ImageVerifierCode 换一换
格式:PDF , 页数:73 ,大小:408.80KB ,
资源ID:735923      下载积分:10000 积分
快捷下载
登录下载
邮箱/手机:
温馨提示:
如需开发票,请勿充值!快捷下载时,用户名和密码都是您填写的邮箱或者手机号,方便查询和重复下载(系统自动生成)。
如填写123,账号就是123,密码也是123。
特别说明:
请自助下载,系统不会自动发送文件的哦; 如果您已付费,想二次下载,请登录后访问:我的下载记录
支付方式: 支付宝扫码支付 微信扫码支付   
注意:如需开发票,请勿充值!
验证码:   换一换

加入VIP,免费下载
 

温馨提示:由于个人手机设置不同,如果发现不能下载,请复制以下地址【http://www.mydoc123.com/d-735923.html】到电脑端继续下载(重复下载不扣费)。

已注册用户请登录:
账号:
密码:
验证码:   换一换
  忘记密码?
三方登录: 微信登录  

下载须知

1: 本站所有资源如无特殊说明,都需要本地电脑安装OFFICE2007和PDF阅读器。
2: 试题试卷类文档,如果标题没有明确说明有答案则都视为没有答案,请知晓。
3: 文件的所有权益归上传用户所有。
4. 未经权益所有人同意不得将文件中的内容挪作商业或盈利用途。
5. 本站仅提供交流平台,并不能对任何下载内容负责。
6. 下载文件中如有侵权或不适当内容,请与我们联系,我们立即纠正。
7. 本站不保证下载资源的准确性、安全性和完整性, 同时也不承担用户因使用这些下载资源对自己和他人造成任何形式的伤害或损失。

版权提示 | 免责声明

本文(ETSI TR 102 437-2006 Electronic Signatures and Infrastructures (ESI) Guidance on TS 101 456 (Policy Requirements for certification authorities issuing qualified certificates) (V1 1_1.pdf)为本站会员(吴艺期)主动上传,麦多课文库仅提供信息存储空间,仅对用户上传内容的表现方式做保护处理,对上载内容本身不做任何修改或编辑。 若此文所含内容侵犯了您的版权或隐私,请立即通知麦多课文库(发送邮件至master@mydoc123.com或直接QQ联系客服),我们立即给予删除!

ETSI TR 102 437-2006 Electronic Signatures and Infrastructures (ESI) Guidance on TS 101 456 (Policy Requirements for certification authorities issuing qualified certificates) (V1 1_1.pdf

1、 ETSI TR 102 437 V1.1.1 (2006-10)Technical Report Electronic Signatures and Infrastructures (ESI); Guidance on TS 101 456 (Policy Requirements for certification authorities issuing qualified certificates) ETSI ETSI TR 102 437 V1.1.1 (2006-10) 2 Reference DTR/ESI-000023 Keywords e-commerce, electroni

2、c signature, security ETSI 650 Route des Lucioles F-06921 Sophia Antipolis Cedex - FRANCE Tel.: +33 4 92 94 42 00 Fax: +33 4 93 65 47 16 Siret N 348 623 562 00017 - NAF 742 C Association but non lucratif enregistre la Sous-Prfecture de Grasse (06) N 7803/88 Important notice Individual copies of the

3、present document can be downloaded from: http:/www.etsi.org The present document may be made available in more than one electronic version or in print. In any case of existing or perceived difference in contents between such versions, the reference version is the Portable Document Format (PDF). In c

4、ase of dispute, the reference shall be the printing on ETSI printers of the PDF version kept on a specific network drive within ETSI Secretariat. Users of the present document should be aware that the document may be subject to revision or change of status. Information on the current status of this

5、and other ETSI documents is available at http:/portal.etsi.org/tb/status/status.asp If you find errors in the present document, please send your comment to one of the following services: http:/portal.etsi.org/chaircor/ETSI_support.asp Copyright Notification No part may be reproduced except as author

6、ized by written permission. The copyright and the foregoing restriction extend to reproduction in all media. European Telecommunications Standards Institute 2006. All rights reserved. DECTTM, PLUGTESTSTM and UMTSTM are Trade Marks of ETSI registered for the benefit of its Members. TIPHONTMand the TI

