Reference scenarios
Target audience: Solution Architects, Enterprise Architects, CISOs, Business Stakeholders
Reading time: 20 minutes
Prerequisites: Entity reference, Relationships and runtime flow
Introduction
The deployment organization model is general by design. The same set of twelve entities composes solutions for problems that, on the surface, appear unrelated: governing card production with multiple embossing providers, controlling cryptographic operations performed by an outsourced collections processor, and operating cryptography across multiple regulatory jurisdictions.
This page works through three reference scenarios. Each scenario shows the conceptual modeling — applications, contexts, actors, assets, grants, constraints — that materializes the solution. The scenarios are deliberately representative of common enterprise problems, drawn from real industry patterns.
| Scenario | Industry pattern | Key challenge |
|---|---|---|
| Card issuance with multiple providers | Banking — payment cards | Multiple third-party embossing vendors, each with bounded access to cardholder data |
| BPO collections processing | Banking — outsourced operations | A BPO operates on customer data without ever receiving cleartext bulk files |
| Multi-jurisdiction regulatory reporting | Multinational enterprise | Cryptographic operations governed by different regulatory regimes per jurisdiction |
Scenario 1: Card issuance with multiple providers
Context
A bank issues physical cards through two embossing providers: VISA and AMEX. Each provider must decrypt cardholder data only for the cards it physically produces, only during the agreed batch window, and never beyond that scope.
In a traditional model, the bank would deliver the cardholder data file to each provider, encrypted with a key that has been pre-shared. This creates several problems:
- The provider holds key material outside the bank's control domain
- Revocation requires bilateral coordination
- Audit depends on what the provider reports
- A provider compromise exposes cardholder data the provider was not actively producing
- The bank cannot enforce per-batch or time-window restrictions cryptographically
Modeling with ANKASecure©
flowchart TB
subgraph BANK["🏦 Bank — Tenant: Card Operations"]
APP["Application: Card Issuance"]
subgraph VCTX["Exchange Context: Embossing — VISA"]
direction TB
VACT["Actor: visa-embossing-actor"]
VGRANT["Grant: decrypt<br/>+ single-use<br/>+ batch-scoped<br/>+ time window"]
VASSET["Asset: embossing-key-visa"]
VACT --> VGRANT --> VASSET
end
subgraph ACTX["Exchange Context: Embossing — AMEX"]
direction TB
AACT["Actor: amex-embossing-actor"]
AGRANT["Grant: decrypt<br/>+ single-use<br/>+ batch-scoped<br/>+ time window"]
AASSET["Asset: embossing-key-amex"]
AACT --> AGRANT --> AASSET
end
APP --> VCTX
APP --> ACTX
end
VISA["🏢 VISA<br/>embossing system"]
AMEX["🏢 AMEX<br/>embossing system"]
VISA -.->|invokes decrypt| VACT
AMEX -.->|invokes decrypt| AACT
style BANK fill:#e8f4f8,stroke:#1a5276,stroke-width:2px
style APP fill:#d5f5e3,stroke:#1e8449
style VCTX fill:#d6eaf8,stroke:#2980b9
style ACTX fill:#fdebd0,stroke:#d68910
style VISA fill:#fadbd8,stroke:#c0392b
style AMEX fill:#fadbd8,stroke:#c0392b Entity composition
Application
Card Issuance— the business domain that owns the card production process
Exchange Contexts
Embossing — VISA: OUTBOUND exchange with VISA, sensitivity RESTRICTEDEmbossing — AMEX: OUTBOUND exchange with AMEX, sensitivity RESTRICTED
Cryptographic Actors
visa-embossing-actor: belongs to Card Issuance, represents VISA's embossing systemamex-embossing-actor: belongs to Card Issuance, represents AMEX's embossing system
Cryptographic Assets
embossing-key-visa: symmetric data-encryption key used to protect VISA-bound batchesembossing-key-amex: symmetric data-encryption key used to protect AMEX-bound batches
Capability Grants
VISA grant:
Actor: visa-embossing-actor
Capability: decrypt
Asset: embossing-key-visa
Exchange Context: Embossing — VISA
Constraints:
- Single-use per batch identifier
- Batch-scoped (decrypts only records tagged with the active batch_id)
