{"id":347762,"date":"2024-10-20T00:27:51","date_gmt":"2024-10-20T00:27:51","guid":{"rendered":"https:\/\/pdfstandards.shop\/product\/uncategorized\/bs-iso-211882018-tc\/"},"modified":"2024-10-25T23:59:24","modified_gmt":"2024-10-25T23:59:24","slug":"bs-iso-211882018-tc","status":"publish","type":"product","link":"https:\/\/pdfstandards.shop\/product\/publishers\/bsi\/bs-iso-211882018-tc\/","title":{"rendered":"BS ISO 21188:2018 – TC"},"content":{"rendered":"
PDF Pages<\/th>\n | PDF Title<\/th>\n<\/tr>\n | ||||||
---|---|---|---|---|---|---|---|
155<\/td>\n | National foreword <\/td>\n<\/tr>\n | ||||||
160<\/td>\n | Foreword <\/td>\n<\/tr>\n | ||||||
162<\/td>\n | Introduction <\/td>\n<\/tr>\n | ||||||
164<\/td>\n | 1 Scope 2 Normative references <\/td>\n<\/tr>\n | ||||||
165<\/td>\n | 3 Terms and definitions <\/td>\n<\/tr>\n | ||||||
171<\/td>\n | 4 Abbreviated terms <\/td>\n<\/tr>\n | ||||||
172<\/td>\n | 5 Public key infrastructure (PKI) 5.1 General <\/td>\n<\/tr>\n | ||||||
173<\/td>\n | 5.2 What is PKI? 5.2.1 General <\/td>\n<\/tr>\n | ||||||
174<\/td>\n | 5.2.2 Public key infrastructure process flow 5.3 Business requirement impact on PKI environment 5.3.1 General 5.3.2 Illustration of certificate application in a closed environment <\/td>\n<\/tr>\n | ||||||
175<\/td>\n | 5.3.3 Illustration of certificate application in a contractual PKI environment <\/td>\n<\/tr>\n | ||||||
176<\/td>\n | 5.3.4 Illustration of certificate application in an open environment <\/td>\n<\/tr>\n | ||||||
178<\/td>\n | 5.4 Certification authority (CA) <\/td>\n<\/tr>\n | ||||||
179<\/td>\n | 5.5 Business perspectives 5.5.1 General 5.5.2 Business risks 5.5.3 Applicability 5.5.4 Legal issues 5.5.5 Regulatory issues 5.5.6 Business usage issues <\/td>\n<\/tr>\n | ||||||
180<\/td>\n | 5.5.7 Interoperability issues <\/td>\n<\/tr>\n | ||||||
181<\/td>\n | 5.5.8 Audit journal requirements <\/td>\n<\/tr>\n | ||||||
182<\/td>\n | 5.6 Certificate policy (CP) 5.6.1 General 5.6.2 Certificate policy usage <\/td>\n<\/tr>\n | ||||||
183<\/td>\n | 5.6.3 Certificate policies within a hierarchy of trust <\/td>\n<\/tr>\n | ||||||
184<\/td>\n | 5.6.4 Certificate status 5.7 Certification practice statement (CPS) 5.7.1 General 5.7.2 Authority <\/td>\n<\/tr>\n | ||||||
185<\/td>\n | 5.7.3 Purpose 5.7.4 Level of specificity 5.7.5 Approach 5.7.6 Audience and access 5.8 Agreements <\/td>\n<\/tr>\n | ||||||
186<\/td>\n | 5.9 Time-stamping <\/td>\n<\/tr>\n | ||||||
187<\/td>\n | 5.10 Trust models 5.10.1 Trust model considerations <\/td>\n<\/tr>\n | ||||||
188<\/td>\n | 5.10.2 Wildcard considerations 5.10.3 Relying party considerations <\/td>\n<\/tr>\n | ||||||
189<\/td>\n | 6 Certificate policy and certification practice statement requirements 6.1 Certificate policy (CP) <\/td>\n<\/tr>\n | ||||||
191<\/td>\n | 6.2 Certification practice statement (CPS) 7 Certification authority control procedures 7.1 General <\/td>\n<\/tr>\n | ||||||
192<\/td>\n | 7.2 CA environmental controls 7.2.1 Certification practice statement and certificate policy management <\/td>\n<\/tr>\n | ||||||
