BUREAU OF INDIAN STANDARDS
Programme of Work
LITD17 : Information Systems Security And Privacy
- Scope : Standardization in Security and Privacy aspects of Information Systems
-
Liaison :ISO/IEC JTC 1/SC 27 - Information security, cybersecurity and privacy protection - Participating (P)
ISO/IEC/JTC1 SC 27/WG 1 - Information security management systems
ISO/IEC/JTC1 SC 27/WG 2 - Cryptography and security mechanisms
ISO/IEC/JTC1 SC 27/WG 3 - Security evaluation, testing and specification
ISO/IEC/JTC1 SC 27/WG 4 - Security controls and services
ISO/IEC/JTC1 SC 27/WG 5 - Identity management and privacy technologies
IS/ISO/IEC/TR 27039 : 2015 ISO/IEC 27039 : 2015 Reviewed In : 2024 |
Information Technology - Security Techniques - Selection, Deployment and Operations of Intrusion Detection Systems ( IDPS )
|
June, 2024
|
-
|
Identical under single numbering
|
|
IS/ISO/IEC 11770-1 : 2010 ISO/IEC 11770-1 : 2010 Reviewed In : 2023 |
Information technology - Security techniques - Key management: Part 1 framework
|
March, 2023
|
-
|
Identical under single numbering
|
|
IS/ISO/IEC 11770-2 : 2018 ISO/IEC 11770-2 : 2018 Reviewed In : 2023 |
IT Security Techniques — Key Management Part 2 Mechanisms Using Symmetric Techniques ( First Revision )
|
September, 2023
|
-
|
Identical under single numbering
|
|
IS/ISO/IEC 11770-3 : 2021 ISO/IEC 11770-3:2021 |
Information security Key management Part 3: Mechanisms using asymmetric techniques Second Revision
|
-
|
Identical under single numbering
|
||
IS/ISO/IEC 11770-4 : 2017 ISO/IEC 11770-4 : 2017 Reviewed In : 2022 |
Information technology - Security techniques - Key management: Part 4 mechanisms based on weak: Secrets (First Revision)
|
May, 2022
|
2
|
Identical under single numbering
|
|
IS/ISO/IEC 11770-5 : 2020 ISO/IEC 11770-5:2020 |
INFORMATION SECURITY KEY MANAGEMENT PART 5: GROUP KEY MANAGEMENT (First Revision)
|
-
|
Identical under single numbering
|
||
IS/ISO/IEC 11770-6 : 2016 ISO/IEC 11770-6 : 2016 Reviewed In : 2023 |
Information Technology - Security Techniques - Key Management Part 6 Key Derivation
|
January, 2023
|
-
|
Identical under single numbering
|
|
IS/ISO/IEC 11770-7 : 2021 ISO/IEC 11770-7: 2021 |
Information security Key management Part 7: Cross-domain password-based authenticated key exchange
|
-
|
Identical under single numbering
|
||
IS/ISO/IEC 14888-1 : 2008 ISO/IEC 14888-1 : 2008 Reviewed In : 2022 |
Information technology - Security techniques - Digital signatures with appendix: Part 1 general
|
June, 2022
|
-
|
Identical under single numbering
|
|
IS/ISO/IEC 14888-2 : 2008 ISO/IEC 14888-2 : 2008 Reviewed In : 2022 |
Information technology - Security techniques - digital signatures with appendix: Part 2 integer factorization based mechanisms
|
May, 2022
|
1
|
Identical under single numbering
|
|
IS/ISO/IEC 14888-3 : 2018 ISO/IEC 14888-3 : 2018 Reviewed In : 2023 |
IT Security Techniques — Digital Signatures with Appendix Part 3 Discrete Logarithm Based Mechanisms ( First Revision )
|
January, 2023
|
-
|
Identical under single numbering
|
|
IS 14990 (Part 1) : 2024 ISO/IEC 15408-1:2022 |
Information Security Cybersecurity and Privacy Protection Evaluation Criteria for IT Security Part 1: Introduction and General Model Third Revision
|
-
|
Identical under dual numbering
|
||
IS 14990 (Part 2) : 2024 ISO/IEC 15408-2:2022 |
Information security cybersecurity and privacy protection Evaluation criteria for IT security Part 2: Security functional components Third Revision
|
-
|
Identical under dual numbering
