PD ISO/TR 20526:2017
|
Account-based ticketing state of the art report |
18/30346433 DC : 0
|
BS ISO/IEC 19086-4 - INFORMATION TECHNOLOGY - CLOUD COMPUTING SERVICE LEVEL AGREEMENT (SLA) FRAMEWORK - PART 4: SECURITY AND PRIVACY |
15/30319488 DC : 0
|
BS ISO/IEC 27000 - INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - INFORMATION SECURITY MANAGEMENT SYSTEMS - OVERVIEW AND VOCABULARY |
CSA ISO/IEC 27000 : 2018
|
INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - INFORMATION SECURITY MANAGEMENT SYSTEMS - OVERVIEW AND VOCABULARY |
BS ISO/IEC 19086-1:2016
|
Information technology. Cloud computing. Service level agreement (SLA) framework Overview and concepts |
ISO/IEC 38505-1:2017
|
Information technology — Governance of IT — Governance of data — Part 1: Application of ISO/IEC 38500 to the governance of data |
BS ISO/IEC 27000 : 2016
|
INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - INFORMATION SECURITY MANAGEMENT SYSTEMS - OVERVIEW AND VOCABULARY |
ISO/IEC 27009:2016
|
Information technology Security techniques Sector-specific application of ISO/IEC 27001 Requirements |
CSA TELECOM ORGANIZATIONS PACKAGE : 2018
|
CONSISTS OF CAN/CSA-ISO/IEC 27000:18 - INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - INFORMATION SECURITY MANAGEMENT SYSTEMS - OVERVIEW AND VOCABULARY; CAN/CSA-ISO/IEC 27001:14, INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - INFORMATION SECURITY MANAGEMENT SYSTEMS - REQUIREMENTS; CAN/CSA-ISO/IEC 27002:15 - INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - CODE OF PRACTICE FOR |
ISO/IEC 19086-1:2016
|
Information technology Cloud computing Service level agreement (SLA) framework Part 1: Overview and concepts |
DIN ISO/IEC 17789:2017-07
|
INFORMATION TECHNOLOGY - CLOUD COMPUTING - REFERENCE ARCHITECTURE (ISO/IEC 17789:2014) |
18/30348902 DC : 0
|
BS ISO/IEC 21878 - INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - SECURITY GUIDELINES FOR DESIGN AND IMPLEMENTATION OF VIRTUALIZED SERVERS |
BS ISO/IEC 17789:2014
|
Information technology. Cloud computing. Reference architecture |
ISO/IEC 27000:2018
|
Information technology — Security techniques — Information security management systems — Overview and vocabulary |
ISO/IEC 19941:2017
|
Information technology — Cloud computing — Interoperability and portability |
ISO/IEC TR 38505-2:2018
|
Information technology — Governance of IT — Governance of data — Part 2: Implications of ISO/IEC 38505-1 for data management |
ISO/IEC 27017:2015
|
Information technology — Security techniques — Code of practice for information security controls based on ISO/IEC 27002 for cloud services |
BS ISO/IEC 27009:2016
|
Information technology. Security techniques. Sector-specific application of ISO/IEC 27001. Requirements |
BS ISO/IEC 27036-4:2016
|
Information technology. Security techniques. Information security for supplier relationships Guidelines for security of cloud services |
BS ISO/IEC 38505-1:2017
|
Information technology. Governance of IT. Governance of data Application of ISO/IEC 38500 to the governance of data |
I.S. EN ISO/IEC 27000:2017
|
INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - INFORMATION SECURITY MANAGEMENT SYSTEMS - OVERVIEW AND VOCABULARY (ISO/IEC 27000:2016) |
CAN/CSA-ISO/IEC 27017:16
|
Information technology Security techniques Code of practice for information security controls based on ISO/IEC 27002 for cloud services (Adopted ISO/IEC 27017:2015, first edition, 2015-12-15) |
CSA ISO/IEC 27009 : 2018
|
INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - SECTOR-SPECIFIC APPLICATION OF ISO/IEC 27001 - REQUIREMENTS |
ISO/IEC 27036-4:2016
|
Information technology Security techniques Information security for supplier relationships Part 4: Guidelines for security of cloud services |
BS ISO/IEC 29151:2017
