DIN EN 419251-3:2013-06
|
SECURITY REQUIREMENTS FOR DEVICE FOR AUTHENTICATION - PART 3: ADDITIONAL FUNCTIONALITY FOR SECURITY TARGETS |
AAMI IEC TIR 80001-2-2 : 2012
|
APPLICATION OF RISK MANAGEMENT FOR IT-NETWORKS INCORPORATING MEDICAL DEVICES - PART 2-2: GUIDANCE FOR THE DISCLOSURE AND COMMUNICATION OF MEDICAL DEVICE SECURITY NEEDS, RISKS AND CONTROLS |
ISO/IEC 29128:2011
|
Information technology — Security techniques — Verification of cryptographic protocols |
PD ISO/IEC TR 19791:2006
|
Information technology. Security techniques. Security assessment of operational systems |
BS EN 419251-2:2013
|
Security requirements for device for authentication Protection profile for extension for trusted channel to certificate generation application |
INCITS/ISO/IEC 30111 : 2014
|
INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - VULNERABILITY HANDLING PROCESSES |
S.R. CEN ISO/TS 14907-1:2015
|
ELECTRONIC FEE COLLECTION - TEST PROCEDURES FOR USER AND FIXED EQUIPMENT - PART 1: DESCRIPTION OF TEST PROCEDURES (ISO/TS 14907-1:2015) |
ISO/IEC TR 20004:2015
|
Information technology Security techniques Refining software vulnerability analysis under ISO/IEC 15408 and ISO/IEC 18045 |
BS EN 50436-6:2015
|
Alcohol interlocks. Test methods and performance requirements Data security |
CAN/CSA-IEC 62443-2-1:17
|
Industrial communication networks — Network and system security — Part 2-1: Establishing an industrial automation and control system security program (Adopted IEC 62443-2-1:2010, first edition, 2010-11) | Réseaux industriels de communication — Sécurité dans les réseaux et les systèmes — Partie 2-1 : Établissement d’un programme de sécurité pour les systèmes d’automatisation et de commande industrielles (norme IEC 62443-2-1:2010 adoptée, première édition, 2010-11) |
05/30144069 DC : DRAFT DEC 2005
|
ISO 13491-1 - BANKING - SECURE CRYPTOGRAPHIC DEVICES (RETAIL) - PART 1: CONCEPTS, REQUIREMENTS AND EVALUATION METHODS |
UNI CEN ISO/TS 25110 : 2013
|
ELECTRONIC FEE COLLECTION - INTERFACE DEFINITION FOR ON-BOARD ACCOUNT USING INTEGRATED CIRCUIT CARD (ICC) |
PD CEN ISO/TS 14907-1:2015
|
Electronic fee collection. Test procedures for user and fixed equipment Description of test procedures |
BS EN 419211-6:2014
|
Protection profiles for secure signature creation device Extension for device with key import and trusted channel to signature creation application |
ISO/IEC TS 19249:2017
|
Information technology — Security techniques — Catalogue of architectural and design principles for secure products, systems and applications |
BS ISO/IEC 30107-3:2017
|
Information technology. Biometric presentation attack detection Testing and reporting |
PREN 419221-5 : DRAFT 2016
|
PROTECTION PROFILES FOR TRUST SERVICE PROVIDER CRYPTOGRAPHIC MODULES - PART 5: CRYPTOGRAPHIC MODULE FOR TRUST SERVICES |
CAN/CSA-ISO/IEC 27034-1:12 (R2017)
|
Information technology - Security techniques - Application security - Part 1: Overview and concepts (Adopted ISO/IEC 27034-1:2011, first edition, 2011-11-15) |
BS ISO/IEC 15408-1:2009
|
Information technology. Security techniques. Evaluation criteria for IT security Introduction and general model |
EN ISO/TS 17574 : 2004
|
ROAD TRANSPORT AND TRAFFIC TELEMATICS - ELECTRONIC FEE COLLECTION (EFC) - GUIDELINES FOR EFC SECURITY PROTECTION PROFILES |
DIN EN 419251-1 E : 2013
|
SECURITY REQUIREMENTS FOR DEVICE FOR AUTHENTICATION - PART 1: PROTECTION PROFILE FOR CORE FUNCTIONALITY |
07/30162803 DC : 0
|
BS ISO/IEC 18045 - INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - METHODOLOGY FOR IT SECURITY EVALUATION |
14/30275438 DC : 0
|
BS ISO/IEC 29167-12 - INFORMATION TECHNOLOGY - AUTOMATIC IDENTIFICATION AND DATA CAPTURE TECHNIQUES - PART 12: CRYPTO SUITE ECC-DH SECURITY SERVICES FOR AIR INTERFACE COMMUNICATION |
CSA ISO/IEC TR 14516 : 2004
|
INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - GUIDELINES FOR THE USE AND MANAGEMENT OF TRUSTED THIRD PARTY SERVICES |