|
||
IS 14990 (Part 3) : 2024 ISO/IEC 15408-3:2022 |
Information Security Cybersecurity and Privacy Protection Evaluation Criteria for IT Security Part 3: Security Assurance Components Third Revision
|
-
|
Identical under dual numbering
|
||
IS 14990 (Part 4) : 2024 ISO/IEC 15408-4:2022 |
Information Security Cybersecurity and Privacy Protection Evaluation Criteria for IT Security Part 4: Framework for the Specification of Evaluation Methods and Activities
|
-
|
Identical under dual numbering
|
||
IS 14990 (Part 5) : 2024 ISO/IEC 15408-5:2022 |
Information Security Cybersecurity and Privacy Protection Evaluation Criteria for IT Security Part 5: Pre-defined Packages of Security Requirements
|
-
|
Identical under dual numbering
|
||
IS 15116 : 2018 ISO/IEC 10116 : 2017 Reviewed In : 2021 |
Information technology - Security techniques - Modes of operation for an n - Bit block cipher (Second Revision)
|
November, 2021
|
1
|
Identical under dual numbering
|
|
IS/ISO/IEC/TR 15446 : 2017 ISO/IEC TR 15446 : 2017 Reviewed In : 2022 |
Information technology - Security techniques - Guidance for the production of protection profiles and Security targets
|
May, 2022
|
-
|
Identical under single numbering
|
|
IS 15580 : 2012 ISO/IEC 21827 : 2008 Reviewed In : 2021 |
Information technology - Security techniques - Systems: Security engineering - Capability maturity model® (SSE - CMM®) (First Revision)
|
October, 2021
|
-
|
Identical under dual numbering
|
|
IS 15671 : 2024 ISO/IEC 18045:2022 |
Information Security Cybersecurity and Privacy Protection Evaluation Criteria for IT Security Methodology for IT Security Evaluation Second Revision
|
-
|
Identical under dual numbering
|
||
IS/ISO/IEC 15946-1 : 2016 ISO/IEC 15946 -1 : 2016 Reviewed In : 2024 |
Information Technology - Security Techniques - Cryptographic Techniques Based on Elliptic Curves Part 1 General
|
June, 2024
|
-
|
Identical under single numbering
|
|
IS 17428 (Part 1) : 2020 Reviewed In : 2023 |
Data Privacy Assurance Part 1 Engineering and Management Requirements
|
December, 2023
|
-
|
Indigenous
|
|
IS 17428 (Part 2) : 2020 Reviewed In : 2023 |
Data Privacy Assurance Part 2 Engineering and Management Guidelines
|
December, 2023
|
-
|
Indigenous
|
|
IS 17737 (Part 1) : 2021 |
Mobile Device Security Part 1 Overview
|
-
|
Indigenous
|
||
IS 17737 (Part 2) : 2021 |
Mobile Device Security Part 2 Security Requirements
|
-
|
Indigenous
|
||
IS 17737 (Part 3) : 2021 |
Mobile Device Security Part 3 Security levels
|
-
|
Indigenous
|
||
IS 17737 (Part 4) : 2021 |
Mobile Device Security Part 4 Assessment and Evaluation
|
-
|
Indigenous
|
||
IS/ISO/IEC 18014-1 : 2008 ISO/IEC 18014-1 : 2008 Reviewed In : 2024 |
Information Technology- Security Techniques- Time Stamping Services Part 1 Framework
|
February, 2024
|
-
|
Identical under single numbering
|
|
IS/ISO/IEC 18014-2 : 2021 ISO/IEC 18014-2 : 2021 |
Information security Time- stamping services Part 2: Mechanisms producing independent tokens
|
-
|
Identical under single numbering
|
||
IS/ISO/IEC 18014-3 : 2009 ISO/IEC 18014-3 : 2009 Reviewed In : 2024 |
Information technology - Security techniques - Time - Stamping services: Part 3 mechanisms producing linked tokens
|
February, 2024
|
-
|
Identical under single numbering
|
|
IS/ISO/IEC 18014-4 : 2015 ISO/IEC 18014-4 : 2015 Reviewed In : 2022 |
Information Technology - Security Techniques - Time-Stamping Services Part 4 Traceability of Time Sources
|
May, 2022
|
-
|
Identical under single numbering
|
|
