ImageVerifierCode 换一换
格式:PDF , 页数:18 ,大小:112.11KB ,
资源ID:740320      下载积分:10000 积分
快捷下载
登录下载
邮箱/手机:
温馨提示:
如需开发票,请勿充值!快捷下载时,用户名和密码都是您填写的邮箱或者手机号,方便查询和重复下载(系统自动生成)。
如填写123,账号就是123,密码也是123。
特别说明:
请自助下载,系统不会自动发送文件的哦; 如果您已付费,想二次下载,请登录后访问:我的下载记录
支付方式: 支付宝扫码支付 微信扫码支付   
注意:如需开发票,请勿充值!
验证码:   换一换

加入VIP,免费下载
 

温馨提示:由于个人手机设置不同,如果发现不能下载,请复制以下地址【http://www.mydoc123.com/d-740320.html】到电脑端继续下载(重复下载不扣费)。

已注册用户请登录:
账号:
密码:
验证码:   换一换
  忘记密码?
三方登录: 微信登录  

下载须知

1: 本站所有资源如无特殊说明,都需要本地电脑安装OFFICE2007和PDF阅读器。
2: 试题试卷类文档,如果标题没有明确说明有答案则都视为没有答案,请知晓。
3: 文件的所有权益归上传用户所有。
4. 未经权益所有人同意不得将文件中的内容挪作商业或盈利用途。
5. 本站仅提供交流平台,并不能对任何下载内容负责。
6. 下载文件中如有侵权或不适当内容,请与我们联系,我们立即纠正。
7. 本站不保证下载资源的准确性、安全性和完整性, 同时也不承担用户因使用这些下载资源对自己和他人造成任何形式的伤害或损失。

版权提示 | 免责声明

本文(ETSI TS 119 401-2015 Electronic Signatures and Infrastructures (ESI) General Policy Requirements for Trust Service Providers (V2 0 1)《电子签名和基础设施 (ESI) 信托服务提供商的通用政策要求 (V2 0 1)》.pdf)为本站会员(progressking105)主动上传,麦多课文库仅提供信息存储空间,仅对用户上传内容的表现方式做保护处理,对上载内容本身不做任何修改或编辑。 若此文所含内容侵犯了您的版权或隐私,请立即通知麦多课文库(发送邮件至master@mydoc123.com或直接QQ联系客服),我们立即给予删除!

ETSI TS 119 401-2015 Electronic Signatures and Infrastructures (ESI) General Policy Requirements for Trust Service Providers (V2 0 1)《电子签名和基础设施 (ESI) 信托服务提供商的通用政策要求 (V2 0 1)》.pdf

1、 ETSI TS 119 401 V2.0.1 (2015-07) Electronic Signatures and Infrastructures (ESI); General Policy Requirements for Trust Service Providers TECHNICAL SPECIFICATION ETSI ETSI TS 119 401 V2.0.1 (2015-07)2Reference RTS/ESI-0019401-TS Keywords electronic signature, provider, security, trust services ETSI

2、 650 Route des Lucioles F-06921 Sophia Antipolis Cedex - FRANCE Tel.: +33 4 92 94 42 00 Fax: +33 4 93 65 47 16 Siret N 348 623 562 00017 - NAF 742 C Association but non lucratif enregistre la Sous-Prfecture de Grasse (06) N 7803/88 Important notice The present document can be downloaded from: http:/

3、www.etsi.org/standards-search The present document may be made available in electronic versions and/or in print. The content of any electronic and/or print versions of the present document shall not be modified without the prior written authorization of ETSI. In case of any existing or perceived dif

4、ference in contents between such versions and/or in print, the only prevailing document is the print of the Portable Document Format (PDF) version kept on a specific network drive within ETSI Secretariat. Users of the present document should be aware that the document may be subject to revision or c

