• There are no items in your cart
We noticed you’re not on the correct regional site. Switch to our AMERICAS site for the best experience.
Dismiss alert

BS ISO 21188:2006

Current

Current

The latest, up-to-date edition.

Public key infrastructure for financial services. Practices and policy framework

Available format(s)

Hardcopy , PDF

Language(s)

English

Published date

30-06-2006

Foreword
Introduction
1 Scope
2 Normative references
3 Terms and definitions
4 Abbreviated terms
5 Public key infrastructure (PKI)
6 Certificate policy and certification practice statement
  requirements
7 Certification authority control procedures
Annex A (informative) - Management by certificate policy
Annex B (informative) - Elements of a certification practice
        statement
Annex C (informative) - Object identifiers (OID)
Annex D (informative) - CA key generation ceremony
Annex E (informative) - Mapping of RFC 2527 to RFC 3647
Annex F (normative) - Certification authority audit journal
        contents and use
Annex G (informative) - Alternative trust models
Bibliography

Describes a framework of requirements to manage a PKI through certificate policies and certification practice statements and to enable the use of public key certificates in the financial services industry.

Committee
IST/12
DevelopmentNote
Supersedes 05/30092187 DC (07/2006) Supersedes 17/30281253 DC. (05/2018)
DocumentType
Standard
Pages
116
PublisherName
British Standards Institution
Status
Current
SupersededBy
Supersedes

Standards Relationship
ISO 21188:2006 Identical
ISO 21188:2018 Identical

ISO/IEC 18033-1:2015 Information technology Security techniques Encryption algorithms Part 1: General
ISO/IEC 18032:2005 Information technology Security techniques Prime number generation
ISO/IEC 18014-3:2009 Information technology Security techniques Time-stamping services Part 3: Mechanisms producing linked tokens
ISO/IEC 15945:2002 Information technology — Security techniques — Specification of TTP services to support the application of digital signatures
ISO/IEC 7813:2006 Information technology Identification cards Financial transaction cards
ISO/IEC 9834-1:2012 Information technology — Procedures for the operation of object identifier registration authorities — Part 1: General procedures and top arcs of the international object identifier tree
ISO/IEC 18033-2:2006 Information technology — Security techniques — Encryption algorithms — Part 2: Asymmetric ciphers
ISO/IEC 18033-3:2010 Information technology Security techniques Encryption algorithms Part 3: Block ciphers
ISO/IEC 18014-2:2009 Information technology Security techniques Time-stamping services Part 2: Mechanisms producing independent tokens
ISO 13491-1:2016 Financial services — Secure cryptographic devices (retail) — Part 1: Concepts, requirements and evaluation methods
FIPS PUB 140-2 : 0 SECURITY REQUIREMENTS FOR CRYPTOGRAPHIC MODULES
ISO/IEC 19790:2012 Information technology — Security techniques — Security requirements for cryptographic modules
ISO/IEC 27002:2013 Information technology Security techniques Code of practice for information security controls
ISO/IEC 8824:1990 Information technology — Open Systems Interconnection — Specification of Abstract Syntax Notation One (ASN.1)
ISO/TR 13569:2005 Financial services Information security guidelines
ISO/IEC 9594-8:2017 Information technology Open Systems Interconnection The Directory Part 8: Public-key and attribute certificate frameworks
TS 101 456 : 1.4.3 ELECTRONIC SIGNATURES AND INFRASTRUCTURES (ESI); POLICY REQUIREMENTS FOR CERTIFICATION AUTHORITIES ISSUING QUALIFIED CERTIFICATES
ISO/IEC 10118-3:2004 Information technology Security techniques Hash-functions Part 3: Dedicated hash-functions
ISO/IEC 7810:2003 Identification cards Physical characteristics
ISO/IEC 10646-1:2000 Information technology Universal Multiple-Octet Coded Character Set (UCS) Part 1: Architecture and Basic Multilingual Plane
TS 102 042 : 2.4.1 ELECTRONIC SIGNATURES AND INFRASTRUCTURES (ESI); POLICY REQUIREMENTS FOR CERTIFICATION AUTHORITIES ISSUING PUBLIC KEY CERTIFICATES
ISO/IEC 18033-4:2011 Information technology — Security techniques — Encryption algorithms — Part 4: Stream ciphers

Access your standards online with a subscription

Features

  • Simple online access to standards, technical information and regulations.

  • Critical updates of standards and customisable alerts and notifications.

  • Multi-user online standards collection: secure, flexible and cost effective.