ISO 17090-3:2021
(Main)Health informatics - Public key infrastructure - Part 3: Policy management of certification authority
Health informatics - Public key infrastructure - Part 3: Policy management of certification authority
This document gives guidelines for certificate management issues involved in deploying digital certificates in healthcare. It specifies a structure and minimum requirements for certificate policies, as well as a structure for associated certification practice statements. This document also identifies the principles needed in a healthcare security policy for cross-border communication and defines the minimum levels of security required, concentrating on aspects unique to healthcare.
Informatique de santé — Infrastructure de clé publique — Partie 3: Gestion politique d'autorité de certification
General Information
Relations
Overview
ISO 17090-3:2021 - Health informatics - Public key infrastructure - Part 3: Policy management of certification authority - provides guidelines for certificate management when deploying digital certificates in healthcare. It specifies a structure and minimum requirements for certificate policies (CPs) and a structure for associated certification practice statements (CPSs). The standard identifies principles for healthcare security policies that support cross‑border communication and defines minimum security levels focused on aspects unique to healthcare PKI deployments.
Key Topics and Requirements
The standard organizes policy management requirements around practical PKI operations commonly needed in healthcare:
- Governance and assurance
- Need for a high level of assurance, availability and trust for healthcare PKI.
- Internet compatibility and facilitation of CP evaluation and comparison.
- Structure of policy documents
- Required structure and content for CPs and CPSs and their relationship.
- Publication and repositories
- Rules for repositories, publication frequency and access controls for certificate information.
- Identification and authentication
- Procedures for initial registration, identity validation, re‑keying and revocation requests.
- Certificate lifecycle
- Controls for application, issuance, acceptance, renewal, re‑keying, modification, revocation/suspension, status services (CRL/OCSP), and end of subscription.
- Security controls
- Physical controls, personnel and procedural controls, record archives, compromise and disaster recovery, and CA termination.
- Technical controls such as key pair generation, private key protection, activation data, computer and network security, time stamping.
- Profiles and audits
- Certificate, CRL and OCSP profile requirements and compliance audit procedures (frequency, scope, auditor independence).
- Legal and business matters
- Fees, financial responsibility, confidentiality, privacy, IP, warranties, liability, dispute resolution and governing law.
- Model PKI disclosure statement
- Template guidance for communicating PKI properties to relying parties.
Applications
ISO 17090-3:2021 is designed to guide secure use of digital certificates across healthcare use cases, including:
- Secure exchange of electronic health records (EHRs) and cross‑border patient data flows
- Authentication and signing for e‑prescriptions, clinical messaging and telemedicine
- Securing health information systems, device communications and interoperability gateways
- Implementing trustworthy Certification Authorities (CAs) that serve hospitals, health networks and national health services
Who Uses This Standard
- Healthcare IT architects and CISOs
- Certification Authority operators servicing healthcare
- Health system integrators and software vendors
- Regulators, auditors and compliance officers
- National health bodies planning cross‑border identity and trust frameworks
Related standards
- Other parts of the ISO 17090 series (complementary PKI guidance for healthcare)
- General PKI and cryptographic standards (ISO/IEC and regional standards) relevant to implementation and interoperability
Keywords: ISO 17090-3:2021, health informatics, public key infrastructure, PKI, certificate policy, certification authority, digital certificates, healthcare security, cross‑border communication, certificate management.
Standards Content (Sample)
INTERNATIONAL ISO
STANDARD 17090-3
Second edition
2021-03
Health informatics — Public key
infrastructure —
Part 3:
Policy management of certification
authority
Informatique de santé — Infrastructure de clé publique —
Partie 3: Gestion politique d'autorité de certification
Reference number
©
ISO 2021
© ISO 2021
All rights reserved. Unless otherwise specified, or required in the context of its implementation, no part of this publication may
be reproduced or utilized otherwise in any form or by any means, electronic or mechanical, including photocopying, or posting
on the internet or an intranet, without prior written permission. Permission can be requested from either ISO at the address
below or ISO’s member body in the country of the requester.