IS/ISO/IEC 18031 : 2011 ISO/IEC 18031 : 2011 Reviewed In : 2024 |
Information technology - Security techniques - Random bit generation
|
July, 2024
|
1
|
Identical under single numbering
|
|
IS/ISO/IEC 18033-1 : 2021 ISO/IEC 18033-1:2021 |
Information security Encryption algorithms Part 1: General First Revision
|
-
|
Identical under single numbering
|
||
IS/ISO/IEC 18033-2 : 2006 ISO/IEC 18033-2 : 2006 Reviewed In : 2024 |
Information Technology - Security Techniques - Encryption Algorithms Part 2 Asymmetric Ciphers
|
June, 2024
|
1
|
Identical under single numbering
|
|
IS/ISO/IEC 18033-3 : 2010 ISO/IEC 18033-3 : 2010 Reviewed In : 2024 |
Information Technology-Security Techniques - Encryption Algorithms Part 3 Block Ciphers
|
June, 2024
|
1
|
Identical under single numbering
|
|
IS/ISO/IEC 18033-4 : 2011 ISO/IEC 18033-4 : 2011 Reviewed In : 2022 |
Information technology - Security techniques - encryption algorithms: Part 4 stream ciphers
|
May, 2022
|
1
|
Identical under single numbering
|
|
IS/ISO/IEC 18033-5 : 2015 Reviewed In : 2022 |
Information technology - Security techniques - Encryption algorithms: Part 5 identity - Based ciphers
|
May, 2022
|
1
|
Identical under single numbering
|
|
IS/ISO/IEC 19790 : 2012 ISO/IEC 19790:2012 |
INFORMATION TECHNOLOGY SECURITY TECHNIQUES SECURITY REQUIREMENTS FOR CRYPTOGRAPHIC MODULES
|
-
|
Identical under single numbering
|
||
IS/ISO/IEC 19792 : 2009 ISO/IEC 19792 :2009 |
Information Technology Security techniques Security evaluation of biometrics
|
-
|
Identical under single numbering
|
||
IS/ISO/IEC 19896-1 : 2018 ISO/IEC 19896-1 : 2018 Reviewed In : 2023 |
IT Security Techniques - Competence Requirements for Information Security Testers and Evaluators Part 1 Introduction, Concepts and General Requirements
|
January, 2023
|
-
|
Identical under single numbering
|
|
IS/ISO/IEC 19896-2 : 2018 ISO/IEC 19896-2 : 2018 Reviewed In : 2023 |
IT Security Techniques - Competence Requirements for Information Security Testers and Evaluators Part 2 Knowledge, Skills and Effectiveness Requirements for ISO / IEC 19790 Testers
|
January, 2023
|
-
|
Identical under single numbering
|
|
IS/ISO/IEC 19896-3 : 2018 ISO/IEC 19896-3 : 2018 Reviewed In : 2023 |
IT Security Techniques - Competence Requirements for Information Security Testers and Evaluators Part 3 Knowledge, Skills and Effectiveness Requirements for ISO/IEC 15408 Evaluators
|
January, 2023
|
-
|
Identical under single numbering
|
|
IS/ISO/IEC/TS 20540 : 2018 ISO/IEC TS 20540 : 2018 Reviewed In : 2023 |
Information Technology - Security Techniques - Testing Cryptographic Modules in their Operational Environment
|
January, 2023
|
-
|
Identical under single numbering
|
|
IS/ISO/IEC 20543 : 2019 ISO/IEC 20543:2019 |
Information technology Security techniques Test and analysis methods for random bit generators within ISOIEC 19790 and ISOIEC 15408
|
-
|
Identical under single numbering
|
||
IS/ISO/IEC 20547-4 : 2020 ISO/IEC 20547-4:2020 |
INFORMATION TECHNOLOGY BIG DATA REFERENCE ARCHITECTURE PART 4: SECURITY AND PRIVACY
|
-
|
Identical under single numbering
|
||
IS/ISO/IEC 24745 : 2022 ISO/IEC 24745:2022 |
Information security cybersecurity and privacy protection Biometric information protection
|
-
|
Identical under single numbering
|
||
IS/ISO/IEC 24759 : 2017 ISO/IEC 24759:2017 |
Information technology Security techniques Test requirements for cryptographic modules
|
-
|
Identical under single numbering
|
||
IS/ISO/IEC 24761 : 2019 ISO/IEC 24761:2019 |
