{"id":347762,"date":"2024-10-20T00:27:51","date_gmt":"2024-10-20T00:27:51","guid":{"rendered":"https:\/\/pdfstandards.shop\/product\/uncategorized\/bs-iso-211882018-tc\/"},"modified":"2024-10-25T23:59:24","modified_gmt":"2024-10-25T23:59:24","slug":"bs-iso-211882018-tc","status":"publish","type":"product","link":"https:\/\/pdfstandards.shop\/product\/publishers\/bsi\/bs-iso-211882018-tc\/","title":{"rendered":"BS ISO 21188:2018 – TC"},"content":{"rendered":"

PDF Catalog<\/h4>\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n
PDF Pages<\/th>\nPDF Title<\/th>\n<\/tr>\n
155<\/td>\nNational foreword <\/td>\n<\/tr>\n
160<\/td>\nForeword <\/td>\n<\/tr>\n
162<\/td>\nIntroduction <\/td>\n<\/tr>\n
164<\/td>\n1 Scope
2 Normative references <\/td>\n<\/tr>\n
165<\/td>\n3 Terms and definitions <\/td>\n<\/tr>\n
171<\/td>\n4 Abbreviated terms <\/td>\n<\/tr>\n
172<\/td>\n5 Public key infrastructure (PKI)
5.1 General <\/td>\n<\/tr>\n
173<\/td>\n5.2 What is PKI?
5.2.1 General <\/td>\n<\/tr>\n
174<\/td>\n5.2.2 Public key infrastructure process flow
5.3 Business requirement impact on PKI environment
5.3.1 General
5.3.2 Illustration of certificate application in a closed environment <\/td>\n<\/tr>\n
175<\/td>\n5.3.3 Illustration of certificate application in a contractual PKI environment <\/td>\n<\/tr>\n
176<\/td>\n5.3.4 Illustration of certificate application in an open environment <\/td>\n<\/tr>\n
178<\/td>\n5.4 Certification authority (CA) <\/td>\n<\/tr>\n
179<\/td>\n5.5 Business perspectives
5.5.1 General
5.5.2 Business risks
5.5.3 Applicability
5.5.4 Legal issues
5.5.5 Regulatory issues
5.5.6 Business usage issues <\/td>\n<\/tr>\n
180<\/td>\n5.5.7 Interoperability issues <\/td>\n<\/tr>\n
181<\/td>\n5.5.8 Audit journal requirements <\/td>\n<\/tr>\n
182<\/td>\n5.6 Certificate policy (CP)
5.6.1 General
5.6.2 Certificate policy usage <\/td>\n<\/tr>\n
183<\/td>\n5.6.3 Certificate policies within a hierarchy of trust <\/td>\n<\/tr>\n
184<\/td>\n5.6.4 Certificate status
5.7 Certification practice statement (CPS)
5.7.1 General
5.7.2 Authority <\/td>\n<\/tr>\n
185<\/td>\n5.7.3 Purpose
5.7.4 Level of specificity
5.7.5 Approach
5.7.6 Audience and access
5.8 Agreements <\/td>\n<\/tr>\n
186<\/td>\n5.9 Time-stamping <\/td>\n<\/tr>\n
187<\/td>\n5.10 Trust models
5.10.1 Trust model considerations <\/td>\n<\/tr>\n
188<\/td>\n5.10.2 Wildcard considerations
5.10.3 Relying party considerations <\/td>\n<\/tr>\n
189<\/td>\n6 Certificate policy and certification practice statement requirements
6.1 Certificate policy (CP) <\/td>\n<\/tr>\n
191<\/td>\n6.2 Certification practice statement (CPS)
7 Certification authority control procedures
7.1 General <\/td>\n<\/tr>\n
192<\/td>\n7.2 CA environmental controls
7.2.1 Certification practice statement and certificate policy management <\/td>\n<\/tr>\n
193<\/td>\n7.2.2 Security management <\/td>\n<\/tr>\n
194<\/td>\n7.2.3 Asset classification and management <\/td>\n<\/tr>\n
195<\/td>\n7.2.4 Personnel security <\/td>\n<\/tr>\n
196<\/td>\n7.2.5 Physical and environmental security <\/td>\n<\/tr>\n
197<\/td>\n7.2.6 Operations management <\/td>\n<\/tr>\n
198<\/td>\n7.2.7 System access management <\/td>\n<\/tr>\n
200<\/td>\n7.2.8 Systems development and maintenance
7.2.9 Business continuity management <\/td>\n<\/tr>\n
202<\/td>\n7.2.10 Monitoring and compliance
7.2.11 Audit logging <\/td>\n<\/tr>\n
206<\/td>\n7.3 CA key life cycle management controls
7.3.1 CA key generation <\/td>\n<\/tr>\n
