EN 419221-5:2018
Current
The latest, up-to-date edition.
Protection Profiles for TSP Cryptographic Modules - Part 5: Cryptographic Module for Trust Services
02-05-2018
European foreword
Introduction
1 Scope
2 Normative references
3 Terms and definitions
4 Protection Profile
5 Conformance Claim
6 Security Problem Definition
7 Security Objectives
8 Extended Components Definitions
9 Security Requirements
10 Rationales
Annex A (informative) - Mapping to Regulation
(EU) 910/2014
Bibliography
This part of EN 419221 specifies a Protection Profile for cryptographic modules suitable for use by trust service providers supporting electronic signature and electronic sealing operations, certificate issuance and revocation, time stamp operations, and authentication services, as identified by the (EU) No 910/2014 regulation of the European Parliament and of the Council on electronic identification and trust services for electronic transactions in the internal market (eIDAS) in [Regulation]. The Protection Profile also includes optional support for protected backup of keys.The document follows the rules and conventions laid out in Common Criteria part 1 [CC1], Annex B "Specification of Protection Profiles".
Committee |
CEN/TC 224
|
DevelopmentNote |
Supersedes PREN 419221-5. (05/2018)
|
DocumentType |
Standard
|
PublisherName |
Comite Europeen de Normalisation
|
Status |
Current
|
Standards | Relationship |
I.S. EN 419221-5:2018 | Identical |
PN EN 419221-5 : 2018 | Identical |
UNI EN 419221-5:2018 | Identical |
UNE-EN 419221-5:2018 | Identical |
DIN EN 419221-5:2018-07 | Identical |
BS EN 419221-5:2018 | Identical |
ISO/IEC 15408-2:2008 | Information technology — Security techniques — Evaluation criteria for IT security — Part 2: Security functional components |
I.S. CWA 14170:2004 | SECURITY REQUIREMENTS FOR SIGNATURE CREATION APPLICATIONS |
I.S. CWA 14167-1:2002 | SECURITY REQUIREMENTS FOR TRUSTWORTHY SYSTEMS MANAGING CERTIFICATES FOR ELECTRONIC SIGNATURES - PART 1: SYSTEM SECURITY REQUIREMENTS |
PREN 419241-1 : DRAFT 2017 | TRUSTWORTHY SYSTEMS SUPPORTING SERVER SIGNING - PART 1: GENERAL SYSTEM SECURITY REQUIREMENTS |
ISO/IEC 15408-3:2008 | Information technology — Security techniques — Evaluation criteria for IT security — Part 3: Security assurance components |
ISO/IEC 19790:2012 | Information technology — Security techniques — Security requirements for cryptographic modules |
TS 119 312 : 1.2.1 | ELECTRONIC SIGNATURES AND INFRASTRUCTURES (ESI); CRYPTOGRAPHIC SUITES |
PREN 419241-2 : DRAFT 2017 | TRUSTWORTHY SYSTEMS SUPPORTING SERVER SIGNING - PART 2: PROTECTION PROFILE FOR QSCD FOR SERVER SIGNING |
ISO/IEC 15408-1:2009 | Information technology — Security techniques — Evaluation criteria for IT security — Part 1: Introduction and general model |
Access your standards online with a subscription
Features
-
Simple online access to standards, technical information and regulations.
-
Critical updates of standards and customisable alerts and notifications.
-
Multi-user online standards collection: secure, flexible and cost effective.