• ISO/IEC 15408-2:2008

    Superseded A superseded Standard is one, which is fully replaced by another Standard, which is a new edition of the same Standard.

    Information technology — Security techniques — Evaluation criteria for IT security — Part 2: Security functional components

    Available format(s):  Hardcopy, PDF, PDF 3 Users, PDF 5 Users, PDF 9 Users

    Superseded date:  09-08-2022

    Language(s):  French, English

    Published date:  19-08-2008

    Publisher:  International Organization for Standardization

    Add To Cart

    Abstract - (Show below) - (Hide below)

    ISO/IEC 15408-2:2008 defines the content and presentation of the security functional requirements to be assessed in a security evaluation using ISO/IEC 15408. It contains a comprehensive catalogue of predefined security functional components that will meet most common security needs of the marketplace. These are organized using a hierarchical structure of classes, families and components, and supported by comprehensive user notes.

    ISO/IEC 15408-2:2008 also provides guidance on the specification of customized security requirements where no suitable predefined security functional components exist.

    General Product Information - (Show below) - (Hide below)

    Document Type Standard
    Product Note THIS STANDARD HAVE CORRECTED VERSION FOR ENGLISH 2011
    Publisher International Organization for Standardization
    Status Superseded
    Superseded By
    Supersedes

    Standards Referenced By This Book - (Show below) - (Hide below)