|
Information technology. Security techniques. Code of practice for personally identifiable information protection |
ISO/TR 20526:2017
|
Account-based ticketing state of the art report |
BS ISO/IEC 27017:2015
|
Information technology. Security techniques. Code of practice for information security controls based on ISO/IEC 27002 for cloud services |
CSA INFORMATION SECURITY PACKAGE : 2018
|
CONSISTS OF CAN/CSA-ISO/IEC 27000:18 - INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - INFORMATION SECURITY MANAGEMENT SYSTEMS - OVERVIEW AND VOCABULARY; CAN/CSA-ISO/IEC 27001:14, INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - INFORMATION SECURITY MANAGEMENT SYSTEMS - REQUIREMENTS; CAN/CSA-ISO/IEC 27002:15 - INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - CODE OF PRACTICE FOR INFORMATION |
DIN ISO/IEC 17789:2016-10 (Draft)
|
INFORMATION TECHNOLOGY - CLOUD COMPUTING - REFERENCE ARCHITECTURE (ISO/IEC 17789:2014) |
BS ISO/IEC 19941:2017
|
Information technology. Cloud computing. Interoperability and portability |
16/30316173 DC : 0
|
BS ISO/IEC 19086-1 - INFORMATION TECHNOLOGY - CLOUD COMPUTING - SERVICE LEVEL AGREEMENT (SLA) FRAMEWORK - PART 1: OVERVIEW AND CONCEPTS |
16/30275200 DC : 0
|
BS ISO/IEC 27036-4 - INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - INFORMATION SECURITY FOR SUPPLIER RELATIONSHIPS - PART 4: GUIDELINES FOR SECURITY OF CLOUD SERVICES |
ISO/IEC 24760-3:2016
|
Information technology — Security techniques — A framework for identity management — Part 3: Practice |
CAN/CSA-ISO/IEC 19086-1:18
|
Information technology — Cloud computing — Service level agreement (SLA) framework — Part 1: Overview and concepts (Adopted ISO/IEC 19086-1:2016, first edition, 2016-09-15) |
SR 003 391 : 2.1.1
|
CLOUD STANDARDS COORDINATION PHASE 2; INTEROPERABILITY AND SECURITY IN CLOUD COMPUTING |
BS EN ISO/IEC 27000:2017
|
Information technology. Security techniques. Information security management systems. Overview and vocabulary |
CAN/CSA-ISO/IEC 27036-4:18
|
Information technology — Security techniques — Information security for supplier relationships — Part 4: Guidelines for security of cloud services (Adopted ISO/IEC 27036-4:2016, first edition, 2016-10-01) |
EN ISO/IEC 27000:2017
|
Information technology - Security techniques - Information security management systems - Overview and vocabulary (ISO/IEC 27000:2016) |
ISO/IEC TR 20000-9:2015
|
Information technology Service management Part 9: Guidance on the application of ISO/IEC 20000-1 to cloud services |
CAN/CSA-ISO/IEC 17789:16
|
Information technology Cloud computing Reference architecture (Adopted ISO/IEC 17789:2014, first edition, 2014-10-15) |
DIN ISO/IEC 17789 E : 2017
|
INFORMATION TECHNOLOGY - CLOUD COMPUTING - REFERENCE ARCHITECTURE (ISO/IEC 17789:2014) |
PD ISO/IEC TR 20000-9:2015
|
Information technology. Service management Guidance on the application of ISO/IEC 20000-1 to cloud services |
15/30259619 DC : 0
|
BS ISO/IEC 27017 - INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - CODE OF PRACTICE FOR INFORMATION SECURITY CONTROLS BASED ON ISO/IEC 27002 FOR CLOUD SERVICES |
16/30333228 DC : 0
|
BS ISO/IEC 38505-1 - INFORMATION TECHNOLOGY - GOVERNANCE OF IT - PART 1: THE APPLICATION OF ISO/IEC 38500 TO THE GOVERNANCE OF DATA |
ISO/IEC 29151:2017
|
Information technology — Security techniques — Code of practice for personally identifiable information protection |
SR 003 381 : 2.1.1
|
CLOUD STANDARDS COORDINATION PHASE 2; IDENTIFICATION OF CLOUD USER NEEDS |
CAN/CSA-ISO/IEC 24760-3:18
|
Information technology — Security techniques — A framework for identity management — Part 3: Practice (Adopted ISO/IEC 24760-3:2016, first edition, 2016-08-01) |
ISO/IEC 17789:2014
|
Information technology — Cloud computing — Reference architecture |