---
title: Revisiting §3 - Operationalizing SSI - From Principles to Properties
robots: noindex, nofollow
---
DRAFT!!!
# Operationalizing SSI - From Principles to Properties
- Revisiting the Ten Principles of Self-Sovereign Identity (part two)
*— Article 3 in the "Revisiting the Ten Principles of Self-Sovereign Identity" Series (2025)*
(see [Overview](https://hackmd.io/oUIM9j8TTa-wvhBvvO5vZA))
## I. Introduction: Why Operationalize SSI?
- **From ideals to infrastructure**
The 10 Self-Sovereign Identity (SSI) principles defined a philosophical direction: one rooted in autonomy, consent, and user dignity. But a decade later, questions persist: *How do we measure compliance? How do we enforce these values in real systems?*
- **The CSSPS as a compliance backbone**
The Compliance SSI System Property Set (CSSPS), proposed by Pattiyanon & Aoki in [IEEE Access (2022)](https://ieeexplore.ieee.org/document/9875265), aims to fill this gap by defining **42 system-level properties**, each with specific constraint expressions, enabling technical assessment and comparison.
- **Why this matters:**
- Gives **regulators**, **engineers**, and **auditors** a common language.
- Allows for **SSI certification schemes** and **interoperability assessments**.
- Strengthens the SSI movement’s credibility by aligning with privacy law, cybersecurity standards, and operational best practices.
> “An SSI system must enable individuals to encode their personal characteristics... and must associate individual users’ identities with their unique identifiers.”
> — *CSSPS, IP1: Existence* ([PDF](https://ieeexplore.ieee.org/document/9875265))
## II. What Is the CSSPS?
- **Authored by:** Charnon Pattiyanon and Toshiaki Aoki
- **Published in:** IEEE Access, 2022
- **Purpose:** Establish a standards-based framework for testing whether SSI systems comply with legal norms and technical safeguards.
- **What it includes:**
- 42 properties (IP1–IP42), grouped thematically.
- Emphasis on user rights, cryptographic verification, environmental sustainability, and governance.
- Concrete constraint expressions (e.g. must, should) designed for implementation and audit.
- **Why important:**
Where the 10 principles articulate *why* SSI matters, CSSPS begins to answer *how we know when it’s real.*
## III. Where CSSPS Enhances the Original 10 Principles
### 1. **Existence → Clarified and Contested**
- **Original framing:** Existence is intrinsic — every person has the right to a digital identity.
- **CSSPS IP1:**
> “An SSI system must make identities open and accessible to the public.”
- **Why important:**
This exposes a tension. Making identities “open” may violate privacy, especially for vulnerable groups. The principle must affirm **existence without exposure**.
- **Reframed version:**
> “Existence means that one’s digital self is acknowledged and protected — not contingent on being public, encoded, or externally recognized.”
### 2. **Control → Technically Enforced**
- **CSSPS IP2 (Sovereignty):**
> “An SSI system must prevent other individuals, organizations, or governments from controlling the identities of users.”
- **Why important:**
Goes beyond permission to enforce **exclusive authority**, aligning with agency law. Strengthens the legal footing for **Principal Authority** ([link](https://www.blockchaincommons.com/articles/Principal-Authority/)).
### 3. **Consent → Made Verifiable**
- **CSSPS IP16:**
> “An SSI system must enable the deliberate and well-understood presentation of consent... and allow users to revoke their consent.”
- **Why important:**
This introduces **procedural consent** — the need for transparency, informed choice, and reversibility. Aligns with GDPR and avoids “checkbox sovereignty.”
### 4. **Access → Augmented with Rights of Review and Challenge**
- **CSSPS IP11 & IP42:**
> “An SSI system must provide users unrestricted access to their identities...”
> “...must provide users with reasons for denials of their requests and the right to challenge such denials.”
