• PD CEN/TS 419261:2015

    Current The latest, up-to-date edition.

    Security requirements for trustworthy systems managing certificates and time-stamps

    Available format(s):  Hardcopy

    Language(s):  English

    Published date:  30-04-2015

    Publisher:  British Standards Institution

    Add To Cart

    Table of Contents - (Show below) - (Hide below)

    Foreword
    Introduction
    1 Scope
    2 Normative references
    3 Terms, definitions, symbols and abbreviations
    4 Description of a Trust Service Provider System
    5 Security Requirements
    Annex A (informative) - Physical security requirements
            for the operational environment
    Annex B (informative) - Network Security Requirements
            for the Operational Environment
    Bibliography

    Abstract - (Show below) - (Hide below)

    Defines security requirements for TWSs that can be used by a TSP in order to issue QCs and Non-Qualified Certificates (NQCs) as well as electronic time-stamps in accordance with Dir.1999/93/EC and with [Reg.910/2014/EU].

    Scope - (Show below) - (Hide below)

    1.1 General This Technical Specification establishes security requirements for TWSs that can be used by a TSP in order to issue QCs and Non-Qualified Certificates (NQCs) as well as electronic time-stamps in accordance with Dir. 1999/93/EC and with [Reg. 910/2014/EU ]. Security requirements for the Subject Device Provision Service, which includes SCDev/QSCD provision to subjects, are defined in this TS. However, requirements specific to SCDev/QSCD devices, as used by subjects of the TSP, are outside the scope of this TS. These requirements are defined as Common Criteria [CC] Protection Profiles (PP) in the EN419211 series. Recommendations for the cryptographic algorithms to be supported by TWSs are provided in ETSI/TS119312 . Although this TS is based on the use of public key cryptography, it does not require or define any particular communication protocol or format for electronic signatures, certificates, certificate revocation lists, certificate status information and time-stamp tokens. It only assumes certain types of information to be present in the certificates in accordance with AnnexI of Dir. 1999/93/EC and of [Reg. 910/2014/EU ]. Interoperability between TSP systems and subject systems is outside the scope of this document. The use of TWSs that are already compliant to relevant security requirements of this TS should support TSPs in reducing their burden to establish conformance of their policy to ETSITS119411‑1 , 119411-2, and 119421 (or equivalent ENs to be subsequently published) and in meeting the AnnexI and AnnexII requirements of Dir. 1999/93/EC as well as the requirements from AnnexI and Article24.2 (e) of [Reg. 910/2014/EU ]. 1.2 European Regulation-specific The main focus of this document is on the requirements in Article24.2 (e) of [Reg. 910/2014/EU ] whilst still facilitating the meeting of requirements in Dir. 1999/93/EC , AnnexII (f). In considering [Reg. 910/2014/EU ] it is important to take into account the following requirements of particular relevance to TSP trustworthy systems: Article24.2 (f) – “use trustworthy systems to store data provided to it, in a verifiable form so that: they are publicly available for retrieval only where the consent of the person to whom the data relates has been obtained, only authorised persons can make entries and changes to the stored data, the data can be checked for authenticity??; Article24.2 (g) – “take appropriate measures against forgery and theft of data??; Article24.2 (h) – “record and keep accessible for an appropriate period of time, including after the activities of the qualified trust service provider have ceased, all relevant information concerning data issued and received by the qualified trust service provider, in particular, for the purpose of providing evidence in legal proceedings and for the purpose of ensuring continuity of the service. Such recording may be done electronically??; Article24.2 (j) – “ensure lawful processing of personal data in accordance with Directive 95/46/EC ??; Article24.2 (k) – “in case of qualified trust service providers issuing qualified certificates, establish and keep updated a certificate database??; Article24.3– “If a qualified trust service provider issuing qualified certificates decides to revoke a certificate, it shall register such revocation in its certificate database and publish the revocation status of the certificate in a timely manner, and in any event within 24 hours after the receipt of the request. The revocation shall become effective immediately upon its publication??; Article24.4– \'With regard to paragraph3, qualified trust service providers issuing qualified certificates shall provide to any relying party information on the validity or revocation status of qualified certificates issued by them. This information shall be made available at least on a per certificate basis at any time and beyond the validity period of the certificate in an automated manner that is reliable, free of charge and efficient??; Article42.1– “A qualified electronic time stamp shall meet the following requirements: it binds the date and time to data in such a manner as to reasonably preclude the possibility of the data being changed undetectably; it is based on an accurate time source linked to Coordinated Universal Time; and it is signed using an advanced electronic signature or sealed with an advanced electronic seal of the qualified trust service provider, or by some equivalent method??; AnnexesI, III, IV – requirements on data in qualified certificates

    General Product Information - (Show below) - (Hide below)

    Committee IST/17
    Document Type Standard
    Publisher British Standards Institution
    Status Current

    Standards Referencing This Book - (Show below) - (Hide below)

    EN 1627:2011 Pedestrian doorsets, windows, curtain walling, grilles and shutters - Burglar resistance - Requirements and classification
    ISO/IEC 19790:2012 Information technology Security techniques Security requirements for cryptographic modules
    EN 319 401 : 2.1.1 ELECTRONIC SIGNATURES AND INFRASTRUCTURES (ESI); GENERAL POLICY REQUIREMENTS FOR TRUST SERVICE PROVIDERS
    TS 119 411-1 : 1.0.1 ELECTRONIC SIGNATURES AND INFRASTRUCTURES (ESI); POLICY AND SECURITY REQUIREMENTS FOR TRUST SERVICE PROVIDERS ISSUING CERTIFICATES; PART 1: GENERAL REQUIREMENTS
    TS 119 312 : 1.2.1 ELECTRONIC SIGNATURES AND INFRASTRUCTURES (ESI); CRYPTOGRAPHIC SUITES
    ISO/IEC 9594-8:2017 Information technology Open Systems Interconnection The Directory Part 8: Public-key and attribute certificate frameworks
    TS 119 421 : 1.0.1 ELECTRONIC SIGNATURES AND INFRASTRUCTURES (ESI); POLICY AND SECURITY REQUIREMENTS FOR TRUST SERVICE PROVIDERS ISSUING TIME-STAMPS
    ISO 7498-2:1989 Information processing systems Open Systems Interconnection Basic Reference Model Part 2: Security Architecture
    ISO/IEC 10118-1:2016 Information technology Security techniques Hash-functions Part 1: General
    TS 119 411-2 : 2.0.7 ELECTRONIC SIGNATURES AND INFRASTRUCTURES (ESI); POLICY AND SECURITY REQUIREMENTS FOR TRUST SERVICE PROVIDERS ISSUING CERTIFICATES; PART 2: REQUIREMENTS FOR TRUST SERVICE PROVIDERS ISSUING EU QUALIFIED CERTIFICATES
    ISO/IEC 9798-1:2010 Information technology Security techniques Entity authentication Part 1: General
    • Access your standards online with a subscription

      Features

      • Simple online access to standards, technical information and regulations
      • Critical updates of standards and customisable alerts and notifications
      • Multi - user online standards collection: secure, flexibile and cost effective