Transparency and security

Trust through verifiable systems

Digital identity and administrative infrastructures are among the most sensitive technical systems in modern societies. Trust is therefore not built solely through technology, but above all through transparent procedures, clear lines of responsibility and regular independent audits.

Transparency and security are therefore central principles underpinning our work. We design our systems in such a way that their functionality, security mechanisms and organisational processes remain verifiable and traceable at all times.

Security as a fundamental architectural principle

We adopt a holistic approach to security right from the development stage of our systems. This is underpinned by an architecture that is consistently based on modern security principles, in particular a comprehensive zero-trust approach.

This approach means that no component of a system is automatically regarded as trustworthy. Every communication, every interface and every system component is independently verified, authenticated and logged. This results in an infrastructure in which security mechanisms are not merely applied in isolated instances, but are systematically integrated into the entire architecture.

This approach applies in particular to

  • Device architecture and hardware components
  • Communication interfaces and network connections
  • Administrative and management systems
  • Archiving and documentation systems
  • Logging and audit mechanisms.

Regular independent safety inspections

In addition to the technical architecture, the ongoing independent testing of the systems plays a key role.

Our systems are regularly analysed and assessed by qualified and accredited inspectors. These inspections include, in particular,

  • the security architecture of the systems
  • the implementation of the zero-trust approach
  • organisational security processes
  • Data protection and compliance requirements
  • the integrity and traceability of identification processes.

These audits are carried out at regular intervals and serve to continuously monitor and improve the security and stability of the platform.

Transparency reports for public authorities and partners

A key component of our safety concept is the systematic documentation of the results of these tests.

Transparency and security reports are produced at regular intervals, summarising and documenting the results of the audits. These reports provide the relevant authorities and partners with a comprehensive insight into the security architecture, the processes that have been audited, and the ongoing development of the platform.

The reports are made available to the participating institutions on a regular basis via automated processes.

Security as an ongoing process

Digital infrastructures are constantly evolving. New technologies, new regulatory requirements and new threat scenarios necessitate the ongoing adaptation of security measures.

Security is therefore not seen as a one-off state, but as an ongoing process. Systems are regularly reviewed, further developed and adapted to new requirements.

This combination of technical architecture, independent auditing and transparent documentation creates an infrastructure that can build trust over the long term and consistently meet high security standards.

If you’d like to find out more, please feel free to contact us directly. You can also find a brief overview in our Myth FAQ.