- **Why important:**
Transforms “access” into an enforceable **data subject right**, backed by dispute resolution and rectification. Moves from *read-only access* to *right to know, edit, and contest.*
### 5. **Minimization → Codified as Cryptographic Practice**
- **CSSPS IP17:**
> “In order to share identities, an SSI system must employ selective disclosure, range proof, and other zero-knowledge techniques.”
- **Why important:**
No longer just a privacy ethic — becomes a cryptographic requirement. Encourages privacy-by-design and avoids overcollection defaults.
### 6. **New Properties to Integrate into Next-Gen Principles**
#### 🧾 **Principle 11: Auditability & Non-Repudiation**
- **CSSPS IP27–28:**
> “An SSI system must maintain sufficient log information... and include a mechanism to provide irrefutable evidence.”
- **Why important:**
Establishes **accountability** in both directions — for issuers and users. Supports legal claims, forensic review, and governance transparency.
#### 🌍 **Principle 12: Interjurisdictional Resilience**
- **CSSPS IP23:**
> “An SSI system should be accessible to all, regardless of their ethnic origin, gender, socioeconomic status, or language.”
- **Why important:**
Promotes **universal design** — ensuring SSI doesn’t become a luxury or national silo. Supports cross-border rights and inclusion.
## IV. Where CSSPS Falls Short
### 🧠 No Cognitive or UX Protections
- No mention of:
- **Dark patterns**
- **Manipulative consent flows**
- **Behavioral design ethics**
→ Misses the modern risks of **digital coercion**, which will be addressed in the [Anti-Coercive Design](#) and [Cognitive Liberty](#) articles in this series.
### ⚖️ Ignores Power and Discrimination
- No systemic analysis of:
- **Disparate impact**
- **Schema bias**
- **Verifiable exclusion**
→ Suggest a future principle:
> “SSI systems must be assessed for structural bias, ensuring identity tools do not encode historical inequality or systemic exclusion.”
## V. Toward a Hybrid SSI Model
| Layer | Role | What It Provides |
|-------|------|------------------|
| **Principles** | Ethical Compass | Autonomy, equity, dignity, mental sovereignty |
| **Properties (CSSPS)** | Implementation Guide | Auditability, technical safeguards, legal compliance |
- **Why this matters:**
Bridging principle and property allows SSI to remain values-driven **while scaling into real-world deployments** — across wallets, issuers, and verifiers.
## VI. Reclaiming Principle 1: Existence
- **Why it matters most:**
Existence underpins all rights. Without it, one has no standing in a digital world. But if misinterpreted, it can also justify surveillance or over-identification.
- **Problem with CSSPS IP1:**
Treats existence as *technical visibility*, not legal or social personhood.
- **Revised version:**
> “Digital existence must be protected by default, not exposed by design. Systems must support pseudonymity, non-disclosure, and self-erasure — affirming identity without demanding visibility.”
## VII. Conclusion
- **CSSPS offers precision and power** — but must be guided by ethical vision.
- **Systems thinking is necessary** — but not sufficient.
- **SSI must remain people-centered** — resisting the reduction of identity to data, code, or compliance alone.
