Artifact GuideGLOBAL

ETSI EN 319 411-1 Compliance

A compliance playbook for certificate issuing TSPs that produces defensible evidence by default.

Focus: CP and CPS quality, repository governance, identity validation, lifecycle controls, revocation and status services, and evidence retention that withstands audits and relying-party scrutiny.

Author
Sorena AI
Published
Mar 4, 2026
Updated
Mar 4, 2026
Sections
8

Structured answer sets in this page tree.

Primary sources
3

Cited legal and guidance references.

Publication metadata
Sorena AI
Published Mar 4, 2026
Updated Mar 4, 2026
Overview

ETSI EN 319 411-1 compliance is not a document exercise. It is a production system: you publish CP, CPS, and disclosure artifacts; run identity validation and authenticated requests; execute certificate lifecycle state transitions reliably; and prove it all through logs and archives that remain usable years later. This page translates the current V1.5.1 standard into a practical operating program for certificate issuing CAs and TSPs.

Section 1

1) Define scope and services like a relying party would

Start by explicitly scoping which certificate services you provide, which certificate policies you assert, and which operational components are in scope, including RA functions, CA signing systems, status infrastructure, repositories, and outsourced service components.

Your scope statement is the foundation for every assessment and every customer assurance request. If you cannot state which policy identifiers map to which service instances and which systems support them, the rest of the compliance program will drift.

  • Service inventory: certificate types, policy identifiers asserted, relying-party communities, and whether the service is public web PKI or another trust model
  • System inventory: signing systems, issuance pipelines, identity-proofing systems, repositories, and status endpoints
  • Role inventory: registration officers, revocation officers, privileged operators, security administrators, and external service providers
Section 2

2) Build the CP, CPS, and repository program

EN 319 411-1 draws a clear boundary: CP communicates what requirements are adhered to, while CPS communicates how you adhere to them. Low-level operational procedures may remain internal, but the public set still has to be accurate, versioned, and easy to discover.

Do not treat repository responsibilities as a publishing afterthought. The public repository is how subscribers, subjects, relying parties, and assessors understand what was in force when a certificate was issued, changed, or revoked.

  • CP and CPS versioning with effective dates, change history, stable URLs, and controlled approvals
  • Terms and conditions plus PKI disclosure content that accurately reflects revocation and status-service behavior
  • Change control and notice process for subscribers and relying parties when public documentation changes
Section 3

3) Identity validation and authenticated requests as a control system

Identity validation must be consistent with your policy and certificate type. EN 319 411-1 covers naming, initial identity validation, and identification and authentication for re-key and revocation requests.

Treat request authentication as the heart of trust. Fraudulent re-key and fraudulent revocation are catastrophic failure modes. If identity proofing or RA work is delegated, the TSP still owns the policy outcome and the evidence trail.

  • Define validation depth by policy and record the evidence of checks performed for each issuance path
  • Authenticate re-key and revocation requests with strong controls, clear authorization rules, and tested exception handling
  • Log validation decisions, delegated-party involvement, and exceptions so disputes can be resolved years later
Section 4

4) Lifecycle operations: make state transitions traceable

EN 319 411-1 covers certificate application processing, issuance, acceptance, renewal, re-key, modification, revocation or suspension, and end of subscription. The compliance goal is a reliable state machine with evidence.

If a certificate changes state, you should be able to reconstruct why, who authorized it, what checks were performed, and what was published to relying parties.

  • Workflow: request, validation, issuance, acceptance, monitoring, and change events with clear ownership
  • Separation of duties and privileged-access controls around issuance, re-key, modification, and revocation functions
  • Operational metrics: issuance lead time, re-key lead time, revocation lead time, status propagation delay, and repository update delay
Section 5

5) Revocation and suspension program

Revocation must be timely and based on authorized, validated requests. EN 319 411-1 includes detailed expectations for revocation handling and also addresses short-term certificates where certain revocation requirements may not apply.

Even when certificates are non-revocable in a short-term model, you still need a problem-reporting channel, documented handling, and audit logging of notified problems. The compliance question is not just whether you revoked, but whether you can prove you handled the event correctly under the policy in force.

  • Revocation request intake: channels, authentication, authorization, escalation, and evidence-retention rules
  • Timeliness objectives with measured performance and exception handling when response targets are missed
  • Short-term certificates: explicit non-revocation model, problem-report workflow, and public status interpretation guidance
Section 6

6) Status services are production infrastructure

EN 319 411-1 expects revocation status information to be available 24 by 7 and for multi-method status offerings such as CRL and online status to stay consistent over time, with interpretation documented when delay windows exist.

In practice, assessors will sample availability evidence, update propagation evidence, and failure behavior. Treat status endpoints as customer-facing infrastructure, not a side service hidden behind the CA.

  • Availability objectives: 24 by 7 with a CPS-defined maximum outage; monitor and report outages
  • Consistency controls: ensure revocation updates propagate across CRL and online-status paths and explain interpretation if a delay window exists
  • Public and international reach: treat endpoints as globally reachable dependencies with tested recovery
Section 7

7) Underlying control environment: people, keys, resilience, and termination

EN 319 411-1 also covers facility, management, and operational controls. That means physical security, personnel controls, procedural controls, key changeover, compromise handling, disaster recovery, and CA or RA termination are part of the compliance story.

If your issuance workflow is strong but privileged access, key custody, or disaster recovery is weak, the certificate service is still weak. Evidence should show how trusted roles are governed and how the service survives compromise or major outage.

  • Trusted-role governance, least privilege, dual control, and secure onboarding and offboarding for sensitive operators
  • Key changeover, compromise response, and disaster-recovery plans that include repository and status-service continuity
  • Termination and transition procedures so certificates, archives, and relying-party information remain manageable if service ownership changes
Section 8

8) Evidence operations: audit logging, archival, and retention

EN 319 411-1 includes audit logging procedures and records archival as core controls. Evidence is the difference between thinking you comply and proving you complied.

Retention has to be engineered into storage systems and procedures. The ETSI material anchors retention at at least seven years after any certificate based on the records ceases to be valid, so design archives around that floor where those records apply.

  • Audit logging: issuance actions, validation steps, re-key events, revocation events, repository changes, and status-service changes
  • Records archival: integrity, confidentiality, access governance, and retrieval procedures for proceedings and assessments
  • Retention schedule by record type with tested enforcement rather than a policy statement that storage systems ignore
Recommended next step

Turn ETSI EN 319 411-1 Compliance into an operational assessment

Assessment Autopilot can take ETSI EN 319 411-1 Compliance from operationalizing the guidance into a tracked program to a reusable workflow inside Sorena. Teams working on ETSI EN 319 411-1 can keep owners, evidence, and next steps aligned without copying this guide into separate documents.

Primary sources

References and citations

etsi.org
Referenced sections
  • Useful for aligning EN 319 411-1 evidence packages with conformity-assessment expectations.
Related guides

Explore more topics