5、hange of status. Information on the current status of this and other ETSI documents is available at http:/portal.etsi.org/tb/status/status.asp If you find errors in the present document, please send your comment to one of the following services: https:/portal.etsi.org/People/CommiteeSupportStaff.asp

6、x Copyright Notification No part may be reproduced or utilized in any form or by any means, electronic or mechanical, including photocopying and microfilm except as authorized by written permission of ETSI. The content of the PDF version shall not be modified without the written authorization of ETS

7、I. The copyright and the foregoing restriction extend to reproduction in all media. European Telecommunications Standards Institute 2015. All rights reserved. DECTTM, PLUGTESTSTM, UMTSTMand the ETSI logo are Trade Marks of ETSI registered for the benefit of its Members. 3GPPTM and LTE are Trade Mark

8、s of ETSI registered for the benefit of its Members and of the 3GPP Organizational Partners. GSM and the GSM logo are Trade Marks registered and owned by the GSM Association. ETSI ETSI TS 119 401 V2.0.1 (2015-07)3Contents Intellectual Property Rights 4g3Foreword . 4g3Modal verbs terminology 4g3Intro

9、duction 4g31 Scope 5g32 References 5g32.1 Normative references . 5g32.2 Informative references 5g33 Definitions and abbreviations . 6g33.1 Definitions 6g33.2 Abbreviations . 6g34 Overview 7g35 Risk Assesment 7g36 Policies and practices . 7g36.1 Trust Service Practice (TSP) statement 7g36.2 Terms and

10、 Conditions 8g36.3 Information security policy 8g37 TSP management and operation . 9g37.1 Internal organization. 9g37.1.1 Organization reliability . 9g37.1.2 Segregation of duties 9g37.2 Human resources 9g37.3 Asset management 11g37.3.1 General requirements 11g37.3.2 Media handling . 11g37.4 Access

11、control 11g37.5 Cryptographic controls . 11g37.6 Physical and environmental security 11g37.7 Operation security 12g37.8 Network security 13g37.9 Incident management . 13g37.10 Collection of evidence 14g37.11 Business continuity management . 15g37.12 TSP termination and termination plans 15g37.13 Com

12、pliance. 15g3Annex A (informative): Bibliography . 17g3History 18g3ETSI ETSI TS 119 401 V2.0.1 (2015-07)4Intellectual Property Rights IPRs essential or potentially essential to the present document may have been declared to ETSI. The information pertaining to these essential IPRs, if any, is publicl

13、y available for ETSI members and non-members, and can be found in ETSI SR 000 314: “Intellectual Property Rights (IPRs); Essential, or potentially Essential, IPRs notified to ETSI in respect of ETSI standards“, which is available from the ETSI Secretariat. Latest updates are available on the ETSI We

14、b server (http:/ipr.etsi.org). Pursuant to the ETSI IPR Policy, no investigation, including IPR searches, has been carried out by ETSI. No guarantee can be given as to the existence of other IPRs not referenced in ETSI SR 000 314 (or the updates on the ETSI Web server) which are, or may be, or may b

15、ecome, essential to the present document. Foreword This Technical Specification (TS) has been produced by ETSI Technical Committee Electronic Signatures and Infrastructures (ESI). Modal verbs terminology In the present document “shall“, “shall not“, “should“, “should not“, “may“, “need not“, “will“,

16、 “will not“, “can“ and “cannot“ are to be interpreted as described in clause 3.2 of the ETSI Drafting Rules (Verbal forms for the expression of provisions). “must“ and “must not“ are NOT allowed in ETSI deliverables except when used in direct citation. Introduction Building trust in the online envir

17、onment is key to economic and social development. Lack of trust, in particular because of a perceived lack of security, makes consumers, businesses and administrations hesitate to carry out transactions electronically and to adopt new services. Trust service providers are often an essential element

18、to establish trust between parties transacting electronically, particularly in open public networks, and can be used, for example, to provide trusted identity information and help establish secure communications between transacting parties. Examples of such trust service providers are issuers of pub

