Artifact GuideGLOBAL

ETSI EN 319 401 FAQ

Fast, operational answers for TSP security, engineering, and audit teams.

Focused on what you need to build, how to prove it, and what auditors sample most often.

Author
Sorena AI
Published
Mar 4, 2026
Updated
Mar 4, 2026
Questions
9

Structured answer sets in this page tree.

Primary sources
2

Cited legal and guidance references.

Publication metadata
Sorena AI
Published Mar 4, 2026
Updated Mar 4, 2026
Overview

This FAQ focuses on practical implementation and evidence. It's written for teams responsible for trust service operations, security controls, incident handling, and audit readiness.

Question 1

What is ETSI EN 319 401 (in plain language)?

ETSI EN 319 401 is a European Standard that defines general policy requirements for Trust Service Providers. It covers how a TSP should manage risk, define policies and practices, run secure operations, detect/respond/report incidents, and retain evidence.

It's often used as an operational blueprint under legal frameworks like eIDAS and as a baseline for conformity assessment and procurement assurance.

  • Think of it as how a TSP should operate securely, not only what to document
  • Operational proof (scans, logs, incident records) matters more than paper policies
Question 2

What changed in the current V3.1.1 release?

The current release is ETSI EN 319 401 V3.1.1 (2024-06), adopted on 30 May 2024, with national endorsement and withdrawal milestones falling on 28 February 2025. The standard also states that the 2024 revision updates the document to take NIS2 into account and refreshes references such as ISO/IEC 27002:2022.

In practice, teams using older internal mappings should review requirement numbering, monitoring and incident-management language, and supply-chain expectations before reusing older audit packs.

  • Confirm that internal control matrices reference the current REQ numbering
  • Refresh legacy evidence packs that were built against older V2.x summaries
  • Make sure NIS2-aware incident and risk management language is reflected in procedures and reporting plans
Question 3

What is a Trust Service Practice Statement and why do auditors care?

EN 319 401 requires the TSP to have a statement of practices and procedures addressing applicable trust service policy requirements and to make relevant documentation available to subscribers and relying parties as necessary to demonstrate conformance.

Auditors care because it's the bridge between requirements and reality: it explains how your service is operated and what evidence exists (without exposing sensitive details).

  • Keep it versioned with a review cadence and change control
  • Tie it to operational procedures and evidence index links
Question 4

How should we use risk assessment (REQ-5) in practice?

REQ-5 requires risk assessment and risk treatment measures commensurate to risk, with management approval and regular review. The common failure is treating risk as a standalone document.

Make risk outputs drive control changes: monitoring coverage, scan cadence, segmentation changes, and incident response capacity.

  • Risk register -> risk treatment plan -> control implementation -> evidence generation
  • Use risk reviews to justify cadence changes (but document and defend them)
Question 5

Do we really need quarterly vulnerability scans?

EN 319 401 requires regular vulnerability scans and evidence that scans were performed by a competent and independent party. It also recommends that the scan should be performed once per quarter.

If you choose a different cadence, be prepared to justify it via risk assessment, exposure, and compensating controls. Quarterly is the defensible default for most TSP scopes.

  • Keep scan scope inventory (public/private IPs) and evidence of competence/independence
  • Track remediation outcomes and risk acceptance decisions when applicable
Question 6

When do we need penetration tests?

EN 319 401 requires penetration testing after infrastructure or application upgrades/modifications that the TSP determines are significant.

The key is to define significance in your program, for example new trust service components, major network changes, or privileged access redesign, and prove you applied the trigger consistently.

  • Define a change classification that triggers pen tests
  • Keep evidence: change ticket -> trigger decision -> pen test report -> remediation proof
Question 7

What does 24 hour reporting readiness mean here?

EN 319 401 includes requirements to establish procedures to notify appropriate parties of significant-impact breaches within 24 hours of breach identification and to comply with reporting obligations in relevant legislative frameworks.

Operationally: you need detection, categorization, escalation, and a prepared communication and reporting workflow that can execute within the time window.

  • Practice: tabletop exercises and post-incident reviews to prove the workflow works
  • Evidence: incident records, timestamps, stakeholder notifications, and supervisory reporting logs
Question 8

Why does UTC time synchronization matter for audit logs?

EN 319 401 requires synchronizing the time used to record audit log events with UTC at least once per day. This is about legal defensibility and incident reconstruction.

If time integrity is weak, your incident timelines and audit evidence can be challenged.

  • Keep daily UTC sync evidence and monitor for drift
  • Ensure time is consistent across systems, logs, and retained evidence archives
Question 9

How should we handle outsourcing and cloud providers?

EN 319 401 does not let a TSP outsource responsibility. When suppliers, cloud providers, or external trust service components are used, the TSP remains responsible for conformance with the supply-chain policy, information security policy, and the applicable trust service policy.

Operationally, that means contracts, service levels, review cycles, and incident-response interfaces must all be part of the evidence system.

  • Keep documented agreements and named security obligations for each relevant supplier
  • Review supplier cybersecurity practices at planned intervals and after relevant incidents
  • Record which controls are implemented by the TSP and which are implemented by the supplier
Recommended next step

Use ETSI EN 319 401 FAQ as a cited research workflow

Research Copilot can take ETSI EN 319 401 FAQ from cited answers to recurring questions on this topic to a reusable workflow inside Sorena. Teams working on ETSI EN 319 401 can keep owners, evidence, and next steps aligned without copying this guide into separate documents.

Primary sources

References and citations

Related guides

Explore more topics