|
1 |
IS/ISO/IEC 11770 : Part 3 : 2015 |
Information technology - Security techniques - Key management: Part 3 mechanisms using asymmetric techniques (First Revision) |
Others |
IS/ISO/IEC 11770 3:2021 |
|
2 |
IS/ISO/IEC 11770 : Part 5 : 2011 |
Information Technology - Security Techniques - Key Management Part 5 Group Key Management |
Others |
IS/ISO/IEC 11770-5:2020 |
|
3 |
IS/ISO/IEC 13335 : PART 1 : 2004 |
Information Technology - Security Techniques - Management of Information and Communications Technology Security Part 1 Concepts and Models for Information and Communications Technology Security Management |
Others |
------ |
|
4 |
IS 14356 : 1996 |
Guide for protection of information resources |
Code of Practice |
Decided by divisional council 15 sep 2020 |
|
5 |
IS 14357 : 2002 |
Information Technology - Code of Practice for Information Security Management |
------ |
------ |
|
6 |
IS 14990 : PART 1 : 2012 |
Information technology - Security techniques - Evaluation criteria for it: Security: Part 1 introduction and general model (Second Revision) |
Methods of tests |
IS 14990 (PART 1) : 2024 |
|
7 |
IS 14990 : Part 2 : 2017 |
Information technology - Security techniques - Evaluation criteria for it: Security: Part 2 Security functional requirements (Second Revision) |
Methods of tests |
IS 14990 (PART 2) : 2024 |
|
8 |
IS 14990 : Part 3 : 2016 |
Information technology - Security techniques - Evaluation criteria for it: Security: Part 3 Security assurance components (Second Revision) |
Methods of tests |
IS 14990 (PART 3) : 2024 |
|
9 |
IS 15114 : 2002 |
Information Processing - Modes of Operation for a 64-Bit Block Cipher Algorithm |
------ |
------ |
|
10 |
IS 15115 : 2002 |
Information Technology - Security Techniques - Procedures for the Registration of Cryptographic Alogorithms |
------ |
------ |
|
11 |
IS 15150 : 2002 |
Information Security Management System - Requirements |
------ |
------ |
|
12 |
IS 15671 : 2016 |
Information technology - Security techniques - Methodology for IT Security evaluation (First Revision) |
Methods of tests |
IS 15671 : 2024 |
|
13 |
IS 16281 : Part 1 : 2014 |
Information Technology — Common Biometric Exchange Formats Framework Part 1 Data Element Specification |
------ |
------ |
|
14 |
IS 16281 : Part 4 : 2014 |
Information Technology Common Biometric Exchange Formats Framework Part 4 Security Block Format Specifications |
------ |
------ |
|
15 |
IS/ISO/IEC 17799 : 2005 |
Information Technology_ Code of practice for Information Security Management |
Code of Practice |
------ |
|
16 |
IS/ISO/IEC 18014 : 2009 |
Information Technology- Security Techniques- Time Stamping Services Part 3 Mechanisms Producing Linked Tokens |
Others |
none |
|
17 |
IS/ISO/IEC 18014 : Part 2 : 2009 |
Information technology - Security Techniques - Time - Stamping Services Part 2 Mechanisms Producing Independent Tokens |
Others |
IS/ISO/IEC 18014-2:2021 |
|
18 |
IS/ISO/IEC 18033 : Part 1 : 2015 |
Information Technology - Security Techniques - Encryption Algorithms Part 1 General |
Others |
IS/ISO/IEC 18033-1:2021 |
|
19 |
IS/ISO/IEC 19785 : Part 2 : 2018 |
Information Technology- Common Biometric Exchange Formats Framework Part 2 Procedures for the Operation of the Biometric Registration Authority |
Others |
------ |
|
20 |
IS/ISO/IEC 24762 : 2008 |
Information Technology-Security Techniques-Guidelines for Information and Communications Technology Disaster Recovery Services |
Code of Practice |
------ |
|
21 |
IS/ISO/IEC 27002 : 2013 |
Information technology - Security techniques - Code of practice for information: Security controls |
Others |
IS/ISO/IEC 27002 : 2022 |
|
22 |
IS/ISO/IEC 27005 : 2018 |
Information Technology Security Techniques — Information Security Risk Management ( Second Revision ) |
Methods of tests |
|
|
23 |
IS/ISO/IEC 27007 : 2017 |
Information technology - Security techniques - Guidelines for information security management systems auditing |
Others |
------ |
|
24 |
IS/ISO/IEC 27032 : 2012 |
Information Technology - Security Techniques - Guidelines for Cyber Security |
Others |
IS/ISO/IEC 27032 : 2023 |
|
25 |
IS/ISO/IEC 27035 : 2011 |
Information technology - Security techniques - Information Security incident management |
System Standard |
REVISED AS PART 1 and PART 2 |
|
26 |
IS/ISO/IEC 27035 : Part 1 : 2016 |
Information technology - Security techniques - Information Security incident management: Part 1 principles of incident management (First Revision) |
Methods of tests |
IS/ISO/IEC 27035(Part 1):2023 |
|
27 |
IS/ISO/IEC 27035 : Part 2 : 2016 |
Information technology - Security techniques - Information: Security incident management: Part 2 guidelines to plan and prepare for incident response (First Revision) |
Methods of tests |
IS/ISO/IEC 27035(Part 2):2023 |
|
28 |
IS/ISO/IEC 27036 : Part 1 : 2014 |
Information technology - Security techniques - Information: Security for supplier relationships: Part 1 overview and concepts |
Others |
IS/ISO/IEC 27036 (Part-1):2021 |
|
29 |
IS/ISO/IEC 27050 : Part 1 : 2016 |
Information technology - Security techniques - Electronic discovery: Part 1 overview and concepts |
Others |
------ |
|
30 |
IS/ISO/IEC 27050 : Part 3 : 2017 |
Information technology - Security techniques - Electronic discovery: Part 3 code of practice for electronic discovery |
Code of Practice |
------ |
|
31 |
IS/ISO/IEC 29192 : Part 2 : 2012 |
Information Technology - Security Techniques - Lightweight Cryptography Part 2 Block Ciphers |
Others |
------ |