PREN 419221-5 : DRAFT 2016
Superseded
A superseded Standard is one, which is fully replaced by another Standard, which is a new edition of the same Standard.
PROTECTION PROFILES FOR TRUST SERVICE PROVIDER CRYPTOGRAPHIC MODULES - PART 5: CRYPTOGRAPHIC MODULE FOR TRUST SERVICES
01-05-2018
30-01-2017
European foreword
Introduction
1 Scope
2 Normative references
3 Terms and Definitions
4 Protection Profile
5 Conformance Claim
6 Security Problem Definition
7 Security Objectives
8 Extended Components Definitions
9 Security Requirements
10 Rationales
Annex A (informative) - Acronyms
Annex B (informative) - Mapping to [Regulation]
Bibliography
Defines a Protection Profile for cryptographic modules suitable for use by trust service providers supporting el ectronic signature and electronic sealing operations, certificate issuance and revocation, time stamp operations, and authentication services, as identified by the (EU) No 910/2014 regulation of the European Parliament and of the Council on electronic identification and trust services for electronic transactions in the internal market (eIDAS) in [Regulation].
Committee |
TC 224
|
DocumentType |
Draft
|
PublisherName |
Comite Europeen de Normalisation
|
Status |
Superseded
|
Standards | Relationship |
NF EN 419221-5 : 2017 PR | Identical |
17/30346588 DC : 0 | Identical |
NEN EN 419221-5 : DRAFT 2017 | Identical |
PREN 419241-2 : DRAFT 2017 | TRUSTWORTHY SYSTEMS SUPPORTING SERVER SIGNING - PART 2: PROTECTION PROFILE FOR QSCD FOR SERVER SIGNING |
PREN 419241-1 : DRAFT 2017 | TRUSTWORTHY SYSTEMS SUPPORTING SERVER SIGNING - PART 1: GENERAL SYSTEM SECURITY REQUIREMENTS |
17/30354142 DC : 0 | BS EN 419231 - PROTECTION PROFILE FOR TRUSTWORTHY SYSTEMS SUPPORTING TIME STAMPING |
17/30348282 DC : 0 | BS EN 419241-1 - TRUSTWORTHY SYSTEMS SUPPORTING SERVER SIGNING - PART 1: GENERAL SYSTEM SECURITY REQUIREMENTS |
17/30357420 DC : 0 | BS EN 419241-2 - TRUSTWORTHY SYSTEMS SUPPORTING SERVER SIGNING - PART 2: PROTECTION PROFILE FOR QSCD FOR SERVER SIGNING |
ISO/IEC 15408-2:2008 | Information technology — Security techniques — Evaluation criteria for IT security — Part 2: Security functional components |
ISO/IEC 15408-3:2008 | Information technology — Security techniques — Evaluation criteria for IT security — Part 3: Security assurance components |
ISO/IEC 19790:2012 | Information technology — Security techniques — Security requirements for cryptographic modules |
TS 119 312 : 1.2.1 | ELECTRONIC SIGNATURES AND INFRASTRUCTURES (ESI); CRYPTOGRAPHIC SUITES |
CEN/TS 419241:2014 | Security Requirements for Trustworthy Systems Supporting Server Signing |
ISO/IEC 15408-1:2009 | Information technology — Security techniques — Evaluation criteria for IT security — Part 1: Introduction and general model |
Access your standards online with a subscription
Features
-
Simple online access to standards, technical information and regulations.
-
Critical updates of standards and customisable alerts and notifications.
-
Multi-user online standards collection: secure, flexible and cost effective.