7、PHON logo are Trade Marks currently being registered by ETSI for the benefit of its Members. 3GPPTM is a Trade Mark of ETSI registered for the benefit of its Members and of the 3GPP Organizational Partners. ETSI ETSI TR 102 437 V1.1.1 (2006-10) 3 Contents Intellectual Property Rights5 Foreword.5 Int

8、roduction 5 1 Scope 7 2 References 7 3 Definitions and abbreviations.9 3.1 Definitions9 3.2 Abbreviations .9 3.3 Additional terms used in the present document9 4 General Concepts .10 5 Introduction to qualified certificate policies.10 5.1 Overview 10 5.2 Identification 11 5.3 User Community and appl

9、icability.11 5.3.1 QCP public + SSCD .12 5.3.2 QCP public12 5.4 Conformance 12 5.4.1 General12 5.4.2 QCP public + SSCD .14 5.4.3 QCP public14 6 Obligations and liability .14 6.1 Certification authority obligations14 6.2 Subscriber obligations 15 6.3 Information for Relying parties 17 6.4 Liability 1

10、8 7 Requirements on CA practice.18 7.1 Certification practice statement19 7.2 Public key infrastructure - Key management life cycle21 7.2.1 Certification authority key generation 21 7.2.2 Certification authority key storage, backup and recovery.24 7.2.3 Certification authority public key distributio

11、n27 7.2.4 Key escrow .27 7.2.5 Certification authority key usage 27 7.2.6 End of CA key life cycle.28 7.2.7 Life cycle management of cryptographic hardware used to sign certificates .29 7.2.8 CA provided subject key management services30 7.2.9 Secure-signature-creation device preparation.31 7.3 Publ

12、ic key infrastructure - Certificate Management life cycle .32 7.3.1 Subject registration .32 7.3.2 Certificate renewal, rekey and update.36 7.3.3 Certificate generation37 7.3.4 Dissemination of Terms and Conditions.39 7.3.5 Certificate dissemination 40 7.3.6 Certificate revocation and suspension.41

13、7.4 CA management and operation 44 7.4.1 Security management44 7.4.2 Asset classification and management .48 7.4.3 Personnel security.49 7.4.4 Physical and environmental security.52 7.4.5 Operations management .54 7.4.6 System Access Management.56 ETSI ETSI TR 102 437 V1.1.1 (2006-10) 4 7.4.7 Trustw

14、orthy Systems Deployment and Maintenance .58 7.4.8 Business continuity management and incident handling 59 7.4.9 CA termination .62 7.4.10 Compliance with Legal Requirements63 7.4.11 Recording of Information Concerning Qualified Certificates.65 7.5 Organizational 67 8 Framework for the definition of

15、 other qualified certificate policies 69 8.1 Qualified certificate policy management69 8.2 Exclusions for non public QCPs.70 8.3 Additional requirements .71 8.4 Conformance 71 History 73 ETSI ETSI TR 102 437 V1.1.1 (2006-10) 5 Intellectual Property Rights IPRs essential or potentially essential to t

16、he present document may have been declared to ETSI. The information pertaining to these essential IPRs, if any, is publicly available for ETSI members and non-members, and can be found in ETSI SR 000 314: “Intellectual Property Rights (IPRs); Essential, or potentially Essential, IPRs notified to ETS

17、I in respect of ETSI standards“, which is available from the ETSI Secretariat. Latest updates are available on the ETSI Web server (http:/webapp.etsi.org/IPR/home.asp). Pursuant to the ETSI IPR Policy, no investigation, including IPR searches, has been carried out by ETSI. No guarantee can be given

18、as to the existence of other IPRs not referenced in ETSI SR 000 314 (or the updates on the ETSI Web server) which are, or may be, or may become, essential to the present document. Foreword This Technical Report (TR) has been produced by ETSI Technical Committee Security (SEC). The present document i

19、s largely based on the “TTP.NL Guidance on TS 101 456 15“, issued by ECP.NL - The Electronic Commerce Platform for the Netherlands that kindly offered their document as a basis for the present document. Introduction Electronic commerce is getting momentum as a way of doing business and communicating

20、 across public and private networks. An important requirement of electronic commerce is the ability to identify the originator of electronic information in the same way that documents are signed using a hand-written signature. This is commonly achieved by using electronic signatures which are suppor