Information technology Security techniques Authentication context for biometrics
|
-
|
Identical under single numbering
|
||
IS/ISO/IEC 27000 : 2018 ISO/IEC 27000 : 2018 Reviewed In : 2022 |
Information technology - Security techniques - information: Security management systems - Overview and vocabulary (First Revision)
|
May, 2022
|
-
|
Identical under single numbering
|
|
IS/ISO/IEC 27001 : 2013 ISO/IEC 27001 : 2013 Reviewed In : 2022 |
Information Technologies - Security Techniques - information Security Managemet Systems - Requirements (First Revision)
|
December, 2022
|
1
|
Identical under single numbering
|
|
IS/ISO/IEC 27001 : 2022 ISO/IEC 27001 : 2022 |
Information Security, Cybersecurity and Privacy Protection - Information Security Management Systems - Requirements (Second Revision)
|
1
|
Identical under single numbering
|
||
IS/ISO/IEC 27002 : 2022 ISO/IEC 27002:2022 |
Information security cybersecurity and privacy protection Information security controls
|
-
|
Identical under single numbering
|
||
IS/ISO/IEC 27003 : 2017 ISO/IEC 27003 : 2017 Reviewed In : 2021 |
Information technology - Security techniques - Information: Security management systems - Guidance (First Revision)
|
September, 2021
|
-
|
Identical under single numbering
|
|
IS/ISO/IEC 27004 : 2016 ISO/IEC 27004 : 2016 Reviewed In : 2022 |
Information technology - Security techniques - Information: Security management - Monitoring, measurement, analysis and evaluation (First Revision)
|
May, 2022
|
-
|
Identical under single numbering
|
|
IS/ISO/IEC 27005 : 2022 ISO/IEC 27005:2022 |
Information security cybersecurity and privacy protection Guidance on managing information security risks
|
-
|
Identical under single numbering
|
||
IS/ISO/IEC 27006 : 2015 ISO/IEC 27006 : 2015 Reviewed In : 2024 |
Information technology - Security techniques - Requirements for bodies providing audit and Certification of Information Security Management systems (First Revision)
|
June, 2024
|
1
|
Identical under single numbering
|
|
IS/ISO/IEC 27007 : 2020 ISO/IEC 27007:2020 |
Information security cybersecurity and privacy protection Guidelines for information security management systems auditing
|
-
|
Identical under single numbering
|
||
IS/ISO/IEC/TS 27008 : 2019 ISO/IEC TS 27008 : 2019 Reviewed In : 2023 |
Information Technology — Security Techniques — Guidelines for the Assessment of Information Security Controls ( First Revision )
|
September, 2023
|
-
|
Identical under single numbering
|
|
IS/ISO/IEC 27010 : 2015 ISO/IEC 27010:2015 Reviewed In : 2024 |
Information Technology - Security Techniques - Information Security Management for Inter-Sector and Inter-Organizational Communications
|
May, 2024
|
-
|
Identical under single numbering
|
|
IS/ISO/IEC 27011 : 2024 ISO/IEC 27011:2024 |
Information Security, Cybersecurity and Privacy Protection — Information Security Controls Based on ISO/IEC 27002 for Telecommunications Organizations (Second Revision)
|
-
|
Identical under single numbering
|
||
IS/ISO/IEC 27011 : 2016 ISO/IEC 27011 : 2016 Reviewed In : 2023 |
Information Technology — Security Techniques — Code of Practice for Information Security Controls Based on ISO/IEC 27002 for Telecommunications Organizations ( First Revision )
|
February, 2023
|
-
|
Identical under single numbering
|
|
IS/ISO/IEC 27017 : 2015 ISO/IEC 27017 : 2015 Reviewed In : 2024 |
Information Technology - Security Techniques - Code of Practice for Information Security Controls Based on ISO/IEC 27002 for Cloud Services
|
June, 2024
|
-
|
