Artifact GuideGLOBAL

ETSI EN 319 411-1 Requirements

A practical requirements map for TSPs/Certification Authorities issuing certificates (general requirements).

Use this current-edition guide to convert ETSI EN 319 411-1 V1.5.1 into CP/CPS content, lifecycle controls, repository duties, and evidence you can defend with auditors and relying parties.

Author
Sorena AI
Published
Mar 4, 2026
Updated
Mar 4, 2026
Sections
9

Structured answer sets in this page tree.

Primary sources
3

Cited legal and guidance references.

Publication metadata
Sorena AI
Published Mar 4, 2026
Updated Mar 4, 2026
Overview

ETSI EN 319 411-1 V1.5.1 is operational by design: it defines policy and security requirements for certificate issuance, maintenance, and lifecycle management. The fastest way to implement it is to treat each requirement family as a control system with documented commitments, operational reality, and evidence trails that remain usable years later. The current edition was adopted on 24 March 2025 and published by ETSI on 7 April 2025, so update older internal cross references if they still point to prior versions.

Section 1

1) Documentation stack: CP vs CPS vs terms & PKI disclosure statement

ETSI EN 319 411-1 is built around how relying parties and auditors understand certificate services. The Certificate Policy communicates what quality and assurance you claim. The Certification Practice Statement communicates how you implement and operate that policy. Terms and conditions, including the PKI disclosure statement, communicate key reliance and operational information to subscribers, subjects, and relying parties.

A compliance anti-pattern is oversharing internal procedures publicly. The standard allows low-level operational procedures to remain internal, while the published CPS can be limited to information useful for external parties and complemented by confidential internal elements. That split should be intentional, version-controlled, and reflected in your document hierarchy.

  • CP: what is adhered to, including policy scope, quality level, applicability, and identifiers
  • CPS: how it is adhered to, including the operational controls the issuing TSP actually runs
  • Terms and conditions plus PKI disclosure statement: concise relying-party information, liability framing, and service commitments
Section 2

2) Policy identifiers and the reference certificate policies you must implement correctly

Certificates communicate policy via a CP identifier and documentation references. ETSI EN 319 411-1 defines multiple reference certificate policies, including NCP, NCP+, LCP, and the TLS-focused DVCP, OVCP, IVCP, and EVCP variants.

If you assert a policy identifier in publicly trusted TLS certificates, EN 319 411-1 expects you to adhere to the corresponding policy requirements and to track the full current CA Browser Forum baseline or extended validation material where the standard says those external requirements take precedence.

  • Define which CP families you support and how relying parties discover the applicable CP and CPS for each certificate type
  • Keep certificate profiles, subject-data rules, and documentation references aligned with the policy identifier you assert
  • Treat every policy OID as an auditable commitment that has to stay synchronized with external baseline requirements when applicable
Section 3

3) Publication, repository, and reliance transparency

Certificate ecosystems fail when relying parties cannot find authoritative information. EN 319 411-1 expects publication and repository responsibilities to be clear: what documentation is public, where it is hosted, how updates are communicated, and how historical versions are retained for reliance and legal evidence.

Design the repository as a stable interface for subscribers, subjects, relying parties, and assessors. Version history, effective dates, and change notices should be easy to find and should match the documents actually in force at the time of issuance or revocation decisions.

  • Public repository with CP, CPS, terms and conditions, PKI disclosure content, and version history
  • Document how relying parties obtain status information and how to interpret delays or temporary inconsistencies across CRL and online status services
  • Retain historical public versions so investigations and legal reliance questions can be answered against the correct edition
Section 4

4) Identity validation and authenticated requests (issuance, re-key, revocation)

Identity validation is not only for issuance. EN 319 411-1 covers naming and initial identity validation and also identification and authentication for re-key requests and revocation requests.

Treat request authentication as a high-risk control. Fraudulent re-key and fraudulent revocation can be as damaging as bad initial vetting. If identity proofing or RA activity is delegated to separate components or suppliers, the evidence still has to satisfy the policy you assert.

