-
Key: IEFRA2-86
-
Status: open
-
Source: Advanced Systems Management Group Ltd. ( Mr. Michael Abramson)
-
Summary:
"11.3 Weaknesses & Gaps
11.3.1 No Explanation of key terms
● The section introduces SAC and Trusted Data Object but does not explain them or reference in
the document where they are explained. .
● If not, a brief sentence clarifying their purpose (e.g., “SAC and Trusted Data Objects are mechanisms for securely encapsulating and enforcing metadata-driven security policies.”) would be beneficial.
● My preliminary scan makes this the first time these are introduced in IEF." -
Reported: IEF-RA 2.0a1 — Mon, 4 Aug 2025 17:24 GMT
-
Updated: Mon, 4 Aug 2025 17:24 GMT
IEFRA2 — Weaknesses & Gaps sec 1.7.5
- Key: IEFRA2-86
- OMG Task Force: IEF Reference Architecture 2.0 FTF