Other IT Certification Services

Apart from certifying electronic identification and trust services in accordance with the eIDAS regulation, as well as document management software used by public sector organisations, our accreditation also allows us to certify a wide range of other devices, software and services. See below the normative documents on which we base our further accredited quality certification services.

Certification of the Security of IT Equipment and Services

In this field, we provide certification services based on the following normative documents:

ISO/IEC 15408-1:2009 ISO/IEC 15408-1:2009 Information technology – Security techniques – Evaluation criteria for IT security – Part 1: Introduction and general model
ISO/IEC 15408-2:2008 ISO/IEC 15408-2:2009 Information technology – Security techniques – Evaluation criteria for IT security – Part 2: Security functional components
ISO/IEC 15408-3:2008 ISO/IEC 15408-3:2009 Information technology – Security techniques – Evaluation criteria for IT security – Part 3: Security assurance components
ISO/IEC 19790:2015 Information technology — Security techniques — Security requirements for cryptographic modules

Certification of Digital Archiving Software and Applications

In this field, we provide certification services based on the following normative documents:

Decree No. 114/2007. (XII.29.) GKM On the rules of digital archiving 2., 3., 4. és 5.§
Recommendation about the safety requirements for the systems used for electronic archiving services, NHH, June 2008
Decree No.1/2018. (VI. 29.) ITM On the rules of digital archiving

Certification of Electronic Signature Products

In this field, we provide certification services based on the following normative documents:

CWA 14167-1:2003 Security Requirements for Trustworthy Systems Managing Certificates for Electronic Signatures – Part 1: System Security Requirements
CWA 14170:2004 Security requirements for signature creation applications
CWA 14171:2004 General guidelines for electronic signature verification
ETSI TS 119 101 V1.1.1 (2016-03)

Electronic Signatures and Infrastructures (ESI);

Policy and security requirements for applications

for signature creation and signature validation

EN 419251-1:2013 Security requirements for device for authentication. Protection profile for core functionality
EN 419251-2:2013 Security requirements for device for authentication. Protection profile for extension for trusted channel to certificate generation application
EN 419251-3:2013 Security requirements for device for authentication. Additional functionality for security targets
CEN/TS 419 261:2015 Security requirements for trustworthy systems managing certificates and time-stamps

Certification of Electronic Signature Systems

In this field, we provide certification services based on the following normative documents:

CWA 14167-1:2003

Security Requirements for Trustworthy Systems Managing

Certificates for Electronic Signatures – Part 1: System Security Requirements

CWA 14170:2004 Security requirements for signature creation applications
CWA 14171:2004 General guidelines for electronic signature verification
ETSI TS 119 101 V1.1.1 (2016-03)

Electronic Signatures and Infrastructures (ESI);

Policy and security requirements for applications

for signature creation and signature validation

EN 419 231 Protection profile for trustworthy systems supporting time stamping
CEN/TS 419 241:2014

Security Requirements for Trustworthy Systems Supporting Server Signing

 

EN 419241-1:2018 Trustworthy Systems Supporting Server Signing. General System Security Requirements
EN 419241-2 Trustworthy Systems Supporting Server Signing. Part 2. Protection profile for QSCD for Server Signing
CEN/TS 419 261:2015

Security requirements for trustworthy systems managing certificates and time-stamps

 

Certification of Systems Used for Generating Electronic Copies of Paper-Based Documents

In this field, we provide certification services based on the following normative document:

§ 55-58. of Decree No. 451/2016.
(XII. 19.) Korm.
On the detailed rules of electronic administration, Chapter III, The rules of creating electronic copies of paper-based documents