiers MUST NOT request fields beyond their defined MDS. Example:
| Verifier category | Minimum Disclosure Set (TransactionEvent) |
|---|---|
| Customs authority | epcList, bizStep, eventTime, bizLocation, issuer DID |
| Downstream trading partner | epcList, bizStep, eventTime, disposition |
| Regulatory auditor (DSCSA) | All mandatory DSCSA fields per [[GS1-DSCSA-GUIDE]] |
| ESG/sustainability reporter | geoLocation, certificationReference, carbonFootprint |
This section specifies the minimum auditing and enforcement requirements for a VSC-conformant Trust Framework. The approach is informed by the seven governance areas of [[CREDENTIAL-ENGINE-GOV]]: transparency, accountability, accuracy, privacy, security, interoperability, and sustainability.
Every Trusted Issuer MUST undergo at minimum an annual surveillance audit conducted by or on behalf of their accrediting TAO. The audit MUST assess at minimum:
Auditors conducting surveillance audits MUST hold qualifications appropriate to the sector. For frameworks governed by regulated industries, auditors SHOULD hold relevant national qualifications (e.g., ISO 27001 lead auditor for information security aspects, [[ISO-27001]]). The TFD MUST specify acceptable auditor qualifications in its Section 12.
| Stage | Trigger | Consequence | Timeframe |
|---|---|---|---|
| 1. Advisory Notice | Minor non-conformance; low risk | Written notice with remediation plan required within 30 days | TAO decision within 10 business days |
| 2. Formal Warning | Repeated minor or single significant non-conformance | Written warning; corrective action plan required within 15 days; progress review at 30 days | TAO decision within 5 business days |
| 3. Suspension | Failure to remediate after Formal Warning; serious non-conformance with no immediate safety risk | TIR entry marked suspended; TI may not issue new credentials; existing credentials remain valid | Immediate; TAO notifies TI simultaneously |
| 4. Revocation | Confirmed fraud, key compromise, sustained non-compliance, or serious safety risk | TIR entry marked revoked; accreditation credential revoked via [[VC-BITSTRING-STATUS]] | Immediate upon confirmation |
Any Trusted Issuer subject to a Formal Warning, Suspension, or Revocation decision MUST be afforded a right of appeal to the Governance Authority within 15 business days of notification. The GA MUST render a decision on the appeal within 30 calendar days. The TFD MUST specify whether appeal has suspensive effect (i.e., whether the TI may continue issuing during the appeal period).
Any holder or verifier that believes a VSC Credential was issued in error or fraudulently MAY file a credential challenge with the issuer's TAO. The TFD MUST define a challenge procedure that includes: a structured challenge submission form, a response timeline (RECOMMENDED: 10 business days), and an escalation path to the Governance Authority if unresolved.
The following profiles instantiate the template for specific regulated sectors. Each is a starting point; adopting networks must complete all placeholders before publishing a production TFD.