- Time window: 2026-04-26T00:00Z to 2026-04-26T06:00Z
- Rate limit: 50,000 ops / hour
AMEX grant:
Actor: amex-embossing-actor
Capability: decrypt
Asset: embossing-key-amex
Exchange Context: Embossing — AMEX
Constraints:
- Single-use per batch identifier
- Batch-scoped (independent batch_id namespace)
- Time window: 2026-04-26T02:00Z to 2026-04-26T08:00Z
- Rate limit: 30,000 ops / hour
Resulting properties
| Property | Outcome |
|---|---|
| Provider isolation | VISA cannot decrypt AMEX-bound data; AMEX cannot decrypt VISA-bound data |
| Key non-exposure | Neither provider receives raw key material; both invoke decrypt capabilities |
| Bounded usage | Each provider is constrained to its own batch and its own time window |
| Independent revocation | Suspending VISA's grant does not affect AMEX's operations |
| Auditable evidence | Every decryption produces an audit event linking actor, batch, capability, and outcome |
The model scales naturally to additional providers (a third issuer joins the program), to additional capabilities (verification of provider-signed receipts), and to additional jurisdictions (per-country exchange contexts), without architectural change.
Scenario 2: BPO collections processing
Context
A bank outsources delinquent customer collections to a BPO (Business Process Outsourcer). The BPO operates on customer data — names, contact details, account balances — to perform outreach. Today, this means the bank decrypts portfolios into bulk CSV files and transfers them to the BPO via SFTP.
This model has several structural problems:
- The bank loses visibility into how the data is used once it arrives at the BPO
- Files persist on BPO infrastructure indefinitely
- A BPO breach exposes the entire transferred portfolio
- Revocation requires coordinating data deletion across BPO systems
- Audit depends on BPO self-reporting
Modeling with ANKASecure©
The model replaces the bulk file transfer with mediated, per-record cryptographic invocations. The BPO never receives a bulk plaintext file; it receives the right to invoke the bank's decrypt capability under controlled conditions, record by record.
flowchart TB
subgraph BANK["🏦 Bank — Tenant: Collections Operations"]
APP["Application: Collections Outsourcing"]
subgraph BPOCTX["Exchange Context: BPO Collections — Alpha"]
direction TB
BPOACT["Actor: bpo-alpha-collections-actor"]
BPOGRANT["Grant: decrypt<br/>+ rate-limited<br/>+ business-hours only<br/>+ per-record scope<br/>+ contextual mTLS"]
BPOASSET["Asset: collections-data-key-2026Q2"]
BPOACT --> BPOGRANT --> BPOASSET
end
APP --> BPOCTX
end
BPO["🏭 BPO Alpha<br/>collections agents"]
BPO -.->|invokes decrypt<br/>per record| BPOACT
style BANK fill:#e8f4f8,stroke:#1a5276,stroke-width:2px
style APP fill:#d5f5e3,stroke:#1e8449
style BPOCTX fill:#fadbd8,stroke:#c0392b
style BPO fill:#fdebd0,stroke:#d68910 Entity composition
Application
Collections Outsourcing— the business domain owning the collections workflow
Exchange Context
BPO Collections — Alpha: OUTBOUND exchange with BPO Alpha, sensitivity RESTRICTED, status ACTIVE for the duration of the contract
Cryptographic Actor
bpo-alpha-collections-actor: belongs to Collections Outsourcing, represents BPO Alpha's processing system, type EXTERNAL_PARTY
Cryptographic Asset
collections-data-key-2026Q2: symmetric encryption key protecting the quarterly collections portfolio data
Capability Grant
Actor: bpo-alpha-collections-actor
Capability: decrypt
Asset: collections-data-key-2026Q2
Exchange Context: BPO Collections — Alpha
Constraints:
- Rate limit: 500 ops / hour (matches expected agent throughput)
- Time window: business hours only (Mon-Fri 08:00-18:00 local)
- Per-record scope (one decryption per call, no bulk operations)
- Contextual: mTLS with BPO's client certificate from approved CA
- Auto-revoke on: 100 consecutive denials in 1 hour (anomaly signal)
How a typical workflow runs
sequenceDiagram
participant AGENT as BPO agent system
participant CCP as ANKASecure©
participant HSM as Bank HSM
participant AUD as Bank audit
Note over AGENT: Agent opens customer record #4521
