• PD CEN/TS 419241:2014

    Superseded A superseded Standard is one, which is fully replaced by another Standard, which is a new edition of the same Standard.

    Security Requirements for Trustworthy Systems Supporting Server Signing

    Available format(s):  Hardcopy

    Superseded date:  16-07-2018

    Language(s):  English

    Published date:  30-04-2014

    Publisher:  British Standards Institution

    Add To Cart

    Table of Contents - (Show below) - (Hide below)

    Foreword
    Introduction
    1 Scope
    2 Normative references
    3 Terms and definitions
    4 Symbols and abbreviations
    5 Description of Trustworthy Systems
      Supporting Server Signing
    6 Security Requirements
    Bibliography

    Abstract - (Show below) - (Hide below)

    Defines security requirements and recommendations for Trustworthy System Supporting Server Signing (TW4S) that generate advanced electronic signatures as defined in Directive 1999/93/EC.

    Scope - (Show below) - (Hide below)

    1.1 General This document specifies security requirements and recommendations for Trustworthy System Supporting Server Signing (TW4S) that generate advanced electronic signatures as defined in Directive 1999/93/EC. This document may also be applied to electronic signatures complying to Article 5(1) of Directive 1999/93/EC employing a Secure Signature Creation Device (SSCD) compliant with Annex III and supported by a qualified electronic signature. The Server Signing Application (SSA) runs on a networked server supporting one or more signatories to remotely sign electronic documents using centralized signature keys held on the signing server under sole control of the signatory. An SSA is intended to deliver to the user or to some other application process in a form specified by the user, an Advanced- or where applicable a Qualified - Electronic Signature associated with a Signer\'s Document as a Signed Data Object. This document: - provides commonly recognized functional models of TW4S; - specifies overall requirements that apply across all of the services identified in the functional model; - specifies security requirements for each of the services identified in the SSA. - specifies security requirements for sensitive system components which may be used by the SSA (e.g. Signature Creation Device (SCDev)). This document does not specify technologies and protocols, but rather identifies requirements on the security on technologies to be employed. 1.2 Out of scope The following aspects are considered to be out of scope: - other trusted services that may be used alongside this service such as signature validation service, time-stamping service and information preservation service, - any application or system outside of the SSA, - the legal interpretation of any form of signature (e.g. the implications of countersignatures, of multiple signatures and of signatures covering complex information structures containing other signatures). 1.3 Audience This document specifies security requirements that are intended to be followed by: - providers of SSA systems. - Trust Service Providers (TSP) offering signature generation service.

    General Product Information - (Show below) - (Hide below)

    Committee IST/17
    Document Type Standard
    Publisher British Standards Institution
    Status Superseded
    Superseded By

    Standards Referencing This Book - (Show below) - (Hide below)

    EN 419251-1:2013 Security requirements for device for authentication - Part 1: Protection profile for core functionality
    FIPS PUB 140-2 : 0 SECURITY REQUIREMENTS FOR CRYPTOGRAPHIC MODULES
    ISO/IEC 19790:2012 Information technology — Security techniques — Security requirements for cryptographic modules
    EN 319 401 : 2.1.1 ELECTRONIC SIGNATURES AND INFRASTRUCTURES (ESI); GENERAL POLICY REQUIREMENTS FOR TRUST SERVICE PROVIDERS
    ISO/IEC 29115:2013 Information technology Security techniques Entity authentication assurance framework
    EN 319 411-2 : 2.1.1 ELECTRONIC SIGNATURES AND INFRASTRUCTURES (ESI); POLICY AND SECURITY REQUIREMENTS FOR TRUST SERVICE PROVIDERS ISSUING CERTIFICATES; PART 2: REQUIREMENTS FOR TRUST SERVICE PROVIDERS ISSUING EU QUALIFIED CERTIFICATES
    TS 101 733 : 2.2.1 ELECTRONIC SIGNATURES AND INFRASTRUCTURES (ESI); CMS ADVANCED ELECTRONIC SIGNATURES (CADES)
    TS 102 853 : 1.2.1 ELECTRONIC SIGNATURES AND INFRASTRUCTURES (ESI); SIGNATURE VALIDATION PROCEDURES AND POLICIES
    EN 319 411-3 : 1.1.1 ELECTRONIC SIGNATURES AND INFRASTRUCTURES (ESI); POLICY AND SECURITY REQUIREMENTS FOR TRUST SERVICE PROVIDERS ISSUING CERTIFICATES; PART 3: POLICY REQUIREMENTS FOR CERTIFICATION AUTHORITIES ISSUING PUBLIC KEY CERTIFICATES
    EN 14890-2:2008 Application Interface for smart cards used as Secure Signature Creation Devices - Part 2: Additional Services
    EN 14890-1:2008 Application Interface for smart cards used as Secure Signature Creation Devices - Part 1: Basic services
    SR 001 604 : 1.1.1 RATIONALISED FRAMEWORK FOR ELECTRONIC SIGNATURE STANDARDISATION
    • Access your standards online with a subscription

      Features

      • Simple online access to standards, technical information and regulations
      • Critical updates of standards and customisable alerts and notifications
      • Multi - user online standards collection: secure, flexibile and cost effective