Access control model for data exchange, how mandate gating becomes real across exchange, wallet, and payments layers
- Ott Sarv
- Dec 26, 2025
- 9 min read

An access control model for data exchange turns interoperability into controlled public delivery by making each disclosure traceable to mandate, purpose, minimal necessary data points, and enforceable remedy. Without that operating model, plumbing scales faster than governance, and ecosystem membership is mistaken for entitlement.
The practical aim is simple. Joining the ecosystem creates the ability to request, not a right to recei
ve, and the system must be able to prove that distinction transaction by transaction.
The use case registry is the first governance object
A trust framework that spans multiple DPIs and multiple DPSs needs one shared control surface that decides what is allowed. That control surface is the use case registry, because it binds mandate, purpose, data minimisation, evidence expectations, remedy reach, and change control into an accountable unit that can be approved, versioned, and audited.
Each use case entry must name a single accountable owner, state the decision purpose in plain terms, state the mandate basis for the requesting actor class, identify the source authority that may disclose, and lock the attribute set to an explicit allow list. It must also state what the relying party may do with the result, and how correction and reversal are executed when an outcome is challenged. If any of these fields are missing, the use case is not authorised, it is a draft.
Transaction context makes authorisation attributable
A platform that only transports packets cannot protect the system from informal access. The operating model therefore requires a transaction context that travels with each request, so the access decision is attributable and reconstructable across exchange, wallet, and payments layers.
In practice, each request must carry the requesting actor identity, the declared use case identifier, the requested attribute set, the necessity basis for those attributes, a recipient constraint that limits onward disclosure, an evidence handle that points to the required log bundle, and a remedy handle that links the transaction to correction workflows if needed. The point is not ceremony, the point is auditability without interpretation.
Data minimisation becomes real only when interfaces are narrow
Data minimisation fails when interfaces are broad, because broad interfaces invite over-collection when deadlines hit. The operating model treats minimisation as an interface rule.
A well-governed exchange does not expose general search endpoints. It exposes stable, use case specific endpoints with constrained schemas. A well-governed wallet ecosystem does not treat presentation capability as permission to request, it binds each request to an authorised use case and a minimal attribute set. A well-governed payments rail does not let participants infer eligibility authority from routing authority, it routes authorised transactions and preserves integrity evidence.
Role allocation prevents plumbing from becoming accidental authority
The operating model relies on stable functional roles, even when labels vary across jurisdictions. The source authority remains accountable for disclosure conditions and authoritative correction. The requesting authority remains accountable for the decision purpose and the consequences of using the data. The ministry of ICT operating the rails remains accountable for integrity, availability, onboarding discipline, and transmission evidence, and it remains bounded to that role. Wallet providers and payments rail operators remain trust plumbing operators for secure operation and integrity evidence, and they must not become the de facto owners of downstream purposes through analytics, defaults, or secondary use.
This is the key discipline. If an operator starts defining default attribute bundles, matching logic, or retention behaviours that shape ecosystem decisions, the operator has moved from plumbing into decision surface influence, and governance must treat that as a change in authority footprint.
Onboarding is entry into an accountability ecosystem
Technical onboarding without governance onboarding creates the illusion of readiness. Onboarding must prove mandate clarity, use case readiness, attribute discipline, evidence capability, remedy capability, and change control participation before production reliance forms.
If a participant cannot demonstrate how it will justify each requested attribute, how it will handle denials, how it will support correction and reversal, and how it will produce evidence for oversight, it is not ready for production connectivity, regardless of integration success.
Change control is where ecosystems drift unless it is contained
Defaults behave like policy. If any operator changes attribute bundles, matching logic, schema constraints, retention behaviour, or analytics without governance sign-off, it alters what the ecosystem can do, and therefore what it will do.
Any change that affects what can be requested, what can be disclosed, how matching is performed, or how long content is retained must be treated as a mandate-bound governance act with a named owner, documented scope, regression evidence, and a remedy path that still works after release.