ISO copyright office
CP 401 • Ch. de Blandonnet 8
CH-1214 Vernier, Geneva
Phone: +41 22 749 01 11
Email: copyright@iso.org
Website: www.iso.org
Published in Switzerland
ii © ISO 2021 – All rights reserved
Contents Page
Foreword .v
Introduction .vi
1 Scope . 1
2 Normative references . 1
3 Terms and definitions . 1
4 Abbreviations. 1
5 Requirements for digital certificate policy management in a healthcare context.2
5.1 General . 2
5.2 Need for a high level of assurance . 2
5.3 Need for a high level of infrastructure availability . 2
5.4 Need for a high level of trust . 2
5.5 Need for Internet compatibility. 3
5.6 Need to facilitate evaluation and comparison of CPs . 3
6 Structure of healthcare CPs and healthcare CPSs . 3
6.1 General requirements for CPs . 3
6.2 General requirements for CPSs . 4
6.3 Relationship between a CP and a CPS . 4
6.4 Applicability . 4
7 Minimum requirements for a healthcare CP . 5
7.1 General requirements . 5
7.2 Publication and repository responsibilities. 5
7.2.1 Repositories . 5
7.2.2 Publication of certification information . 5
7.2.3 Frequency of publication . 5
7.2.4 Access controls on repositories . 5
7.3 Identification and authentication . 6
7.3.1 Initial registration . 6
7.3.2 Initial identity validation . 7
7.3.3 Identification and authentication for re-keying requests . 8
7.3.4 Identification and authentication for revocation request . 8
7.4 Certificate life-cycle operational requirements . 9
7.4.1 Certificate application . 9
7.4.2 Certificate application processing .10
7.4.3 Certificate issuance .10
7.4.4 Certificate acceptance .11
7.4.5 Key pair and certificate usage .11
7.4.6 Certificate renewal .12
7.4.7 Certificate re-key .13
7.4.8 Certificate modification .13
7.4.9 Certificate revocation and suspension .14
7.4.10 Certificate status services .17
7.4.11 End of subscription . .18
7.4.12 Private key escrow .18
7.5 Physical controls .18
7.5.1 General.18
7.5.2 Physical controls .18
7.5.3 Procedural controls .18
7.5.4 Personnel controls .18
7.5.5 Security audit logging procedures .18
7.5.6 Record archive .18
7.5.7 Key changeover .19
7.5.8 Compromise and disaster recovery .19
7.5.9 CA termination .19
7.6 Technical security controls .19
7.6.1 Key pair generation and installation .19
7.6.2 Private key protection .20
7.6.3 Other aspects of key management .22
7.6.4 Activation data .23
7.6.5 Computer security controls .23
7.6.6 Life-cycle technical controls .23
7.6.7 Network security controls .23
7.6.8 Time stamping .24
7.7 Certificate, CRL and OCSP profiles .24
7.8 Compliance audit .24
7.8.1 General.24
7.8.2 Frequency of CA compliance audit .24
7.8.3 Identity/qualifications of auditor .24
7.8.4 Auditor's relationship to audited party.24
7.8.5 Topics covered by audit .24
7.8.6 Actions taken as a result of deficiency .25
7.8.7 Communication of audit results .26
7.9 Other business and legal matters .26
7.9.1 Fees .26
7.9.2 Financial responsibility .26
7.9.3 Confidentiality of business information .26
7.9.4 Privacy of personal information .26
7.9.5 Intellectual property rights .27
7.9.6 Representations and warranties .27
7.9.7 Disclaimers of warranties .29
7.9.8 Limitations of liability .29
7.9.9 Indemnities .30
7.9.10 Term and termination .30
7.9.11 Individual notices and communication with participants .30
7.9.12 Amendments .30
7.9.13 Dispute resolution procedures .30
7.9.14 Governing law . .31
7.9.15 Compliance with applicable law .31
7.9.16 Miscellaneous provisions .31
8 Model PKI disclosure statement .31
8.1 Introduction .31
8.2 Structure of PKI disclosure statement .32
Bibliography .33
iv © ISO 2021 – All rights reserved
Foreword
ISO (the International Organization for Standardization) is a worldwide federation of national standards
bodies (ISO member bodies). The work of preparing International Standards is normally carried out
through ISO technical committees. Each member body interested in a subject for which a technical
committee has been established has the right to be represented on that committee. International
organizations, governmental and non-governmental, in liaison with ISO, also take part in the work.