AGENT->>CCP: decrypt(asset=collections-data-key-2026Q2, record=4521)
CCP->>CCP: Evaluate grant + context + constraints
Note over CCP: Within business hours ✓<br/>Under rate limit ✓<br/>mTLS valid ✓
CCP->>HSM: Execute decrypt
HSM-->>CCP: Plaintext for record 4521
CCP->>AUD: Log: actor, record-id, timestamp, allow
CCP-->>AGENT: Plaintext for record 4521 only
Note over AGENT: Agent makes outreach call<br/>Plaintext is ephemeral Resulting properties
| Property | Outcome |
|---|---|
| Zero bulk transfer | The bank never delivers a CSV file. Each record is an individual invocation |
| Per-record audit | Every customer record accessed produces an audit event with the record identifier |
| Time-bound access | Operations outside business hours are denied automatically |
| Behavioral revocation | Anomalous patterns (rate spikes, denial bursts) auto-revoke the grant |
| Immediate termination | Contract termination = grant revocation. No file deletion across BPO infrastructure required |
| Sovereignty preserved | The portfolio key never leaves the bank's HSM. The BPO operates on capabilities, not data |
This model is what ANKASecure© refers to as the paradigm shift from sharing keys to sharing capabilities — the underlying principle is described in Cryptographic sovereignty.
Scenario 3: Multi-jurisdiction regulatory reporting
Context
A multinational financial institution operates in multiple regulatory jurisdictions: the European Union (under DORA, GDPR, eIDAS 2), the United States (under SOX, NIST), and South America (under regional data protection laws). Each jurisdiction imposes specific cryptographic requirements:
- EU regulators require ETSI-aligned signatures and post-quantum readiness for long-retention data
- US federal entities require NIST FIPS 203/204/205 algorithms
- Regional jurisdictions require local data residency and sovereign cryptographic operations
The institution must produce regulatory reports to each jurisdiction's authority, signed with cryptographic mechanisms that satisfy local rules — without architecting three separate platforms.
Modeling with ANKASecure©
The model uses three Exchange Contexts (one per jurisdiction), each with its own actor, asset, and policy regime. The Application — Regulatory Reporting — is the unified business domain.
flowchart TB
subgraph DEPLOY["🏛️ Deployment: Multinational"]
subgraph TENANT["Tenant: Regulatory & Compliance"]
APP["Application: Regulatory Reporting"]
subgraph EUCTX["Exchange Context: Reporting — EU"]
direction TB
EUACT["Actor: eu-regulatory-reporter"]
EUGRANT["Grant: sign<br/>+ ETSI-aligned policy<br/>+ daily window"]
EUASSET["Asset: eu-reporting-key (ML-DSA-87 + RSA-PSS hybrid)"]
EUACT --> EUGRANT --> EUASSET
end
subgraph USCTX["Exchange Context: Reporting — US"]
direction TB
USACT["Actor: us-regulatory-reporter"]
USGRANT["Grant: sign<br/>+ NIST FIPS policy<br/>+ daily window"]
USASSET["Asset: us-reporting-key (ML-DSA-87)"]
USACT --> USGRANT --> USASSET
end
subgraph SACTX["Exchange Context: Reporting — South America"]
direction TB
SAACT["Actor: sa-regulatory-reporter"]
SAGRANT["Grant: sign<br/>+ regional policy<br/>+ residency-bound"]
SAASSET["Asset: sa-reporting-key (RSA-4096 + ML-DSA-65)"]
SAACT --> SAGRANT --> SAASSET
end
APP --> EUCTX
APP --> USCTX
APP --> SACTX
end
end
EUREG["📋 EU regulator"]
USREG["📋 US regulator"]
SAREG["📋 SA regulators"]
EUACT -.->|signed report| EUREG
USACT -.->|signed report| USREG
SAACT -.->|signed report| SAREG
style DEPLOY fill:#e8f4f8,stroke:#1a5276,stroke-width:2px
style TENANT fill:#d6eaf8,stroke:#2980b9
style APP fill:#d5f5e3,stroke:#1e8449
style EUCTX fill:#fdebd0,stroke:#d68910
style USCTX fill:#e8daef,stroke:#7d3c98
style SACTX fill:#fadbd8,stroke:#c0392b Why this composition works
Single Application, multiple contexts. The business workflow is the same: produce a regulatory report and submit it. The cryptographic governance differs per jurisdiction. By modeling jurisdictional governance in the Exchange Context (not the Application), the business logic remains unified while the cryptographic policies remain jurisdiction-specific.