> _“The measure of a good SSI system isn’t just how compliant it is — but how well it respects and protects the people it serves.”_
## VIII. Appendix: CSSPS Summary Table — Mapping System Properties to SSI Principles
| CSSPS Property | Description | Aligns With Principle |
|----------------|-------------|------------------------|
| **IP1** | Existence via public encoding and biometric correlation | **Principle 1 (Revised)** — Existence must not require exposure |
| **IP2** | User sovereignty over identity, credentials, agents | **Principle 2** — Control |
| **IP3** | Users as primary source of identity and claims | **Principle 2** & **10** — Control + Protection |
| **IP4** | Use of open standards for identity data | **Principle 8** — Interoperability |
| **IP5** | Cost-free or low-cost access to identity systems | **Candidate** — Future equity principle |
| **IP6** | Avoid centralized control or registration | **Principle 2** & **6** — Control + Transparency |
| **IP7** | Cryptographic verification of credentials | **Principle 10** — Protection |
| **IP8** | Identity scalability, decomposition, and granularity | **Candidate** — Interoperability, Identity layering |
| **IP9** | Simplicity and accessibility of use | **Candidate** — Accessibility, Usability |
| **IP10** | Environmental, technical, economic sustainability | **Candidate** — Long-term viability principle |
| **IP11** | Access control: update, hide, delete identities | **Principle 5** — Access |
| **IP12** | Transparency of systems, algorithms, and proofs | **Principle 6** — Transparency |
| **IP13** | Persistence with erasure and revocation safeguards | **Principle 3** — Persistence (revised) |
| **IP14** | Portability of identities, wallets, and services | **Principle 7** — Portability |
| **IP15** | Interoperability with legacy and other systems | **Principle 8** — Interoperability |
| **IP16** | Consent: specific, revocable, and contextual | **Principle 4** — Consent |
| **IP17** | Data minimization using ZKPs and selective disclosure | **Principle 9** — Minimization |
| **IP18** | Protection of user rights during conflict | **Principle 10** — Protection |
| **IP19** | Force-resistant identity authentication | **Candidate** — Security & Sovereignty |
| **IP20** | Physical authentication of hardware/devices | **Candidate** — Security-by-design |
| **IP21** | Use of strong cryptography for confidentiality | **Principle 10** — Protection |
| **IP22** | Identity recovery from loss (wallet, keys, etc.) | **Principle 7 (Extended)** — Portability & Continuity |
| **IP23** | Availability of identity across platforms and demographics | **Proposed Principle 12** — Equity & Resilience |
| **IP24** | Secure communication protocols for ID data | **Principle 10** — Protection |
| **IP25** | Data integrity via digital signatures and hash functions | **Principle 10** — Protection |
| **IP26** | Role-based data authorization and access control | **Principle 5** — Access |
| **IP27** | System activity logs and compliance audits | **Proposed Principle 11** — Auditability |
| **IP28** | Non-repudiation mechanisms for obligations | **Proposed Principle 11** — Accountability |
| **IP29** | Validation and sanitization of identity data | **Candidate** — Accuracy, Clean Data Practices |
| **IP30** | Robust error handling and data corruption defense | **Candidate** — Resilience, Security |
| **IP31** | Key management and secure key sharing | **Principle 10** — Protection |
| **IP32** | Malware protection on identity-processing systems | **Principle 10** — Protection |
| **IP33** | Password security and user controls | **Candidate** — Credential hygiene & resilience |
| **IP34** | Secure system configuration and file handling | **Candidate** — Deployment integrity |
| **IP35** | Session management and inactivity safeguards | **Candidate** — Privacy & Session Control |
| **IP36** | Classification of data by security level | **Candidate** — Governance & Tiered Risk |
| **IP37** | Fair and lawful identity processing | **Principle 4** — Consent; also supports **Principle 12** — Equity |
| **IP38** | Purpose specification and limits on use | **Principle 9** — Minimization (expanded) |
| **IP39** | Use and disclosure limitations, with audit trails | **Principle 6** — Transparency & Accountability |
| **IP40** | Data quality, completeness, and correction rights | **Principle 5** — Access |
| **IP41** | User notification of data use and breaches | **Principle 6** — Transparency |
| **IP42** | Individual participation, challenge, and redress | **Principle 5** — Access + **Proposed Principle 13** — Due Process & Rights Assertion |
### Observations:
- At least **30+ properties directly align** with some of the original 10 principles, offering technical depth and measurable benchmarks.
- Several **gap areas** (UX coercion, cognitive rights, equity audits) remain **unaddressed**, supporting the case for your upcoming pieces on:
- *Anti-Coercive Design*
- *Cognitive Liberty*
- *Existence 2.0*
- *Principal Authority*
- CSSPS offers a **robust compliance substrate**, but must be **paired with ethical foresight** to ensure sovereignty is truly realized in practice.