19、lic key certificates, time-stamping service providers, providers of remote electronic signature generation or validation services. For participants of electronic commerce to have confidence in the security of these trust services they need to have confidence that the trust service providers (TSPs) h

20、ave established a set of procedures, processes and security measures in order to minimize the operational and financial threats and risks associated. The present document specifies baseline policy requirements on the operation and management practices of TSP regardless the service they provide. Othe

21、r standards, addressing particular type of trust service, can build on this standard to identify supplement requirements for particular type of trust service. The present document is aiming to meet the general requirements of the international community to provide trust and confidence in electronic

22、transactions including, amongst others, applicable requirements from Regulation (EU) No 910/2014 i.2 and those from CA Browser Forum i.4. ETSI ETSI TS 119 401 V2.0.1 (2015-07)51 Scope The present document specifies general policy requirements relating to trust service providers (TSPs) that are indep

23、endent of the type of TSP whether certificate issuer (qualified or otherwise), timestamp issuer, signature verifier, e-delivery provider or other form of trust service provider. It defines policy requirements on the operation and management practices of TSPs. Other specifications refine and extend t

24、hese requirements as applicable to particular forms of TSP. The present document does not specify how the requirements identified can be assessed by an independent party, including requirements for information to be made available to such independent assessors, or requirements on such assessors. NOT

25、E: See ETSI TS 119 403 i.6: “Electronic Signatures and Infrastructures (ESI); Requirements for conformity assessment bodies assessing Trust Service Providers“. 2 References 2.1 Normative references References are either specific (identified by date of publication and/or edition number or version num

26、ber) or non-specific. For specific references, only the cited version applies. For non-specific references, the latest version of the reference document (including any amendments) applies. Referenced documents which are not found to be publicly available in the expected location might be found at ht

27、tp:/docbox.etsi.org/Reference. NOTE: While any hyperlinks included in this clause were valid at the time of publication, ETSI cannot guarantee their long term validity. The following referenced documents are necessary for the application of the present document. Not applicable. 2.2 Informative refer

28、ences References are either specific (identified by date of publication and/or edition number or version number) or non-specific. For specific references, only the cited version applies. For non-specific references, the latest version of the reference document (including any amendments) applies. NOT

29、E: While any hyperlinks included in this clause were valid at the time of publication, ETSI cannot guarantee their long term validity. The following referenced documents are not necessary for the application of the present document but they assist the user with regard to a particular subject area. i

30、.1 Directive 95/46/EC of the European Parliament and of the Council of 24 October 1995 on the protection of individuals with regard to the processing of personal data and on the free movement of such data. i.2 Regulation (EU) No 910/2014 of the European Parliament and of the Council of 23 July 2014

31、on electronic identification and trust services for electronic transactions in the internal market and repealing Directive 1999/93/EC. i.3 ISO/IEC 27002:2013: “Information technology - Security techniques - Code of practice for information security management“. i.4 CA/Browser Forum: “Guidelines for

32、the issuance and management of extended validation certificates“. i.5 ISO/IEC 27005:2011: “Information technology - Security techniques - Information security risk management“. ETSI ETSI TS 119 401 V2.0.1 (2015-07)6i.6 ETSI TS 119 403: “Electronic Signatures and Infrastructures (ESI); Trust Service

33、Provider Conformity Assessment - Requirements for conformity assessment bodies assessing Trust Service Providers“. i.7 Void. i.8 CA/Browser Forum: “Network and certificate system security requirements“. i.9 Void. i.10 ETSI TS 119 312: “Electronic Signatures and Infrastructures (ESI); Cryptographic S

34、uites“. i.11 Recommendation ITU-R TF.460-6 (2002): “Standard-frequency and time-signal emissions“. i.12 ETSI TS 119 411-1: “Electronic Signatures and Infrastructures (ESI); Policy and security requirements for Trust Service Providers issuing certificates; Part 1: General requirements“. i.13 ETSI EN