ISO collaborates closely with the International Electrotechnical Commission (IEC) on all matters of
electrotechnical standardization.
The procedures used to develop this document and those intended for its further maintenance are
described in the ISO/IEC Directives, Part 1. In particular, the different approval criteria needed for the
different types of ISO documents should be noted. This document was drafted in accordance with the
editorial rules of the ISO/IEC Directives, Part 2 (see www .iso .org/ directives).
Attention is drawn to the possibility that some of the elements of this document may be the subject of
patent rights. ISO shall not be held responsible for identifying any or all such patent rights. Details of
any patent rights identified during the development of the document will be in the Introduction and/or
on the ISO list of patent declarations received (see www .iso .org/ patents).
Any trade name used in this document is information given for the convenience of users and does not
constitute an endorsement.
For an explanation of the voluntary nature of standards, the meaning of ISO specific terms and
expressions related to conformity assessment, as well as information about ISO's adherence to the
World Trade Organization (WTO) principles in the Technical Barriers to Trade (TBT), see www .iso .org/
iso/ foreword .html.
This document was prepared by Technical Committee ISO/TC 215, Health informatics.
This second edition cancels and replaces the first edition (ISO 17090-3:2008), of which it constitutes a
minor revision. The changes compared to the previous edition are as follows:
— update to references;
— editorial update.
A list of all parts in the ISO 17090 series can be found on the ISO website.
Any feedback or questions on this document should be directed to the user’s national standards body. A
complete listing of these bodies can be found at www .iso .org/ members .html.
Introduction
The healthcare industry is faced with the challenge of reducing costs by moving from paper-based
processes to automated electronic processes. New models of healthcare delivery are emphasizing the
need for patient information to be shared among a growing number of specialist healthcare providers
and across traditional organizational boundaries.
Healthcare information concerning individual citizens is commonly interchanged by means of
electronic mail, remote database access, electronic data interchange and other applications. The
Internet provides a highly cost-effective and accessible means of interchanging information, but it
is also an insecure vehicle that demands additional measures be taken to maintain the privacy and
confidentiality of information. Threats to the security of health information through unauthorized
access (either inadvertent or deliberate) are increasing. It is essential to have available to the healthcare
system reliable information security services that minimize the risk of unauthorized access.
How does the healthcare industry provide appropriate protection for the data conveyed across the
Internet in a practical, cost-effective way? Public key infrastructure (PKI) and digital certificate
technology seek to address this challenge.
The proper deployment of digital certificates requires a blend of technology, policy and administrative
processes that enable the exchange of sensitive data in an unsecured environment by the use of
“public key cryptography” to protect information in transit and “certificates” to confirm the identity
of a person or entity. In healthcare environments, this technology uses authentication, encipherment
and digital signatures to facilitate confidential access to, and movement of, individual health records
to meet both clinical and administrative needs. The services offered by the deployment of digital
certificates (including encipherment, information integrity and digital signatures) are able to address
many of these security issues. This is especially the case if digital certificates are used in conjunction
with an accredited information security standard. Many individual organizations around the world
have started to use digital certificates for this purpose.
Interoperability of digital certificate technology and supporting policies, procedures and practices
is of fundamental importance if information is to be exchanged between organizations and between
jurisdictions in support of healthcare applications (for example between a hospital and a community
physician working with the same patient).
