Programme of work


BUREAU OF INDIAN STANDARDS


Electronics and Information Technology Department

Programme of Work




LITD17 : Information Systems Security And Privacy



Published Standards

SI. No.
IS No.
Title
Reaffirmation Details
No. of Amendments
Degree of Equivalence
1.
IS/ISO/IEC/TR 27039 : 2015
ISO/IEC 27039 : 2015
Reviewed In : 2024
Information Technology - Security Techniques - Selection, Deployment and Operations of Intrusion Detection Systems ( IDPS )
June, 2024
-
Identical under single numbering
2.
IS/ISO/IEC 11770-1 : 2010
ISO/IEC 11770-1 : 2010
Reviewed In : 2023
Information technology - Security techniques - Key management: Part 1 framework
March, 2023
-
Identical under single numbering
3.
IS/ISO/IEC 11770-2 : 2018
ISO/IEC 11770-2 : 2018
Reviewed In : 2023
IT Security Techniques — Key Management Part 2 Mechanisms Using Symmetric Techniques ( First Revision )
September, 2023
-
Identical under single numbering
4.
IS/ISO/IEC 11770-3 : 2021
ISO/IEC 11770-3:2021
Information security Key management Part 3: Mechanisms using asymmetric techniques Second Revision
-
Identical under single numbering
5.
IS/ISO/IEC 11770-4 : 2017
ISO/IEC 11770-4 : 2017
Reviewed In : 2022
Information technology - Security techniques - Key management: Part 4 mechanisms based on weak: Secrets (First Revision)
May, 2022
2
Identical under single numbering
6.
IS/ISO/IEC 11770-5 : 2020
ISO/IEC 11770-5:2020
INFORMATION SECURITY KEY MANAGEMENT PART 5: GROUP KEY MANAGEMENT (First Revision)
-
Identical under single numbering
7.
IS/ISO/IEC 11770-6 : 2016
ISO/IEC 11770-6 : 2016
Reviewed In : 2023
Information Technology - Security Techniques - Key Management Part 6 Key Derivation
January, 2023
-
Identical under single numbering
8.
IS/ISO/IEC 11770-7 : 2021
ISO/IEC 11770-7: 2021
Information security Key management Part 7: Cross-domain password-based authenticated key exchange
-
Identical under single numbering
9.
IS/ISO/IEC 14888-1 : 2008
ISO/IEC 14888-1 : 2008
Reviewed In : 2022
Information technology - Security techniques - Digital signatures with appendix: Part 1 general
June, 2022
-
Identical under single numbering
10.
IS/ISO/IEC 14888-2 : 2008
ISO/IEC 14888-2 : 2008
Reviewed In : 2022
Information technology - Security techniques - digital signatures with appendix: Part 2 integer factorization based mechanisms
May, 2022
1
Identical under single numbering
11.
IS/ISO/IEC 14888-3 : 2018
ISO/IEC 14888-3 : 2018
Reviewed In : 2023
IT Security Techniques — Digital Signatures with Appendix Part 3 Discrete Logarithm Based Mechanisms ( First Revision )
January, 2023
-
Identical under single numbering
12.
IS 14990 (Part 1) : 2024
ISO/IEC 15408-1:2022
Information Security Cybersecurity and Privacy Protection Evaluation Criteria for IT Security Part 1: Introduction and General Model Third Revision
-
Identical under dual numbering
13.
IS 14990 (Part 2) : 2024
ISO/IEC 15408-2:2022
Information security cybersecurity and privacy protection Evaluation criteria for IT security Part 2: Security functional components Third Revision
-
Identical under dual numbering
14.
IS 14990 (Part 3) : 2024
ISO/IEC 15408-3:2022
Information Security Cybersecurity and Privacy Protection Evaluation Criteria for IT Security Part 3: Security Assurance Components Third Revision
-
Identical under dual numbering
15.
IS 14990 (Part 4) : 2024
ISO/IEC 15408-4:2022
Information Security Cybersecurity and Privacy Protection Evaluation Criteria for IT Security Part 4: Framework for the Specification of Evaluation Methods and Activities
-
Identical under dual numbering
16.
IS 14990 (Part 5) : 2024
ISO/IEC 15408-5:2022
Information Security Cybersecurity and Privacy Protection Evaluation Criteria for IT Security Part 5: Pre-defined Packages of Security Requirements
-
Identical under dual numbering
17.
IS 15116 : 2018
ISO/IEC 10116 : 2017
Reviewed In : 2021
Information technology - Security techniques - Modes of operation for an n - Bit block cipher (Second Revision)
November, 2021
1
Identical under dual numbering
18.
IS/ISO/IEC/TR 15446 : 2017
ISO/IEC TR 15446 : 2017
Reviewed In : 2022
Information technology - Security techniques - Guidance for the production of protection profiles and Security targets
May, 2022
-
Identical under single numbering
19.
IS 15580 : 2012
ISO/IEC 21827 : 2008
Reviewed In : 2021
Information technology - Security techniques - Systems: Security engineering - Capability maturity model® (SSE - CMM®) (First Revision)
October, 2021
-
Identical under dual numbering
20.
IS 15671 : 2024
ISO/IEC 18045:2022
Information Security Cybersecurity and Privacy Protection Evaluation Criteria for IT Security Methodology for IT Security Evaluation Second Revision
-
Identical under dual numbering
21.
IS/ISO/IEC 15946-1 : 2016
ISO/IEC 15946 -1 : 2016
Reviewed In : 2024
Information Technology - Security Techniques - Cryptographic Techniques Based on Elliptic Curves Part 1 General
June, 2024
-
Identical under single numbering
22.
IS 17428 (Part 1) : 2020