Identical under single numbering
|
|
IS/ISO/IEC 27018 : 2019 ISO/IEC 27018 : 2019 Reviewed In : 2023 |
Information Technology — Security Techniques — Code of Practice for Protection of Personally Identifiable Information ( PII ) in Public Clouds Acting as PII Processors ( First Revision )
|
September, 2023
|
-
|
Identical under single numbering
|
|
IS/ISO/IEC 27019 : 2017 ISO/IEC 27019 : 2017 Reviewed In : 2022 |
Information Technology - Security Techniques - Information Security Controls for the Energy Utility Industry
|
December, 2022
|
-
|
Identical under single numbering
|
|
IS/ISO/IEC 27032 : 2023 ISO/IEC 27032:2023 |
Cyber Security — Internet Security — Guidelines (First Revision)
|
-
|
Identical under single numbering
|
||
IS/ISO/IEC 27033-1 : 2015 ISO/IEC 27033-1 : 2015 Reviewed In : 2024 |
Information Technology - Security Techniques - Network Security Part 1 Overview and Concepts (First Revision)
|
June, 2024
|
-
|
Identical under single numbering
|
|
IS/ISO/IEC 27033-2 : 2012 ISO/IEC 27033-2 : 2012 Reviewed In : 2024 |
Information technology - Security techniques: Part 2 guidelines for the design and implementation of network: Security
|
July, 2024
|
-
|
Identical under single numbering
|
|
IS/ISO/IEC 27033-3 : 2010 Reviewed In : 2022 |
Information technology - Security techniques - Network: Security: Part 3 reference networking scenarios - Threats, design techniques and control issues
|
January, 2022
|
-
|
Identical under single numbering
|
|
IS/ISO/IEC 27033-4 : 2014 ISO/IEC 27033-4 : 2014 Reviewed In : 2022 |
Information technology - Security techniques - Network: Security: Part 4 Securing communications between networks using: Security gateways
|
November, 2022
|
-
|
Identical under single numbering
|
|
IS/ISO/IEC 27033-5 : 2013 ISO/IEC 27033-5 : 2013 Reviewed In : 2024 |
Information technology - Security techniques - Network Security: Part 5 Securing communications across networks using virtual pr4ate networks (VPNs)
|
June, 2024
|
-
|
Identical under single numbering
|
|
IS/ISO/IEC 27033-6 : 2016 ISO/IEC 27033-6 : 2016 Reviewed In : 2022 |
Information technology - Security techniques - Network Security: Part 6 Securing wireless IP network access
|
May, 2022
|
-
|
Identical under single numbering
|
|
IS/ISO/IEC 27034-1 : 2011 ISO/IEC 27034-1 : 2011 Reviewed In : 2024 |
Information technology - Security techniques - Application Security: Part 1 overview and concepts
|
July, 2024
|
1
|
Identical under single numbering
|
|
IS/ISO/IEC 27034-2 : 2015 ISO/IEC 27034-2 : 2015 Reviewed In : 2022 |
Information technology - Security techniques - Application Security: Part 2 organization normat4e framework
|
May, 2022
|
-
|
Identical under single numbering
|
|
IS/ISO/IEC 27034-3 : 2018 ISO/IEC 27034-3 : 2018 Reviewed In : 2023 |
Information Technology - Application Security Part 3 Application Security Management Process
|
January, 2023
|
-
|
Identical under single numbering
|
|
IS/ISO/IEC/TS 27034-5-1 : 2018 ISO/IEC TS 27034-5-1 : 2018 Reviewed In : 2023 |
Information Technology - Application Security Part 5-1 Protocols and Application Security Controls Data Structure, XML Schemas
|
January, 2023
|
-
|
Identical under single numbering
|
|
IS/ISO/IEC 27034-5 : 2017 ISO/IEC 27034-5 : 2017 Reviewed In : 2022 |
Information technology - Security techniques - Application Security: Part 5 protocols and application Security controls data structure
|
May, 2022
|
-
|
Identical under single numbering
|
|
IS/ISO/IEC 27034-6 : 2016 ISO/IEC 27034-6 : 2016 Reviewed In : 2022 |