35、301 549: “Accessibility requirements suitable for public procurement of ICT products and services in Europe“. 3 Definitions and abbreviations 3.1 Definitions For the purposes of the present document, the following terms and definitions apply: Coordinated Universal Time (UTC): time scale based on the

36、 second as defined in Recommendation ITU-R TF.460-6 i.11 relying party: natural or legal person that relies upon an electronic identification or a trust service NOTE: Relying parties include parties verifying a digital signature using a public key certificate. subscriber: legal or natural person bou

37、nd by agreement with a trust service provider to any subscriber obligations trust service: electronic service which enhances trust and confidence in electronic transactions NOTE: Such trust services are typically but not necessarily using cryptographic techniques or involving confidential material.

38、trust service policy: set of rules that indicates the applicability of a trust service to a particular community and/or class of application with common security requirements NOTE: See clause 6 for further information on TSP policy. trust service practice statement: statement of the practices that a

39、 TSP employs in providing a trust service NOTE: See clause 6.2 for further information on practice statement. trust service provider: entity which provides one or more trust services. 3.2 Abbreviations For the purposes of the present document, the following abbreviations apply: CA Certification Auth

40、ority IP Internet protocolIT Information Technology TSP Trust Service Provider UTC Coordinated Universal Time ETSI ETSI TS 119 401 V2.0.1 (2015-07)74 Overview Trust services may encompass but should not be limited to the issuance of public key certificates, provision of registration services, time-s

41、tamping services, long term preservation services, e-delivery services and/or signature validation services. These policy requirements are not meant to imply any restrictions on charging for TSP services. The requirements are indicated in terms of the security objectives followed by more specific re

42、quirements for controls to meet those objectives where considered necessary to provide the necessary confidence that those objectives will be met. NOTE: The details of controls required to meet an objective is a balance between achieving the necessary confidence whilst minimizing the restrictions on

43、 the techniques that a TSP can employ in providing services. 5 Risk Assesment The TSP shall carry out a risk assessment to identify, analyse and evaluate trust service risks taking into account business and technical issues. The TSP shall select the appropriate risk treatment measures, taking accoun

44、t of the risk assessment results. The risk treatment measures shall ensure that the level of security is commensurate to the degree of risk. NOTE: See ISO/IEC 27005 i.5 for guidance on information security risk management as part of an information security management system. The TSP shall determine

45、all security requirements and operational procedures that are necessary to implement the risk treatment options measures chosen as documented in the information security policy and the trust service practice statement (see clause 6). The risk assessment shall be regularly reviewed and revised. 6 Pol

46、icies and practices 6.1 Trust Service Practice (TSP) statement The TSP shall specify the set of policies and practices appropriate for the trust services it is providing. These shall be approved by management, published and communicated to employees and external parties as relevant. The TSP shall ha

47、ve a statement of the practices and procedures for the trust service provided. NOTE 1: The present document makes no requirement as to the structure of the trust service practice statement. In particular: a) The TSP shall have a statement of the practices and procedures used to address all the requi

48、rements identified for the applicable TSP policy. b) The TSPs trust service practice statement shall identify the obligations of all external organizations supporting the TSP services including the applicable policies and practices. c) The TSP shall make available to subscribers and relying parties

49、its practice statement, and other relevant documentation, as necessary to assess conformance to the service policy. d) The TSP shall have a management body with overall responsibility for the TSP with final authority for approving the TSP practice statement. e) The TSP management shall implement the practices. f) The TSP shall define a review process for the practices including responsibilities for maintaining the TSP practice statement. ETSI ETSI TS 119 401 V2.0.1 (2015-07)8g) The TSP shall notify notice of changes it intends to make in i

copyright@ 2008-2019 麦多课文库(www.mydoc123.com)网站版权所有
备案/许可证编号:苏ICP备17064731号-1