PREN 419241-2 : DRAFT 2017
Current
The latest, up-to-date edition.
TRUSTWORTHY SYSTEMS SUPPORTING SERVER SIGNING - PART 2: PROTECTION PROFILE FOR QSCD FOR SERVER SIGNING
29-05-2017
EUROPEAN FOREWORD
INTRODUCTION
1 SCOPE
2 NORMATIVE REFERENCES
3 TERMS, DEFINITIONS, SYMBOLS AND
ABBREVIATIONS
4 INTRODUCTION
5 CONFORMANCE CLAIM
6 SECURITY PROBLEM DEFINITION
7 SECURITY OBJECTIVES
8 EXTENDED COMPONENTS DEFINITIONS -
GENERATION OF RANDOM NUMBERS (FCS_RNG)
9 SECURITY REQUIREMENTS
10 RATIONALE
BibLIOGRAPHY
Defines a protection profile for a Signature Activation Module (SAM), which is aimed to meet the requirements of a QSCD as specified in Regulation (EU) No 910/2014 eIDAS.
| Committee |
TC 224
|
| DocumentType |
Draft
|
| PublisherName |
Comite Europeen de Normalisation
|
| Status |
Current
|
| Standards | Relationship |
| NEN EN 419241-2 : DRAFT 2017 | Identical |
| DIN EN 419241-2:2017-06 (Draft) | Identical |
| 17/30357420 DC : 0 | Identical |
| 17/30357420 DC : DRAFT MAY 2017 | Identical |
| DIN EN 419241-2:2019-05 | Identical |
| I.S. EN 419221-5:2018 | PROTECTION PROFILES FOR TSP CRYPTOGRAPHIC MODULES - PART 5: CRYPTOGRAPHIC MODULE FOR TRUST SERVICES |
| EN 419221-5:2018 | Protection Profiles for TSP Cryptographic Modules - Part 5: Cryptographic Module for Trust Services |
| ISO/IEC 15408-2:2008 | Information technology — Security techniques — Evaluation criteria for IT security — Part 2: Security functional components |
| PREN 419241-1 : DRAFT 2017 | TRUSTWORTHY SYSTEMS SUPPORTING SERVER SIGNING - PART 1: GENERAL SYSTEM SECURITY REQUIREMENTS |
| PREN 419221-5 : DRAFT 2016 | PROTECTION PROFILES FOR TRUST SERVICE PROVIDER CRYPTOGRAPHIC MODULES - PART 5: CRYPTOGRAPHIC MODULE FOR TRUST SERVICES |
| ISO/IEC 15408-3:2008 | Information technology — Security techniques — Evaluation criteria for IT security — Part 3: Security assurance components |
| ISO/IEC 19790:2012 | Information technology — Security techniques — Security requirements for cryptographic modules |
| ISO/IEC 15408-1:2009 | Information technology — Security techniques — Evaluation criteria for IT security — Part 1: Introduction and general model |
Access your standards online with a subscription
-
Simple online access to standards, technical information and regulations.
-
Critical updates of standards and customisable alerts and notifications.
-
Multi-user online standards collection: secure, flexible and cost effective.