Evidence bundles are what make oversight possible
Oversight works when evidence supports reconstruction. The operating model therefore defines, per use case, what evidence must exist. At minimum, the system must be able to show who asked, under which authorised use case, what was disclosed, why disclosure was permitted, that the channel protected the exchange, which downstream decision relied on the data where applicable, and what correction or reversal occurred if the decision was contested.
This is the difference between governance and narrative. Narrative explains intent. Evidence proves execution.
Remedy propagation is the completion condition for legitimacy
Correction must occur at the authoritative source, and reversal must occur where legal effect is applied. Exchange, wallet, and payments layers support propagation and evidence, they do not substitute for mandate.
A workable propagation pattern is consistent across layers. The source corrects the authoritative record, the corrected assertion is re-issued or re-exposed through controlled interfaces, relying parties that used the earlier state are handled according to decision class rules, and the evidence trail shows both the original transaction and the correction event.
Procurement should buy enforceability, not only throughput
If donors and governments want interoperability that survives scrutiny, procurement must fund the operating model. That means funding the use case registry as a live governance function, funding attribute-level policy enforcement, funding evidence pipelines, funding remedy propagation operations, and funding change control regimes that span rails.
An access control model for data exchange is not paperwork. It is how mandate gating, data minimisation, evidence, and remedy become enforceable across exchange, wallet, and payments layers, even when the plumbing is shared.
The contradiction worth stating plainly is this, why do programmes speak as if joining the platform enables access, when every legitimate request still depends on purpose, mandate, minimal data points, and a remedy path that can actually change outcomes.
Mandate and remedy decide access, not ecosystem membership
A connected institution gains capability, not entitlement. The permission to receive a specific data point must be traceable to mandate, the purpose must be explicit, and the institution must be compellable for the consequences of using the data in a decision, otherwise access becomes a convenience feature rather than a public act.
Remedy is the test that separates lawful access from technical access. If a disputed decision depends on exchanged data, the system must show which institution can correct the authoritative record, which institution must reverse downstream effects, and how that correction propagates, because complaint intake without correction is administrative theatre.
Data minimisation is the only interface rule that survives donor scale
Modern privacy and data protection regimes converge on one practical discipline, do not collect or disclose more than is necessary for the stated purpose. Data minimisation is not a policy aspiration, it is an interface property.
In a data exchange context, that means the platform should not expose broad query surfaces by default. It should route narrowly defined use cases with attribute-level allow lists, necessity statements tied to each request type, and logged denials treated as normal governance outcomes. The ability to ask is never the justification to ask, and the ability to route is never permission to disclose.
Trust framework scope spans multiple DPIs and multiple DPSs
A trust framework in this context is a data roles and rights framework, it allocates entitlements, duties, constraints, evidence expectations, and remedies around personal and organisational data. It spans multiple DPIs and multiple DPSs because it governs the whole chain of reliance, not a single platform.
Technical components are instruments that deliver the business promises captured in the trust framework. They authenticate actors, route assertions, preserve integrity, constrain access, and produce evidence. They do not create authority on their own, and they should never become the place where mandates quietly relocate because integration is easier than governance.
Digital identity wallet and payments rail behave like courier layers
A digital identity wallet is an exchange layer that packages secure presentation and transmission. A payments rail is an exchange layer that routes value transfer events. A data exchange platform is an exchange layer that routes information requests. Each is courier infrastructure with trust properties, not a new owner of every downstream relationship.
That is why the European digital identity wallet framework in Regulation (EU) 2024/1183 and the operational integrity discipline in Commission Implementing Regulation (EU) 2024/2979 should be read as trust plumbing requirements, not as an invitation to treat the wallet provider as a universal controller of every relying party interaction.
The postal analogy is governance accurate in 2026. A courier protects the channel, provides evidence of delivery events, and manages incidents. The courier does not become the author of the letter, the legal owner of the letter, or the decision-maker for what the letter triggers. If a transmitted assertion drives an eligibility decision, the remedy sits with the institution that made the decision and the institution that owns the authoritative record, not with the courier.
Roles are stable across laws even when labels vary
Across modern privacy and data protection laws, the same functional roles appear with small naming differences. The point of stating them is operational clarity, so plumbing never becomes entitlement by assumption.