pharma-dscsa-us)| Attribute | Value |
|---|---|
| Governance Authority type | Industry consortium or GS1 US authorized body |
| Root TAO | GA DID (did:web:) |
| TAO(s) | State pharmacy boards, FDA-recognized ATP registrars |
| Trusted Issuer categories | Licensed manufacturer, licensed wholesale distributor, licensed dispenser (per [[DSCSA]] 581) |
| Vetting requirements | FDA Establishment Registration Number; DEA Schedule II license where applicable; GS1 Company Prefix |
| Mandatory credential types | VSCTransactionEvent (shipping, receiving); VSCObjectEvent (commissioning, decommissioning) |
| Accreditation scope restriction | Must specify SGTIN EPC class; US geographic scope |
| Proof format | eddsa-rdfc-2022 or VC-JWT ES256 |
| Key management | HSM required for manufacturing tier; software key permitted for dispensers |
| Regulatory obligations | [[DSCSA]] 582; [[GS1-DSCSA-GUIDE]] R1.3 |
| TIR implementation | REST API (recommended); must support real-time revocation |
| Audit frequency | Annual surveillance + triggered audit on incident report |
food-eudr-eu)| Attribute | Value |
|---|---|
| Governance Authority type | EU Member State competent authority or recognized industry body |
| TAO(s) | National forest authorities; organic certification bodies; EU-recognized third-party auditors |
| Trusted Issuer categories | Land-owner / producer; processor; first-place-of-sale operator |
| Vetting requirements | [[EUDR]] due diligence system registration; geolocation proof of land ownership or lease |
| Mandatory credential types | VSCObjectEvent (commissioning with geo-polygon); VSCTransactionEvent (shipping) |
| Mandatory credential fields | geoLocation (GeoJSON polygon per [[EUDR]] Art. 9); harvestDate; speciesIdentifier |
| Selective disclosure | SD-JWT required; supplier identity MUST be independently disclosable from geo-coordinates |
| Regulatory obligations | [[EUDR]] Art. 3, 8, 10; due-diligence statement requirement |
| Audit frequency | Annual surveillance; triggered audit on deforestation risk signal |
critical-minerals-cbam)| Attribute | Value |
|---|---|
| Governance Authority type | Industry consortium or EU-recognized body (e.g., Battery Pass consortium) |
| TAO(s) | National geological surveys; ISO 17025-accredited testing laboratories; EU notified bodies for DPP |
| Trusted Issuer categories | Mine operator; smelter/refiner; component manufacturer; battery manufacturer |
| Vetting requirements | [[CBAM]] declarant registration; [[EU-DPP]] economic operator registration; OECD Due Diligence Guidance compliance declaration |
| Mandatory credential types | VSCTransformationEvent (bill-of-materials); VSCObjectEvent (commissioning) |
| Mandatory credential fields | carbonFootprint (kg CO2e per unit); countryOfOrigin; hsCode; cbamDeclarantId |
| Regulatory obligations | [[CBAM]] Art. 4 to 6; [[EU-DPP]] Battery Regulation (EU) 2023/1542; OECD Minerals Guidance |
| Multi-tier linkage | Tier-2 and Tier-3 TransformationEvent credentials MUST be linked via vscPredecessor |
Every Trust Framework Document MUST include a machine-readable section serialized as a [[VC-DATA-MODEL]]-conformant JSON-LD document published at a stable, versioned URI. This document is the authoritative source for automated verifier policy loading and Trust Chain traversal.
{
"@context": [
"https://www.w3.org/ns/credentials/v2",
"https://w3c-cg.github.io/vsc/contexts/v1"
],
"type": ["VerifiableCredential", "VSCTrustFrameworkDocument"],
"id": "https://w3c-cg.github.io/vsc-trust-framework/instances/pharma-dscsa-us-v1",
"issuer": "did:web:governance.example-consortium.org",
"validFrom": "2026-07-01T00:00:00Z",
"validUntil": "2027-07-01T00:00:00Z",
"credentialSubject": {
"id": "https://w3c-cg.github.io/vsc-trust-framework/instances/pharma-dscsa-us-v1",
"name": "Example Pharma DSCSA Trust Framework v1.0",
"version": "1.0",
"baseSpecification": "https://w3c-cg.github.io/vsc-trust-framework/",
"interopToolkit": "https://w3c-cg.github.io/vsc-interop-toolkit/",
"conformanceProfile": "pharmaceuticals-dscsa",
"rootTAO": "did:web:governance.example-consortium.org",
"trustedIssuersRegistry": "https://tir.example-consortium.org/tir/v1/",
"taos": [
{
"did": "did:web:tao.pharma-body.org",
"name": "Example Pharma Sector Body",
"accreditationCredential": "https://tir.example-consortium.org/root/tao-001",
"sectors": ["pharmaceutical"],
"geoScope": ["US"]
}
],
"governanceDocuments": [
{
"type": "KeyManagementPolicy",
"uri": "https://docs.example-consortium.org/kmp-v1.0.pdf",
"digestSRI": "sha256-BASE64ENCODED",
"status": "normative"
},
{
"type": "AuditProcedure",
"uri": "https://docs.example-consortium.org/audit-v1.0.pdf",
"digestSRI": "sha256-BASE64ENCODED",
"status": "normative"
}
],
"credentialPolicies": [
{
"vscCredentialType": "VSCTransactionEvent",
"defaultValidityDuration": "P7Y",
"requiredFields": ["epcList", "bizStep", "bizTransactionList", "sourceList", "destinationList"],
"requiredProofFormat": "eddsa-rdfc-2022",
"predecessorLinkRequired": true,
"revocationRequired": true
}
]
},
"proof": { /* Data Integrity Proof by Root TAO */ }
}
The machine-readable TFD MUST be discoverable at:
https://{governance-authority-domain}/.well-known/vsc-trust-framework.json
Additionally, the Root TAO's [[DID-WEB]] document SHOULD include a service entry of type VSCTrustFramework pointing to this URI.
