The national trust service behind ITSO security
The ITSO Security Management System (ISMS) is the central trust service that manages security across the entire ITSO smart ticketing framework.
If the ISAM is the secure vault inside each device, the ISMS is the national authority that controls the keys to those vaults.
It is responsible for generating, distributing and governing the cryptographic keys that allow ITSO systems to operate securely and interoperably across the UK. Without it, there would be no trusted way for independently operated systems to recognise and accept each other’s tickets.
ITSO Specification
ISAM
ISMS
How the ISMS works
The ISMS acts as the central security authority for the ITSO framework. It generates and manages the lifecycle of cryptographic keys, distributes them securely to authorised ISAMs via members’ Asset Management Systems, and maintains oversight of every security module deployed across the network.
Operated as a secured service, mandatory for all Licensed Members, the ISMS ensures consistent security standards, controlled participation and long-term resilience across the national ITSO ecosystem.
What does the ISMS do?
Key Management
Generates and securely distributes the cryptographic keys that power the ITSO network.
ISAM Lifecyle Control
Manages the ordering, commissioning, renewal and withdrawal of every ISAM in service.
Enables interoperability
Protects the passenger
How the ISMS operates
The ISMS operates from a secure, managed data centre environment and functions separately from individual members’ scheme infrastructure.
It does not process ticket transactions, perform back-office settlements or store passenger data - those responsibilities sit within each scheme’s Host Operator Processing System (HOPS).
Instead, the ISMS exists solely to manage and safeguard the cryptographic security infrastructure that enables those systems to operate securely. By separating central key management from local transaction processing, the ITSO model ensures strong governance, clear accountability and protection of passenger privacy, while maintaining trust across independently operated schemes.
Who can use the ISMS
The ITSO framework operates on a distributed model, with members running their own equipment and back-office systems. Without a centralised key authority, security credentials could be self-generated, trust relationships fragmented and interoperability compromised.
Access to the ISMS is included as part of the ITSO Operating Licence and is mandatory for all Licensed Members.
The costs of operating the ISMS are recovered through ITSO licensing and security-related fees, which reflect participation in the ITSO environment, use of cryptographic services, and ISAM provisioning and lifecycle management. Members also pay for the ISAMs they order and deploy within their own equipment.
This approach ensures the national security infrastructure is sustainably funded while remaining centrally governed and consistently applied across all schemes.