Policies attached at multiple levels. A Policy at deployment level defines the universal cryptographic baseline (FIPS posture, hybrid requirement, minimum security level). Policies at Exchange Context level refine those for each jurisdiction (ETSI signature schemes for EU, FIPS-only for US, residency-bound for SA).
Independent assets per jurisdiction. Each jurisdiction's signing key is a separate Cryptographic Asset, governed by its own lifecycle policy and rotation schedule. A key compromise or rotation in one jurisdiction does not cascade to the others.
Independent actors per jurisdiction. A single business workflow may invoke up to three actors in sequence — one per jurisdiction it must report to — using credentials and policies appropriate to each. Actor separation also produces audit clarity: which jurisdiction received which signed report, when, with which key.
Resulting properties
| Property | Outcome |
|---|---|
| Single business application | Regulatory Reporting is one Application, not three |
| Jurisdictional independence | Each Exchange Context governs its own algorithms, policies, lifecycle |
| Policy inheritance | Deployment baseline → tenant refinement → context override |
| PQC adoption per jurisdiction | EU adopts hybrid ML-DSA + RSA today; US adopts pure ML-DSA; SA continues with classical+PQC hybrid until local mandate matures |
| Residency compliance | Each jurisdiction's keys are tagged with residency constraints; HSM placement reflects them |
| Audit segregation | Reports to each jurisdiction produce audit events tagged with the corresponding context — supporting jurisdiction-specific compliance reporting |
This scenario illustrates a model property worth highlighting: the Exchange Context is the substrate that lets multi-jurisdiction governance compose cleanly. Without it, the same business logic would have to fragment into multiple applications or multiple tenants — neither of which is faithful to the actual organizational structure.
Cross-scenario observations
| Observation | Why it matters |
|---|---|
| The same twelve entities compose all three scenarios | One model serves internal integrations, third-party exchanges, and multi-jurisdiction governance |
| The Exchange Context is the differentiator | A KMS without business interaction modeling cannot represent these scenarios with the same fidelity |
| Capability Grants make authorization atomic | Each grant can be revoked, suspended, or audited as a single decision — supporting granular operational governance |
| Constraint Policies translate business rules to cryptographic enforcement | Time windows, batch scopes, rate limits, contextual requirements — all enforced at the control plane, not in application code |
| Audit emits the same shape across all scenarios | Compliance reporting becomes a uniform query across heterogeneous business workflows |
Beyond these scenarios
The model is not limited to financial services. The same conceptual composition supports:
- Healthcare data exchange (clinical labs, insurers, research consortia)
- Government inter-agency data sharing
- Telecommunications partner data exchange (roaming, MVNO billing, IPX interconnection)
- Retail and supply chain (EDI with suppliers, federated loyalty programs)
- SaaS multi-tenancy with enterprise BYOK customers
For the broader applicability of the cryptographic sovereignty model, see Cryptographic sovereignty.
Next steps
- For the entity definitions used in these scenarios, see Entity reference.
- For the runtime authorization flow that evaluates each invocation, see Relationships and runtime flow.
- For the broader principle of cryptographic sovereignty in third-party exchange, see Cryptographic sovereignty.