EN 319 411-2 : 2.2.2
Superseded
A superseded Standard is one, which is fully replaced by another Standard, which is a new edition of the same Standard.
ELECTRONIC SIGNATURES AND INFRASTRUCTURES (ESI); POLICY AND SECURITY REQUIREMENTS FOR TRUST SERVICE PROVIDERS ISSUING CERTIFICATES; PART 2: REQUIREMENTS FOR TRUST SERVICE PROVIDERS ISSUING EU QUALIFIED CERTIFICATES
27-05-2021
12-01-2013
Intellectual Property Rights
Foreword
Introduction
1 Scope
2 References
3 Definitions and abbreviations
4 General concepts
5 Introduction to qualified certificate policies
6 Obligations and liability
7 Requirements on CA practice
8 Framework for the definition of other qualified
certificate policies
Annex A (informative) - Potential liability in the use of
electronic signatures
Annex B (informative) - Model PKI disclosure statement
Annex C (informative) - Electronic signature Directive and
qualified certificate policy cross-reference
Annex D (informative) - IETF RFC 3647 and qualified
certificate policy cross-reference
Annex E (informative) - Revisions made since TS 101 456
version 1.4.3 (2007-05)
Annex F (informative) - Bibliography
History
Describes policy and security requirements for the issuance, maintenance and life-cycle management of EU qualified certificates as defined in Regulation (EU) No 910/2014.
Committee |
ESI
|
DocumentType |
Standard
|
PublisherName |
European Telecommunications Standards Institute
|
Status |
Superseded
|
Standards | Relationship |
PN EN 319 411-2 : 2016 | Identical |
NF EN 319411-2 : 2016 | Identical |
DIN EN 319411-2:2016-07 | Identical |
NBN EN 319 411-2 : 2013 | Identical |
OVE/ONORM EN 319411-2 : 2.1.1 | Identical |
NF EN 319411-2:2023 | Identical |
DS/ETSI EN 319 411-2 V2.5.1:2023 | Identical |
ISO/IEC 15408-2:2008 | Information technology — Security techniques — Evaluation criteria for IT security — Part 2: Security functional components |
ISO/IEC 15408-3:2008 | Information technology — Security techniques — Evaluation criteria for IT security — Part 3: Security assurance components |
FIPS PUB 140-2 : 0 | SECURITY REQUIREMENTS FOR CRYPTOGRAPHIC MODULES |
EN 319 401 : 2.1.1 | ELECTRONIC SIGNATURES AND INFRASTRUCTURES (ESI); GENERAL POLICY REQUIREMENTS FOR TRUST SERVICE PROVIDERS |
ISO/IEC 27002:2013 | Information technology Security techniques Code of practice for information security controls |
ISO/IEC 9594-8:2017 | Information technology Open Systems Interconnection The Directory Part 8: Public-key and attribute certificate frameworks |
TS 101 456 : 1.4.3 | ELECTRONIC SIGNATURES AND INFRASTRUCTURES (ESI); POLICY REQUIREMENTS FOR CERTIFICATION AUTHORITIES ISSUING QUALIFIED CERTIFICATES |
ANSI X9.79-1 : 2001 | FINANCIAL SERVICES PUBLIC KEY INFRASTRUCTURE - PART 1: PKI PRACTICES AND POLICY FRAMEWORK |
ISO/IEC 15408-1:2009 | Information technology — Security techniques — Evaluation criteria for IT security — Part 1: Introduction and general model |
TS 119 403 : 2.2.1 | ELECTRONIC SIGNATURES AND INFRASTRUCTURES (ESI); TRUST SERVICE PROVIDER CONFORMITY ASSESSMENT - REQUIREMENTS FOR CONFORMITY ASSESSMENT BODIES ASSESSING TRUST SERVICE PROVIDERS |
EN 319 412-5 : 2.2.1 | ELECTRONIC SIGNATURES AND INFRASTRUCTURES (ESI); CERTIFICATE PROFILES; PART 5: QCSTATEMENTS |
TS 102 176-1 : 2.1.1 | ELECTRONIC SIGNATURES AND INFRASTRUCTURES (ESI); ALGORITHMS AND PARAMETERS FOR SECURE ELECTRONIC SIGNATURES; PART 1: HASH FUNCTIONS AND ASYMMETRIC ALGORITHMS |
EN 319 411-1 : 1.1.1 | ELECTRONIC SIGNATURES AND INFRASTRUCTURES (ESI); POLICY AND SECURITY REQUIREMENTS FOR TRUST SERVICE PROVIDERS ISSUING CERTIFICATES; PART 1: GENERAL REQUIREMENTS |
Access your standards online with a subscription
Features
-
Simple online access to standards, technical information and regulations.
-
Critical updates of standards and customisable alerts and notifications.
-
Multi-user online standards collection: secure, flexible and cost effective.