FAQGLOBAL

ETSI Standards Hub FAQ

Frequently asked questions about ETSI cybersecurity standards, trust services standards, and audit-ready evidence.

Grounded in the current ETSI publications linked from this hub and written for teams that need practical selection and evidence guidance.

Author
Sorena AI
Published
Mar 4, 2026
Updated
Mar 4, 2026
Questions
11

Structured answer sets in this page tree.

Primary sources
6

Cited legal and guidance references.

Publication metadata
Sorena AI
Published Mar 4, 2026
Updated Mar 4, 2026
Overview

This FAQ focuses on implementation and evidence. It is not legal advice. Validate interpretation against current ETSI primary sources, because version drift is one of the easiest ways to make an ETSI evidence pack unreliable.

Question 1

What are the current ETSI editions covered by this hub?

The hub is pinned to the current ETSI editions reflected in the linked standard pages: EN 303 645 V3.1.3 for the consumer IoT baseline, TS 103 701 V2.1.1 for the corresponding assessment method, EN 319 401 V3.1.1 for general TSP requirements, EN 319 411-1 V1.5.1 for general certificate issuance, and EN 319 411-2 V2.6.1 for qualified certificate issuance.

That matters because older internal guides often still point to EN 303 645 V2.1.1 or earlier trust-service editions. If your control matrix and your cited edition do not match, audit confidence drops immediately.

  • Pin title, version, and publication date in scope documents and evidence packs
  • Monitor ETSI milestones or work-item pages for revisions before re-baselining
Question 2

Is ETSI a law or a standard?

ETSI publishes standards and technical specifications. ETSI documents are not laws by themselves, but they are frequently referenced by laws, schemes, procurement requirements, certification programs, and audits.

In practice, ETSI becomes "mandatory" when a regulation, customer, or assurance scheme requires you to follow a specific ETSI EN/TS (often pinned to a version).

  • Law/regulation: defines legal obligations and enforcement
  • ETSI standard/spec: defines technical or policy requirements and evidence expectations
  • Assurance scheme: decides how the standard is assessed and what evidence is acceptable
Question 3

Is ETSI EN 303 645 mandatory for IoT products?

ETSI EN 303 645 is a baseline requirements standard for consumer IoT cybersecurity and data protection provisions. Whether it is "mandatory" depends on your market and assurance context.

Many organizations adopt EN 303 645 as a practical baseline because it provides a consolidated set of outcome-focused requirements that can be translated into product security controls, tests, and evidence.

  • Treat it as a baseline: integrate into secure development, release gates, and update support policy
  • Make it auditable: map each requirement to an owner, verification method, and evidence artifact
  • Use the conformance assessment spec (TS 103 701) when assessment/test-case structure is required
Question 4

What is the difference between ETSI EN 303 645 and ETSI TS 103 701?

Think of EN 303 645 as the baseline requirements for consumer IoT security outcomes and TS 103 701 as the conformance-assessment method for testing those outcomes in a structured, repeatable way.

The current ETSI stack matters here: TS 103 701 V2.1.1 was updated to align the assessment method to EN 303 645 V3.1.3. Using a mismatched pair can invalidate your test assumptions.

  • EN 303 645: baseline requirements and provisions to implement and evidence
  • TS 103 701: assessment procedure, test scenarios, documentation inputs (ICS/IXIT), and verdict approach
  • Use both when you need baseline implementation plus lab-ready, repeatable assessment
Question 5

What does ETSI EN 319 401 cover for Trust Service Providers (TSPs)?

ETSI EN 319 401 provides general policy requirements for Trust Service Providers relating to electronic signatures and trust infrastructures. It is organized around risk assessment, policies and practices, and TSP management and operation.

Operationally, it reads like an audit blueprint: internal organization and reliability, segregation of duties, HR security, asset management, access control, cryptographic controls, physical security, operations and network security, and incident management with monitoring and logging.

  • Risk assessment and risk treatment approach for trust services
  • Policy documentation: trust service practice statement, terms and conditions, information security policy
  • Operational controls: monitoring/logging, incident response, reporting, post-incident review
Question 6

When do I need ETSI EN 319 411-1 vs ETSI EN 319 411-2?

The EN 319 411 series focuses on certificate policy and certificate issuance expectations. Part 1 covers certificate policy requirements in general issuance contexts. Part 2 covers qualified certificate policy and qualified certificate issuance requirements under the eIDAS-aligned qualified context.

