IEF-RA 2.0b2 FTF Avatar
  1. OMG Issue

IEFRA2 — Weaknesses & Gaps sec 1.7.5

  • Key: IEFRA2-86
  • Status: open  
  • Source: Advanced Systems Management Group Ltd. ( Mr. Michael Abramson)
  • Summary:

    "11.3 Weaknesses & Gaps
    11.3.1 No Explanation of key terms
    ● The section introduces SAC and Trusted Data Object but does not explain them or reference in
    the document where they are explained. .
    ● If not, a brief sentence clarifying their purpose (e.g., “SAC and Trusted Data Objects are mechanisms for securely encapsulating and enforcing metadata-driven security policies.”) would be beneficial.
    ● My preliminary scan makes this the first time these are introduced in IEF."

  • Reported: IEF-RA 2.0a1 — Mon, 4 Aug 2025 17:24 GMT
  • Updated: Mon, 4 Aug 2025 17:24 GMT