    DIN EN 419251-3:2013-06 SECURITY REQUIREMENTS FOR DEVICE FOR AUTHENTICATION - PART 3: ADDITIONAL FUNCTIONALITY FOR SECURITY TARGETS
    AAMI IEC TIR 80001-2-2 : 2012 APPLICATION OF RISK MANAGEMENT FOR IT-NETWORKS INCORPORATING MEDICAL DEVICES - PART 2-2: GUIDANCE FOR THE DISCLOSURE AND COMMUNICATION OF MEDICAL DEVICE SECURITY NEEDS, RISKS AND CONTROLS
    ISO/IEC 29128:2011 Information technology — Security techniques — Verification of cryptographic protocols
    PD ISO/IEC TR 19791:2006 Information technology. Security techniques. Security assessment of operational systems
    BS EN 419251-2:2013 Security requirements for device for authentication Protection profile for extension for trusted channel to certificate generation application
    DIN EN 419211-2 E : 2013 PROTECTION PROFILES FOR SECURE SIGNATURE CREATION DEVICE - PART 2: DEVICE WITH KEY GENERATION
    DIN EN ISO 27789:2013-06 Health informatics - Audit trails for electronic health records (ISO 27789:2013)
    ISO/IEC TR 15446:2017 Information technology Security techniques Guidance for the production of protection profiles and security targets
    ISO/IEC TR 20004:2015 Information technology Security techniques Refining software vulnerability analysis under ISO/IEC 15408 and ISO/IEC 18045
    BS EN 50436-6:2015 Alcohol interlocks. Test methods and performance requirements Data security
    BS EN 419211-6:2014 Protection profiles for secure signature creation device Extension for device with key import and trusted channel to signature creation application
    CAN/CSA-IEC 62443-2-1:17 Industrial communication networks — Network and system security — Part 2-1: Establishing an industrial automation and control system security program (Adopted IEC 62443-2-1:2010, first edition, 2010-11) | Réseaux industriels de communication — Sécurité dans les réseaux et les systèmes — Partie 2-1 : Établissement d’un programme de sécurité pour les systèmes d’automatisation et de commande industrielles (norme IEC 62443-2-1:2010 adoptée, première édition, 2010-11)
    05/30144069 DC : DRAFT DEC 2005 ISO 13491-1 - BANKING - SECURE CRYPTOGRAPHIC DEVICES (RETAIL) - PART 1: CONCEPTS, REQUIREMENTS AND EVALUATION METHODS
    UNI CEN ISO/TS 25110 : 2013 ELECTRONIC FEE COLLECTION - INTERFACE DEFINITION FOR ON-BOARD ACCOUNT USING INTEGRATED CIRCUIT CARD (ICC)
    PD CEN ISO/TS 14907-1:2015 Electronic fee collection. Test procedures for user and fixed equipment Description of test procedures
    ISO/IEC TS 19249:2017 Information technology — Security techniques — Catalogue of architectural and design principles for secure products, systems and applications
    BS ISO/IEC 30107-3:2017 Information technology. Biometric presentation attack detection Testing and reporting
    PREN 419221-5 : DRAFT 2016 PROTECTION PROFILES FOR TRUST SERVICE PROVIDER CRYPTOGRAPHIC MODULES - PART 5: CRYPTOGRAPHIC MODULE FOR TRUST SERVICES
    BS EN ISO 27789:2013 Health informatics. Audit trails for electronic health records
    13/30293476 DC : 0 BS EN 62601 - INDUSTRIAL COMMUNICATION NETWORKS - WIRELESS COMMUNICATION NETWORK AND COMMUNICATION PROFILES - WIA-PA
    10/30156465 DC : DRAFT DEC 2010 BS EN ISO 27789 - HEALTH INFORMATICS - AUDIT TRAILS FOR ELECTRONIC HEALTH RECORDS
    EN ISO/TS 17574 : 2004 ROAD TRANSPORT AND TRAFFIC TELEMATICS - ELECTRONIC FEE COLLECTION (EFC) - GUIDELINES FOR EFC SECURITY PROTECTION PROFILES
    DIN EN 419251-1 E : 2013 SECURITY REQUIREMENTS FOR DEVICE FOR AUTHENTICATION - PART 1: PROTECTION PROFILE FOR CORE FUNCTIONALITY
    S.R. CEN ISO/TS 14907-1:2015 ELECTRONIC FEE COLLECTION - TEST PROCEDURES FOR USER AND FIXED EQUIPMENT - PART 1: DESCRIPTION OF TEST PROCEDURES (ISO/TS 14907-1:2015)
    07/30162803 DC : 0 BS ISO/IEC 18045 - INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - METHODOLOGY FOR IT SECURITY EVALUATION
    14/30275438 DC : 0 BS ISO/IEC 29167-12 - INFORMATION TECHNOLOGY - AUTOMATIC IDENTIFICATION AND DATA CAPTURE TECHNIQUES - PART 12: CRYPTO SUITE ECC-DH SECURITY SERVICES FOR AIR INTERFACE COMMUNICATION
    CSA ISO/IEC TR 14516 : 2004 INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - GUIDELINES FOR THE USE AND MANAGEMENT OF TRUSTED THIRD PARTY SERVICES
    DD IEC PAS 62601 : DRAFT MAR 2009 INDUSTRIAL COMMUNICATION NETWORKS - FIELDBUS SPECIFICATIONS - WIA-PA COMMUNICATION NETWORK AND COMMUNICATION PROFILE
    CSA TELECOM ORGANIZATIONS PACKAGE : 2018 CONSISTS OF CAN/CSA-ISO/IEC 27000:18 - INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - INFORMATION SECURITY MANAGEMENT SYSTEMS - OVERVIEW AND VOCABULARY; CAN/CSA-ISO/IEC 27001:14, INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - INFORMATION SECURITY MANAGEMENT SYSTEMS - REQUIREMENTS; CAN/CSA-ISO/IEC 27002:15 - INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - CODE OF PRACTICE FOR
    I.S. EN 419212-4:2018 APPLICATION INTERFACE FOR SECURE ELEMENTS FOR ELECTRONIC IDENTIFICATION, AUTHENTICATION AND TRUSTED SERVICES - PART 4: PRIVACY SPECIFIC PROTOCOLS
    CSA ISO/IEC TR 14516 : 2004 : R2012 INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - GUIDELINES FOR THE USE AND MANAGEMENT OF TRUSTED THIRD PARTY SERVICES
    INCITS/ISO/IEC 15945 : 2002 INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - SPECIFICATION OF TTP SERVICES TO SUPPORT THE APPLICATION OF DIGITAL SIGNATURES
    S.R. CEN ISO/TS 14441:2013 HEALTH INFORMATICS - SECURITY AND PRIVACY REQUIREMENTS OF EHR SYSTEMS FOR USE IN CONFORMITY ASSESSMENT (ISO/TS 14441:2013)
    ANSI X9.117 : 2012 SECURE REMOTE ACCESS - MUTUAL AUTHENTICATION
    ISO/IEC TR 15443-3:2007 Information technology Security techniques A framework for IT security assurance Part 3: Analysis of assurance methods
    S.R. CEN/TS 419221-2:2016 PROTECTION PROFILES FOR TSP CRYPTOGRAPHIC MODULES - PART 2: CRYPTOGRAPHIC MODULE FOR CSP SIGNING OPERATIONS WITH BACKUP
    INCITS/ISO/IEC 15408-3 : 2013(R2018) INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - EVALUATION CRITERIA FOR IT SECURITY - PART 3: SECURITY ASSURANCE REQUIREMENTS
    I.S. EN 50436-6:2015 ALCOHOL INTERLOCKS - TEST METHODS AND PERFORMANCE REQUIREMENTS - PART 6: DATA SECURITY
    AAMI/IEC TIR80001-2-3:2012 APPLICATION OF RISK MANAGEMENT FOR IT-NETWORKS INCORPORATING MEDICAL DEVICES - PART 2-3: GUIDANCE FOR WIRELESS NETWORKS
    PD CEN ISO/TS 25110:2013 Electronic fee collection. Interface definition for on-board account using integrated circuit card (ICC)
    EN IEC 62443-4-1:2018 Security for industrial automation and control systems - Part 4-1: Secure product development lifecycle requirements
    I.S. EN ISO 27799:2016 HEALTH INFORMATICS - INFORMATION SECURITY MANAGEMENT IN HEALTH USING ISO/IEC 27002
    16/30345816 DC : 0 BS EN 419212-4 - APPLICATION INTERFACE FOR SECURE ELEMENTS FOR ELECTRONIC IDENTIFICATION, AUTHENTICATION AND TRUSTED SERVICES - PART 4: PRIVACY SPECIFIC PROTOCOLS
    I.S. CWA 14172-7:2004 EESSI CONFORMITY ASSESSMENT GUIDANCE - PART 7: CRYPTOGRAPHIC MODULES USED BY CERTIFICATION SERVICE PROVIDERS FOR SIGNING OPERATIONS AND KEY GENERATION SERVICES
    EN ISO 25110:2017 Electronic fee collection - Interface definition for on-board account using integrated circuit card (ICC) (ISO 25110:2017)
    ISO/IEC 15945:2002 Information technology — Security techniques — Specification of TTP services to support the application of digital signatures
    CEN ISO/TS 17574:2017 Electronic fee collection - Guidelines for security protection profiles (ISO/TS 17574:2017)
    CEN ISO/TS 25110:2013 Electronic fee collection - Interface definition for on-board account using integrated circuit card (ICC) (ISO/TS 25110:2013)
    EN 50436-6:2015 Alcohol interlocks - Test methods and performance requirements - Part 6: Data security
    EN 62601:2016 Industrial networks - Wireless communication network and communication profiles - WIA-PA
    EN 319 421 : 1.1.1 ELECTRONIC SIGNATURES AND INFRASTRUCTURES (ESI); POLICY AND SECURITY REQUIREMENTS FOR TRUST SERVICE PROVIDERS ISSUING TIME-STAMPS
    UNE-EN 419211-2:2016 Protection profiles for secure signature creation device - Part 2: Device with key generation
    TR 102 780 : 1.1.1 METHODS FOR TESTING AND SPECIFICATION (MTS); SECURITY; GUIDE TO THE USE OF METHODS IN DEVELOPMENT OF ETSI SECURITY STANDARDS
    S.R. CEN/TS 419221-3:2016 PROTECTION PROFILES FOR TSP CRYPTOGRAPHIC MODULES - PART 3: CRYPTOGRAPHIC MODULE FOR CSP KEY GENERATION SERVICES
    04/30091046 DC : DRAFT DEC 2004 ISO/IEC 19790 - INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - SECURITY REQUIREMENTS FOR CRYPTOGRAPHIC MODULES
    16/30329605 DC : 0 BS ISO/IEC 30107-3 - INFORMATION TECHNOLOGY - BIOMETRIC PRESENTATION ATTACK DETECTION - PART 3: TESTING AND REPORTING
    INCITS/ISO/IEC 15292 : 2001 : R2007 INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - PROTECTION PROFILE REGISTRATION PROCEDURES
    ISO 13491-2:2017 Financial services — Secure cryptographic devices (retail) — Part 2: Security compliance checklists for devices used in financial transactions
    BS ISO/IEC 15408-1:2009 Information technology. Security techniques. Evaluation criteria for IT security Introduction and general model
    ISO/IEC 30107-3:2017 Information technology — Biometric presentation attack detection — Part 3: Testing and reporting
    08/30091038 DC : DRAFT JUNE 2008 ISO/IEC 19792 - INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - SECURITY EVALUATION OF BIOMETRICS
    ISO/IEC 15026-1:2013 Systems and software engineering Systems and software assurance Part 1: Concepts and vocabulary
    TS 102 573 : 2.1.1 ELECTRONIC SIGNATURES AND INFRASTRUCTURES (ESI); POLICY REQUIREMENTS FOR TRUST SERVICE PROVIDERS SIGNING AND/OR STORING DATA OBJECTS
    17/30351770 DC : 0 BS EN ISO 25110 - ELECTRONIC FEE COLLECTION - INTERFACE DEFINITION FOR ON-BOARD ACCOUNT USING INTEGRATED CIRCUIT CARD (ICC)
    DIN EN 419211-2:2013-12 Protection profiles for secure signature creation device - Part 2: Device with key generation
    BS ISO/IEC 19792:2009 Information technology. Security techniques. Security evaluation of biometrics
    PD IEC/TR 80001-2-9:2017 Application of risk management for it-networks incorporating medical devices Application guidance. Guidance for use of security assurance cases to demonstrate confidence in IEC TR 80001-2-2 security capabilities
    BS EN 419251-1:2013 Security requirements for device for authentication Protection profile for core functionality
    ISO/IEC 15408-3:2008 Information technology — Security techniques — Evaluation criteria for IT security — Part 3: Security assurance components
    EG 202 549 : 1.1.1 TELECOMMUNICATIONS AND INTERNET CONVERGED SERVICES AND PROTOCOLS FOR ADVANCED NETWORKING (TISPAN); DESIGN GUIDE; APPLICATION OF SECURITY COUNTERMEASURES TO SERVICE CAPABILITIES
    ISO/IEC 29167-14:2015 Information technology Automatic identification and data capture techniques Part 14: Crypto suite AES OFB security services for air interface communications
    08/30133461 DC : 0 ISO/IEC 27003 - INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - INFORMATION SECURITY MANAGEMENT SYSTEM IMPLEMENTATION GUIDANCE
    EN 319 411-2 : 2.2.2 ELECTRONIC SIGNATURES AND INFRASTRUCTURES (ESI); POLICY AND SECURITY REQUIREMENTS FOR TRUST SERVICE PROVIDERS ISSUING CERTIFICATES; PART 2: REQUIREMENTS FOR TRUST SERVICE PROVIDERS ISSUING EU QUALIFIED CERTIFICATES
    TR 187 013 : 3.1.1 TELECOMMUNICATIONS AND INTERNET CONVERGED SERVICES AND PROTOCOLS FOR ADVANCED NETWORKING (TISPAN); FEASIBILITY STUDY ON IPTV SECURITY ARCHITECTURE
    ISO/IEC 29167-12:2015 Information technology Automatic identification and data capture techniques Part 12: Crypto suite ECC-DH security services for air interface communications
    13/30277648 DC : 0 BS EN 50436-6 - ALCOHOL INTERLOCKS - TEST METHODS AND PERFORMANCE REQUIREMENTS - PART 6: DATA SECURITY
    07/30169475 DC : 0 BS ISO 15782-1 - CERTIFICATE MANAGEMENT FOR FINANCIAL SERVICES - PART 1: PUBLIC KEY CERTIFICATES
    CSA ISO/IEC 15292 : 2004 INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - PROTECTION PROFILE REGISTRATION PROCEDURES
    DD ISO/TS 25237:2008 Health informatics. Pseudonymization
    BS ISO/IEC 15945:2002 Information technology. Security techniques. Specification of TTP services to support the application of digital signatures
    BS ISO 13491-2:2017 Financial services. Secure cryptographic devices (retail) Security compliance checklists for devices used in financial transactions
    CSA ISO/IEC 15408-1 : 2010 INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - EVALUATION CRITERIA FOR IT SECURITY - PART 1: INTRODUCTION AND GENERAL MODEL
    CAN/CSA-ISO/IEC 15945-04 (R2017) Information Technology - Security Techniques - Specification of TTP Services to Support the Application of Digital Signatures (Adopted ISO/IEC 15945:2002, first edition, 2002-02-01)
    CSA ISO/IEC TR 15446 : 2010 INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - GUIDE FOR THE PRODUCTION OF PROTECTION PROFILES AND SECURITY TARGETS
    IEEE DRAFT 1074 : 0 DEVELOPING SOFTWARE LIFE CYCLE PROCESSES
    INCITS/ISO/IEC 15408-1 : 2012 INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - EVALUATION CRITERIA FOR IT SECURITY - PART 1: INTRODUCTION AND GENERAL MODEL
    TR 185 012 : 3.1.1 TELECOMMUNICATIONS AND INTERNET CONVERGED SERVICES AND PROTOCOLS FOR ADVANCED NETWORKING (TISPAN); FEASIBILITY STUDY OF SECURITY MECHANISMS FOR CUSTOMER PREMISES NETWORKS CONNECTED TO TISPAN NGN
    IEC 62443-2-1:2010 Industrial communication networks - Network and system security - Part 2-1: Establishing an industrial automation and control system security program
    UNE-ISO/IEC TR 19791:2013 IN Information technology. Security techniques. Security assessment of operational systems
    UNE 71512:2011 Applications with the Spanish DNIe. Electronic signature creation and verification. Type 2 for personal computers, and with a Evaluation Assurance Level «EAL1»
    BIS IS 14990-1 : 2012 INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - EVALUATION CRITERIA FOR IT SECURITY - PART 1: INTRODUCTION AND GENERAL MODEL
    I.S. CWA 14365-1:2004 GUIDE ON THE USE OF ELECTRONIC SIGNATURES - PART 1: LEGAL AND TECHNICAL ASPECTS
    EG 202 387 : 1.1.1 TELECOMMUNICATIONS AND INTERNET CONVERGED SERVICES AND PROTOCOLS FOR ADVANCED NETWORKING (TISPAN); SECURITY DESIGN GUIDE; METHOD FOR APPLICATION OF COMMON CRITERIA TO ETSI DELIVERABLES
    TR 102 420 : 1.1.1 TELECOMMUNICATIONS AND INTERNET CONVERGED SERVICES AND PROTOCOLS FOR ADVANCED NETWORKING (TISPAN); REVIEW OF ACTIVITY ON SECURITY
    I.S. EN 62601:2016 INDUSTRIAL NETWORKS - WIRELESS COMMUNICATION NETWORK AND COMMUNICATION PROFILES - WIA-PA
    PREN 419241-2 : DRAFT 2017 TRUSTWORTHY SYSTEMS SUPPORTING SERVER SIGNING - PART 2: PROTECTION PROFILE FOR QSCD FOR SERVER SIGNING
    UNI CEN ISO/TS 14441 : 2014 HEALTH INFORMATICS - SECURITY AND PRIVACY REQUIREMENTS OF HER SYSTEMS FOR USE IN CONFORMITY ASSESSMENT
    UNE 71511:2011 Applications with the Spanish DNIe. Electronic signature creation and verification. Type 1 for IT platforms that allow an exclusive control of signer’s interfaces, and with a Evaluation Assurance Level «EAL3»
    I.S. CWA 14172-3:2004 EESSI CONFORMITY ASSESSMENT GUIDANCE - PART 3: TRUSTWORTHY SYSTEMS MANAGING CERTIFICATES FOR ELECTRONIC SIGNATURES
    UNE 71513:2011 Applications with the Spanish DNIe. Electronic signature creation and verification. Type 2 for personal computers, and with a Evaluation Assurance Level «EAL3»
    UNE-ISO/IEC TR 15446:2013 IN Information technology. Security techniques. Guide for the production of Protection Profiles and Security Targets
    TR 187 020 : 1.1.1 RADIO FREQUENCY IDENTIFICATION (RFID); COORDINATED ESO RESPONSE TO PHASE 1 OF EU MANDATE M436
    CSA ISO/IEC 15026-1 : 2015 SYSTEMS AND SOFTWARE ENGINEERING - SYSTEMS AND SOFTWARE ASSURANCE - PART 1: CONCEPTS AND VOCABULARY
    I.S. CWA 14355:2004 GUIDELINES FOR THE IMPLEMENTATION OF SECURE SIGNATURE-CREATION DEVICES
    DIN EN 419251-2:2013-06 SECURITY REQUIREMENTS FOR DEVICE FOR AUTHENTICATION - PART 2: PROTECTION PROFILE FOR EXTENSION FOR TRUSTED CHANNEL TO CERTIFICATE GENERATION APPLICATION
    GS NFV-SEC 006 : 1.1.1 NETWORK FUNCTIONS VIRTUALISATION (NFV); SECURITY GUIDE; REPORT ON SECURITY ASPECTS AND REGULATORY CONCERNS
    ISO/IEC 29167-11:2014 Information technology — Automatic identification and data capture techniques — Part 11: Crypto suite PRESENT-80 security services for air interface communications
    04/30040790 DC : DRAFT MARCH 2004 ISO/IEC DTR 15443-2 - INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - A FRAMEWORK FOR IT SECURITY ASSURANCE - PART 2 - ASSURANCE METHODS
    BS EN 419211-2:2013 Protection profiles for secure signature creation device Device with key generation
    DIN EN 419251-3 E : 2013 SECURITY REQUIREMENTS FOR DEVICE FOR AUTHENTICATION - PART 3: ADDITIONAL FUNCTIONALITY FOR SECURITY TARGETS
    GS NFV-SEC 014 : 3.1.1 NETWORK FUNCTIONS VIRTUALISATION (NFV) RELEASE 3; NFV SECURITY; SECURITY SPECIFICATION FOR MANO COMPONENTS AND REFERENCE POINTS
    DIN CEN ISO/TS 14907-1;DIN SPEC 91192:2015-12 ELECTRONIC FEE COLLECTION - TEST PROCEDURES FOR USER AND FIXED EQUIPMENT - PART 1: DESCRIPTION OF TEST PROCEDURES (ISO/TS 14907-1:2015)
    INCITS/ISO 19153 : 2014 GEOGRAPHIC INFORMATION - GEOSPATIAL DIGITAL RIGHTS MANAGEMENT REFERENCE MODEL (GEODRM RM)
    DIN EN 62601:2016-10 Industrial networks - Wireless communication network and communication profiles - WIA-PA (IEC 62601:2015); English version EN 62601:2016
    15/30285708 DC : 0 BS EN ISO 25237 - HEALTH INFORMATICS - PSEUDONYMISATION
    DIN EN 419251-1:2013-05 SECURITY REQUIREMENTS FOR DEVICE FOR AUTHENTICATION - PART 1: PROTECTION PROFILE FOR CORE FUNCTIONALITY
    BS ISO/IEC TR 15942:2000 Information technology. Programming languages. Guide for the use of the Ada programming language in high integrity systems
    BS ISO/IEC 15408-3:2008 Information technolgy. Security techniques. Evaluation criteria for IT security Security assurance components
    ES 202 382 : 1.1.1 TELECOMMUNICATIONS AND INTERNET CONVERGED SERVICES AND PROTOCOLS FOR ADVANCED NETWORKING (TISPAN); SECURITY DESIGN GUIDE; METHOD AND PROFORMA FOR DEFINING PROTECTION PROFILES
    ISO/IEC TR 19791:2010 Information technology Security techniques Security assessment of operational systems
    DIN EN 419251-2 E : 2013 SECURITY REQUIREMENTS FOR DEVICE FOR AUTHENTICATION - PART 2: PROTECTION PROFILE FOR EXTENSION FOR TRUSTED CHANNEL TO CERTIFICATE GENERATION APPLICATION
    TS 187 001 : 3.9.1 NETWORK TECHNOLOGIES (NTECH); NGN SECURITY (SEC); REQUIREMENTS
    SR 002 564 : 2.0.0 APPLICABILITY OF EXISTING ETSI AND ETSI/3GPP DELIVERABLES TO EHEALTH
    BS IEC 62443-2-1 : 2010 INDUSTRIAL COMMUNICATION NETWORKS - NETWORK AND SYSTEM SECURITY - PART 2-1: ESTABLISHING AN INDUSTRIAL AUTOMATION AND CONTROL SYSTEM SECURITY PROGRAM
    CSA ISO/IEC TR 15942 : 2004 : R2014 INFORMATION TECHNOLOGY - PROGRAMMING LANGUAGES - GUIDE FOR THE USE OF THE ADA PROGRAMMING LANGUAGE IN HIGH INTEGRITY SYSTEMS
    PD ISO/IEC TR 20004:2015 Information technology. Security techniques. Refining software vulnerability analysis under ISO/IEC 15408 and ISO/IEC 18045
    DIN EN 419211-6 E : 2014 PROTECTION PROFILES FOR SECURE SIGNATURE CREATION DEVICE - PART 6: EXTENSION FOR DEVICE WITH KEY IMPORT AND TRUSTED CHANNEL TO SIGNATURE CREATION APPLICATION
    BS EN 419251-3:2013 Security requirements for device for authentication Additional functionality for security targets
    07/30162799 DC : 0 BS ISO/IEC 15408-3 - INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - EVALUATION CRITERIA FOR IT SECURITY - PART 3: SECURITY ASSURANCE REQUIREMENTS
    07/30161079 DC : 0 BS EN 14890-1 - APPLICATION INTERFACE FOR SMART CARDS USED AS SECURE SIGNATURE CREATION DEVICES - PART 1: BASIC SERVICES
    ISA 99.02.01 : 2009 SECURITY FOR INDUSTRIAL AUTOMATION AND CONTROL SYSTEMS: ESTABLISHING AN INDUSTRIAL AUTOMATION AND CONTROL SYSTEMS SECURITY PROGRAM
    07/30143790 DC : 0 BS ISO/IEC 24759 - INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - TEST REQUIREMENTS FOR CRYPTOGRAPHIC MODULES
    10/30192143 DC : 0 BS ISO/IEC 29128 - INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - VERIFICATION OF CRYPTOGRAPHIC PROTOCOLS
    07/30107763 DC : 0 BS ISO/IEC 24713-2 - INFORMATION TECHNOLOGY - BIOMETRIC PROFILES FOR INTEROPERABILITY AND DATA INTERCHANGE - PART 2: PHYSICAL ACCESS CONTROL FOR EMPLOYEES AT AIRPORTS
    I.S. EN 419251-2:2013 SECURITY REQUIREMENTS FOR DEVICE FOR AUTHENTICATION - PART 2: PROTECTION PROFILE FOR EXTENSION FOR TRUSTED CHANNEL TO CERTIFICATE GENERATION APPLICATION
    IEC PAS 62601:2009 Industrial communication networks - Fieldbus specifications - WIA-PA communication network and communication profile
    CSA ISO/IEC 27003 : 2010 : R2015 INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - INFORMATION SECURITY MANAGEMENT SYSTEM IMPLEMENTATION GUIDANCE
    CSA ISO/IEC 15408-3 : 2009 INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - EVALUATION CRITERIA FOR IT SECURITY - PART 3: SECURITY ASSURANCE COMPONENTS
    CAN/CSA-ISO/IEC 29167-12:16 Information technology Automatic identification and data capture techniques Part 12: Crypto suite ECC-DH security services for air interface communication (Adopted ISO/IEC 29167-12:2015, first edition, 2015-05-15)
    SAE J 3061 : 2016 CYBERSECURITY GUIDEBOOK FOR CYBER-PHYSICAL VEHICLE SYSTEMS
    I.S. EN ISO 25237:2017 HEALTH INFORMATICS - PSEUDONYMIZATION (ISO 25237:2017)
    AAMI/IEC TIR80001-2-8:2016 APPLICATION OF RISK MANAGEMENT FOR IT NETWORKS INCORPORATING MEDICAL DEVICES - PART 2-8: APPLICATION GUIDANCE - GUIDANCE ON STANDARDS FOR ESTABLISHING THE SECURITY CAPABILITIES IDENTIFIED IN IEC 80001-2-2
    TR 187 011 : 2.1.1 TELECOMMUNICATIONS AND INTERNET CONVERGED SERVICES AND PROTOCOLS FOR ADVANCED NETWORKING (TISPAN); NGN SECURITY; APPLICATION OF ISO-15408-2 REQUIREMENTS TO ETSI STANDARDS - GUIDE, METHOD AND APPLICATION WITH EXAMPLES
    PD CEN/TS 419221-2:2016 Protection Profiles for TSP cryptographic modules Cryptographic module for CSP signing operations with backup
    ISO/IEC 19792:2009 Information technology Security techniques Security evaluation of biometrics
    I.S. CWA 14169:2004 SECURE SIGNATURE-CREATION DEVICES 'EAL 4+'
    TR 102 572 : 1.1.1 BEST PRACTICES FOR HANDLING ELECTRONIC SIGNATURES AND SIGNED DATA FOR DIGITAL ACCOUNTING
    UNE 71510:2011 Applications with the Spanish DNIe. Electronic signature creation and verification. Type 1 for IT platforms that allow an exclusive control of signer’s interfaces, and with a Evaluation Assurance Level «EAL1».
    IEC TR 80001-2-8:2016 Application of risk management for IT-networks incorporating medical devices - Part 2-8: Application guidance - Guidance on standards for establishing the security capabilities identified in IEC TR 80001-2-2
    TS 102 165-1 : 4.2.3 CYBER; METHODS AND PROTOCOLS; PART 1: METHOD AND PRO FORMA FOR THREAT, VULNERABILITY, RISK ANALYSIS (TVRA)
    UNE EN 419211-2 : 2016 PROTECTION PROFILES FOR SECURE SIGNATURE CREATION DEVICE - PART 2: DEVICE WITH KEY GENERATION
    UNI EN ISO 27789 : 2013 HEALTH INFORMATICS - AUDIT TRAILS FOR ELECTRONIC HEALTH RECORDS
    UNI EN 419211-6 : 2014 PROTECTION PROFILES FOR SECURE SIGNATURE CREATION DEVICE - PART 6: EXTENSION FOR DEVICE WITH KEY IMPORT AND TRUSTED CHANNEL TO SIGNATURE CREATION APPLICATION
    ISO/TS 25110:2013 Electronic fee collection Interface definition for on-board account using integrated circuit card (ICC)
    UNI EN 419212-1 : 2015 APPLICATION INTERFACE FOR SMART CARDS USED AS SECURE SIGNATURE CREATION DEVICES - PART 1: BASIC SERVICES
    I.S. EN 419211-6:2014 PROTECTION PROFILES FOR SECURE SIGNATURE CREATION DEVICE - PART 6: EXTENSION FOR DEVICE WITH KEY IMPORT AND TRUSTED CHANNEL TO SIGNATURE CREATION APPLICATION
    PD IEC/TR 80001-2-3:2012 Application of risk management for IT-networks incorporating medical devices Guidance for wireless networks
    PD ISO/IEC TR 15446:2009 Information technology. Security techniques. Guide for the production of protection profiles and security targets
