South Africa is on the cusp of a digital revolution that promises to end the era of ‘the system is down’. The Department of Home Affairs (DHA) recently gazetted draft regulations for a smartphone-based digital identity, a move that could turn our mobile devices into our primary ID cards, birth certificates, and marriage licences – a move that would even leapfrog most advanced economies in the world.
As all eyes turn to us, we need to lay cybersecurity foundations that ensure our revolutionary project succeeds, and then keeps on succeeding as others look to us as an example. The cost of failure is high; the rewards of success will be even higher.
The global context: a leapfrog moment
South Africa’s fast-tracking of this framework places it in an elite group of nations reimagining the “biometric state”. While developed economies like Estonia (where 99% of services are digital) and Singapore (via its advanced Singpass system) have long been the gold standard, many other developed nations are still grappling with fragmented systems. For instance, Germany is only now renewing its digital ID strategy to align with the EU’s 2026 wallet mandate, and Japan continues to face adoption hurdles with its “My Number” cards.
In the developing world, the momentum is more striking. India’s Aadhaar remains the world’s largest biometric system, while African peers like Ghana (with 19 million registered on GhanaCard) and Ethiopia are making rapid strides. By moving directly to a mobile-first, biometric-authenticated model, South Africa is leapfrogging traditional hurdles, moving straight to a sophisticated ecosystem that many advanced economies are still only debating. This puts South Africa at the forefront of a global shift toward decentralised, verifiable credentials.
The government’s own digital transformation roadmap notes that around 21 million physical Smart ID cards with associated digital biometrics had been issued by the end of 2023, thus forming the basis for future digital identity and secure remote access to services.
For citizens, a stronger digital identity system equates to fewer queues and less paperwork with better access to services that depend on trusted identity records. For the government, there’s a foundation for more efficient service delivery with downstream benefits for banks and insurers in verifying people quickly and accurately.
But as identity becomes more digital and interconnected, questions around security become more significant too.
The recently gazetted draft digital identity regulations also clarify additional details of the envisioned mobile-first model, with digital credentials stored and used via smartphones, remote biometric verification, and secure integration between government systems and private sector platforms.
A lot of innovation is coming, but that means there will also soon be a lot more to digitally secure.
Questions around trust and security can, and should, serve to strengthen South Africa’s digital transformation agenda rather than slow it down, though.
South Africa needs modern, efficient and accessible public services and a digital identity can be a powerful enabler of that and more. But to deliver that promise sustainably, security has to be designed into its very foundations.
Availability meets integrity
For years, the frustration around public systems has been expressed in the familiar phrase, ‘the system is down’. While the online availability of services will always be essential, the next test will be whether the identity itself can be trusted as South Africa moves further into digital identity. The real significance of the moment will be how well national identity data is guarded as a form of critical infrastructure.
A breach that exposes personal data will always be a serious concern, but another significant risk is the possibility of attackers interfering with the processes that prove, verify or protect identity.
Globally, cybercriminals are already highly adept in how they use stolen personal information, compromised credentials, synthetic media and social engineering. Biometric data adds yet another dimension to the picture through the creation of synthetic identities that appear legitimate enough to bypass traditional checks.
It’s for this reason that identity and trust are forever bound together. Once a fraudulent identity is created, or a legitimate identity is taken over, every system that depends on that identity is by definition exposed, affecting anything from financial services onboarding and grant access to healthcare administration and public sector procurement.
Building a wall of trust
Securing the national identity environment requires protection of the full ecosystem around identity: the networks, applications, devices, cloud environments, APIs, privileged users and third parties that may interact with sensitive identity systems, which means every connection into that environment must be governed and continuously assessed.
A unified security architecture allows organisations to see more clearly across the full attack surface, bringing together network security, identity protection, cloud security, endpoint protection, threat intelligence and automated response so that suspicious activity can be detected and acted on faster.
For any national identity system, clear visibility is non-negotiable because security teams need to know who is accessing sensitive systems, from where, through which device, and whether that behaviour is normal. If a privileged user account suddenly behaves unusually, if an application attempts to access records outside its expected pattern, or if a third-party integration begins sending abnormal traffic, those signals need to be detected immediately.
The principles of Zero Trust must always apply so that every user, device and system is verified continuously, even when it is already inside the network. This is especially relevant in identity environments, where the highest levels of access should be tightly controlled, monitored and reviewed. Strong encryption, network segmentation, secure API management, privileged access controls, multi-factor authentication, continuous monitoring and AI-powered threat detection all have a role to play.
The ultimate guiding principle, however, is that these controls must work together because a national identity ecosystem cannot be protected effectively if its security is fragmented.
And that’s where Sovereign Secure Access Service Edge (SASE) becomes essential. Sovereign SASE provides the secure “connective tissue” essential for various organisations to collaborate effectively on shared infrastructure. This model replaces scattered, disparate security solutions with a single, centrally managed security framework that is both locally governed and informed by global standards.
Critically, Sovereign SASE extends comprehensive protection to all users, devices, and cloud edges, maintaining it while remaining strictly under South Africa’s jurisdiction and regulatory oversight. This architecture ensures consistent policy enforcement, regardless of location, thereby guaranteeing adherence to local legislation, such as POPIA and FICA, even when private partners are involved in hosting or processing government data.
A milestone built on confidence
South Africa’s digital identity journey should be seen as a very positive step forward. A secure digital Smart ID and biometric identity ecosystem can make services more accessible and also support broader economic participation, all of which makes the responsibility as significant as the opportunity. As identity becomes more central to how the country functions, protecting it becomes a matter of national trust. The future of digital government will depend on keeping systems available while also ensuring the data inside them remains accurate, secure and resilient – to the benefit of all.
- Doros Hadjizenonos, Regional Director – Southern Africa at Fortinet

