• Shopping Cart
    There are no items in your cart

PREN 419221-5 : DRAFT 2016

Superseded

Superseded

A superseded Standard is one, which is fully replaced by another Standard, which is a new edition of the same Standard.

PROTECTION PROFILES FOR TRUST SERVICE PROVIDER CRYPTOGRAPHIC MODULES - PART 5: CRYPTOGRAPHIC MODULE FOR TRUST SERVICES

Superseded date

01-05-2018

Published date

30-01-2017

Sorry this product is not available in your region.

European foreword
Introduction
1 Scope
2 Normative references
3 Terms and Definitions
4 Protection Profile
5 Conformance Claim
6 Security Problem Definition
7 Security Objectives
8 Extended Components Definitions
9 Security Requirements
10 Rationales
Annex A (informative) - Acronyms
Annex B (informative) - Mapping to [Regulation]
Bibliography

Defines a Protection Profile for cryptographic modules suitable for use by trust service providers supporting el ectronic signature and electronic sealing operations, certificate issuance and revocation, time stamp operations, and authentication services, as identified by the (EU) No 910/2014 regulation of the European Parliament and of the Council on electronic identification and trust services for electronic transactions in the internal market (eIDAS) in [Regulation].

Committee
TC 224
DocumentType
Draft
PublisherName
Comite Europeen de Normalisation
Status
Superseded

Standards Relationship
NF EN 419221-5 : 2017 PR Identical
17/30346588 DC : 0 Identical
NEN EN 419221-5 : DRAFT 2017 Identical

PREN 419241-2 : DRAFT 2017 TRUSTWORTHY SYSTEMS SUPPORTING SERVER SIGNING - PART 2: PROTECTION PROFILE FOR QSCD FOR SERVER SIGNING
PREN 419241-1 : DRAFT 2017 TRUSTWORTHY SYSTEMS SUPPORTING SERVER SIGNING - PART 1: GENERAL SYSTEM SECURITY REQUIREMENTS
17/30354142 DC : 0 BS EN 419231 - PROTECTION PROFILE FOR TRUSTWORTHY SYSTEMS SUPPORTING TIME STAMPING
17/30348282 DC : 0 BS EN 419241-1 - TRUSTWORTHY SYSTEMS SUPPORTING SERVER SIGNING - PART 1: GENERAL SYSTEM SECURITY REQUIREMENTS
17/30357420 DC : 0 BS EN 419241-2 - TRUSTWORTHY SYSTEMS SUPPORTING SERVER SIGNING - PART 2: PROTECTION PROFILE FOR QSCD FOR SERVER SIGNING

ISO/IEC 15408-2:2008 Information technology — Security techniques — Evaluation criteria for IT security — Part 2: Security functional components
ISO/IEC 15408-3:2008 Information technology — Security techniques — Evaluation criteria for IT security — Part 3: Security assurance components
ISO/IEC 19790:2012 Information technology — Security techniques — Security requirements for cryptographic modules
TS 119 312 : 1.2.1 ELECTRONIC SIGNATURES AND INFRASTRUCTURES (ESI); CRYPTOGRAPHIC SUITES
CEN/TS 419241:2014 Security Requirements for Trustworthy Systems Supporting Server Signing
ISO/IEC 15408-1:2009 Information technology — Security techniques — Evaluation criteria for IT security — Part 1: Introduction and general model

Access your standards online with a subscription

Features

  • Simple online access to standards, technical information and regulations.

  • Critical updates of standards and customisable alerts and notifications.

  • Multi-user online standards collection: secure, flexible and cost effective.