193<\/td>\n | 7.2.2 Security management <\/td>\n<\/tr>\n | ||||||
194<\/td>\n | 7.2.3 Asset classification and management <\/td>\n<\/tr>\n | ||||||
195<\/td>\n | 7.2.4 Personnel security <\/td>\n<\/tr>\n | ||||||
196<\/td>\n | 7.2.5 Physical and environmental security <\/td>\n<\/tr>\n | ||||||
197<\/td>\n | 7.2.6 Operations management <\/td>\n<\/tr>\n | ||||||
198<\/td>\n | 7.2.7 System access management <\/td>\n<\/tr>\n | ||||||
200<\/td>\n | 7.2.8 Systems development and maintenance 7.2.9 Business continuity management <\/td>\n<\/tr>\n | ||||||
202<\/td>\n | 7.2.10 Monitoring and compliance 7.2.11 Audit logging <\/td>\n<\/tr>\n | ||||||
206<\/td>\n | 7.3 CA key life cycle management controls 7.3.1 CA key generation <\/td>\n<\/tr>\n | ||||||
207<\/td>\n | 7.3.2 CA key storage, back-up and recovery <\/td>\n<\/tr>\n | ||||||
208<\/td>\n | 7.3.3 CA public key distribution <\/td>\n<\/tr>\n | ||||||
209<\/td>\n | 7.3.4 CA key usage 7.3.5 CA key archival and destruction <\/td>\n<\/tr>\n | ||||||
210<\/td>\n | 7.3.6 CA key compromise <\/td>\n<\/tr>\n | ||||||
211<\/td>\n | 7.4 Subject key life cycle management controls 7.4.1 CA-provided subject key generation services (if supported) 7.4.2 CA-provided subject key storage and recovery services (if supported) <\/td>\n<\/tr>\n | ||||||
212<\/td>\n | 7.4.3 Integrated circuit card (ICC) life cycle management (if supported) <\/td>\n<\/tr>\n | ||||||
214<\/td>\n | 7.4.4 Requirements for subject key management <\/td>\n<\/tr>\n | ||||||
215<\/td>\n | 7.5 Certificate life cycle management controls 7.5.1 Subject registration <\/td>\n<\/tr>\n | ||||||
216<\/td>\n | 7.5.2 Certificate renewal (if supported) <\/td>\n<\/tr>\n | ||||||
217<\/td>\n | 7.5.3 Certificate rekey 7.5.4 Certificate issuance <\/td>\n<\/tr>\n | ||||||
218<\/td>\n | 7.5.5 Certificate distribution <\/td>\n<\/tr>\n | ||||||
219<\/td>\n | 7.5.6 Certificate revocation 7.5.7 Certificate suspension (if supported) <\/td>\n<\/tr>\n | ||||||
220<\/td>\n | 7.5.8 Certificate validation services <\/td>\n<\/tr>\n | ||||||
221<\/td>\n | 7.6 Controlled CA termination <\/td>\n<\/tr>\n | ||||||
222<\/td>\n | 7.7 CA certificate life cycle management controls \u2014 subordinate CA certificate <\/td>\n<\/tr>\n | ||||||
224<\/td>\n | Annex A (informative) Management by certificate policy <\/td>\n<\/tr>\n | ||||||
233<\/td>\n | Annex B (informative) Elements of a certification practice statement <\/td>\n<\/tr>\n | ||||||
248<\/td>\n | Annex C (informative) Object identifiers (OID) <\/td>\n<\/tr>\n | ||||||
250<\/td>\n | Annex D (informative) CA key generation ceremony <\/td>\n<\/tr>\n | ||||||
254<\/td>\n | Annex E (informative) Mapping of RFC 2527 to RFC 3647 <\/td>\n<\/tr>\n | ||||||
255<\/td>\n | Annex F (normative) Certification authority audit journal contents and use <\/td>\n<\/tr>\n | ||||||
258<\/td>\n | Annex G (informative) Alternative trust models <\/td>\n<\/tr>\n | ||||||
270<\/td>\n | Bibliography <\/td>\n<\/tr>\n<\/table>\n","protected":false},"excerpt":{"rendered":" Tracked Changes. Public key infrastructure for financial services. Practices and policy framework<\/b><\/p>\n |