(
)
User requests access to business application
System verifies role and provides access
Secure Access to VIES Data Value Stream
Fraud Detection Value Stream
Cross Checking Value Stream