21、ted by a certification-service-provider issuing certificates, commonly called a certification authority. The Directive 1999/93/EC of the European Parliament and of the Council on a Community framework for electronic signatures 1 (hereinafter referred to as “the Directive“) identifies a special form

22、of electronic signature which is based on a “qualified certificate“. Annex I of this Directive specifies requirements for qualified certificates. Annex II of the Directive specifies requirements on certification-service-providers issuing qualified certificates (i.e. certification authorities issuing

23、 qualified certificates). Annex III specifies requirements for secure signature creation devices. For users of electronic signatures to have confidence in the authenticity of the qualified electronic signatures they need to have confidence that the CA that issued the qualified certificate the electr

24、onic signature is based upon has properly established procedures and protective measure in order to minimize the operational and financial threats and risks associated with public key crypto systems. ETSI ESI issued, and keeps updated, the Technical Specification TS 101 456 15 that specifies baselin

25、e policy requirements on the operation and management practices of certification authorities issuing qualified certificates to the public, that are used in support of qualified electronic signatures (i.e. electronic signatures that are legally equivalent to hand-written signatures in line with artic

26、le 5.1 of the European Directive on a community framework for electronic signatures 1). The use of a secure-signature-creation device, as required through annex III of the Directive, is an optional element of these policy requirements. The present document provides guidelines on interpreting the TS

27、101 456 15 requirements for use by independent bodies and their assessors, certification service providers and other interested parties. Guidance is provided both to the assessors, by specifying which verifications they are recommended to do, and to the certification authorities, by indicating docum

28、ents and other factual reference they should provide to assessors. Interrelation of standards In figure 1 a schema is shown displaying the CAs areas (organization, systems, products, crypto modules) and the corresponding assessment scopes. ETSI ETSI TR 102 437 V1.1.1 (2006-10) 6 CA conforming to TS

29、101 456 Systems and products conforming to CWA 14167-1 hw / sw hw / sw Crypto module(s) conforming to FIPS-140 or CWA 14167 or ISO 15408 EAL 4 hw / sw Scope of evaluation of crypto module(s) Scope of audit of systems and products Scope of audit of the CA Management Organisation Processes Procedures

30、Legend Figure 1: Illustration of interrelation of standards regarding electronic signatures More specifically: CA management, organization, processes and procedures are to be assessed against TS 101 456 15; CA systems and products are to be assessed against CWA 14167-1 8; CA crypto systems are to be

31、 assessed against CWA 14167-2 9, -3 10, -4 11 as appropriate, or FIPS 140-1, -2 5, or suitable ISO/IEC 15408 7 protection profiles or security target to EAL 4. This implies the following: For the management system: auditing of documentation and implementation. For trustworthy systems: executing an E

32、DP-audit against CWA 14167-1 8 or verifying a statement that an EDP-audit against CWA 14167-1 has been carried out with positive results. For Crypto Modules: demanding statements, that fulfil certain conditions (based on the right standards, supplied by the right organizations and persons, etc.). Fu

33、rther assessment guidelines on TS 101 456 15 are provided in CWA 14172-2 18. In addition, guidance on assessment of trustworth systems against CWA 14167-1 8 is given in CWA 14172-3 18. The present document incorporates guidance on TS 101 456 15: As given in most notes included in TS 101 456 15. As g

34、iven in CWA 14172-2, by referring to the relevant sections. With additional guidance covering further issues identified in applying TS 101 456 15. The guidance taken from these 3 sources are provided in tables of the following form: Subject TS 101 456 Guidance Note / CWA 14172-2 Guidance / Additiona

35、l Guidance Best practice ETSI ETSI TR 102 437 V1.1.1 (2006-10) 7 1 Scope The present document provides guidance on interpreting the requirements specified in TS 101 456 (V1.4.1) 15. This guidance is intended for use by bodies that supervise (e.g. as per Directive articles 3.3), approve or accredit C

36、As (e.g. as per articles 3.2 of Directive 1), assessors, certification service providers and other interested parties. The present document purpose is to facilitate assessors in evaluating compliance of certification authorities with TS 101 456 15 and, consequently, to facilitate certification autho

37、rities in implementing TS 101 456 15 requirements. The original text of TS 101 456 15 is repeated in the present document to provide a comprehensive source. TEXT COPIED VERBATIM FROM TS 101 456 15 IS IN ITALIC. 2 References For the purposes of this Technical Report (TR) the following references appl

