Customer Support: 131 242

  • There are no items in your cart
We noticed you’re not on the correct regional site. Switch to our AMERICAS site for the best experience.
Dismiss alert

EN 419221-5:2018

Current

Current

The latest, up-to-date edition.

Protection Profiles for TSP Cryptographic Modules - Part 5: Cryptographic Module for Trust Services

Published date

02-05-2018

Sorry this product is not available in your region.

European foreword
Introduction
1 Scope
2 Normative references
3 Terms and definitions
4 Protection Profile
5 Conformance Claim
6 Security Problem Definition
7 Security Objectives
8 Extended Components Definitions
9 Security Requirements
10 Rationales
Annex A (informative) - Mapping to Regulation
        (EU) 910/2014
Bibliography

This part of EN 419221 specifies a Protection Profile for cryptographic modules suitable for use by trust service providers supporting electronic signature and electronic sealing operations, certificate issuance and revocation, time stamp operations, and authentication services, as identified by the (EU) No 910/2014 regulation of the European Parliament and of the Council on electronic identification and trust services for electronic transactions in the internal market (eIDAS) in [Regulation]. The Protection Profile also includes optional support for protected backup of keys.The document follows the rules and conventions laid out in Common Criteria part 1 [CC1], Annex B "Specification of Protection Profiles".

Committee
CEN/TC 224
DevelopmentNote
Supersedes PREN 419221-5. (05/2018)
DocumentType
Standard
PublisherName
Comite Europeen de Normalisation
Status
Current

Standards Relationship
I.S. EN 419221-5:2018 Identical
PN EN 419221-5 : 2018 Identical
UNI EN 419221-5:2018 Identical
UNE-EN 419221-5:2018 Identical
DIN EN 419221-5:2018-07 Identical
BS EN 419221-5:2018 Identical

ISO/IEC 15408-2:2008 Information technology — Security techniques — Evaluation criteria for IT security — Part 2: Security functional components
I.S. CWA 14170:2004 SECURITY REQUIREMENTS FOR SIGNATURE CREATION APPLICATIONS
I.S. CWA 14167-1:2002 SECURITY REQUIREMENTS FOR TRUSTWORTHY SYSTEMS MANAGING CERTIFICATES FOR ELECTRONIC SIGNATURES - PART 1: SYSTEM SECURITY REQUIREMENTS
PREN 419241-1 : DRAFT 2017 TRUSTWORTHY SYSTEMS SUPPORTING SERVER SIGNING - PART 1: GENERAL SYSTEM SECURITY REQUIREMENTS
ISO/IEC 15408-3:2008 Information technology — Security techniques — Evaluation criteria for IT security — Part 3: Security assurance components
ISO/IEC 19790:2012 Information technology — Security techniques — Security requirements for cryptographic modules
TS 119 312 : 1.2.1 ELECTRONIC SIGNATURES AND INFRASTRUCTURES (ESI); CRYPTOGRAPHIC SUITES
PREN 419241-2 : DRAFT 2017 TRUSTWORTHY SYSTEMS SUPPORTING SERVER SIGNING - PART 2: PROTECTION PROFILE FOR QSCD FOR SERVER SIGNING
ISO/IEC 15408-1:2009 Information technology — Security techniques — Evaluation criteria for IT security — Part 1: Introduction and general model

Access your standards online with a subscription

Features

  • Simple online access to standards, technical information and regulations.

  • Critical updates of standards and customisable alerts and notifications.

  • Multi-user online standards collection: secure, flexible and cost effective.

Need help?
Call us on 131 242, then click here to start a Screen Sharing session
so we can help right away! Learn more