Achieving interoperability between different digital certificate implementations requires the
establishment of a framework of trust, under which parties responsible for protecting an individual’s
information rights may rely on the policies and practices and, by extension, the validity of digital
certificates issued by other established authorities.
Many countries are deploying digital certificates to support secure communications within their
national boundaries. Inconsistencies will arise in policies and procedures between the certification
authorities (CAs) and the registration authorities (RAs) of different countries if standards development
activity is restricted to within national boundaries.
Digital certificate technology is still evolving in certain aspects that are not specific to healthcare.
Important standardization efforts and, in some cases, supporting legislation are ongoing. On the other
hand, healthcare providers in many countries are already using or planning to use digital certificates.
The ISO 17090 series seeks to address the need for guidance of these rapid international developments.
The ISO 17090 series describes the common technical, operational and policy requirements that need
to be addressed to enable digital certificates to be used in protecting the exchange of healthcare
information within a single domain, between domains and across jurisdictional boundaries. Its purpose
is to create a platform for global interoperability. It specifically supports digital certificate-enabled
communication across borders, but could also provide guidance for the national or regional deployment
of digital certificates in healthcare. The Internet is increasingly used as the vehicle of choice to support
the movement of healthcare data between healthcare organizations and is the only realistic choice for
cross-border communication in this sector.
vi © ISO 2021 – All rights reserved
The ISO 17090 series should be approached as a whole, with the five parts all making a contribution
to defining how digital certificates can be used to provide security services in the health industry,
including authentication, confidentiality, data integrity and the technical capacity to support the quality
of digital signature.
ISO 17090-1 defines the basic concepts underlying the use of digital certificates in healthcare and
provides a scheme of interoperability requirements to establish digital certificate-enabled secure
communication of health information.
ISO 17090-2 provides healthcare-specific profiles of digital certificates based on the international
[9]
standard X.509 and the profile of this, specified in IETF/RFC 5280 for different types of certificates.
This document deals with management issues involved in implementing and using digital certificates in
healthcare. It defines a structure and minimum requirements for certificate policies (CPs) and a structure
for associated certification practice statements. This document is based on the recommendations of the
informational IETF/RFC 3647, and identifies the principles needed in a healthcare security policy for
cross border communication. It also defines the minimum levels of security required, concentrating on
the aspects unique to healthcare.
ISO 17090-4 supports interchangeability of digital signatures and the prevention of incorrect or illegal
digital signatures by providing minimum requirements and formats for generating and verifying digital
signatures and related certificates.
ISO 17090-5 defines the procedural requirements for validating an entity credential based on PKI
defined in the ISO 17090 series, used in healthcare information systems including accessing remote
systems.
INTERNATIONAL STANDARD ISO 17090-3:2021(E)
Health informatics — Public key infrastructure —
Part 3:
Policy management of certification authority
1 Scope
This document gives guidelines for certificate management issues involved in deploying digital
certificates in healthcare. It specifies a structure and minimum requirements for certificate policies, as
well as a structure for associated certification practice statements.
This document also identifies the principles needed in a healthcare security policy for cross-border
communication and defines the minimum levels of security required, concentrating on aspects unique
to healthcare.
2 Normative references
The following documents are referred to in the text in such a way that some or all of their content
constitutes requirements of this document. For dated references, only the edition cited applies. For
undated references, the latest edition of the referenced document (including any amendments) applies.
ISO 17090-1:2021, Health informatics — Public key infrastructure — Part 1: Overview of digital certificate
services
ISO 17090-2:2015, Health informatics — Public key infrastructure — Part 2: Certificate profile
ISO/IEC 27002, Information technology — Security techniques — Code of practice for information security
controls
IETF/RFC 3647, Internet X.509 Public Key Infrastructure Certificate Policy and Certification Practices
Framework
IETF/RFC 4211, Internet X.509 Public Key Infrastructure Certificate Request Message Format (CRMF)
3 Terms and definitions
For the purposes of this document, the terms and definitions given in ISO 17090-1 apply.