207<\/td>\n7.3.2 CA key storage, back-up and recovery <\/td>\n<\/tr>\n
208<\/td>\n7.3.3 CA public key distribution <\/td>\n<\/tr>\n
209<\/td>\n7.3.4 CA key usage
7.3.5 CA key archival and destruction <\/td>\n<\/tr>\n
210<\/td>\n7.3.6 CA key compromise <\/td>\n<\/tr>\n
211<\/td>\n7.4 Subject key life cycle management controls
7.4.1 CA-provided subject key generation services (if supported)
7.4.2 CA-provided subject key storage and recovery services (if supported) <\/td>\n<\/tr>\n
212<\/td>\n7.4.3 Integrated circuit card (ICC) life cycle management (if supported) <\/td>\n<\/tr>\n
214<\/td>\n7.4.4 Requirements for subject key management <\/td>\n<\/tr>\n
215<\/td>\n7.5 Certificate life cycle management controls
7.5.1 Subject registration <\/td>\n<\/tr>\n
216<\/td>\n7.5.2 Certificate renewal (if supported) <\/td>\n<\/tr>\n
217<\/td>\n7.5.3 Certificate rekey
7.5.4 Certificate issuance <\/td>\n<\/tr>\n
218<\/td>\n7.5.5 Certificate distribution <\/td>\n<\/tr>\n
219<\/td>\n7.5.6 Certificate revocation
7.5.7 Certificate suspension (if supported) <\/td>\n<\/tr>\n
220<\/td>\n7.5.8 Certificate validation services <\/td>\n<\/tr>\n
221<\/td>\n7.6 Controlled CA termination <\/td>\n<\/tr>\n
222<\/td>\n7.7 CA certificate life cycle management controls \u2014 subordinate CA certificate <\/td>\n<\/tr>\n
224<\/td>\nAnnex A (informative) Management by certificate policy <\/td>\n<\/tr>\n
233<\/td>\nAnnex B (informative) Elements of a certification practice statement <\/td>\n<\/tr>\n
248<\/td>\nAnnex C (informative) Object identifiers (OID) <\/td>\n<\/tr>\n
250<\/td>\nAnnex D (informative) CA key generation ceremony <\/td>\n<\/tr>\n
254<\/td>\nAnnex E (informative) Mapping of RFC 2527 to RFC 3647 <\/td>\n<\/tr>\n
255<\/td>\nAnnex F (normative) Certification authority audit journal contents and use <\/td>\n<\/tr>\n
258<\/td>\nAnnex G (informative) Alternative trust models <\/td>\n<\/tr>\n
270<\/td>\nBibliography <\/td>\n<\/tr>\n<\/table>\n","protected":false},"excerpt":{"rendered":"

Tracked Changes. Public key infrastructure for financial services. Practices and policy framework<\/b><\/p>\n\n\n\n\n
Published By<\/td>\nPublication Date<\/td>\nNumber of Pages<\/td>\n<\/tr>\n
BSI<\/b><\/a><\/td>\n2020<\/td>\n273<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n","protected":false},"featured_media":347765,"template":"","meta":{"rank_math_lock_modified_date":false,"ep_exclude_from_search":false},"product_cat":[696,2641],"product_tag":[],"class_list":{"0":"post-347762","1":"product","2":"type-product","3":"status-publish","4":"has-post-thumbnail","6":"product_cat-35-240-40","7":"product_cat-bsi","9":"first","10":"instock","11":"sold-individually","12":"shipping-taxable","13":"purchasable","14":"product-type-simple"},"_links":{"self":[{"href":"https:\/\/pdfstandards.shop\/wp-json\/wp\/v2\/product\/347762","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/pdfstandards.shop\/wp-json\/wp\/v2\/product"}],"about":[{"href":"https:\/\/pdfstandards.shop\/wp-json\/wp\/v2\/types\/product"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/pdfstandards.shop\/wp-json\/wp\/v2\/media\/347765"}],"wp:attachment":[{"href":"https:\/\/pdfstandards.shop\/wp-json\/wp\/v2\/media?parent=347762"}],"wp:term":[{"taxonomy":"product_cat","embeddable":true,"href":"https:\/\/pdfstandards.shop\/wp-json\/wp\/v2\/product_cat?post=347762"},{"taxonomy":"product_tag","embeddable":true,"href":"https:\/\/pdfstandards.shop\/wp-json\/wp\/v2\/product_tag?post=347762"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}