Reviewed In : 2023
Data Privacy Assurance Part 1 Engineering and Management Requirements
December, 2023
-
Indigenous
23.
IS 17428 (Part 2) : 2020

Reviewed In : 2023
Data Privacy Assurance Part 2 Engineering and Management Guidelines
December, 2023
-
Indigenous
24.
IS 17737 (Part 1) : 2021
Mobile Device Security Part 1 Overview
-
Indigenous
25.
IS 17737 (Part 2) : 2021
Mobile Device Security Part 2 Security Requirements
-
Indigenous
26.
IS 17737 (Part 3) : 2021
Mobile Device Security Part 3 Security levels
-
Indigenous
27.
IS 17737 (Part 4) : 2021
Mobile Device Security Part 4 Assessment and Evaluation
-
Indigenous
28.
IS/ISO/IEC 18014-1 : 2008
ISO/IEC 18014-1 : 2008
Reviewed In : 2024
Information Technology- Security Techniques- Time Stamping Services Part 1 Framework
February, 2024
-
Identical under single numbering
29.
IS/ISO/IEC 18014-2 : 2021
ISO/IEC 18014-2 : 2021
Information security Time- stamping services Part 2: Mechanisms producing independent tokens
-
Identical under single numbering
30.
IS/ISO/IEC 18014-3 : 2009
ISO/IEC 18014-3 : 2009
Reviewed In : 2024
Information technology - Security techniques - Time - Stamping services: Part 3 mechanisms producing linked tokens
February, 2024
-
Identical under single numbering
31.
IS/ISO/IEC 18014-4 : 2015
ISO/IEC 18014-4 : 2015
Reviewed In : 2022
Information Technology - Security Techniques - Time-Stamping Services Part 4 Traceability of Time Sources
May, 2022
-
Identical under single numbering
32.
IS/ISO/IEC 18031 : 2011
ISO/IEC 18031 : 2011
Reviewed In : 2021
Information technology - Security techniques - Random bit generation
July, 2021
1
Identical under single numbering
33.
IS/ISO/IEC 18033-1 : 2021
ISO/IEC 18033-1:2021
Information security Encryption algorithms Part 1: General First Revision
-
Identical under single numbering
34.
IS/ISO/IEC 18033-2 : 2006
ISO/IEC 18033-2 : 2006
Reviewed In : 2024
Information Technology - Security Techniques - Encryption Algorithms Part 2 Asymmetric Ciphers
June, 2024
1
Identical under single numbering
35.
IS/ISO/IEC 18033-3 : 2010
ISO/IEC 18033-3 : 2010
Reviewed In : 2024
Information Technology-Security Techniques - Encryption Algorithms Part 3 Block Ciphers
June, 2024
1
Identical under single numbering
36.
IS/ISO/IEC 18033-4 : 2011
ISO/IEC 18033-4 : 2011
Reviewed In : 2022
Information technology - Security techniques - encryption algorithms: Part 4 stream ciphers
May, 2022
1
Identical under single numbering
37.
IS/ISO/IEC 18033-5 : 2015

