eID & Trust Services Advisory

Partner — Strategic Partnerships & Trust Services Principal Consultant

In the digital economy, trust is not an abstract principle — it is engineered. As governments and organizations transition toward the eIDAS 2.0 framework and the EU Digital Identity Wallet (EUDIW), the ability to design and assure robust identity and trust infrastructures becomes mission-critical.

SpearIT provides independent, multidisciplinary advisory for the design, evaluation, and assurance of national eID schemes, digital wallets, and qualified trust service infrastructures. Our consultants bring together regulatory expertise, cryptographic assurance, and practical experience gained through years of involvement in national eID design, peer review processes, and qualified trust service audits.

Building Trust From Architecture to Assurance

We help clients navigate the complete lifecycle of trust service and eID system development: from conceptual architecture and policy design to conformity assessment and cross-border recognition. Our work ensures that identity systems are technically sound, regulatorily aligned, and verifiably trustworthy.

Whether you are defining a national eID scheme, implementing a wallet ecosystem, or operating a qualified trust service, our independent assessments identify architectural weaknesses, compliance gaps, and assurance opportunities early, saving time, cost, and risk during certification and operation.

We serve as a neutral advisory partner, interpreting ETSI standards, eIDAS requirements, and supervisory expectations with precision while maintaining vendor and auditor independence. This objectivity allows us to give clear, defensible guidance that regulators trust and providers can implement with confidence.

Navigating eIDAS 2.0 and the New Trust Landscape

The shift from eIDAS 1.0 to eIDAS 2.0 marks a profound evolution in Europe’s digital trust framework. The Regulation expands the trust landscape beyond qualified certificates to encompass digital wallets, remote identity proofing, and electronic attestations of attributes (QEAAs).

Our experts help clients interpret these new obligations and transform them into actionable design and assurance measures.
We assess wallet architectures against the EU Toolbox specifications, review RQSCD implementations, and ensure compliance with ETSI EN 319 400-series standards.
We also support alignment with emerging post-quantum cryptography (PQC) standards to future-proof trust ecosystems.

From Policy Documents to Operational Assurance

Trust service and eID certification depend as much on documentation and governance as on technology. SpearIT assists in drafting Certificate Policies (CP), Certification Practice Statements (CPS), and related governance documents that accurately reflect technical and organizational controls. Our approach bridges the gap between auditors’ expectations and operators’ realities, ensuring that documentation is compliant, defensible, and operationally practical.

We also perform Level of Assurance (LoA) assessments and readiness reviews, helping organizations demonstrate that their identity or signing services meet the assurance criteria required for recognition or notification under eIDAS.

Remote Identity Proofing & Onboarding Assurance

Remote identity proofing is becoming the cornerstone of modern trust ecosystems. However, achieving LoA High remotely requires rigorous controls, advanced supervision mechanisms, and regulatory foresight.

SpearIT provides expert guidance on the design and evaluation of remote onboarding processes aligned with ETSI EN 119 461, EUIW Remote Onboarding guidelines, and ENISA recommendations.
We help clients balance user convenience with fraud resistance, ensuring solutions remain auditable, privacy-preserving, and technically sound.

icon
Our Advantage
Our consultants are actively involved in standardization and policy forums shaping the future of European trust frameworks, offering clients early visibility into regulatory change and practical pathways for compliance.
Regulatory Precision
Deep expertise in eIDAS 2.0, ETSI standards, CA/B Forum, and WebTrust requirements.
Technical & Policy Integration
Advisory spanning cryptography, PKI, security assurance, and institutional governance.
Independence & Credibility
Objective evaluations that regulators, conformity assessors, and supervisory bodies can rely on.
Proven Experience
Contributions to multiple EU eID scheme notifications, eID scheme alignment for the EUDIW, qualified trust services implementations in the EU & US.

Expertise Across the Digital Trust Landscape

Knowledge that shapes digital trust.

Our subject-matter experts team is periodically contributing to publications in digital identity and cybersecurity niches. Below you will find 2 resources relevant to our eID & trust services offering.

Remote ID Proofing - Good Practices

2024-03

PDF, 4.1MB

Our team conducted the research design and lead authoring of the ENISA report on remote identity proofing good practices. This report aims to enhance stakeholder awareness, facilitate risk analysis in evolving threat landscapes, and bolster trustworthiness in remote identity proofing methods.

Read the Report
icon

HSM-as-a-Service Use Cases, Considerations, and Best Practices

2024-04

PDF, 1.6MB

Our team participated in the research design and co-authored the Cloud Security Alliance (CSA) report on HSM-as-a-Service use cases paper. Readers can understand better this common model in modern WebPKI and rQSCD cases, understand its hardware and technological aspects, logical and physical security considerations, as well as best practices for the design, configuration, operation and compliance.

Read the Report
icon
Photo
icon
Strategies, Stories & Smarter Paths Forward

Discover How We Shape and Bring National Digital Identity Initiatives to Reality

Our success stories highlight our work with governments, regulators, and trust service providers to design, assure, and secure national eID schemes and trust service ecosystems recognized across Europe and beyond, through:

National eID Scheme Strategy
Stakeholder Analysis
Technology Assessment
Legal Framework Gap Analysis
Knowledge Diffusion Workshops
Usability Studies