Skip links

Standards for trust services

Trust services

ETSI EN 319 403-1 v2.3.1: Requirements for conformity assessment bodies assessing Trust Service Providers
ETSI EN 319 403 v2.2.2: Requirements for conformity assessment bodies assessing Trust Service Providers
ETSI EN 319 401 v2.2.1 General Policy Requirements for Trust Service Providers
ETSI EN 319 411 Policy and security requirements for Trust Service Providers issuing certificates

Formation and verification of electronic signatures

ETSI TS 119 101 v1.1.1 on Policy and security requirements for applications for signature creation and signature validation
ETSI TR 119 100 v1.1.1 on Guidance on the use of standards for signatures creation and validation

Cryptography

ETSI TR 119 300 v1.2.1 Business guidance on cryptographic suites
ETSI TS 119 312 v1.3.1 Cryptographic Suites

Trusted list

ETSI TS 119 612 v2.1.1 Trusted Lists
ETSI TR 119 600 v1.2.1 Business guidance for trust service status lists providers

ISO (International Organization for Standardization)

LST ISO/IEC 15408-1:2010 Informacinės technologijos. Saugumo metodai. Informacinių technologijų saugumo įvertinimo kriterijai. 1 dalis. Įvadas ir bendrasis modelis (tapatus ISO/IEC 15408-1:2009)

ISO/IEC 15408-1:2009Information technology – Security techniques – Evaluation criteria for IT security – Part 1: Introduction and general model (ISO/IEC 15408-1:2009, identical)

LST ISO/IEC 15408-2:2008 Informacijos technologija. Saugumo metodai. Informacijos technologijų saugumo įvertinimo kriterijai. 2 dalis. Funkciniai saugumo komponentai (tapatus ISO/IEC 15408-2:2008)

ISO/IEC 15408-2:2008 Information technology – Security techniques – Evaluation criteria for IT security – Part 2: Security functional components (ISO/IEC 15408-2:2008, identical)

LST ISO/IEC 15408-3:2008 Informacijos technologija. Saugumo metodai. Informacijos technologijų saugumo įvertinimo kriterijai. 3 dalis. Saugumo užtikrinimo komponentai (tapatus ISO/IEC 15408-3:2008)

ISO/IEC 15408-3:2008Information technology – Security techniques – Evaluation criteria for IT security – Part 3: Security assurance components (ISO/IEC 15408-3:2008, identical)

LST ISO/IEC 18045:2008 „Informacinės technologijos. Saugumo metodai. Informacinių technologijų saugumo įvertinimo metodika"

ISO/IEC 15408-3:2008 Information technology – Security techniques – Evaluation criteria for IT security – Part 3: Security assurance components (ISO/IEC 15408-3:2008, identical)

CEN (Comité Européen de Normalisation)

LST CWA 14171 Elektroninio parašo tikrinimo procedūros

CWA 14171:2004 General guidelines for electronic signature verification (atnaujintas)

LST EN 419211-2 Saugaus elektroninio parašo kūrimo įtaiso apsaugos profilis. 2 dalis. Įtaisas su rakto generatoriumi

EN 419211-2:2013 Protection profiles for secure signature creation device – Part 2: Device with key generation

LST CWA 14170 Reikalavimai, keliami parašo formavimo taikomosioms sistemoms

CWA 14170:2004 Security Requirements for Signature Creation Applications (atnaujintas)

LST CWA 14167-3 Saugos reikalavimai, keliami patikimoms elektroninių parašų sertifikatų valdymo sistemoms – 3 Dalis: Sertifikavimo paslaugų teikėjų raktų generavimo kriptografinis modulis – Apsaugos profilis

CWA 14167-3:2002 Security Requirements for Trustworthy Systems Managing Certificates for Electronic Signatures – Part 3: Cryptographic module for CSP key generation services protection profile CMCKG-PP (atnaujintas)

LST CWA 14167-2 Saugos reikalavimai, keliami patikimoms elektroninių parašų sertifikatų valdymo sistemoms – 2 Dalis: Sertifikavimo paslaugų teikėjų pasirašymo operacijų kriptografinis modulis – Apsaugos profilis

CWA 14167-2:2004 Security Requirements for Trustworthy Systems Managing Certificates for Electronic Signatures – Part 2: Cryptographic module for CSP signing operations with backup – Protection profile – CMCSOB PP (atnaujintas)

LST CWA 14167-1 Saugos reikalavimai, keliami patikimoms elektroninių parašų sertifikatų valdymo sistemoms – 1 Dalis: Reikalavimai, keliami sistemų saugai

CWA 14167-1:2003 Security Requirements for Trustworthy Systems Managing Certificates for Electronic Signatures – Part 1: System Security Requirements (atnaujintas)

Skip to content
This Website is committed to ensuring digital accessibility for people with disabilitiesWe are continually improving the user experience for everyone, and applying the relevant accessibility standards.
Conformance status