Reviewed In : 2022
Information technology - Security techniques - Encryption algorithms: Part 5 identity - Based ciphers
May, 2022
1
Identical under single numbering
38.
IS/ISO/IEC 19790 : 2012
ISO/IEC 19790:2012
INFORMATION TECHNOLOGY SECURITY TECHNIQUES SECURITY REQUIREMENTS FOR CRYPTOGRAPHIC MODULES
-
Identical under single numbering
39.
IS/ISO/IEC 19792 : 2009
ISO/IEC 19792 :2009
Information Technology Security techniques Security evaluation of biometrics
-
Identical under single numbering
40.
IS/ISO/IEC 19896-1 : 2018
ISO/IEC 19896-1 : 2018
Reviewed In : 2023
IT Security Techniques - Competence Requirements for Information Security Testers and Evaluators Part 1 Introduction, Concepts and General Requirements
January, 2023
-
Identical under single numbering
41.
IS/ISO/IEC 19896-2 : 2018
ISO/IEC 19896-2 : 2018
Reviewed In : 2023
IT Security Techniques - Competence Requirements for Information Security Testers and Evaluators Part 2 Knowledge, Skills and Effectiveness Requirements for ISO / IEC 19790 Testers
January, 2023
-
Identical under single numbering
42.
IS/ISO/IEC 19896-3 : 2018
ISO/IEC 19896-3 : 2018
Reviewed In : 2023
IT Security Techniques - Competence Requirements for Information Security Testers and Evaluators Part 3 Knowledge, Skills and Effectiveness Requirements for ISO/IEC 15408 Evaluators
January, 2023
-
Identical under single numbering
43.
IS/ISO/IEC/TS 20540 : 2018
ISO/IEC TS 20540 : 2018
Reviewed In : 2023
Information Technology - Security Techniques - Testing Cryptographic Modules in their Operational Environment
January, 2023
-
Identical under single numbering
44.
IS/ISO/IEC 20543 : 2019
ISO/IEC 20543:2019
Information technology Security techniques Test and analysis methods for random bit generators within ISOIEC 19790 and ISOIEC 15408
-
Identical under single numbering
45.
IS/ISO/IEC 20547-4 : 2020
ISO/IEC 20547-4:2020
INFORMATION TECHNOLOGY BIG DATA REFERENCE ARCHITECTURE PART 4: SECURITY AND PRIVACY
-
Identical under single numbering
46.
IS/ISO/IEC 24745 : 2022
ISO/IEC 24745:2022
Information security cybersecurity and privacy protection Biometric information protection
-
Identical under single numbering
47.
IS/ISO/IEC 24759 : 2017
ISO/IEC 24759:2017
Information technology Security techniques Test requirements for cryptographic modules
-
Identical under single numbering
48.
IS/ISO/IEC 24761 : 2019
ISO/IEC 24761:2019
Information technology Security techniques Authentication context for biometrics
-
Identical under single numbering
49.
IS/ISO/IEC 27000 : 2018
ISO/IEC 27000 : 2018
Reviewed In : 2022
Information technology - Security techniques - information: Security management systems - Overview and vocabulary (First Revision)
May, 2022
-
Identical under single numbering
50.
IS/ISO/IEC 27001 : 2013
ISO/IEC 27001 : 2013
Reviewed In : 2022
Information Technologies - Security Techniques - information Security Managemet Systems - Requirements (First Revision)
December, 2022
1
Identical under single numbering
51.
IS/ISO/IEC 27001 : 2022
ISO/IEC 27001 : 2022
Information security cybersecurity and privacy protection Information security management systems Requirements
-
Identical under single numbering
52.
IS/ISO/IEC 27002 : 2022
ISO/IEC 27002:2022
Information security cybersecurity and privacy protection Information security controls
-
Identical under single numbering
53.
IS/ISO/IEC 27003 : 2017
ISO/IEC 27003 : 2017
Reviewed In : 2021
Information technology - Security techniques - Information: Security management systems - Guidance (First Revision)
September, 2021
-
Identical under single numbering
54.
IS/ISO/IEC 27004 : 2016
ISO/IEC 27004 : 2016
Reviewed In : 2022
Information technology - Security techniques - Information: Security management - Monitoring, measurement, analysis and evaluation (First Revision)