Role | What the role means in practice | What must remain true under scrutiny |
Data subject | The natural person the data is about | Rights exercise reaches an accountable institution, and remedy changes outcomes, not just records a complaint |
Controller | Decides purpose and essential means for processing | Can justify why each data point is needed, can constrain disclosure, can correct authoritative records |
Joint controller | Shares decisions about purpose and essential means | Responsibilities are allocated and enforceable, not implied by participation |
Processor | Executes processing on behalf of a controller | Works under instruction, does not repurpose data, produces evidence of execution and controls |
Sub-processor | Downstream executor engaged by a processor | Is authorised, bounded, and auditable under the same constraints |
Recipient | Receives disclosed data | Receives only what is authorised, cannot treat receipt as a licence for unrelated reuse |
Issuer | Issues an attestation or authoritative statement | Can correct, suspend, revoke, and explain what was issued and why |
Relying party | Requests attributes and makes decisions based on them | Can justify the request, can evidence necessity, can support redress for decisions made |
Oversight body | Supervises and compels corrective action | Can obtain evidence quickly and require remediation across actors |
Trust plumbing operator | Operates exchange, wallet, or payments rails | Protects critical assets, maintains integrity and availability, produces transmission evidence without inheriting sector mandates |
Ministry of ICT role in data exchange platform governance
A ministry of ICT operating the platform is best understood as a trust plumbing operator for the national exchange layer. It is accountable for onboarding discipline, trust services, integrity controls, availability, incident handling, and evidence of exchange events. It does not become the owner of health records, education records, revenue records, or benefit records simply because those records traverse the rails.
Sector authorities remain controllers for their authoritative datasets, because they determine the purpose and legal effect of those records and they are the only actors that can be compelled to correct them. Requesting institutions remain controllers for their own decision purposes, because they decide why they request data and what they do with it.
Ecosystem actor | Role allocation that keeps access lawful | Boundary that prevents role drift |
Ministry of ICT operating the exchange layer | Trust plumbing operator for routing and integrity, controller only for its own operational datasets such as participant registries and security telemetry | Does not define sector purposes, does not decide eligibility logic, does not set default disclosure beyond rail safety requirements |
Sector authority holding the authoritative register | Controller and issuer for sector attestations and disclosures | Owns purpose, defines disclosure conditions, remains compellable for correction at source |
Requesting authority using data for a programme decision | Controller and relying party for the decision purpose | Must justify necessity of each data point and support remedy for downstream decisions |
Wallet provider or wallet operator | Trust plumbing operator for secure presentation and transmission, controller only for its own operational datasets required to run the service | Does not accumulate payloads for secondary use, does not redefine relying party entitlements |
Payments rail operator | Trust plumbing operator for transaction routing and integrity evidence | Routes authorised transactions, does not become eligibility authority |
Oversight body | Independent oversight body | Can compel evidence and corrective action across controllers and operators |
Drift arrives through defaults and change control
Role clarity fails in practice when defaults behave like policy. Drift begins when the platform operator standardises attribute sets that are broader than necessary, embeds matching logic that changes eligibility outcomes, or retains payload content beyond what is required for routing and integrity evidence. The platform then starts influencing essential means across the ecosystem, and the trust plumbing role quietly becomes a decision surface.
The containment mechanism is governance, not architecture fashion. Any change that affects which attributes are disclosed, how identity matching is performed, how long content is retained, or what analytics are run must be treated as a mandate-bound decision with accountable owners, documented scope, and a remedy path that still works after the change.
The decision question donors and countries should keep asking
If an institution claims it should have access because it joined the ecosystem, the correct response is a governance response, not a technical one. Which mandate covers this purpose, which minimum data points are necessary, who is accountable for the decision effect, and who can be compelled to correct the authoritative record and reverse downstream effects when the decision is contested.
Fund the rails as critical infrastructure, and gate every disclosure on mandate, necessity, and enforceable remedy, so that wallets, exchanges, and payments components remain trust plumbing rather than accidental authority.




Comments