Information technology - Security techniques - Application Security: Part 6 case studies
|
May, 2022
|
-
|
Identical under single numbering
|
|
IS/ISO/IEC 27034-7 : 2018 ISO/IEC 27034-7 : 2018 Reviewed In : 2023 |
Information Technology - Application Security Part 7 Assurance Prediction Framework
|
January, 2023
|
-
|
Identical under single numbering
|
|
IS/ISO/IEC 27035-1 : 2023 ISO/IEC 27035-1 :2023 |
Information Technology Information Security Incident Management Part 1: Principles and Process Second Revision
|
-
|
Identical under single numbering
|
||
IS/ISO/IEC 27035-2 : 2023 ISO/IEC 27035-2 :2023 |
Information Technology Information security incident management Part 2: Guidelines to plan and prepare for incident response Second Revision
|
-
|
Identical under single numbering
|
||
IS/ISO/IEC 27035-3 : 2020 ISO/IEC 27035-3:2020 |
INFORMATION TECHNOLOGY INFORMATION SECURITY INCIDENT MANAGEMENT PART 3: GUIDELINES FOR ICT INCIDENT RESPONSE OPERATIONS
|
-
|
Identical under single numbering
|
||
IS/ISO/IEC 27036-1 : 2021 ISO/IEC 27036-1: 2021 |
Cybersecurity Supplier relationships Part 1: Overview and concepts First Revision
|
-
|
Identical under single numbering
|
||
IS/ISO/IEC 27036-2 : 2022 ISO/IEC 27036-2:2022 |
Cybersecurity Supplier Relationships Part 2: Requirements
|
-
|
Identical under single numbering
|
||
IS/ISO/IEC 27036-3 : 2023 ISO/IEC 27036-3:2023 |
Cybersecurity - Supplier Relationships Part 3: Guidelines for Hardware Software and Services Supply Chain Security ( First Revision)
|
-
|
Identical under single numbering
|
||
IS/ISO/IEC 27036-3 : 2013 ISO/IEC 27036-3 : 2013 Reviewed In : 2023 |
Information technology - Security techniques - Information Security for supplier relationships: Part 3 guidelines for information and communication technology supply chain Security
|
October, 2023
|
-
|
Identical under single numbering
|
|
IS/ISO/IEC 27036-4 : 2016 ISO/IEC 27036-4 : 2016 Reviewed In : 2022 |
Information Technology - Security Techniques - Information Security for Supplier Relationships Part 4 Guidelines for Security of Cloud Services
|
December, 2022
|
-
|
Identical under single numbering
|
|
IS/ISO/IEC 27037 : 2012 ISO/IEC 27037 : 2012 Reviewed In : 2024 |
Information Technology - Security Techniques - Guidelines for Identification,Collection,Acquisition and Preservation of Digital Evidence
|
June, 2024
|
-
|
Identical under single numbering
|
|
IS/ISO/IEC 27040 : 2024 ISO/IEC 27040:2024 |
Information Technology — Security Techniques — Storage Security (First Revision)
|
-
|
Identical under single numbering
|
||
IS/ISO/IEC 27040 : 2015 ISO/IEC 27040 : 2015 Reviewed In : 2024 |
Information Technology - Security Techniques - Storage Security
|
June, 2024
|
-
|
Identical under single numbering
|
|
IS/ISO/IEC 27050-1 : 2019 ISO/IEC 27050-1:2019 |
Information technology Electronic discovery Part 1: Overview and concepts
|
-
|
Identical under single numbering
|
||
IS/ISO/IEC 27050-2 : 2018 ISO/IEC 27050-2:2018 |
Information Technology � Electronic Discovery Part 2: Guidance for Governance and Management of Electronic Discovery
|
-
|
Identical under single numbering
|
||
IS/ISO/IEC 27050-3 : 2020 ISO/IEC 27050-3:2020 |
Information technology Electronic discovery Part 3: Code of practice for electronic discovery
|
-
|
Identical under single numbering
|
||
IS/ISO/IEC 27050-4 : 2021 ISO/IEC 27050-4: 2021 |
Information technology -Electronic discovery Part 4: Technical readiness
|
-
|
Identical under single numbering
|
||
