BS ISO 21188:2006
Current
The latest, up-to-date edition.
Public key infrastructure for financial services. Practices and policy framework
Hardcopy , PDF
English
30-06-2006
Foreword
Introduction
1 Scope
2 Normative references
3 Terms and definitions
4 Abbreviated terms
5 Public key infrastructure (PKI)
6 Certificate policy and certification practice statement
requirements
7 Certification authority control procedures
Annex A (informative) - Management by certificate policy
Annex B (informative) - Elements of a certification practice
statement
Annex C (informative) - Object identifiers (OID)
Annex D (informative) - CA key generation ceremony
Annex E (informative) - Mapping of RFC 2527 to RFC 3647
Annex F (normative) - Certification authority audit journal
contents and use
Annex G (informative) - Alternative trust models
Bibliography
Describes a framework of requirements to manage a PKI through certificate policies and certification practice statements and to enable the use of public key certificates in the financial services industry.
Committee |
IST/12
|
DevelopmentNote |
Supersedes 05/30092187 DC (07/2006) Supersedes 17/30281253 DC. (05/2018)
|
DocumentType |
Standard
|
Pages |
116
|
PublisherName |
British Standards Institution
|
Status |
Current
|
SupersededBy | |
Supersedes |
Standards | Relationship |
ISO 21188:2006 | Identical |
ISO 21188:2018 | Identical |
ISO/IEC 18033-1:2015 | Information technology Security techniques Encryption algorithms Part 1: General |
ISO/IEC 18032:2005 | Information technology Security techniques Prime number generation |
ISO/IEC 18014-3:2009 | Information technology Security techniques Time-stamping services Part 3: Mechanisms producing linked tokens |
ISO/IEC 15945:2002 | Information technology — Security techniques — Specification of TTP services to support the application of digital signatures |
ISO/IEC 7813:2006 | Information technology Identification cards Financial transaction cards |
ISO/IEC 9834-1:2012 | Information technology — Procedures for the operation of object identifier registration authorities — Part 1: General procedures and top arcs of the international object identifier tree |
ISO/IEC 18033-2:2006 | Information technology — Security techniques — Encryption algorithms — Part 2: Asymmetric ciphers |
ISO/IEC 18033-3:2010 | Information technology Security techniques Encryption algorithms Part 3: Block ciphers |
ISO/IEC 18014-2:2009 | Information technology Security techniques Time-stamping services Part 2: Mechanisms producing independent tokens |
ISO 13491-1:2016 | Financial services — Secure cryptographic devices (retail) — Part 1: Concepts, requirements and evaluation methods |
FIPS PUB 140-2 : 0 | SECURITY REQUIREMENTS FOR CRYPTOGRAPHIC MODULES |
ISO/IEC 19790:2012 | Information technology — Security techniques — Security requirements for cryptographic modules |
ISO/IEC 27002:2013 | Information technology Security techniques Code of practice for information security controls |
ISO/IEC 8824:1990 | Information technology — Open Systems Interconnection — Specification of Abstract Syntax Notation One (ASN.1) |
ISO/TR 13569:2005 | Financial services Information security guidelines |
ISO/IEC 9594-8:2017 | Information technology Open Systems Interconnection The Directory Part 8: Public-key and attribute certificate frameworks |
TS 101 456 : 1.4.3 | ELECTRONIC SIGNATURES AND INFRASTRUCTURES (ESI); POLICY REQUIREMENTS FOR CERTIFICATION AUTHORITIES ISSUING QUALIFIED CERTIFICATES |
ISO/IEC 10118-3:2004 | Information technology Security techniques Hash-functions Part 3: Dedicated hash-functions |
ISO/IEC 7810:2003 | Identification cards Physical characteristics |
ISO/IEC 10646-1:2000 | Information technology Universal Multiple-Octet Coded Character Set (UCS) Part 1: Architecture and Basic Multilingual Plane |
TS 102 042 : 2.4.1 | ELECTRONIC SIGNATURES AND INFRASTRUCTURES (ESI); POLICY REQUIREMENTS FOR CERTIFICATION AUTHORITIES ISSUING PUBLIC KEY CERTIFICATES |
ISO/IEC 18033-4:2011 | Information technology — Security techniques — Encryption algorithms — Part 4: Stream ciphers |
Access your standards online with a subscription
Features
-
Simple online access to standards, technical information and regulations.
-
Critical updates of standards and customisable alerts and notifications.
-
Multi-user online standards collection: secure, flexible and cost effective.