  • Define identity proofing depth by certificate policy and service risk, including natural-person, organization, and website-validation cases
  • Protect re-key and revocation requests with strong authentication, authorization checks, and clear exception handling
  • Log validation evidence, delegated-party roles, and approval decisions so later audits can reconstruct who verified what and when
Section 5

5) Certificate lifecycle operational requirements (make it observable)

EN 319 411-1 addresses certificate application and processing, issuance, acceptance, renewal, re-key, modification, and end of subscription, plus key escrow/recovery where applicable.

The implementation goal is consistent state transitions with evidence: every certificate lifecycle event should be traceable to a request, an authorization decision, and an immutable audit record.

  • Lifecycle state machine defined in CPS: request, validation, issuance, acceptance, renewal, re-key, modification, revocation or suspension, and end of subscription
  • Separation of duties between registration, issuance, and revocation roles where applicable
  • Operational KPIs: validation lead time, issuance lead time, revocation lead time, status freshness, and repository update lag
Recommended next step

Turn ETSI EN 319 411-1 Requirements into an operational assessment

Assessment Autopilot can take ETSI EN 319 411-1 Requirements from turning the requirements into assigned actions to a reusable workflow inside Sorena. Teams working on ETSI EN 319 411-1 can keep owners, evidence, and next steps aligned without copying this guide into separate documents.

Section 6

6) Revocation and suspension (timeliness + authorization + evidence)

Revocation controls must be both secure and fast. EN 319 411-1 requires timely revocation based on authorized and validated revocation requests, and it contains detailed expectations for how revocation is handled across different certificate types, including short-term certificates.

One subtle but critical operational requirement is that short-term certificates do not remove your incident-handling burden. If you issue short-term certificates that cannot be revoked, you still need a documented way to handle and record reported problems, explain how issues can be notified, and publish how relying parties can obtain status information or no-revocation signaling.

  • Authorized request validation: clear rules for who can request revocation and how they authenticate
  • Timeliness targets for revocation processing and evidence of actual performance against those targets
  • Short-term certificates: explicit non-revocable model, problem-report intake, audit logging, and signaling design
Section 7

7) Certificate status services (OCSP/CRL): availability, consistency, and interpretation

Relying parties need reliable revocation status. EN 319 411-1 covers certificate status services and includes expectations such as 24 by 7 availability and consistency across methods when both CRL and online status are offered.

Treat OCSP and CRL as critical production services. Monitor availability, latency, freshness, correctness, and propagation behavior, then explain in the CPS how relying parties should interpret any documented delay window between status channels.

  • Availability objective: status information available 24 by 7 with a CPS-defined maximum outage period
  • Multi-method consistency: if CRL and OCSP are both offered, ensure revocation updates propagate across methods and document the interpretation rules
  • Public reachability: treat status endpoints as internationally reachable dependencies with tested fallback and recovery paths
Section 8

8) Control environment behind issuance and status services

EN 319 411-1 is not limited to CP and CPS text. It also covers facility, management, and operational controls such as physical security, procedural controls, personnel controls, key changeover, compromise handling, disaster recovery, and CA or RA termination.

This matters because a strong CP or CPS cannot compensate for weak production discipline. Your evidence set needs to show who was authorized, how privileged actions were controlled, how critical keys were protected, and how service continuity was maintained when things went wrong.

  • Personnel and procedural controls around trusted roles, dual control, least privilege, and background governance
  • Operational resilience for compromise response, disaster recovery, repository continuity, and status-service recovery
  • Termination and transition planning so certificates, archives, and relying-party information remain manageable if a CA or RA function stops operating
Section 9

9) Audit logging, records archival, and retention (evidence that survives years)

EN 319 411-1 includes facility, management, and operational controls such as audit logging procedures and records archival. Evidence quality is often the decisive factor in assessments: you cannot prove correct operation without reliable logs and archives.

A practical retention anchor captured in the ETSI material is at least seven years after any certificate based on those records ceases to be valid. Treat retention as a design constraint for repositories, ticketing systems, identity-proofing evidence, revocation logs, and status-service telemetry.

  • Audit logs: issuance, validation, re-key, modification, revocation requests, actions taken, and status-service changes
  • Archival integrity: confidentiality, integrity controls, access governance, and retrieval procedures for legal proceedings and conformity assessment
  • Retention schedule: minimum retention aligned to certificate validity plus at least seven years after cessation where the record supports that certificate lifecycle
Primary sources

References and citations

Related guides

Explore more topics