| |
|
User requests access to business application |
System verifies role and provides access |
| |
|
System verifies role and provides access |
MS perform specific cross-checking of DRR data based on National jurisdiction and intelligence of both MS involved |
| |
|
MS system engages in secure machine to machine data exchange |
MS perform specific cross-checking of DRR data based on National jurisdiction and intelligence of both MS involved |