Customer Support: 131 242

  • Shopping Cart
    There are no items in your cart
We noticed you’re not on the correct regional site. Switch to our AMERICAS site for the best experience.
Dismiss alert

TS 102 573 : 2.1.1

Current

Current

The latest, up-to-date edition.

ELECTRONIC SIGNATURES AND INFRASTRUCTURES (ESI); POLICY REQUIREMENTS FOR TRUST SERVICE PROVIDERS SIGNING AND/OR STORING DATA OBJECTS

Available format(s)

Hardcopy , PDF

Language(s)

English

$43.16
Including GST where applicable

Intellectual Property Rights
Foreword
Introduction
1 Scope
2 References
3 Definitions and abbreviations
4 Notation
5 General concepts
6 Obligations
Annex A (normative) - Objectives and controls
        - signature and storage
Annex B (normative) - Objectives and controls
        - information security management
Annex C (informative) - Change history
History

Defines policy requirements applicable to Trusted Service Providers (TSP) that electronically sign and/or store data objects on behalf of their customers.

Committee
ESI
DocumentType
Standard
Pages
28
PublisherName
European Telecommunications Standards Institute
Status
Current

TR 101 533-2 : 1.3.1 ELECTRONIC SIGNATURES AND INFRASTRUCTURES (ESI); DATA PRESERVATION SYSTEMS SECURITY; PART 2: GUIDELINES FOR ASSESSORS
S.R. CWA 16460:2012 GOOD PRACTICE: E-INVOICING COMPLIANCE GUIDELINES - THE COMMENTARY
UNI/TS 11465-1 : 2012 ELECTRONIC SIGNATURES AND INFRASTRUCTURES (ESI) - DATA PRESERVATION SYSTEMS SECURITY - PART 1: REQUIREMENTS FOR IMPLEMENTATION AND MANAGEMENT
UNI/TS 11465-3 : 2013 Electronic Signatures and Infrastructures (ESI) - Security in Data Retention - Italian complement to ETSI TS 101 533-1 and ETSI TR 101 533-2
UNI/TR 11465-2 : 2012 ELECTRONIC SIGNATURES AND INFRASTRUCTURES (ESI) - DATA PRESERVATION SYSTEMS SECURITY - PART 2: GUIDELINES FOR ASSESSORS

ISO/IEC 15408-2:2008 Information technology — Security techniques — Evaluation criteria for IT security — Part 2: Security functional components
ISO/IEC 27001:2013 Information technology — Security techniques — Information security management systems — Requirements
TS 102 734 : 1.1.1 ELECTRONIC SIGNATURES AND INFRASTRUCTURES; PROFILES OF CMS ADVANCED ELECTRONIC SIGNATURES BASED ON TS 101 733 (CADES)
ISO/IEC 15408-3:2008 Information technology — Security techniques — Evaluation criteria for IT security — Part 3: Security assurance components
TR 102 572 : 1.1.1 BEST PRACTICES FOR HANDLING ELECTRONIC SIGNATURES AND SIGNED DATA FOR DIGITAL ACCOUNTING
ISO/IEC 27002:2013 Information technology Security techniques Code of practice for information security controls
TS 102 904 : 1.1.1 ELECTRONIC SIGNATURES AND INFRASTRUCTURES; PROFILES OF XML ADVANCED ELECTRONIC SIGNATURES BASED ON TS 101 903 (XADES)
TR 101 533-2 : 1.3.1 ELECTRONIC SIGNATURES AND INFRASTRUCTURES (ESI); DATA PRESERVATION SYSTEMS SECURITY; PART 2: GUIDELINES FOR ASSESSORS
TS 101 733 : 2.2.1 ELECTRONIC SIGNATURES AND INFRASTRUCTURES (ESI); CMS ADVANCED ELECTRONIC SIGNATURES (CADES)
TS 101 456 : 1.4.3 ELECTRONIC SIGNATURES AND INFRASTRUCTURES (ESI); POLICY REQUIREMENTS FOR CERTIFICATION AUTHORITIES ISSUING QUALIFIED CERTIFICATES
ISO/IEC 15408-1:2009 Information technology — Security techniques — Evaluation criteria for IT security — Part 1: Introduction and general model
TS 102 778 : 1.1.1 ELECTRONIC SIGNATURES AND INFRASTRUCTURES (ESI); PDF ADVANCED ELECTRONIC SIGNATURE PROFILES; CMS PROFILE BASED ON ISO 32000-1
TS 101 903 : 1.4.2 ELECTRONIC SIGNATURES AND INFRASTRUCTURES (ESI); XML ADVANCED ELECTRONIC SIGNATURES (XADES)
TS 102 042 : 2.4.1 ELECTRONIC SIGNATURES AND INFRASTRUCTURES (ESI); POLICY REQUIREMENTS FOR CERTIFICATION AUTHORITIES ISSUING PUBLIC KEY CERTIFICATES
TS 101 533-1 : 1.3.1 ELECTRONIC SIGNATURES AND INFRASTRUCTURES (ESI); DATA PRESERVATION SYSTEMS SECURITY; PART 1: REQUIREMENTS FOR IMPLEMENTATION AND MANAGEMENT
TS 102 918 : 1.3.1 ELECTRONIC SIGNATURES AND INFRASTRUCTURES (ESI); ASSOCIATED SIGNATURE CONTAINERS (ASIC)
TS 102 176-1 : 2.1.1 ELECTRONIC SIGNATURES AND INFRASTRUCTURES (ESI); ALGORITHMS AND PARAMETERS FOR SECURE ELECTRONIC SIGNATURES; PART 1: HASH FUNCTIONS AND ASYMMETRIC ALGORITHMS

Access your standards online with a subscription

Features

  • Simple online access to standards, technical information and regulations.

  • Critical updates of standards and customisable alerts and notifications.

  • Multi-user online standards collection: secure, flexible and cost effective.