Other IT Certification Services
Apart from certifying electronic identification and trust services in accordance with the eIDAS regulation, as well as document management software used by public sector organisations, our accreditation also allows us to certify a wide range of other devices, software and services. See below the normative documents on which we base our further accredited quality certification services.
Certification of the Security of IT Equipment and Services
In this field, we provide certification services based on the following normative documents:
ISO/IEC 15408-1:2009 | ISO/IEC 15408-1:2009 Information technology ? Security techniques ? Evaluation criteria for IT security ? Part 1: Introduction and general model |
ISO/IEC 15408-2:2008 | ISO/IEC 15408-2:2009 Information technology ? Security techniques ? Evaluation criteria for IT security ? Part 2: Security functional components |
ISO/IEC 15408-3:2008 | ISO/IEC 15408-3:2009 Information technology ? Security techniques ? Evaluation criteria for IT security ? Part 3: Security assurance components |
ISO/IEC 19790:2015 | Information technology ? Security techniques ? Security requirements for cryptographic modules |
Certification of Digital Archiving Software and Applications
In this field, we provide certification services based on the following normative documents:
Decree No. 114/2007. (XII.29.) GKM | On the rules of digital archiving 2., 3., 4. és 5.§ Recommendation about the safety requirements for the systems used for electronic archiving services, NHH, June 2008 |
Decree No.1/2018. (VI. 29.) ITM | On the rules of digital archiving |
Certification of Electronic Signature Products
In this field, we provide certification services based on the following normative documents:
CWA 14167-1:2003 | Security Requirements for Trustworthy Systems Managing Certificates for Electronic Signatures ? Part 1: System Security Requirements |
CWA 14170:2004 | Security requirements for signature creation applications |
CWA 14171:2004 | General guidelines for electronic signature verification |
ETSI TS 119 101 V1.1.1 (2016-03) |
Electronic Signatures and Infrastructures (ESI); Policy and security requirements for applications for signature creation and signature validation |
EN 419251-1:2013 | Security requirements for device for authentication. Protection profile for core functionality |
EN 419251-2:2013 | Security requirements for device for authentication. Protection profile for extension for trusted channel to certificate generation application |
EN 419251-3:2013 | Security requirements for device for authentication. Additional functionality for security targets |
CEN/TS 419 261:2015 | Security requirements for trustworthy systems managing certificates and time-stamps |
Certification of Electronic Signature Systems
In this field, we provide certification services based on the following normative documents:
CWA 14167-1:2003 |
Security Requirements for Trustworthy Systems Managing Certificates for Electronic Signatures ? Part 1: System Security Requirements |
CWA 14170:2004 | Security requirements for signature creation applications |
CWA 14171:2004 | General guidelines for electronic signature verification |
ETSI TS 119 101 V1.1.1 (2016-03) |
Electronic Signatures and Infrastructures (ESI); Policy and security requirements for applications for signature creation and signature validation |
EN 419 231 | Protection profile for trustworthy systems supporting time stamping |
CEN/TS 419 241:2014 |
Security Requirements for Trustworthy Systems Supporting Server Signing
|
EN 419241-1:2018 | Trustworthy Systems Supporting Server Signing. General System Security Requirements |
EN 419241-2 | Trustworthy Systems Supporting Server Signing. Part 2. Protection profile for QSCD for Server Signing |
CEN/TS 419 261:2015 |
Security requirements for trustworthy systems managing certificates and time-stamps
|
Certification of Systems Used for Generating Electronic Copies of Paper-Based Documents
In this field, we provide certification services based on the following normative document:
§ 55-58. of Decree No. 451/2016. (XII. 19.) Korm. |
On the detailed rules of electronic administration, Chapter III, The rules of creating electronic copies of paper-based documents |