ISO/IEC 27001:2013
|
Information technology — Security techniques — Information security management systems — Requirements |
ANSI INCITS 400 : 2004
|
INFORMATION TECHNOLOGY - SCSI OBJECT-BASED STORAGE DEVICE COMMANDS (OSD) |
ISO/IEC 27003:2017
|
Information technology — Security techniques — Information security management systems — Guidance |
ISO/TR 10255:2009
|
Document management applications Optical disk storage technology, management and standards |
DIN ISO/IEC 17788 E : 2016
|
INFORMATION TECHNOLOGY - CLOUD COMPUTING - OVERVIEW AND VOCABULARY (ISO/IEC 17788:2014) |
ISO/IEC 27037:2012
|
Information technology — Security techniques — Guidelines for identification, collection, acquisition and preservation of digital evidence |
ISO/IEC 27031:2011
|
Information technology Security techniques Guidelines for information and communication technology readiness for business continuity |
ISO/IEC/IEEE 24765:2017
|
Systems and software engineering — Vocabulary |
ISO/IEC 27033-1:2015
|
Information technology Security techniques Network security Part 1: Overview and concepts |
ISO/IEC 19790:2012
|
Information technology Security techniques Security requirements for cryptographic modules |
ISO/IEC 27002:2013
|
Information technology Security techniques Code of practice for information security controls |
ISO 16609:2012
|
Financial services — Requirements for message authentication using symmetric techniques |
ISO 16175-2:2011
|
Information and documentation Principles and functional requirements for records in electronic office environments Part 2: Guidelines and functional requirements for digital records management systems |
ISO/TR 18492:2005
|
Long-term preservation of electronic document-based information |
ANSI INCITS 482 : 2012
|
INFORMATION TECHNOLOGY - ATA/ATAPI COMMAND SET - 2 (ACS-2) |
IEEE 1619-2007
|
IEEE Standard for Cryptographic Protection of Data on Block-Oriented Storage Devices |
ISO/IEC 17826:2016
|
Information technology Cloud Data Management Interface (CDMI) |
ISO 7498-2:1989
|
Information processing systems Open Systems Interconnection Basic Reference Model Part 2: Security Architecture |
ISO 16175-3:2010
|
Information and documentation Principles and functional requirements for records in electronic office environments Part 3: Guidelines and functional requirements for records in business systems |
IEEE 1619.1-2007
|
IEEE Standard for Authenticated Encryption with Length Expansion for Storage Devices |
ANSI INCITS 458 : 2011
|
INFORMATION TECHNOLOGY - SCSI OBJECT-BASED STORAGE DEVICE COMMANDS - 2 (OSD-2) |
ANSI INCITS 496 : 2012
|
INFORMATION TECHNOLOGY - FIBRE CHANNEL - SECURITY PROTOCOLS - 2 (FC-SP-2) |
ISO/IEC 27005:2011
|
Information technology Security techniques Information security risk management |
ANSI INCITS 512 : 2015
|
INFORMATION TECHNOLOGY - FIBRE CHANNEL - PHYSICAL INTERFACE-6 (FC-PI-6) |
ANSI INCITS 470 : 2011(R2016)
|
INFORMATION TECHNOLOGY - FIBRE CHANNEL - FRAMING AND SIGNALING - 3 (FC-FS-3) |
ISO/IEC 24775:2011
|
Information technology Storage management |
ISO/IEC 24759:2017
|
Information technology Security techniques Test requirements for cryptographic modules |
ISO/IEC 14776-372:2011
|
Information technology Small Computer System Interface (SCSI) Part 372: SCSI Enclosure Services - 2 (SES-2) |
ISO/IEC 27033-3:2010
|
Information technology — Security techniques — Network security — Part 3: Reference networking scenarios — Threats, design techniques and control issues |
ISO/IEC 27033-2:2012
|
Information technology — Security techniques — Network security — Part 2: Guidelines for the design and implementation of network security |
ISO/IEC 10116:2017
|
Information technology — Security techniques — Modes of operation for an n-bit block cipher |
ISO/PAS 22399:2007
|
Societal security - Guideline for incident preparedness and operational continuity management |
ISO/IEC 27000:2016
|
Information technology Security techniques Information security management systems Overview and vocabulary |
ISO 16175-1:2010
|
Information and documentation Principles and functional requirements for records in electronic office environments Part 1: Overview and statement of principles |
ISO/IEC 17788:2014
|
Information technology — Cloud computing — Overview and vocabulary |
ISO Guide 73:2009
|
Risk management — Vocabulary |
ISO/IEC 11179-1:2015
|
Information technology — Metadata registries (MDR) — Part 1: Framework |