If your assurance target involves qualified trust services, qualified certificates, QSCD obligations, and trusted-list validation, Part 2 is usually the right starting point. If you need general certificate-policy requirements outside that qualified context, Part 1 is usually the starting point.

  • Use EN 319 411-1 for certificate policy requirements (Part 1) when you are not in a qualified context
  • Use EN 319 411-2 for qualified certificate policy and qualified certificate issuance requirements (Part 2)
  • Keep your certificate policy boundary explicit: which certificates, which relying parties, which assurance statement
Question 7

How does ETSI relate to eIDAS?

eIDAS (Regulation (EU) No 910/2014) is the legal framework for electronic identification and trust services in the EU. ETSI trust-service standards commonly include informative mapping and alignment to eIDAS concepts and expectations.

In implementation terms, eIDAS defines what the trust service must achieve legally, while ETSI standards help translate that into policy requirements, operational controls, and evidence patterns that can be assessed.

  • Use eIDAS for legal obligations and definitions
  • Use ETSI EN 319 401 for TSP policy and operational control expectations
  • Use EN 319 411 series for certificate policy and certificate issuance requirements
Question 8

What evidence is usually expected for ETSI assessments and audits?

The most common audit failure is not missing controls - it is missing proof. Evidence must be traceable to requirements, attributable to owners, and current enough to be credible.

A good ETSI evidence pack looks like a system: clause-to-control mapping, verification approach, and a set of concrete artifacts (policies, configurations, logs, test reports, training records, drills, corrective actions) with review cadence.

  • Traceability: ETSI requirement/test scenario -> control -> verification -> evidence artifact
  • Attribution: owner, approver, scope, and version pinned for each artifact
  • Freshness: review cadence and triggers (release, incident, supplier change)
  • Repeatability: evidence is produced the same way every time (not one-off screenshots)
Question 9

Can ISO 27001 replace ETSI standards?

Usually, no. ISO/IEC 27001 is a management system standard; ETSI standards are often product- or service-specific assurance specifications. They answer different questions.

A strong approach is to combine them: ISO 27001/27002 provides the governance and control catalogue that keeps operations consistent, while ETSI provides the clause-level requirements, test scenarios, and assurance expectations for the specific product or trust service.

  • ISO = governance system and control catalogue
  • ETSI = domain-specific requirements and assurance questions
  • Best practice = one evidence pack with both an ISO view and an ETSI clause view
Question 10

Do ETSI standards include deadlines or timelines?

ETSI standards are not project plans. They do not usually define "your deadline" for compliance. They define requirements, provisions, policy expectations, and (in some cases) assessment/test scenarios.

Some ETSI EN documents include publication/adoption/transposition metadata and version change history. Treat that as document lifecycle information, not as your organizational compliance timeline.

  • Your timeline comes from: regulation/scheme deadlines, contracts, and your release cycle
  • Use ETSI for requirements and evidence expectations, then build your timeline internally
  • Pin the ETSI version you are implementing to avoid version drift in audits
Question 11

How do we keep up with ETSI revisions and version changes?

For audit stability, always pin the ETSI document version in scope and in your evidence pack. Then decide how you will monitor updates and when you will re-baseline your implementation.

A practical approach is to monitor ETSI milestones and key work-item pages, run a periodic delta review for standards in scope, and only adopt new versions through a controlled change process that updates the mapping, tests, and evidence pack.

  • Pin version in scope: title + version + publication date in your evidence pack
  • Monitor ETSI status/milestones and release notes
  • Run controlled change: delta mapping -> control/test updates -> evidence refresh
Recommended next step

Use ETSI Standards Hub FAQ as a cited research workflow

Research Copilot can take ETSI Standards Hub FAQ from cited answers to recurring questions on this topic to a reusable workflow inside Sorena. Teams working on ETSI Standards Hub can keep owners, evidence, and next steps aligned without copying this guide into separate documents.

Primary sources

References and citations

etsi.org
Referenced sections
  • Current general policy requirements for trust service providers.
etsi.org
Referenced sections
  • Current certificate policy requirements for general issuance contexts.
etsi.org
Referenced sections
  • Official ETSI revision and status page for monitoring version changes.
etsi.org
Referenced sections
  • Current assessment methodology and test scenarios for EN 303 645.
Related guides

Explore more topics