May, 2022
-
Identical under single numbering
55.
IS/ISO/IEC 27005 : 2022
ISO/IEC 27005:2022
Information security cybersecurity and privacy protection Guidance on managing information security risks
-
Identical under single numbering
56.
IS/ISO/IEC 27006 : 2015
ISO/IEC 27006 : 2015
Reviewed In : 2024
Information technology - Security techniques - Requirements for bodies providing audit and Certification of Information Security Management systems (First Revision)
June, 2024
1
Identical under single numbering
57.
IS/ISO/IEC 27007 : 2020
ISO/IEC 27007:2020
Information security cybersecurity and privacy protection Guidelines for information security management systems auditing
-
Identical under single numbering
58.
IS/ISO/IEC/TS 27008 : 2019
ISO/IEC TS 27008 : 2019
Reviewed In : 2023
Information Technology — Security Techniques — Guidelines for the Assessment of Information Security Controls ( First Revision )
September, 2023
-
Identical under single numbering
59.
IS/ISO/IEC 27010 : 2015
ISO/IEC 27010:2015
Reviewed In : 2024
Information Technology - Security Techniques - Information Security Management for Inter-Sector and Inter-Organizational Communications
May, 2024
-
Identical under single numbering
60.
IS/ISO/IEC 27011 : 2016
ISO/IEC 27011 : 2016
Reviewed In : 2023
Information Technology — Security Techniques — Code of Practice for Information Security Controls Based on ISO/IEC 27002 for Telecommunications Organizations ( First Revision )
February, 2023
-
Identical under single numbering
61.
IS/ISO/IEC 27017 : 2015
ISO/IEC 27017 : 2015
Reviewed In : 2024
Information Technology - Security Techniques - Code of Practice for Information Security Controls Based on ISO/IEC 27002 for Cloud Services
June, 2024
-
Identical under single numbering
62.
IS/ISO/IEC 27018 : 2019
ISO/IEC 27018 : 2019
Reviewed In : 2023
Information Technology — Security Techniques — Code of Practice for Protection of Personally Identifiable Information ( PII ) in Public Clouds Acting as PII Processors ( First Revision )
September, 2023
-
Identical under single numbering
63.
IS/ISO/IEC 27019 : 2017
ISO/IEC 27019 : 2017
Reviewed In : 2022
Information Technology - Security Techniques - Information Security Controls for the Energy Utility Industry
December, 2022
-
Identical under single numbering
64.
IS/ISO/IEC 27032 : 2023
ISO/IEC 27032:2023
Cyber Security — Internet Security — Guidelines (First Revision)
-
Identical under single numbering
65.
IS/ISO/IEC 27033-1 : 2015
ISO/IEC 27033-1 : 2015
Reviewed In : 2024
Information Technology - Security Techniques - Network Security Part 1 Overview and Concepts (First Revision)
June, 2024
-
Identical under single numbering
66.
IS/ISO/IEC 27033-2 : 2012
ISO/IEC 27033-2 : 2012
Reviewed In : 2021
Information technology - Security techniques: Part 2 guidelines for the design and implementation of network: Security
July, 2021
-
Identical under single numbering
67.
IS/ISO/IEC 27033-3 : 2010
Reviewed In : 2022
Information technology - Security techniques - Network: Security: Part 3 reference networking scenarios - Threats, design techniques and control issues
January, 2022
-
Identical under single numbering
68.
IS/ISO/IEC 27033-4 : 2014
ISO/IEC 27033-4 : 2014
Reviewed In : 2022
Information technology - Security techniques - Network: Security: Part 4 Securing communications between networks using: Security gateways
November, 2022
-
Identical under single numbering
69.
IS/ISO/IEC 27033-5 : 2013
ISO/IEC 27033-5 : 2013
Reviewed In : 2024
Information technology - Security techniques - Network Security: Part 5 Securing communications across networks using virtual pr4ate networks (VPNs)
June, 2024
-
Identical under single numbering
70.
IS/ISO/IEC 27033-6 : 2016
ISO/IEC 27033-6 : 2016
Reviewed In : 2022