ISO and IEC maintain terminological databases for use in standardization at the following addresses:
— ISO Online browsing platform: available at https:// www .iso .org/ obp
— IEC Electropedia: available at http:// www .electropedia .org/
4 Abbreviations
AA attribute authority
CA certification authority
CP certificate policy
CPS certification practice statement
CRL certificate revocation list
OID object identifier
PKC public key certificate
PKI public key infrastructure
RA registration authority
TTP trusted third party
5 Requirements for digital certificate policy management in a healthcare context
5.1 General
Deployment of digital certificates in healthcare shall meet the following objectives in order to be
effective in securing the communication of personal health information:
— the reliable and secure binding of unique and distinguished names to individuals, organizations,
applications and devices that participate in the electronic exchange of personal health information;
— the reliable and secure binding of professional roles in healthcare to individuals, organizations and
applications that participate in the electronic exchange of personal health information, insofar as
those roles may be used as the basis of role-based access control to such health information;
— (optionally) the reliable and secure binding of attributes to individuals, organizations, applications
and devices that participate in the electronic exchange of personal health information, insofar as
those attributes may further the secure communication of health information.
The above objectives shall be accomplished in a manner that maintains the trust of all who rely upon
the integrity and confidentiality of personal health information that is securely communicated by use
of digital certificates.
To do this, each CA issuing digital certificates for use in healthcare shall operate according to an explicit
set of publicly stated policies that promote the above objectives.
5.2 Need for a high level of assurance
The security services that are required for health applications are specified in Clause 6 of
ISO 17090-1:2021. For each of these security services (authentication, integrity, confidentiality, digital
signature, authorization, access control), a high level of assurance is required.
5.3 Need for a high level of infrastructure availability
Emergency healthcare is a round-the-clock endeavour and the ability to obtain certificates, revoke
certificates and check revocation status is in no way bound by the normal working hours of most
businesses. Unlike e-commerce, healthcare imposes high availability requirements on any deployment
of digital certificates that will be relied upon to secure the communication of personal health
information.
5.4 Need for a high level of trust
Unlike electronic commerce (where a vendor and a customer are often the only parties to an electronic
transaction and are reliant upon its security and integrity), healthcare applications that store or
transmit personal health information may implicitly require the trust of the patients whose information
2 © ISO 2021 – All rights reserved
is being exchanged, as well as that of the general public. It is unlikely that either healthcare providers or
patients will cooperate in the electronic exchange of personal health information if such exchanges are
believed to be insecure.
5.5 Need for Internet compatibility
As the purpose of this document is to define the essential elements of a healthcare digital certificate
deployment to support the secure transmission of healthcare information across national or regional
boundaries, it is based as much as possible upon Internet standards so as to effectively span those
boundaries.
5.6 Need to facilitate evaluation and comparison of CPs
Approaches for using digital certificates to facilitate the secure exchange of health information across
national boundaries are discussed in 9.2 of ISO 17090-1:2021. These approaches (such as cross-
recognition and cross-certification) are greatly facilitated if healthcare CPs follow a consistent format
so that comparisons may be readily drawn between the provisions of one CP and another.
Healthcare CPs also constitute a basis for the accreditation of CAs (a CA being accredited to support
one or more CPs which it proposes to implement). While accreditation criteria are beyond the scope of
this document, the entire process of accreditation of healthcare CAs is expedited by the consistency of
format and the minimum standards which this document promotes.
6 Structure of healthcare CPs and healthcare CPSs
6.1 General requirements for CPs
When a CA issues a certificate, it provides a statement to a relying party that a particular public key is
bound to a particular certificate holder. Different certificates are issued following different practices
and procedures, and may be suitable for different applications and/or purposes.
The CA is responsible for all aspects of the issuance and management of a certificate, including control
over the registration process, verification of information contained in a certificate, the certificate
manufacture, publication, revocation, suspension and renewal. The CA is responsible for ensuring
that all aspects of the CA services and operations are performed in accordance with the requirements,
representations and warrantees of this CP and with the CA’s CPS.