38、y: NOTE: While any hyperlinks included in this clause were valid at the time of publication ETSI cannot guarantee their long term validity. The following references are taken from TS 101 456. 1 Directive 1999/93/EC of the European Parliament and of the Council of 13 December 1999 on a Community fram

39、ework for electronic signatures. NOTE: The above is referred to as “the Directive“ in the present document. 2 IETF RFC 3647 (2003): “Internet X.509 Public Key Infrastructure Certificate Policy and Certification Practices Framework“. NOTE: Obsoletes IETF RFC 2527. 3 ITU-T Recommendation X.509 (2000)/

40、ISO/IEC 9594-8 (2001): “Information technology - Open Systems Interconnection - The Directory: Public-key and attribute certificate frameworks“. 4 Directive 95/46/EC of the European Parliament and of the Council of 24 October 1995 on the protection of individuals with regard to the processing of per

41、sonal data and on the free movement of such data. 5 FIPS PUB 140-2 (2001): “Security Requirements For Cryptographic Modules“. NOTE: FIPS 140-1 certified devices are perfectly admissible and a valid alternative to FIPS 140-2. 6 ETSI TS 101 862: “Qualified certificate profile“. 7 ISO/IEC 15408 (2005)

42、(parts 1 to 3): “Information technology - Security techniques - Evaluation criteria for IT security“. 8 CEN Workshop Agreement 14167-1: “Security Requirements for Trustworthy Systems Managing Certificates for Electronic Signatures - Part 1 System Security Requirements“. 9 CEN Workshop Agreement 1416

43、7-2: “Security Requirements for Trustworthy Systems Managing Certificates for Electronic Signatures - Part 2: Cryptographic Module for CSP signing operations with backup - Protection profile (CMCSOB-PP)“. 10 CEN Workshop Agreement 14167-3: “C Security Requirements for Trustworthy Systems Managing Ce

44、rtificates for Electronic Signatures - Part 3: Cryptographic module for CSP key generation services - Protection profile (CMCKG-PP)“. ETSI ETSI TR 102 437 V1.1.1 (2006-10) 8 11 CEN Workshop Agreement 14167-4: “ Security Requirements for Trustworthy Systems Managing Certificates for Electronic Signat

45、ures - Part 4: Cryptographic module for CSP signing operations - Protection profile - CMCSO PP“. 12 Directive 93/13/EEC of 5 April 1993 on unfair terms in consumer contracts. 13 ISO/IEC 17799 (2005): “Information technology - Security techniques - Code of practice for information security management

46、“. 14 ETSI TS 102 158: “Electronic Signatures and Infrastructures (ESI); Policy requirements for Certification Service Providers issuing attribute certificates usable with Qualified certificates“. Additional references 15 ETSI TS 101 456: “Electronic Signatures and Infrastructures (ESI); Policy requ

47、irements for certification authorities issuing qualified certificates“. 16 ETSI TS 102 176-1: “Electronic Signatures and Infrastructures (ESI); Algorithms and Parameters for Secure Electronic Signatures; Part 1: Hash functions and asymmetric algorithms“. 17 ETSI TS 102 176-2: “Electronic Signatures

48、and Infrastructures (ESI); Algorithms and Parameters for Secure Electronic Signatures; Part 2: Secure channel protocols and algorithms for signature creation devices“. 18 CWA 14172-2: “EESSI Conformity Assessment Guidance on ETSI TS 101 456“. 19 CWA 14172-3: “EESSI Conformity Assessment Guidance on

49、Trustworthy Systems“. 20 IETF RFC 2119: “Key words for use in RFCs to Indicate Requirement Levels“. 21 IETF RFC 4210: “Internet X.509 Public Key Infrastructure Certificate Management Protocol (CMP)“. 22 IETF RFC 4211: “Internet X.509 Public Key Infrastructure Certificate Request Message Format (CRMF)“. 23 PKCS #5 v2.0: “Password-Based Cryptography Standard“. 24 TTP.NL Part 1: “Requirements and Guidance for the Certification of the Public Key Infrastructure of Ce

copyright@ 2008-2019 麦多课文库(www.mydoc123.com)网站版权所有
备案/许可证编号:苏ICP备17064731号-1