Information technology - Security techniques - Network Security: Part 6 Securing wireless IP network access
May, 2022
-
Identical under single numbering
71.
IS/ISO/IEC 27034-1 : 2011
ISO/IEC 27034-1 : 2011
Reviewed In : 2021
Information technology - Security techniques - Application Security: Part 1 overview and concepts
July, 2021
1
Identical under single numbering
72.
IS/ISO/IEC 27034-2 : 2015
ISO/IEC 27034-2 : 2015
Reviewed In : 2022
Information technology - Security techniques - Application Security: Part 2 organization normat4e framework
May, 2022
-
Identical under single numbering
73.
IS/ISO/IEC 27034-3 : 2018
ISO/IEC 27034-3 : 2018
Reviewed In : 2023
Information Technology - Application Security Part 3 Application Security Management Process
January, 2023
-
Identical under single numbering
74.
IS/ISO/IEC/TS 27034-5-1 : 2018
ISO/IEC TS 27034-5-1 : 2018
Reviewed In : 2023
Information Technology - Application Security Part 5-1 Protocols and Application Security Controls Data Structure, XML Schemas
January, 2023
-
Identical under single numbering
75.
IS/ISO/IEC 27034-5 : 2017
ISO/IEC 27034-5 : 2017
Reviewed In : 2022
Information technology - Security techniques - Application Security: Part 5 protocols and application Security controls data structure
May, 2022
-
Identical under single numbering
76.
IS/ISO/IEC 27034-6 : 2016
ISO/IEC 27034-6 : 2016
Reviewed In : 2022
Information technology - Security techniques - Application Security: Part 6 case studies
May, 2022
-
Identical under single numbering
77.
IS/ISO/IEC 27034-7 : 2018
ISO/IEC 27034-7 : 2018
Reviewed In : 2023
Information Technology - Application Security Part 7 Assurance Prediction Framework
January, 2023
-
Identical under single numbering
78.
IS/ISO/IEC 27035-1 : 2023
ISO/IEC 27035-1 :2023
Information Technology Information Security Incident Management Part 1: Principles and Process Second Revision
-
Identical under single numbering
79.
IS/ISO/IEC 27035-2 : 2023
ISO/IEC 27035-2 :2023
Information Technology Information security incident management Part 2: Guidelines to plan and prepare for incident response Second Revision
-
Identical under single numbering
80.
IS/ISO/IEC 27035-3 : 2020
ISO/IEC 27035-3:2020
INFORMATION TECHNOLOGY INFORMATION SECURITY INCIDENT MANAGEMENT PART 3: GUIDELINES FOR ICT INCIDENT RESPONSE OPERATIONS
-
Identical under single numbering
81.
IS/ISO/IEC 27036-1 : 2021
ISO/IEC 27036-1: 2021
Cybersecurity Supplier relationships Part 1: Overview and concepts First Revision
-
Identical under single numbering
82.
IS/ISO/IEC 27036-2 : 2022
ISO/IEC 27036-2:2022
Cybersecurity Supplier Relationships Part 2: Requirements
-
Identical under single numbering
83.
IS/ISO/IEC 27036-3 : 2013
ISO/IEC 27036-3 : 2013
Reviewed In : 2023
Information technology - Security techniques - Information Security for supplier relationships: Part 3 guidelines for information and communication technology supply chain: Security
October, 2023
-
Identical under single numbering
84.
IS/ISO/IEC 27036-4 : 2016
ISO/IEC 27036-4 : 2016
Reviewed In : 2022
Information Technology - Security Techniques - Information Security for Supplier Relationships Part 4 Guidelines for Security of Cloud Services
December, 2022
-
Identical under single numbering
85.
IS/ISO/IEC 27037 : 2012
ISO/IEC 27037 : 2012
Reviewed In : 2024
Information Technology - Security Techniques - Guidelines for Identification,Collection,Acquisition and Preservation of Digital Evidence
June, 2024
-
Identical under single numbering
86.
IS/ISO/IEC 27040 : 2015
ISO/IEC 27040 : 2015
Reviewed In : 2024
Information Technology - Security Techniques - Storage Security
June, 2024
-
Identical under single numbering
87.
IS/ISO/IEC 27050-1 : 2019
ISO/IEC 27050-1:2019
Information technology Electronic discovery Part 1: Overview and concepts
-
Identical under single numbering
88.
IS/ISO/IEC 27050-3 : 2020
ISO/IEC 27050-3:2020
Information technology Electronic discovery Part 3: Code of practice for electronic discovery
-
Identical under single numbering
89.
IS/ISO/IEC 27050-4 : 2021
ISO/IEC 27050-4: 2021
Information technology -Electronic discovery Part 4: Technical readiness
-
Identical under single numbering
90.
IS/ISO/IEC 27099 : 2022
ISO/IEC 27099:2022
Information technology Public key infrastructure Practices and policy framework
-
Identical under single numbering
91.
IS/ISO/IEC/TS 27100 : 2020
ISO/IEC TS 27100:2020
INFORMATION TECHNOLOGY CYBERSECURITY OVERVIEW AND CONCEPTS
-
Identical under single numbering
92.
IS/ISO/IEC/TR 27103 : 2018
ISO/IEC TR 27103 : 2018
Reviewed In : 2023
Information Technology - Security Techniques - Cybersecurity and ISO and IEC Standards
January, 2023
-
Identical under single numbering
93.
IS/ISO/IEC 27400 : 2022
ISO/IEC 27400: 2022
Cybersecurity IoT Security and Privacy Guidelines
-
Identical under single numbering
94.
IS/ISO/IEC/TR 27550 : 2019
ISO/IEC TR 27550:2019
Information technology Security techniques Privacy engineering for system life cycle processes
-
Identical under single numbering
95.
IS/ISO/IEC 29100 : 2011
ISO/IEC 29100 : 2011
Reviewed In : 2024
Information Technology - Security Techniques - Privacy Framework
June, 2024
1
Identical under single numbering
96.
IS/ISO/IEC 29101 : 2018
ISO/IEC 29101 : 2018
Reviewed In : 2023
Information Technology — Security Techniques — Privacy Architecture Framework
September, 2023
-
Identical under single numbering
97.
IS/ISO/IEC 29184 : 2020
ISO/IEC 29184:2020
Information technology Online privacy notices and consent
-
Identical under single numbering
98.
IS/ISO/IEC 29192-1 : 2012
ISO/IEC 29192-1 : 2012
Reviewed In : 2024
Information Technology - Security Techniques - Lightweight Crytography Part 1 General
June, 2024
-
Identical under single numbering
99.
IS/ISO/IEC 29192-2 : 2019
ISO/IEC 29192-2: 2019
Information security Lightweight cryptography Part 2: Block ciphers First Revision
-
Identical under single numbering
100.
IS/ISO/IEC 29192-3 : 2012
ISO/IEC 29192-3 : 2012
Reviewed In : 2024
Information Technology - Security Techniques - Lightweight Cryptography Part 3 Stream Ciphers
May, 2024
-
Identical under single numbering
101.
IS/ISO/IEC 29192-4 : 2013
ISO/IEC 29192-4 : 2013
Reviewed In : 2024
Information Technology - Security Techniques - Lightweight Cryptography Part 4 Mechanisms Using Asymmetric Techniques
June, 2024
1
Identical under single numbering
102.
IS/ISO/IEC 29192-5 : 2016
ISO/IEC 29192-5 : 2016
Reviewed In : 2022
Information Technology - Security Techniques - Lightweight Cryptography Part 5 Hash-Functions
December, 2022
-
Identical under single numbering
103.
IS/ISO/IEC 29192-6 : 2019
ISO/IEC 29192-6:2019
Information technology Lightweight cryptography Part 6: Message authentication codes MACs
-
Identical under single numbering
104.
IS/ISO/IEC 29192-7 : 2019
ISO/IEC 29192-7:2019
Information security Lightweight cryptography Part 7: Broadcast authentication protocols
-
Identical under single numbering
105.
IS/ISO/IEC 29192-8 : 2022
ISO/IEC 29192-8:2022
Information Security Lightweight Cryptography Part 8: Authenticated Encryption
-
Identical under single numbering
106.
IS/ISO/IEC 9796-2 : 2010
ISO/IEC 9796-2 : 2010
Reviewed In : 2024
Information technology - Security techniques - Digital signature schemes g4ing message recovery: Part 2 integer factorization based mechanisms (First Revision)
June, 2024
-
Identical under single numbering
107.
IS/ISO/IEC 9796-3 : 2006
Reviewed In : 2022
Information technology - Security techniques - Digital signature schemes giving message recovery: Part 3 discrete logarithm based mechanisms
April, 2022
-
Identical under single numbering

Standards Under Develpoment

Projects Approved

SI. No.
Doc No
TITLE
No Records Found

Preliminary Draft Standards

SI. No.
Doc No
TITLE
No Records Found

Drafts Standards in WC Stage

SI. No.
Doc No
TITLE
No Records Found

Draft Standards Completed WC Stage

SI. No.
Doc No
TITLE
1
LITD 17 (19143)
Internet of Things Security Privacy Part 3 Assessment and Evaluation
2
LITD 17 (25318)
Revision of: IS/ISO/IEC 27040:2015
Information Technology Security Techniques Storage Security First revision
3
LITD 17 (25330)
Revision of: IS/ISO/IEC 29100:2011
Information Technology Security Techniques Privacy Framework First revision
4
LITD 17 (25331)
Cybersecurity IoT Security and Privacy Device Baseline Requirements
5
LITD 17 (25334)
Information Technology Electronic Discovery Part 2 Guidance for Governance and Management of Electronic Discovery
6
LITD 17 (25335)
Revision of: IS/ISO/IEC 27011:2016
Cybersecurity and Privacy Protection Information Security Controls Based on ISOIEC 27002 for Telecommunications Organizations Second revision
7
LITD 17 (25400)
Information security cybersecurity and privacy protection Information security management systems Requirements Amendment - 1

Finalized Draft Indian Standard

SI. No.
Doc No
TITLE
1
LITD 17 (24467)
Cybersecurity Security Recommendations For Establishing Trusted Connections Between Devices and Services
2
LITD 17 (24473)
Revision of: IS/ISO/IEC 27036:2013
Cybersecurity Supplier Relationships Part 3 Guidelines for Hardware Software and Services Supply Chain Security

Finalized Draft Indian Standards under Print

SI. No.
Doc No
TITLE
No Records Found


Aspect Wise Report

 
 Product:   4
 Code of Practices :    4
 Methods of Test :   11
 Terminology :   2
 Dimensions :   0
 System Standard :   3
 Safety Standard :   0
 Others :    81
 Service Specification :    0
 Process Specification :    1
 Unclassified :    1
 


Annexure-I :List of Indian Standards Withdrawn/Superseded

SI. No.
IS No.
Title
1.
IS/ISO/IEC 13335-1 : 2004
ISO/IEC 13335-1:2004
Reviewed In : 2016
Information Technology - Security Techniques - Management of Information and Communications Technology Security Part 1 Concepts and Models for Information and Communications Technology Security Management
2.
IS 14356 : 1996
Reviewed In : 2018
Guide for protection of information resources
3.
IS 14357 : 2002
Information Technology - Code of Practice for Information Security Management
4.
IS 15114 : 2002
Reviewed In : 2008
Information Processing - Modes of Operation for a 64-Bit Block Cipher Algorithm
5.
IS 15115 : 2002
Reviewed In : 2008
Information Technology - Security Techniques - Procedures for the Registration of Cryptographic Alogorithms
6.
IS 15150 : 2002
Information Security Management System - Requirements
7.
IS 16281 (Part 1) : 2014
ISO/IEC 19785-1 : 2006
Information Technology Common Biometric Exchange Formats Framework Part 1 Data Element Specification
8.
IS 16281 (Part 4) : 2014
ISO/IEC 19785-4 : 2010
Information Technology Common Biometric Exchange Formats Framework Part 4 Security Block Format Specifications
9.
IS/ISO/IEC 17799 : 2005
Reviewed In : 2010
Information Technology Code of practice for Information Security Management
10.
IS/ISO/IEC 18014 : 2009
ISO/IEC 18014-3 : 2009
Information Technology- Security Techniques- Time Stamping Services Part 3 Mechanisms Producing Linked Tokens
11.
IS/ISO/IEC 19785-2 : 2018
ISO/IEC 19785-2 : 2006
Information Technology- Common Biometric Exchange Formats Framework Part 2 Procedures for the Operation of the Biometric Registration Authority
12.
IS/ISO/IEC 24762 : 2008
Reviewed In : 2015
Information Technology-Security Techniques-Guidelines for Information and Communications Technology Disaster Recovery Services
13.
IS/ISO/IEC 27035 : 2011
ISO/IEC 27035 : 2011
Information technology - Security techniques - Information Security incident management


Annexure-II :List of Indian Product Standards

SI. No.
IS No. & Year
Title
1.
IS 17737 (Part 2) : 2021
Mobile Device Security Part 2 Security Requirements
2.
IS 17737 (Part 3) : 2021
Mobile Device Security Part 3 Security levels
3.
IS 17737 (Part 4) : 2021
Mobile Device Security Part 4 Assessment and Evaluation
4.
IS/ISO/IEC 19790 : 2012
ISO/IEC 19790:2012
INFORMATION TECHNOLOGY SECURITY TECHNIQUES SECURITY REQUIREMENTS FOR CRYPTOGRAPHIC MODULES