A CA issuing digital certificates for healthcare use shall have policies and procedures available for the
services they provide. These policies and procedures shall cover:
— registering potential certificate holders prior to certificate issuance, including, where applicable,
the certificate holder’s role in accordance with Clause 6 of ISO 17090-2:2015;
— authenticating the identity of potential certificate holders prior to certificate issuance;
— maintaining the privacy of any personal information held about the people to whom certificates
are given;
— distributing certificates to certificate holders and to directories;
— accepting information about possible private key compromise;
— distributing CRLs (frequency of issue, and how and where to publish them);
— other key management issues, including key size, key generation process, certificate lifespan, re-
keying, etc.;
— cross-certifying with other CAs;
— security controls and auditing.
In order to perform these functions, each CA within the infrastructure will need to provide some basic
services to its certificate holders and relying parties. These CA services are listed in the CP.
Digital certificates contain one or more registered CP OIDs, which identify the CP under which the
certificate was issued, and may be used to decide whether or not a certificate is trusted for a particular
purpose. The registration process follows the procedures specified in some ISO/IEC and ITU standards.
The party that registers the OIDs also publishes the CP for examination by certificate holders and
relying parties.
Because of the importance of a CP in establishing trust in a PKC, it is fundamental that the CP be
understood and consulted not only by certificate holders but by any relying party. Certificate holders
and relying parties shall therefore have ready and reliable access to the CP under which a certificate
was issued.
The following requirements apply to all CPs specified in accordance with this document.
a) Each digital certificate issued in accordance with this document shall contain at least one registered
CP OID, which identifies the CP under which the certificate was issued.
b) The structure of CPs shall be in accordance with IETF/RFC 3647.
c) CPs shall be accessible to certificate holders and relying parties.
While CP and CPS documents are essential for describing and governing CPs and practices, many digital
certificate holders, especially consumers, find these detailed documents difficult to understand. These
certificate holders and other relying parties may benefit from access to a concise statement of the
elements of a CP that require emphasis and disclosure and a model PKI disclosure statement is given in
Clause 8 for this purpose.
6.2 General requirements for CPSs
A CPS is a comprehensive description of such details as the precise implementation of service offerings
and detailed procedures of certificate life-cycle management and will generally be more detailed than
the associated CP.
The following requirements apply to all CPSs specified in accordance with this document.
a) CPSs shall be in accordance with IETF/RFC 3647.
b) A CA with a single CPS may support multiple CPs (used for different application purposes and/or by
different groups of relying parties).
c) A number of CAs with non-identical CPSs may support the same CP.
d) A CA may choose not to make its CPS accessible to certificate holders or relying parties or may
choose to make portions of its CPS available.
6.3 Relationship between a CP and a CPS
A CP states what assurance can be placed in a certificate (including restrictions on certificate use and
limitations on liability). A CPS states how a CA establishes that assurance. A CP may apply more broadly
than to just a single organization, whereas a CPS applies only to a single CA. CPs best serve as the vehicle
on which to base common interoperability standards and common assurance criteria industry-wide (or
possibly more global). A detailed CPS alone does not form a suitable basis for interoperability between
CAs operated by different organizations.
6.4 Applicability
This document applies to CPs and CPSs that are used for the purpose of issuing healthcare certificates
as specified in ISO 17090-2:2015, Clause 5.
4 © ISO 2021 – All rights reserved
7 Minimum requirements for a healthcare CP
7.1 General requirements
A CP shall meet all the following requirements.
The numbers in parentheses beneath the headings in this clause indicate the corresponding section in
IETF/RFC 3647.
7.2 Publication and repository responsibilities
7.2.1 Repositories
(2.1)
Information maintained about certificate holders in RA or CA repositories shall:
— be kept current and up to date (within one day of changes being verified and earlier, depending on
circumstances);
— be managed in accordance with ISO/IEC 27002 (or its equivalent) or approved accreditation or
licensing criteria.
7.2.2 Publication of certification information
(2.2)
All CAs issuing digital certificates for use in healthcare shall make available to their certificate holders
and relying parties:
— the URL of an available web site maintained by, or on behalf of, the CA, containing its certificate
policies;
— each certificate issued or renewed under this policy;
— the current status of each certificate issued under this policy;
— the accreditation or licensing criteria under which the CA operates, where such accreditation or
licensing is applicable in the jurisdiction in which the CA operates.
An electronic copy of the CP document, digitally signed by an authorized representative of the CA, is to
be made available:
— on a web site available to all relying parties or
— via an electronic mail request.
As the CPS precisely details the implementation of a CA service as well as the procedures for key life-
cycle management and is more detailed than the CP, it contains information that may therefore need to
remain confidential to ensure the CA’s security.
7.2.3 Frequency of publication
(2.3)
CAs shall publish information, whenever such information has been modified.
7.2.4 Access controls on repositories
(2.4)
Published information such as policies, practices, certificates and the current status of such certificates
shall be read-only.
7.3 Identification and authentication
7.3.1 Initial registration
7.3.1.1 Types of name
(3.1.1)
The subject names used for certificates issued under this policy shall be in accordance with ISO 17090-2.
7.3.1.2 Need for names to be meaningful
(3.1.2)
The effective use of certificates requires that the relative distinguished names that appear on the
certificate can be understood and used by a relying party. Names used in these certificates shall identify
the certificate holder to which they are assigned in a meaningful way. See also 7.3.1.3.
In the case of certificate holders who are regulated health professionals, non-regulated health
professionals, sponsored healthcare providers, supporting organization employees or patients/
consumers, the name should match the name authenticated in 7.3.2.
7.3.1.3 Anonymity or pseudonymity
(3.1.3)
The need for names to be meaningful (see 7.3.1.2 above) does not preclude the use of pseudonyms in
certificates issued to patients/consumers.
7.3.1.4 Rules for interpreting various name forms
(3.1.4)
A CP shall have a name claim dispute resolution procedure to apply and a convention to be used in
interpreting name forms used in those situations where name claim disputes arise.
7.3.1.5 Uniqueness of names
(3.1.5)
The subject distinguished name listed in a certificate shall be unambiguous and unique to distinct
certificate holders of a CA.
Where necessary, the inclusion of the distinguished name attribute type “serial number” in the
distinguished entity (as described in IETF/RFC 5280) may be used to guarantee uniqueness. Where
possible, it is recommended that the serial number be meaningful (e.g. the license number of a regulated
health professional). See 7.3.1.2.
7.3.1.6 Recognition, authentication and role of trademarks
(3.1.6)
A CA shall not knowingly issue certificates containing trademarks that do not belong to the subject of
the certificate.
6 © ISO 2021 – All rights reserved
7.3.2 Initial identity validation
7.3.2.1 Method to prove possession of private key
(3.2.1)
In those cases where the CA does not generate the key pair, key holders shall be required to prove
possession of their private key [e.g. by the key holder submitting a Certificate Signing Request (CSR)].
Key holders may also be periodically required to sign a challenge from the CA.
7.3.2.2 Authentication of identity of organizations
(3.2.2)
Healthcare organizations, supporting organizations, or persons acting on behalf of organizations
or devices shall present to the RA evidence of their existence and healthcare role by presenting
documentation appropriate to their country, state or provincial government. The CA, the RA and,
where applicable, the AA shall verify this information, as well as the authenticity of the requesting
representative and the representative’s authorization to act in the name of the organization.
7.3.2.3 Authentication of identity of individuals
(3.2.3)
Individuals, including regulated health professionals, non-regulated health professionals, sponsored
healthcare providers, supporting organization employees and patients/consumers shall authenticate
their identity to an RA prior to certificate issuance. This document recommends the same proof
of identity that would be necessary for such individuals to be issued a passport, or a procedure of
equivalent rigour.