IS/ISO/IEC 27071 : 2023 ISO/IEC 27071:2023 |
Cybersecurity - Security Recommendations for Establishing Trusted Connections Between Devices and Services
|
-
|
Identical under single numbering
|
||
IS/ISO/IEC 27099 : 2022 ISO/IEC 27099:2022 |
Information technology Public key infrastructure Practices and policy framework
|
-
|
Identical under single numbering
|
||
IS/ISO/IEC/TS 27100 : 2020 ISO/IEC TS 27100:2020 |
INFORMATION TECHNOLOGY CYBERSECURITY OVERVIEW AND CONCEPTS
|
-
|
Identical under single numbering
|
||
IS/ISO/IEC/TR 27103 : 2018 ISO/IEC TR 27103 : 2018 Reviewed In : 2023 |
Information Technology - Security Techniques - Cybersecurity and ISO and IEC Standards
|
January, 2023
|
-
|
Identical under single numbering
|
|
IS/ISO/IEC 27400 : 2022 ISO/IEC 27400: 2022 |
Cybersecurity IoT Security and Privacy Guidelines
|
-
|
Identical under single numbering
|
||
IS/ISO/IEC 27402 : 2023 ISO/IEC 27402:2023 |
Cybersecurity IoT Security and Privacy Device Baseline Requirements
|
-
|
Identical under single numbering
|
||
IS/ISO/IEC/TR 27550 : 2019 ISO/IEC TR 27550:2019 |
Information technology Security techniques Privacy engineering for system life cycle processes
|
-
|
Identical under single numbering
|
||
IS/ISO/IEC 29100 : 2024 ISO/IEC 29100:2024 |
Information Technology — Security Techniques — Privacy Framework (First Revision)
|
-
|
Identical under single numbering
|
||
IS/ISO/IEC 29100 : 2011 ISO/IEC 29100 : 2011 Reviewed In : 2024 |
Information Technology - Security Techniques - Privacy Framework
|
June, 2024
|
1
|
Identical under single numbering
|
|
IS/ISO/IEC 29101 : 2018 ISO/IEC 29101 : 2018 Reviewed In : 2023 |
Information Technology — Security Techniques — Privacy Architecture Framework
|
September, 2023
|
-
|
Identical under single numbering
|
|
IS/ISO/IEC 29184 : 2020 ISO/IEC 29184:2020 |
Information technology Online privacy notices and consent
|
-
|
Identical under single numbering
|
||
IS/ISO/IEC 29192-1 : 2012 ISO/IEC 29192-1 : 2012 Reviewed In : 2024 |
Information Technology - Security Techniques - Lightweight Crytography Part 1 General
|
June, 2024
|
-
|
Identical under single numbering
|
|
IS/ISO/IEC 29192-2 : 2019 ISO/IEC 29192-2: 2019 |
Information security Lightweight cryptography Part 2: Block ciphers First Revision
|
-
|
Identical under single numbering
|
||
IS/ISO/IEC 29192-3 : 2012 ISO/IEC 29192-3 : 2012 Reviewed In : 2024 |
Information Technology - Security Techniques - Lightweight Cryptography Part 3 Stream Ciphers
|
May, 2024
|
-
|
Identical under single numbering
|
|
IS/ISO/IEC 29192-4 : 2013 ISO/IEC 29192-4 : 2013 Reviewed In : 2024 |
Information Technology - Security Techniques - Lightweight Cryptography Part 4 Mechanisms Using Asymmetric Techniques
|
June, 2024
|
1
|
Identical under single numbering
|
|
IS/ISO/IEC 29192-5 : 2016 ISO/IEC 29192-5 : 2016 Reviewed In : 2022 |
Information Technology - Security Techniques - Lightweight Cryptography Part 5 Hash-Functions
|
December, 2022
|
-
|
Identical under single numbering
|
|
IS/ISO/IEC 29192-6 : 2019 ISO/IEC 29192-6:2019 |
Information technology Lightweight cryptography Part 6: Message authentication codes MACs
|
-
|
Identical under single numbering
|
||
IS/ISO/IEC 29192-7 : 2019 ISO/IEC 29192-7:2019 |
Information security Lightweight cryptography Part 7: Broadcast authentication protocols
|
-
|
Identical under single numbering
|
||
IS/ISO/IEC 29192-8 : 2022 ISO/IEC 29192-8:2022 |
Information Security Lightweight Cryptography Part 8: Authenticated Encryption
|
-
|
Identical under single numbering