All security considerations from [[VC-DATA-MODEL]], [[VC-DI]], and [[VSC-INTEROP]] apply. Trust framework-specific considerations:
A compromise of the Root TAO signing key would invalidate the entire Trust Chain. The Governance Authority MUST use hardware-stored keys for the Root TAO DID. A documented key compromise response procedure MUST be included in the TFD. The procedure MUST include notification to all TAOs and all verifiers within 24 hours.
An attacker whose accreditation has been revoked may exploit verifier caches to continue having credentials accepted until the cache TTL expires. Verifiers processing high-value or safety-critical credentials MUST NOT rely on cached TIR data older than 1 hour. The TIR SHOULD support push notification of revocation events to subscribed verifiers (RECOMMENDED, using WebSub or equivalent).
TFD Governance Document links MUST include a digestSRI hash. Automated policy loaders MUST verify the hash before applying the governance document. Link rot or hash mismatch MUST be treated as a framework integrity failure.
As specified in ROLE-TAO1, a TAO MUST NOT grant accreditation scope beyond its own. Verifier implementations MUST traverse the full Trust Chain to detect any scope escalation at any tier. Any chain where a descendant's scope exceeds its ancestor's MUST be rejected.
An adversary may attempt to register multiple DIDs as Trusted Issuers using fabricated identity evidence. TAOs MUST verify legal entity identity through at least one authoritative external source (national business registry, LEI, or equivalent) that cannot be self-asserted.
TIR entries MUST contain only the data necessary for verifier trust decisions. Fields such as individual employee names or internal system identifiers MUST NOT be included in public TIR entries. Only organization-level identifiers (DID, LEI, GS1 prefix) are appropriate for public listing.
TAO vetting records, audit reports, and enforcement decision logs contain commercially sensitive information. These MUST be treated as confidential governance records and MUST NOT be published without the affected TI's consent, except as required by applicable law or as explicitly provided for in the TFD's dispute resolution procedure.
The AccreditationPolicy termsOfUse entry (CP-1) links an issued credential to the issuer's accreditation record. This link is public information and does not constitute a privacy risk per se, but verifiers SHOULD NOT log this information beyond what is needed for the specific verification purpose.
An issuer's DID may appear in multiple trust frameworks. If the same DID is used, verifiers from different ecosystems could correlate cross-sector issuing activity. The TFD SHOULD advise issuers operating in multiple frameworks to use distinct DIDs per framework where commercial confidentiality between sectors is required.
This section is non-normative.
Join at w3.org/community/vsc (free, requires W3C account and CLA acceptance). Submit feedback via the GitHub issue tracker or the public-vsc mailing list.
governance — role obligations, accreditation rules, enforcementregistry — TIR schema, query API, implementation patternscredential-policy — validity periods, selective disclosure, termsOfUsesector-profile — new or updated sector-specific profiletemplate — fill-in template improvementssecurity / privacy — security or privacy considerationeditorial — grammar, clarity, cross-referencesTo propose a new sector-specific Trust Framework profile, open an issue with label sector-profile and include:
Organizations that have published a Trust Framework Document conformant with this specification are invited to register it in the VSC TFD Registry by submitting a pull request with the TFD's URI, Governance Authority name, sector(s), and a link to the machine-readable TFD.
Registration in the VSC TFD Registry is voluntary and informative; it does not constitute endorsement by the W3C or the VSC Community Group.
The editors thank participants of the Verifiable Supply Chain Community Group. This specification draws on: