[{"data":1,"prerenderedAt":272},["ShallowReactive",2],{"blog-post-blog_de-dssc-blueprint-3-0-und-maturity-assessment":3},{"id":4,"title":5,"body":6,"cover":256,"date":257,"description":258,"draft":259,"extension":260,"meta":261,"navigation":262,"path":263,"seo":264,"stem":265,"tags":266,"__hash__":271},"blog_de\u002Fde\u002Fblog\u002Fdssc-blueprint-3-0-und-maturity-assessment.md","DSSC Blueprint v3.0: Referenz für Data Spaces und neues Maturity Assessment",{"type":7,"value":8,"toc":251},"minimark",[9,22,27,30,72,79,83,86,108,111,114,234,238,247],[10,11,12,13,17,18,21],"p",{},"Der Aufbau von Data Spaces scheitert selten an einzelnen Technologien, sondern an fehlender Vergleichbarkeit: Konzepte, Rollen, Trust-Annahmen und technische Bausteine werden unterschiedlich benannt und bewertet. Mit dem ",[14,15,16],"strong",{},"DSSC Blueprint v3.0"," (Februar 2026) wurden Referenz-Elemente aktualisiert und um ein ",[14,19,20],{},"Maturity Assessment"," ergänzt, das Initiativen entlang definierter Kriterien einordnet.",[23,24,26],"h2",{"id":25},"was-der-blueprint-abdeckt","Was der Blueprint abdeckt",[10,28,29],{},"Der Blueprint stellt eine konsistente Struktur bereit, die in Projekten als gemeinsames Vokabular genutzt werden kann:",[31,32,33,40,46,52,58,65],"ul",{},[34,35,36,39],"li",{},[14,37,38],{},"Business",": Use Cases, Rollen, Nutzen und Wertströme",[34,41,42,45],{},[14,43,44],{},"Governance",": Policies, Vertragswerke, Onboarding und Compliance",[34,47,48,51],{},[14,49,50],{},"Trust",": Identität, Credential-Profile, Konformität und Durchsetzung",[34,53,54,57],{},[14,55,56],{},"Technik",": Konnektoren, Semantik, Schnittstellen, Betrieb und Security",[34,59,60,61,64],{},"Fokus auf ",[14,62,63],{},"Interoperabilität",", damit unterschiedliche Implementierungen kompatible Flows abbilden",[34,66,67,68,71],{},"Hinweise für ",[14,69,70],{},"Betriebsmodelle"," (z. B. Plattformbetrieb, Federation, Teilnehmer-Onboarding)",[10,73,74],{},[75,76],"img",{"alt":77,"src":78},"Diagramm: Blueprint-Schichten und Assessment","\u002Fimg\u002Fblog\u002Fdssc-blueprint-3-0-und-maturity-assessment-diagram.svg",[23,80,82],{"id":81},"maturity-assessment-von-status-zu-roadmap","Maturity Assessment: Von Status zu Roadmap",[10,84,85],{},"Das Assessment verbindet Architektur-Blueprints mit Operationalisierung:",[31,87,88,95,102,105],{},[34,89,90,91,94],{},"Kriterienkatalog für ",[14,92,93],{},"Capabilities"," (z. B. Interoperabilität, Governance, Betrieb)",[34,96,97,98,101],{},"Einordnung auf ",[14,99,100],{},"Reifegraden"," und Ableitung von Lücken",[34,103,104],{},"Self-Assessment als standardisierter Einstieg für Initiativen mit unterschiedlichen Ausgangspunkten",[34,106,107],{},"Vergleichbarkeit über Initiativen hinweg, um Roadmaps und Investitionsprioritäten datenbasiert zu steuern",[10,109,110],{},"In vielen Ökosystemen ist der Trust-Bereich initial weniger ausgereift als technische Konnektivität - das Assessment macht diese Asymmetrien sichtbar.",[10,112,113],{},"Ein schematisches Ergebnis kann als Datenmodell dokumentiert werden:",[115,116,121],"pre",{"className":117,"code":118,"language":119,"meta":120,"style":120},"language-json shiki shiki-themes github-light github-dark","{\n  \"initiative\": \"example-dataspace\",\n  \"dimensions\": {\n    \"governance\": \"defined\",\n    \"trust\": \"emerging\",\n    \"technical\": \"operational\"\n  },\n  \"nextSteps\": [\"credential-profile\", \"policy-enforcement\", \"interop-testing\"]\n}\n","json","",[122,123,124,133,150,159,172,185,196,202,228],"code",{"__ignoreMap":120},[125,126,129],"span",{"class":127,"line":128},"line",1,[125,130,132],{"class":131},"sVt8B","{\n",[125,134,136,140,143,147],{"class":127,"line":135},2,[125,137,139],{"class":138},"sj4cs","  \"initiative\"",[125,141,142],{"class":131},": ",[125,144,146],{"class":145},"sZZnC","\"example-dataspace\"",[125,148,149],{"class":131},",\n",[125,151,153,156],{"class":127,"line":152},3,[125,154,155],{"class":138},"  \"dimensions\"",[125,157,158],{"class":131},": {\n",[125,160,162,165,167,170],{"class":127,"line":161},4,[125,163,164],{"class":138},"    \"governance\"",[125,166,142],{"class":131},[125,168,169],{"class":145},"\"defined\"",[125,171,149],{"class":131},[125,173,175,178,180,183],{"class":127,"line":174},5,[125,176,177],{"class":138},"    \"trust\"",[125,179,142],{"class":131},[125,181,182],{"class":145},"\"emerging\"",[125,184,149],{"class":131},[125,186,188,191,193],{"class":127,"line":187},6,[125,189,190],{"class":138},"    \"technical\"",[125,192,142],{"class":131},[125,194,195],{"class":145},"\"operational\"\n",[125,197,199],{"class":127,"line":198},7,[125,200,201],{"class":131},"  },\n",[125,203,205,208,211,214,217,220,222,225],{"class":127,"line":204},8,[125,206,207],{"class":138},"  \"nextSteps\"",[125,209,210],{"class":131},": [",[125,212,213],{"class":145},"\"credential-profile\"",[125,215,216],{"class":131},", ",[125,218,219],{"class":145},"\"policy-enforcement\"",[125,221,216],{"class":131},[125,223,224],{"class":145},"\"interop-testing\"",[125,226,227],{"class":131},"]\n",[125,229,231],{"class":127,"line":230},9,[125,232,233],{"class":131},"}\n",[23,235,237],{"id":236},"warum-das-wichtig-ist","Warum das wichtig ist",[10,239,240,241,243,244,246],{},"Data-Space-Initiativen sind ökosystemisch: Interoperabilität entsteht nur, wenn mehrere Teilnehmer nach denselben Regeln bauen und betreiben. Ein gemeinsamer Blueprint plus Maturity Assessment verbessert Vergleichbarkeit, reduziert Fragmentierung und beschleunigt die Ausrichtung zwischen ",[14,242,44],{}," und ",[14,245,56],{},".",[248,249,250],"style",{},"html pre.shiki code .sVt8B, html code.shiki .sVt8B{--shiki-default:#24292E;--shiki-dark:#E1E4E8}html pre.shiki code .sj4cs, html code.shiki .sj4cs{--shiki-default:#005CC5;--shiki-dark:#79B8FF}html pre.shiki code .sZZnC, html code.shiki .sZZnC{--shiki-default:#032F62;--shiki-dark:#9ECBFF}html .default .shiki span {color: var(--shiki-default);background: var(--shiki-default-bg);font-style: var(--shiki-default-font-style);font-weight: var(--shiki-default-font-weight);text-decoration: var(--shiki-default-text-decoration);}html .shiki span {color: var(--shiki-default);background: var(--shiki-default-bg);font-style: var(--shiki-default-font-style);font-weight: var(--shiki-default-font-weight);text-decoration: var(--shiki-default-text-decoration);}html .dark .shiki span {color: var(--shiki-dark);background: var(--shiki-dark-bg);font-style: var(--shiki-dark-font-style);font-weight: var(--shiki-dark-font-weight);text-decoration: var(--shiki-dark-text-decoration);}html.dark .shiki span {color: var(--shiki-dark);background: var(--shiki-dark-bg);font-style: var(--shiki-dark-font-style);font-weight: var(--shiki-dark-font-weight);text-decoration: var(--shiki-dark-text-decoration);}",{"title":120,"searchDepth":135,"depth":135,"links":252},[253,254,255],{"id":25,"depth":135,"text":26},{"id":81,"depth":135,"text":82},{"id":236,"depth":135,"text":237},"\u002Fimg\u002Fblog\u002Fdssc-blueprint-3-0-und-maturity-assessment-cover.jpg","2026-02-22","Der DSSC Blueprint v3.0 erweitert die Data-Space-Referenzarchitektur und ergänzt ein Maturity Assessment inklusive Self-Assessment-Tool.",false,"md",{},true,"\u002Fde\u002Fblog\u002Fdssc-blueprint-3-0-und-maturity-assessment",{"title":5,"description":258},"de\u002Fblog\u002Fdssc-blueprint-3-0-und-maturity-assessment",[267,268,269,270],"Dataspace","DSSC","Data Sovereignty","Regulation","NVWfkSxDudToIRqZXSUWdvQBKhXA2Ly89eAM2XRzQBQ",1775892934475]