    PD IEC/TR 80001-2-8:2016 Application of risk management for IT-networks incorporating medical devices Application guidance. Guidance on standards for establishing the security capabilities identified in IEC TR 80001-2-2
    TS 102 158 : 1.1.1 ELECTRONIC SIGNATURES AND INFRASTRUCTURES (ESI); POLICY REQUIREMENTS FOR CERTIFICATION SERVICE PROVIDERS ISSUING ATTRIBUTE CERTIFICATES USABLE WITH QUALIFIED CERTIFICATES
    BS IEC 62601:2011 Industrial communication networks. Fieldbus specifications. WIA-PA communication network and communication profile
    08/30182164 DC : DRAFT MAY 2008 BS ISO 31000 - RISK MANAGEMENT - PRINCIPLES AND GUIDELINES ON IMPLEMENTATION
    I.S. EN ISO 25110:2017 ELECTRONIC FEE COLLECTION - INTERFACE DEFINITION FOR ON-BOARD ACCOUNT USING INTEGRATED CIRCUIT CARD (ICC) (ISO 25110:2017)
    CSA INFORMATION SECURITY PACKAGE : 2018 CONSISTS OF CAN/CSA-ISO/IEC 27000:18 - INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - INFORMATION SECURITY MANAGEMENT SYSTEMS - OVERVIEW AND VOCABULARY; CAN/CSA-ISO/IEC 27001:14, INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - INFORMATION SECURITY MANAGEMENT SYSTEMS - REQUIREMENTS; CAN/CSA-ISO/IEC 27002:15 - INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - CODE OF PRACTICE FOR INFORMATION
    TS 102 181 : 1.2.1 EMERGENCY COMMUNICATIONS (EMTEL); REQUIREMENTS FOR COMMUNICATION BETWEEN AUTHORITIES/ORGANIZATIONS DURING EMERGENCIES
    BS ISO/IEC 29128:2011 Information technology. Security techniques. Verification of cryptographic protocols
    BIS IS/ISO 21188 : 2006 PUBLIC KEY INFRASTRUCTURE FOR FINANCIAL SERVICES - PRACTICES AND POLICY FRAMEWORK
    PD IEC/TR 80001-2-2:2012 Application of risk management for IT-networks incorporating medical devices Guidance for the disclosure and communication of medical device security needs, risks and controls
    S.R. CEN/TS 419221-4:2016 PROTECTION PROFILES FOR TSP CRYPTOGRAPHIC MODULES - PART 4: CRYPTOGRAPHIC MODULE FOR CSP SIGNING OPERATIONS WITHOUT BACKUP
    BS ISO/IEC 15026-1:2013 Systems and software engineering. Systems and software assurance Concepts and vocabulary
    BS ISO/IEC TR 14516:2002 Information technology. Security techniques. Guidelines for the use and management of trusted third party services
    UNI EN 419211-2 : 2014 PROTECTION PROFILES FOR SECURE SIGNATURE CREATION DEVICE - PART 2: DEVICE WITH KEY GENERATION
    UNI EN 419251-3 : 2013 SECURITY REQUIREMENTS FOR DEVICE FOR AUTHENTICATION - PART 3: ADDITIONAL FUNCTIONALITY FOR SECURITY TARGETS
    UNI EN 419251-1 : 2013 SECURITY REQUIREMENTS FOR DEVICE FOR AUTHENTICATION - PART 1: PROTECTION PROFILE FOR CORE FUNCTIONALITY
    PD ISO/IEC/TR 19249:2017 Information technology. Security techniques Catalogue of architectural and design principles for secure products, systems and applications
    DIN EN ISO 25237:2015-10 (Draft) HEALTH INFORMATICS - PSEUDONYMIZATION (ISO 25237:2017)
    17/30346588 DC : 0 BS EN 419221-5 - PROTECTION PROFILES FOR TRUST SERVICE PROVIDER CRYPTOGRAPHIC MODULES - PART 5: CRYPTOGRAPHIC MODULE FOR TRUST SERVICES
    TR 187 002 : 3.1.1 TELECOMMUNICATIONS AND INTERNET CONVERGED SERVICES AND PROTOCOLS FOR ADVANCED NETWORKING (TISPAN); TISPAN NGN SECURITY (NGN SEC); THREAT, VULNERABILITY AND RISK ANALYSIS
    09/30207165 DC : 0 BS EN 62601 - INDUSTRIAL COMMUNICATION NETWORKS - FIELDBUS SPECIFICATIONS - WIA-PA COMMUNICATION NETWORK AND COMMUNICATION PROFILE
    DD CEN ISO/TS 25110:2008 Electronic fee collection. Interface definition for on-board account using integrated circuit card (ICC)
    CSA ISO/IEC 15408-1 : 2010 : R2015 INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - EVALUATION CRITERIA FOR IT SECURITY - PART 1: INTRODUCTION AND GENERAL MODEL
    03/652682 DC : DRAFT NOV 2003 BS ISO/IEC TR 15446 - INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - GUIDE FOR THE PRODUCTION OF PROTECTION PROFILES AND SECURITY TARGETS
    CSA ISO/IEC TR 15446 : 2010 : R2015 INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - GUIDE FOR THE PRODUCTION OF PROTECTION PROFILES AND SECURITY TARGETS
    07/30161082 DC : 0 BS EN 14890-2 - APPLICATION INTERFACE FOR SMART CARDS USED AS SECURE SIGNATURE CREATION DEVICES - PART 2: ADDITIONAL SERVICES
    CSA ISO/IEC 27003 : 2010 INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - INFORMATION SECURITY MANAGEMENT SYSTEM IMPLEMENTATION GUIDANCE
    SR 019 020 : 1.1.2 THE FRAMEWORK FOR STANDARDIZATION OF SIGNATURES; STANDARDS FOR ADES DIGITAL SIGNATURES IN MOBILE AND DISTRIBUTED ENVIRONMENTS
    TS 187 016 : 3.1.1 TELECOMMUNICATIONS AND INTERNET CONVERGED SERVICES AND PROTOCOLS FOR ADVANCED NETWORKING (TISPAN); NGN SECURITY; IDENTITY PROTECTION (PROTECTION PROFILE)
    CR 14301 : 2002 HEALTH INFORMATICS - FRAMEWORK FOR SECURITY PROTECTION OF HEALTHCARE COMMUNICATION
    CAN/CSA-ISO/IEC 29167-14:16 Information technology Automatic identification and data capture techniques Part 14: Crypto suite AES OFB security services for air interface communications (Adopted ISO/IEC 29167-14:2015, first edition, 2015-10-15)
    CSA ISO/IEC 15945 : 2004 INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - SPECIFICATION OF TTP SERVICES TO SUPPORT THE APPLICATION OF DIGITAL SIGNATURES
    CSA ISO/IEC 15408-3 : 2009 : R2014 INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - EVALUATION CRITERIA FOR IT SECURITY - PART 3: SECURITY ASSURANCE COMPONENTS
    16/30315782 DC : 0 BS ISO 16461 - INTELLIGENT TRANSPORT SYSTEMS - CRITERIA FOR PRIVACY AND INTEGRITY PROTECTION
    ES 202 383 : 1.1.1 TELECOMMUNICATIONS AND INTERNET CONVERGED SERVICES AND PROTOCOLS FOR ADVANCED NETWORKING (TISPAN); SECURITY DESIGN GUIDE; METHOD AND PROFORMA FOR DEFINING SECURITY TARGETS
    S.R. CEN ISO/TS 17574:2017 ELECTRONIC FEE COLLECTION - GUIDELINES FOR SECURITY PROTECTION PROFILES (ISO/TS 17574:2017)
    I.S. EN IEC 62443-4-1:2018 SECURITY FOR INDUSTRIAL AUTOMATION AND CONTROL SYSTEMS - PART 4-1: SECURE PRODUCT DEVELOPMENT LIFECYCLE REQUIREMENTS
    GS ISI 001-2 : 1.1.2 INFORMATION SECURITY INDICATORS (ISI); INDICATORS (INC); PART 2: GUIDE TO SELECT OPERATIONAL INDICATORS BASED ON THE FULL SET GIVEN IN PART 1