Regulated health professionals, in order that they authenticate their healthcare license, role and
medical speciality (if any), shall present to the RA proof of their professional credentials established by
the professional regulatory or accrediting body in their jurisdiction.
Non-regulated health professionals, in order that they establish their employment and authenticate
their healthcare role, shall present to the RA proof of sponsorship or employment from their sponsoring
health organizations or sponsoring (regulated) health professionals.
Sponsored healthcare providers, in order that they establish that they are active in their healthcare
community and in order that they authenticate their healthcare role, shall present to the RA proof of
sponsorship from their sponsoring health organizations or sponsoring (regulated) health professionals.
Supporting organization employees, in order that they establish their employment and authenticate
their healthcare role, shall present to the RA proof of empl
...
Frequently Asked Questions
ISO 17090-3:2021 is a standard published by the International Organization for Standardization (ISO). Its full title is "Health informatics - Public key infrastructure - Part 3: Policy management of certification authority". This standard covers: This document gives guidelines for certificate management issues involved in deploying digital certificates in healthcare. It specifies a structure and minimum requirements for certificate policies, as well as a structure for associated certification practice statements. This document also identifies the principles needed in a healthcare security policy for cross-border communication and defines the minimum levels of security required, concentrating on aspects unique to healthcare.
This document gives guidelines for certificate management issues involved in deploying digital certificates in healthcare. It specifies a structure and minimum requirements for certificate policies, as well as a structure for associated certification practice statements. This document also identifies the principles needed in a healthcare security policy for cross-border communication and defines the minimum levels of security required, concentrating on aspects unique to healthcare.
ISO 17090-3:2021 is classified under the following ICS (International Classification for Standards) categories: 35.240.80 - IT applications in health care technology. The ICS classification helps identify the subject area and facilitates finding related standards.
ISO 17090-3:2021 has the following relationships with other standards: It is inter standard links to ISO 17090-3:2008. Understanding these relationships helps ensure you are using the most current and applicable version of the standard.
You can purchase ISO 17090-3:2021 directly from iTeh Standards. The document is available in PDF format and is delivered instantly after payment. Add the standard to your cart and complete the secure checkout process. iTeh Standards is an authorized distributor of ISO standards.
기사 제목: ISO 17090-3:2021 - 의료 정보학 - 공개 키 인프라 - 제3부: 인증 기관의 정책 관리 기사 내용: 이 문서는 의료 분야에서 디지털 인증서를 배포하는 데 관련된 인증서 관리 문제에 대한 지침을 제공합니다. 이 문서는 인증서 정책에 대한 구조와 최소 요구 사항, 관련된 인증 기관의 정책 기술에 대한 구조를 명시합니다. 또한 국경을 넘어 의료 통신에 필요한 의료 보안 정책의 원칙을 도출하고 필요한 최소 보안 수준을 정의하며 의료에 특화된 측면에 집중합니다.
The article discusses ISO 17090-3:2021, which is a standard that provides guidelines for managing digital certificates in healthcare. It outlines the structure and minimum requirements for certificate policies and certification practice statements. The document also emphasizes the importance of healthcare security policies for cross-border communication and specifies the minimum security levels required, with a focus on healthcare-specific aspects.
記事のタイトル:ISO 17090-3:2021 - ヘルスインフォマティクス−公開鍵基盤−Part 3: 認証機関のポリシー管理 記事の内容:このドキュメントは、医療分野におけるデジタル証明書の展開に関連する証明書管理のガイドラインを提供します。証明書ポリシーの構造と最小要件、関連する認証業務声明の構造を明示しています。また、国境を越えた通信における医療セキュリティポリシーの原則や必要な最小セキュリティレベルを定義し、医療特有の側面に焦点を当てています。








Questions, Comments and Discussion
Ask us and Technical Secretary will try to provide an answer. You can facilitate discussion about the standard in here.
Loading comments...