FIPS PUB 140 : 0001
|
SECURITY REQUIREMENTS FOR CRYPTOGRAPHIC MODULES |
ISO/IEC 27001:2013
|
Information technology — Security techniques — Information security management systems — Requirements |
ANSI INCITS 400 : 2004
|
INFORMATION TECHNOLOGY - SCSI OBJECT-BASED STORAGE DEVICE COMMANDS (OSD) |
ISO/IEC 27003:2017
|
Information technology — Security techniques — Information security management systems — Guidance |
ISO/TR 10255:2009
|
Document management applications Optical disk storage technology, management and standards |
ISO/IEC 27037:2012
|
Information technology — Security techniques — Guidelines for identification, collection, acquisition and preservation of digital evidence |
ISO/IEC 27031:2011
|
Information technology Security techniques Guidelines for information and communication technology readiness for business continuity |
ISO/IEC/IEEE 24765:2017
|
Systems and software engineering — Vocabulary |
ISO/IEC 27033-1:2015
|
Information technology Security techniques Network security Part 1: Overview and concepts |
ISO/IEC 19790:2012
|
Information technology Security techniques Security requirements for cryptographic modules |
ISO/IEC 27002:2013
|
Information technology Security techniques Code of practice for information security controls |
ISO 16609:2012
|
Financial services — Requirements for message authentication using symmetric techniques |
ISO 16175-2:2011
|
Information and documentation Principles and functional requirements for records in electronic office environments Part 2: Guidelines and functional requirements for digital records management systems |
ISO/TR 18492:2005
|
Long-term preservation of electronic document-based information |
ANSI INCITS 482 : 2012
|
INFORMATION TECHNOLOGY - ATA/ATAPI COMMAND SET - 2 (ACS-2) |
ANSI INCITS 424 : 2007
|
FIBRE CHANNEL - FRAMING AND SIGNALING - 2 (FC-FS-2) |
IEEE 1619-2007
|
IEEE Standard for Cryptographic Protection of Data on Block-Oriented Storage Devices |
ISO/IEC 17826:2016
|
Information technology Cloud Data Management Interface (CDMI) |
ISO 7498-2:1989
|
Information processing systems Open Systems Interconnection Basic Reference Model Part 2: Security Architecture |
FIPS PUB 197 : 2001
|
ADVANCED ENCRYPTION STANDARD (AES) |
ISO 16175-3:2010
|
Information and documentation Principles and functional requirements for records in electronic office environments Part 3: Guidelines and functional requirements for records in business systems |
IEEE 1619.1-2007
|
IEEE Standard for Authenticated Encryption with Length Expansion for Storage Devices |
ANSI INCITS 458 : 2011
|
INFORMATION TECHNOLOGY - SCSI OBJECT-BASED STORAGE DEVICE COMMANDS - 2 (OSD-2) |
ANSI INCITS 496 : 2012
|
INFORMATION TECHNOLOGY - FIBRE CHANNEL - SECURITY PROTOCOLS - 2 (FC-SP-2) |
ISO/IEC 27005:2011
|
Information technology Security techniques Information security risk management |
ISO/IEC 24759:2017
|
Information technology Security techniques Test requirements for cryptographic modules |
ISO/IEC 27033-3:2010
|
Information technology — Security techniques — Network security — Part 3: Reference networking scenarios — Threats, design techniques and control issues |
ISO/IEC 27033-2:2012
|
Information technology — Security techniques — Network security — Part 2: Guidelines for the design and implementation of network security |
ISO/IEC 10116:2017
|
Information technology — Security techniques — Modes of operation for an n-bit block cipher |
ISO/PAS 22399:2007
|
Societal security - Guideline for incident preparedness and operational continuity management |
ISO/IEC 27000:2016
|
Information technology Security techniques Information security management systems Overview and vocabulary |
ISO 16175-1:2010
|
Information and documentation Principles and functional requirements for records in electronic office environments Part 1: Overview and statement of principles |
ISO Guide 73:2009
|
Risk management — Vocabulary |