    I.S. CWA 14838-2:2003 FACILITATING SMART CARD TECHNOLOGY FOR ELECTRONIC TICKETING AND SEAMLESS TRAVEL - PART 2: DEVELOPMENT OF SMART CARD BASED INTEROPERABLE TICKETING SYSTEMS
    I.S. CWA 14172-1:2004 EESSI CONFORMITY ASSESSMENT GUIDANCE - PART 1: GENERAL INTRODUCTION
    TR 187 009 : 2.1.1 TELECOMMUNICATIONS AND INTERNET CONVERGED SERVICES AND PROTOCOLS FOR ADVANCED NETWORKING (TISPAN); FEASIBILITY STUDY OF PREVENTION OF UNSOLICITED COMMUNICATION IN THE NGN
    TR 102 512 : 1.1.1 TERRESTRIAL TRUNKED RADIO (TETRA); SECURITY; SECURITY REQUIREMENTS ANALYSIS FOR MODULATION ENHANCEMENTS TO TETRA
    I.S. CWA 14890-2:2004 APPLICATION INTERFACE FOR SMART CARDS USED AS SECURE SIGNATURE CREATION DEVICES - PART 2: ADDITIONAL SERVICES
    TS 102 747 : 1.1.1 HUMAN FACTORS (HF); PERSONALIZATION AND USER PROFILE MANAGEMENT; ARCHITECTURAL FRAMEWORK
    I.S. CWA 14365:2003 GUIDE ON THE USE OF ELECTRONIC SIGNATURES
    ISO/TS 25237:2008 Health informatics Pseudonymization
    I.S. EN 419221-5:2018 PROTECTION PROFILES FOR TSP CRYPTOGRAPHIC MODULES - PART 5: CRYPTOGRAPHIC MODULE FOR TRUST SERVICES
    CEN/TS 419221-2:2016 Protection Profiles for TSP cryptographic modules - Part 2: Cryptographic module for CSP signing operations with backup
    IEC TR 80001-2-3:2012 Application of risk management for IT-networks incorporating medical devices - Part 2-3: Guidance for wireless networks
    I.S. CWA 14365-2:2004 GUIDE ON THE USE OF ELECTRONIC SIGNATURES - PART 2: PROTECTION PROFILE FOR SOFTWARE SIGNATURE CREATION DEVICES
    PREN 419212-4 : DRAFT 2016 APPLICATION INTERFACE FOR SECURE ELEMENTS FOR ELECTRONIC IDENTIFICATION, AUTHENTICATION AND TRUSTED SERVICES - PART 4: PRIVACY SPECIFIC PROTOCOLS
    I.S. CWA 14172-6:2004 EESSI CONFORMITY ASSESSMENT GUIDANCE - PART 6: SIGNATURE-CREATION DEVICE SUPPORTING SIGNATURES OTHER THAN QUALIFIED
    S.R. CWA 15929:2009 BEST PRACTICES FOR THE DESIGN AND DEVELOPMENT OF CRITICAL INFORMATION SYSTEMS
    IEC TR 80001-2-2:2012 Application of risk management for IT-networks incorporating medical devices - Part 2-2: Guidance for the disclosure and communication of medical device security needs, risks and controls
    I.S. CEN ISO TS 17574:2005 ROAD TRANSPORT AND TRAFFIC TELEMATICS - ELECTRONIC FEE COLLECTION (EFC) - GUIDELINES FOR EFC SECURITY PROTECTION PROFILES
    ANSI X9.97-1 : 2009 FINANCIAL SERVICES - SECURE CRYPTOGRAPHIC DEVICES (RETAIL) - PART 1: CONCEPTS, REQUIREMENTS AND EVALUATION METHODS
    IEC 62601:2015 Industrial networks - Wireless communication network and communication profiles - WIA-PA
    ISO/TS 14907-1:2015 Electronic fee collection Test procedures for user and fixed equipment Part 1: Description of test procedures
    ISO 25237:2017 Health informatics — Pseudonymization
    ISO/TS 14441:2013 Health informatics — Security and privacy requirements of EHR systems for use in conformity assessment
    ISO/TS 17574:2017 Electronic fee collection — Guidelines for security protection profiles
    EN 419221-5:2018 Protection Profiles for TSP Cryptographic Modules - Part 5: Cryptographic Module for Trust Services
    EN 419251-2:2013 Security requirements for device for authentication - Part 2: Protection profile for extension for trusted channel to certificate generation application
    EN 419251-3:2013 Security requirements for device for authentication - Part 3: Additional functionality for security targets
    EN 419212-4:2018 Application Interface for Secure Elements for Electronic Identification, Authentication and Trusted Services - Part 4: Privacy specific Protocols
    EN ISO 25237:2017 Health informatics - Pseudonymization (ISO 25237:2017)
    EN 419251-1:2013 Security requirements for device for authentication - Part 1: Protection profile for core functionality
    EN 419211-6:2014 Protection profiles for secure signature creation device - Part 6: Extension for device with key import and trusted channel to signature creation application
    EN 419211-2:2013 Protection profiles for secure signature creation device - Part 2: Device with key generation
    PREN 50436-6 : DRAFT 2013 ALCOHOL INTERLOCKS - TEST METHODS AND PERFORMANCE REQUIREMENTS - PART 6: DATA SECURITY
    PD ISO/IEC TR 15443-3:2007 Information technology. Security techniques. A framework for IT security assurance Analysis of assurance methods
    TS 102 941 : 1.1.1 INTELLIGENT TRANSPORT SYSTEMS (ITS); SECURITY; TRUST AND PRIVACY MANAGEMENT
    08/30193508 DC : DRAFT NOV 2008 BS EN 61508-1 - FUNCTIONAL SAFETY OF ELECTRICAL/ELECTRONIC/PROGRAMMABLE ELECTRONIC SAFETY-RELATED SYSTEMS - PART 1: GENERAL REQUIREMENTS
    17/30351732 DC : 0 BS ISO/IEC 19896-1 - INFORMATION TECHNOLOGY - IT SECURITY TECHNIQUES - COMPETENCE REQUIREMENTS FOR INFORMATION SECURITY TESTERS AND EVALUATORS - PART 1: INTRODUCTION, CONCEPTS AND GENERAL REQUIREMENTS
    ISO/IEC TR 14516:2002 Information technology Security techniques Guidelines for the use and management of Trusted Third Party services
    DIN EN 419211-6:2014-12 PROTECTION PROFILES FOR SECURE SIGNATURE CREATION DEVICE - PART 6: EXTENSION FOR DEVICE WITH KEY IMPORT AND TRUSTED CHANNEL TO SIGNATURE CREATION APPLICATION
    I.S. EN ISO 27789:2013 HEALTH INFORMATICS - AUDIT TRAILS FOR ELECTRONIC HEALTH RECORDS (ISO 27789:2013)
    NASA CCSDS 350.4-G : ISSUE 1 CCSDS GUIDE FOR SECURE SYSTEM INTERCONNECTION
    PD CEN/TS 419221-3:2016 Protection Profiles for TSP Cryptographic modules Cryptographic module for CSP key generation services
    BS EN ISO 25237:2017 Health informatics. Pseudonymization
    05/30107724 DC : DRAFT JAN 2005 ISO/IEC 19794-1 - BIOMETRIC DATA INTERCHANGE - PART 1: FRAMEWORK
    PD IEC TR 62210:2003 Power system control and associated communications. Data and communication security
    CSA ISO/IEC TR 15942:2004 INFORMATION TECHNOLOGY - PROGRAMMING LANGUAGES - GUIDE FOR THE USE OF THE ADA PROGRAMMING LANGUAGE IN HIGH INTEGRITY SYSTEMS
    EN 319 411-1 : 1.2.2 ELECTRONIC SIGNATURES AND INFRASTRUCTURES (ESI); POLICY AND SECURITY REQUIREMENTS FOR TRUST SERVICE PROVIDERS ISSUING CERTIFICATES; PART 1: GENERAL REQUIREMENTS
    DD CEN ISO/TS 17574:2009 Electronic fee collection. Guidelines for security protection profiles
    TS 102 731 : 1.1.1 INTELLIGENT TRANSPORT SYSTEMS (ITS); SECURITY; SECURITY SERVICES AND ARCHITECTURE
    PD CEN ISO/TS 14441:2013 Health informatics. Security and privacy requirements of EHR systems for use in conformity assessment
    14/30285138 DC : 0 BS ISO/IEC 29167-14 - INFORMATION TECHNOLOGY - AUTOMATIC IDENTIFICATION AND DATA CAPTURE TECHNIQUES - PART 14: CRYPTO SUITE AES OFB SECURITY SERVICES FOR AIR INTERFACE COMMUNICATIONS
    CSA ISO/IEC 15945 : 2004 : R2012 INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - SPECIFICATION OF TTP SERVICES TO SUPPORT THE APPLICATION OF DIGITAL SIGNATURES
    UNE-EN 419211-6:2016 Protection profiles for secure signature creation device - Part 6: Extension for device with key import and trusted channel to signature creation application
    PD CEN/TS 419221-4:2016 Protection Profiles for TSP cryptographic modules Cryptographic module for CSP signing operations without backup
    ISO/IEC 15408-1:2009 Information technology — Security techniques — Evaluation criteria for IT security — Part 1: Introduction and general model
    PD CEN ISO/TS 17574:2017 Electronic fee collection. Guidelines for security protection profiles
    CAN/CSA-ISO/IEC TR 14516-04 (R2017) Information Technology - Security Techniques - Guidelines for the use and Management of Trusted Third Party Services (Adopted ISO/IEC TR 14516:2002, first edition, 2002-06-15)
    UNI EN 419251-2 : 2013 SECURITY REQUIREMENTS FOR DEVICE FOR AUTHENTICATION - PART 2: PROTECTION PROFILE FOR EXTENSION FOR TRUSTED CHANNEL TO CERTIFICATE GENERATION APPLICATION
    IEC TR 62210:2003 Power system control and associated communications - Data and communication security
    INCITS/ISO/IEC 15292 : 2001 INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - PROTECTION PROFILE REGISTRATION PROCEDURES
    ARINC 664-5 : 2005 AIRCRAFT DATA NETWORK - PART 5: NETWORK DOMAIN CHARACTERISTICS AND INTERCONNECTION
    INCITS/ISO/IEC 19792 : 2012 INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - SECURITY EVALUATION OF BIOMETRICS
    INCITS/ISO/IEC 15945 : 2002 : R2007 INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - SPECIFICATION OF TTP SERVICES TO SUPPORT THE APPLICATION OF DIGITAL SIGNATURES
    TR 187 014 : 2.1.1 TELECOMMUNICATIONS AND INTERNET CONVERGED SERVICES AND PROTOCOLS FOR ADVANCED NETWORKING (TISPAN); ESECURITY; USER GUIDE TO ETVRA WEB-DATABASE
    IEEE/ISO/IEC 15026-1-2014 IEEE Standard Adoption of ISO/IEC 15026-1--Systems and Software Engineering--Systems and Software Assurance--Part 1: Concepts and Vocabulary
    S.R. CEN ISO/TS 25110:2013 ELECTRONIC FEE COLLECTION - INTERFACE DEFINITION FOR ON-BOARD ACCOUNT USING INTEGRATED CIRCUIT CARD (ICC) (ISO/TS 25110:2013)
    I.S. EN 419211-2:2013 PROTECTION PROFILES FOR SECURE SIGNATURE CREATION DEVICE - PART 2: DEVICE WITH KEY GENERATION
    ISO/IEC 15292:2001 Information technology - Security techniques - Protection Profile registration procedures
    IEEE 1074-2006 IEEE Standard for Developing a Software Project Life Cycle Process
    I.S. EN 419251-3:2013 SECURITY REQUIREMENTS FOR DEVICE FOR AUTHENTICATION - PART 3: ADDITIONAL FUNCTIONALITY FOR SECURITY TARGETS
    I.S. EN CWA 14172-5:2004 EESSI CONFORMITY ASSESSMENT GUIDANCE - PART 5: SECURE SIGNATURE CREATION DEVICES
    I.S. EN 419251-1:2013 SECURITY REQUIREMENTS FOR DEVICE FOR AUTHENTICATION - PART 1: PROTECTION PROFILE FOR CORE FUNCTIONALITY
    17/30357420 DC : 0 BS EN 419241-2 - TRUSTWORTHY SYSTEMS SUPPORTING SERVER SIGNING - PART 2: PROTECTION PROFILE FOR QSCD FOR SERVER SIGNING
    TS 102 556 : 1.1.1 TELECOMMUNICATIONS AND INTERNET CONVERGED SERVICES AND PROTOCOLS FOR ADVANCED NETWORKING (TISPAN); PROTECTION PROFILE
    CSA ISO/IEC TR 15942:04 (R2019) Information Technology - Programming Languages - Guide for the Use of the Ada Programming Language in High Integrity Systems (Adopted ISO/IEC TR 15942:2000, first edition, 2000-03-01)
    BS EN ISO 25110:2017 Electronic fee collection. Interface definition for on-board account using integrated circuit card (ICC)
    ISO 25110:2017 Electronic fee collection — Interface definition for on-board account using integrated circuit card (ICC)
    I.S. CR 14301:2002 HEALTH INFORMATICS - FRAMEWORK FOR SECURITY PROTECTION OF HEALTHCARE COMMUNICATION
    I.S. CWA 14172-4:2004 EESSI CONFORMITY ASSESSMENT GUIDANCE - PART 4: SIGNATURE CREATION APPLICATIONS AND GENERAL GUIDELINES FOR ELECTRONIC SIGNATURE VERIFICATION
    ISO 27789:2013 Health informatics Audit trails for electronic health records
    EN ISO 27789:2013 Health informatics - Audit trails for electronic health records (ISO 27789:2013)
    CEN/TS 419221-4:2016 Protection Profiles for TSP cryptographic modules - Part 4: Cryptographic module for CSP signing operations without backup
    CEN/TS 419221-3:2016 Protection Profiles for TSP Cryptographic modules - Part 3: Cryptographic module for CSP key generation services
    CEN ISO/TS 14907-1:2015 Electronic fee collection - Test procedures for user and fixed equipment - Part 1: Description of test procedures (ISO/TS 14907-1:2015)

    Standards Referencing This Book - (Show below) - (Hide below)

    AS ISO 13491.1:2019 Financial services - Secure cryptographic devices (retail) Concepts, requirements and evaluation methods
    AS ISO 13491.2:2019 Financial services - Secure cryptographic devices (retail) Security compliance checklists for devices used in financial transactions
    ISO/IEC 15408-1:2009 Information technology — Security techniques — Evaluation criteria for IT security — Part 1: Introduction and general model
    • Access your standards online with a subscription

      Features

      • Simple online access to standards, technical information and regulations
      • Critical updates of standards and customisable alerts and notifications
      • Multi - user online standards collection: secure, flexibile and cost effective