|
||
IS/ISO/IEC 9796-2 : 2010 ISO/IEC 9796-2 : 2010 Reviewed In : 2024 |
Information technology - Security techniques - Digital signature schemes g4ing message recovery: Part 2 integer factorization based mechanisms (First Revision)
|
June, 2024
|
-
|
Identical under single numbering
|
|
IS/ISO/IEC 9796-3 : 2006 Reviewed In : 2022 |
Information technology - Security techniques - Digital signature schemes giving message recovery: Part 3 discrete logarithm based mechanisms
|
April, 2022
|
-
|
Identical under single numbering
|
No Records Found |
No Records Found |
LITD 17 (26352) |
Information Security Cybersecurity and Privacy Protection Privacy Operationalisation Model and Method for Engineering POMME |
|
LITD 17 (26353) |
Information technology Network security Part 7 Guidelines for network virtualization security |
LITD 17 (19143)
|
Internet of Things Security and Privacy - Assessment and Evaluation |
|
LITD 17 (26354)
Revision of: IS/ISO/IEC 27006:2015 |
Information Security Cybersecurity and Privacy Protection Requirements for Bodies Providing Audit and Certification of Information Security Management Systems Part 1 General First Revision |
No Records Found |
No Records Found |
|
IS/ISO/IEC 13335-1 : 2004 ISO/IEC 13335-1:2004 Reviewed In : 2016 |
Information Technology - Security Techniques - Management of Information and Communications Technology Security Part 1 Concepts and Models for Information and Communications Technology Security Management |
|
IS 14356 : 1996 Reviewed In : 2018 |
Guide for protection of information resources |
|
IS 14357 : 2002 |
Information Technology - Code of Practice for Information Security Management |
|
IS 15114 : 2002 Reviewed In : 2008 |
Information Processing - Modes of Operation for a 64-Bit Block Cipher Algorithm |
|
IS 15115 : 2002 Reviewed In : 2008 |
Information Technology - Security Techniques - Procedures for the Registration of Cryptographic Alogorithms |
|
IS 15150 : 2002 |
Information Security Management System - Requirements |
|
IS 16281 (Part 1) : 2014 ISO/IEC 19785-1 : 2006 |
Information Technology Common Biometric Exchange Formats Framework Part 1 Data Element Specification |
|
IS 16281 (Part 4) : 2014 ISO/IEC 19785-4 : 2010 |
Information Technology Common Biometric Exchange Formats Framework Part 4 Security Block Format Specifications |
|
IS/ISO/IEC 17799 : 2005 Reviewed In : 2010 |
Information Technology Code of practice for Information Security Management |
|
IS/ISO/IEC 18014 : 2009 ISO/IEC 18014-3 : 2009 |
Information Technology- Security Techniques- Time Stamping Services Part 3 Mechanisms Producing Linked Tokens |
|
IS/ISO/IEC 19785-2 : 2018 ISO/IEC 19785-2 : 2006 |
Information Technology- Common Biometric Exchange Formats Framework Part 2 Procedures for the Operation of the Biometric Registration Authority |
|
IS/ISO/IEC 24762 : 2008 Reviewed In : 2015 |
Information Technology-Security Techniques-Guidelines for Information and Communications Technology Disaster Recovery Services |
|
IS/ISO/IEC 27035 : 2011 ISO/IEC 27035 : 2011 |
Information technology - Security techniques - Information Security incident management |
IS 17737 (Part 2) : 2021 |
Mobile Device Security Part 2 Security Requirements |
|
IS 17737 (Part 3) : 2021 |
Mobile Device Security Part 3 Security levels |
|
IS 17737 (Part 4) : 2021 |
Mobile Device Security Part 4 Assessment and Evaluation |
|
IS/ISO/IEC 19790 : 2012 ISO/IEC 19790:2012 |
INFORMATION TECHNOLOGY SECURITY TECHNIQUES SECURITY REQUIREMENTS FOR CRYPTOGRAPHIC MODULES |