I.S. EN 419221-5:2018
Current
The latest, up-to-date edition.
PROTECTION PROFILES FOR TSP CRYPTOGRAPHIC MODULES - PART 5: CRYPTOGRAPHIC MODULE FOR TRUST SERVICES
Hardcopy , PDF
English
17-06-2018
For Harmonized Standards, check the EU site to confirm that the Standard is cited in the Official Journal.
Only cited Standards give presumption of conformance to New Approach Directives/Regulations.
National Foreword
European foreword
Introduction
1 Scope
2 Normative references
3 Terms and definitions
4 Protection Profile
5 Conformance Claim
6 Security Problem Definition
7 Security Objectives
8 Extended Components Definitions
9 Security Requirements
10 Rationales
Annex A (informative) - Mapping to Regulation
(EU) 910/2014
Bibliography
Defines a Protection Profile for cryptographic modules suitable for use by trust service providers supporting electronic signature and electronic sealing operations, certificate issuance and revocation, time stamp operations, and authentication services, as identified by the (EU) No 910/2014 regulation of the European Parliament and of the Council on electronic identification and trust services for electronic transactions in the internal market (eIDAS) in [Regulation].
Committee |
TC 224
|
DocumentType |
Standard
|
Pages |
84
|
ProductNote |
The date of any NSAI previous adoption may not match the date of its original CEN/CENELECdocument. This standard also refer to ETSI/TS 119 312,EN 419241-1,EN 419241-2
|
PublisherName |
National Standards Authority of Ireland
|
Status |
Current
|
Standards | Relationship |
EN 419221-5:2018 | Identical |
ISO/IEC 15408-2:2008 | Information technology — Security techniques — Evaluation criteria for IT security — Part 2: Security functional components |
I.S. CWA 14170:2004 | SECURITY REQUIREMENTS FOR SIGNATURE CREATION APPLICATIONS |
I.S. CWA 14167-1:2002 | SECURITY REQUIREMENTS FOR TRUSTWORTHY SYSTEMS MANAGING CERTIFICATES FOR ELECTRONIC SIGNATURES - PART 1: SYSTEM SECURITY REQUIREMENTS |
PREN 419241-1 : DRAFT 2017 | TRUSTWORTHY SYSTEMS SUPPORTING SERVER SIGNING - PART 1: GENERAL SYSTEM SECURITY REQUIREMENTS |
ISO/IEC 15408-3:2008 | Information technology — Security techniques — Evaluation criteria for IT security — Part 3: Security assurance components |
ISO/IEC 19790:2012 | Information technology — Security techniques — Security requirements for cryptographic modules |
TS 119 312 : 1.2.1 | ELECTRONIC SIGNATURES AND INFRASTRUCTURES (ESI); CRYPTOGRAPHIC SUITES |
PREN 419241-2 : DRAFT 2017 | TRUSTWORTHY SYSTEMS SUPPORTING SERVER SIGNING - PART 2: PROTECTION PROFILE FOR QSCD FOR SERVER SIGNING |
ISO/IEC 15408-1:2009 | Information technology — Security techniques — Evaluation criteria for IT security — Part 1: Introduction and general model |
Access your standards online with a subscription
Features
-
Simple online access to standards, technical information and regulations.
-
Critical updates of standards and customisable alerts and notifications.
-
Multi-user online standards collection: secure, flexible and cost effective.