SNo |
IS Number |
Title |
Technical Committee |
1 |
IS/ISO/IEC 27035 : 2011 |
Information technology - Security techniques - Information Security incident management |
LITD 17 |
2 |
IS/ISO/IEC 27033 : Part 2 : 2012 |
Information technology - Security techniques: Part 2 guidelines for the design and implementation of network: Security |
LITD 17 |
3 |
IS/ISO 27799 : 2016 |
Health informatics - Information security management in health using ISO/IEC 27002 |
MHD 17 |
4 |
IS 14700 : Part 4 : Sec 1 : 2019 |
Electromagnetic compatibility (EMC): Part 4 testing and measurement techniques: Sec 1 overview of the IEC 61000 - 4 series (Second Revision) |
LITD 9 |
5 |
IS/ISO/IEC 27000 : 2018 |
Information technology - Security techniques - information: Security management systems - Overview and vocabulary (First Revision) |
LITD 17 |
6 |
IS/ISO/IEC 27037 : 2012 |
Information Technology - Security Techniques - Guidelines for Identification,Collection,Acquisition and Preservation of Digital Evidence |
LITD 17 |
7 |
IS/ISO/IEC 27017 : 2015 |
Information Technology - Security Techniques - Code of Practice for Information Security Controls Based on ISO/IEC 27002 for Cloud Services |
LITD 17 |
8 |
IS/ISO/IEC 27006 : 2015 |
Information technology - Security techniques - Requirements for bodies providing audit and Certification of Information Security Management systems (First Revision) |
LITD 17 |
9 |
IS/ISO/IEC 27019 : 2017 |
Information Technology - Security Techniques - Information Security Controls for the Energy Utility Industry |
LITD 17 |
10 |
IS/ISO/IEC 27034 : Part 3 : 2018 |
Information Technology - Application Security Part 3 Application Security Management Process |
LITD 17 |
11 |
IS/ISO/IEC 27034 : Part 7 : 2018 |
Information Technology - Application Security Part 7 Assurance Prediction Framework |
LITD 17 |
12 |
IS 16334 : 2015 |
Power system communications - Interoperability - Guidelines |
LITD 10 |
13 |
IS/ISO/IEC 27018 : 2019 |
Information Technology — Security Techniques — Code of Practice for Protection of Personally Identifiable Information ( PII ) in Public Clouds Acting as PII Processors ( First Revision ) |
LITD 17 |
14 |
IS/ISO/IEC/TS 27008 : 2019 |
Information Technology — Security Techniques — Guidelines for the Assessment of Information Security Controls ( First Revision ) |
LITD 17 |
15 |
IS 17428 : Part 1 : 2020 |
Data Privacy Assurance Part 1 Engineering and Management Requirements |
LITD 17 |
16 |
IS/ISO/IEC 27003 : 2017 |
Information technology - Security techniques - Information: Security management systems - Guidance (First Revision) |
LITD 17 |
17 |
IS/ISO/IEC 27034 : Part 1 : 2011 |
Information technology - Security techniques - Application Security: Part 1 overview and concepts |
LITD 17 |
18 |
IS/ISO/IEC/TR 27039 : 2015 |
Information Technology - Security Techniques - Selection, Deployment and Operations of Intrusion Detection Systems ( IDPS ) |
LITD 17 |
19 |
IS/ISO/IEC 27033 : Part 6 : 2016 |
Information technology - Security techniques - Network Security: Part 6 Securing wireless IP network access |
LITD 17 |
20 |
IS/ISO/IEC 27034 : Part 2 : 2015 |
Information technology - Security techniques - Application Security: Part 2 organization normat4e framework |
LITD 17 |
21 |
IS/ISO/IEC 27050 : Part 3 : 2017 |
Information technology - Security techniques - Electronic discovery: Part 3 code of practice for electronic discovery |
LITD 17 |
22 |
IS/ISO/IEC 27050 : Part 1 : 2016 |
Information technology - Security techniques - Electronic discovery: Part 1 overview and concepts |
LITD 17 |
23 |
IS/ISO/IEC 27007 : 2017 |
Information technology - Security techniques - Guidelines for information security management systems auditing |
LITD 17 |
24 |
IS/IEC 62351 : Part 7 : 2017 |
Power systems management and associated information exchange Data and communications security Part 7: Network and System Management NSM data object models |
LITD 10 |
25 |
IS 15076 : 2018 |
Chloroprene Rubber CR - General Purpose Types Evaluation Procedure First Revision |
PCD 29 |
26 |
IS 17702 : 2021 |
Dentistry- Integrated dental floss and handles |
MHD 8 |
27 |
IS/ISO/IEC 27001 : 2013 |
Information Technologies - Security Techniques - information Security Managemet Systems - Requirements (First Revision) |
LITD 17 |
28 |
IS 6078 : 2017 |
PLIERS AND NIPPERS ENGINEERS AND LINEMANS PLIERS DIMENSIONS AND TEST VALUES |
PGD 34 |
29 |
IS/ISO/IEC 27036 : Part 1 : 2014 |
Information technology - Security techniques - Information: Security for supplier relationships: Part 1 overview and concepts |
LITD 17 |
30 |
IS/ISO/IEC 27035 : Part 1 : 2016 |
Information technology - Security techniques - Information Security incident management: Part 1 principles of incident management (First Revision) |
LITD 17 |
31 |
IS/ISO/IEC 27035 : Part 2 : 2016 |
Information technology - Security techniques - Information: Security incident management: Part 2 guidelines to plan and prepare for incident response (First Revision) |
LITD 17 |
32 |
IS/ISO/IEC 27005 : 2018 |
Information Technology Security Techniques — Information Security Risk Management ( Second Revision ) |
LITD 17 |
33 |
IS 4386 : 2022 |
SPECIFICATION FOR PUTTING SHOTS Second Revision |
PGD 41 |
34 |
IS 17925 : 2022 |
Test Conditions for Box Type Vertical Drilling Machines Testing of the Accuracy |
PGD 35 |
35 |
IS/ISO/IEC 27032 : 2012 |
Information Technology - Security Techniques - Guidelines for Cyber Security |
LITD 17 |
36 |
IS/ISO/IEC 27011 : 2016 |
Information Technology — Security Techniques — Code of Practice for Information Security Controls Based on ISO/IEC 27002 for Telecommunications Organizations ( First Revision ) |
LITD 17 |
37 |
IS/ISO/IEC 27040 : 2015 |
Information Technology - Security Techniques - Storage Security |
LITD 17 |
38 |
IS/ISO/IEC 27036 : Part 3 : 2013 |
Information technology - Security techniques - Information Security for supplier relationships: Part 3 guidelines for information and communication technology supply chain Security |
LITD 17 |
39 |
IS 12562 : 2023 |
Ferbam wettable powders - Specification first revision |
FAD 1 |
40 |
IS 18133 : 2023 |
Animal feeding stuffs, cereals and milled cereal products � Guidelines for the application of near infrared spectrometry |
FAD 5 |