Back

CEN/TS 419261:2015

Security requirements for trustworthy systems managing certificates and time-stamps

General information
Valid from 07.05.2015
Base Documents
CEN/TS 419261:2015
Directives or regulations
None

Standard history

Status
Date
Type
Name
07.05.2015
Main
1.1  General
This Technical Specification establishes security requirements for TWSs that can be used by a TSP in order to issue QCs and Non-Qualified Certificates (NQCs) as well as electronic time-stamps in accordance with Dir.1999/93/EC and with [Reg.910/2014/EU].
Security requirements for the Subject Device Provision Service, which includes SCDev/QSCD provision to subjects, are defined in this TS. However, requirements specific to SCDev/QSCD devices, as used by subjects of the TSP, are outside the scope of this TS. These requirements are defined as Common Criteria [CC] Protection Profiles (PP) in the EN 419211 series.
Recommendations for the cryptographic algorithms to be supported by TWSs are provided in ETSI/TS 119 312.
Although this TS is based on the use of public key cryptography, it does not require or define any particular communication protocol or format for electronic signatures, certificates, certificate revocation lists, certificate status information and time-stamp tokens. It only assumes certain types of information to be present in the certificates in accordance with Annex I of Dir.1999/93/EC and of [Reg.910/2014/EU]. Interoperability between TSP systems and subject systems is outside the scope of this document.
The use of TWSs that are already compliant to relevant security requirements of this TS should support TSPs in reducing their burden to establish conformance of their policy to ETSI TS 119 411-1, 119 411-2, and 119 421 (or equivalent ENs to be subsequently published) and in meeting the Annex I and Annex II requirements of Dir.1999/93/EC as well as the requirements from Annex I and Article 24.2 (e) of [Reg.910/2014/EU].
1.2  European Regulation-specific
The main focus of this document is on the requirements in Article 24.2 (e) of [Reg.910/2014/EU] whilst still facilitating the meeting of requirements in Dir.1999/93/EC, Annex II (f). In considering [Reg.910/2014/EU] it is important to take into account the following requirements of particular relevance to TSP trustworthy systems:
a)  Article 24.2 (f) – “use trustworthy systems to store data provided to it, in a verifiable form so that:
(i)  they are publicly available for retrieval only where the consent of the person to whom the data relates has been obtained,
(ii)  only authorised persons can make entries and changes to the stored data,
(iii)  the data can be checked for authenticity”;
b)  Article 24.2 (g) – “take appropriate measures against forgery and theft of data”;
c)  Article 24.2 (h) – “record and keep accessible for an appropriate period of time, including after the activities of the qualified trust service provider have ceased, all relevant information concerning data issued and received by the qualified trust service provider, in particular, for the purpose of providing evidence in legal proceedings and for the purpose of ensuring continuity of the service. Such recording may be done electronically”;
d)  Article 24.2 (j) – “ensure lawful processing of personal data in accordance with Directive 95/46/EC”;
e)  Article 24.2 (k) – “in case of qualified trust service providers issuing qualified certificates, establish and keep updated a certificate database”;
f)  Article 24.3 – “If a qualified trust service provider issuing qualified certificates decides to revoke a certificate, it shall register such revocation in its certificate database and publish the revocation status of the certificate in a timely manner, and in any event within 24 hours after the receipt of the request. The revocation shall become effective immediately upon its publication”;
g)  Article 24.4 – "With regard to paragraph 3, qualified trust service providers issuing qualified certificates shall provide to any relying party information on the validity or revocation status of qualified certificates issued by them.
*
*
*
PDF
31.72 € incl tax
Paper
31.72 € incl tax
Browse standard from 2.44 € incl tax
Standard monitoring

Customers who bought this item also bought

Main

EVS-EN 419211-3:2013

Protection profiles for secure signature creation device - Part 3: Device with key import
Newest version Valid from 09.12.2013
Main

EVS-EN 419211-4:2013

Protection profiles for secure signature creation device - Part 4: Extension for device with key generation and trusted channel to certificate generation application
Newest version Valid from 06.01.2014
Main

EVS-EN 419211-5:2013

Protection profiles for secure signature creation device - Part 5: Extension for device with key generation and trusted channel to signature creation application
Newest version Valid from 06.01.2014
Main

EVS-EN 419211-1:2014

Protection profiles for secure signature creation device - Part 1: Overview
Newest version Valid from 07.11.2014