CSA TELECOM ORGANIZATIONS PACKAGE : 2018
|
CONSISTS OF CAN/CSA-ISO/IEC 27000:18 - INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - INFORMATION SECURITY MANAGEMENT SYSTEMS - OVERVIEW AND VOCABULARY; CAN/CSA-ISO/IEC 27001:14, INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - INFORMATION SECURITY MANAGEMENT SYSTEMS - REQUIREMENTS; CAN/CSA-ISO/IEC 27002:15 - INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - CODE OF PRACTICE FOR |
CSA ISO/IEC 27034-1:2012
|
INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - APPLICATION SECURITY - PART 1: OVERVIEW AND CONCEPTS |
CSA ISO/IEC TR 14516 : 2004 : R2012
|
INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - GUIDELINES FOR THE USE AND MANAGEMENT OF TRUSTED THIRD PARTY SERVICES |
CSA ISO/IEC TR 15942:2004
|
INFORMATION TECHNOLOGY - PROGRAMMING LANGUAGES - GUIDE FOR THE USE OF THE ADA PROGRAMMING LANGUAGE IN HIGH INTEGRITY SYSTEMS |
INCITS/ISO/IEC 15945 : 2002
|
INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - SPECIFICATION OF TTP SERVICES TO SUPPORT THE APPLICATION OF DIGITAL SIGNATURES |
S.R. CEN ISO/TS 14441:2013
|
HEALTH INFORMATICS - SECURITY AND PRIVACY REQUIREMENTS OF EHR SYSTEMS FOR USE IN CONFORMITY ASSESSMENT (ISO/TS 14441:2013) |
ANSI X9.117 : 2012
|
SECURE REMOTE ACCESS - MUTUAL AUTHENTICATION |
ISO/IEC TR 15443-3:2007
|
Information technology Security techniques A framework for IT security assurance Part 3: Analysis of assurance methods |
S.R. CEN/TS 419221-2:2016
|
PROTECTION PROFILES FOR TSP CRYPTOGRAPHIC MODULES - PART 2: CRYPTOGRAPHIC MODULE FOR CSP SIGNING OPERATIONS WITH BACKUP |
AAMI/IEC TIR80001-2-8:2016
|
APPLICATION OF RISK MANAGEMENT FOR IT NETWORKS INCORPORATING MEDICAL DEVICES - PART 2-8: APPLICATION GUIDANCE - GUIDANCE ON STANDARDS FOR ESTABLISHING THE SECURITY CAPABILITIES IDENTIFIED IN IEC 80001-2-2 |
I.S. EN 50436-6:2015
|
ALCOHOL INTERLOCKS - TEST METHODS AND PERFORMANCE REQUIREMENTS - PART 6: DATA SECURITY |
PD CEN ISO/TS 25110:2013
|
Electronic fee collection. Interface definition for on-board account using integrated circuit card (ICC) |
ISO 25110:2017
|
Electronic fee collection — Interface definition for on-board account using integrated circuit card (ICC) |
EN IEC 62443-4-1:2018
|
Security for industrial automation and control systems - Part 4-1: Secure product development lifecycle requirements |
I.S. EN ISO 27799:2016
|
HEALTH INFORMATICS - INFORMATION SECURITY MANAGEMENT IN HEALTH USING ISO/IEC 27002 |
I.S. CWA 14172-7:2004
|
EESSI CONFORMITY ASSESSMENT GUIDANCE - PART 7: CRYPTOGRAPHIC MODULES USED BY CERTIFICATION SERVICE PROVIDERS FOR SIGNING OPERATIONS AND KEY GENERATION SERVICES |
EN ISO 25110:2017
|
Electronic fee collection - Interface definition for on-board account using integrated circuit card (ICC) (ISO 25110:2017) |
CEN ISO/TS 17574:2017
|
Electronic fee collection - Guidelines for security protection profiles (ISO/TS 17574:2017) |
CEN ISO/TS 25110:2013
|
Electronic fee collection - Interface definition for on-board account using integrated circuit card (ICC) (ISO/TS 25110:2013) |
EN 50436-6:2015
|
Alcohol interlocks - Test methods and performance requirements - Part 6: Data security |
EN 319 421 : 1.1.1
|
ELECTRONIC SIGNATURES AND INFRASTRUCTURES (ESI); POLICY AND SECURITY REQUIREMENTS FOR TRUST SERVICE PROVIDERS ISSUING TIME-STAMPS |
UNE-EN 419211-2:2016
|
Protection profiles for secure signature creation device - Part 2: Device with key generation |
TR 102 780 : 1.1.1
|
METHODS FOR TESTING AND SPECIFICATION (MTS); SECURITY; GUIDE TO THE USE OF METHODS IN DEVELOPMENT OF ETSI SECURITY STANDARDS |
04/30091046 DC : DRAFT DEC 2004
|
ISO/IEC 19790 - INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - SECURITY REQUIREMENTS FOR CRYPTOGRAPHIC MODULES |
INCITS/ISO/IEC 15292 : 2001 : R2007
|
INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - PROTECTION PROFILE REGISTRATION PROCEDURES |
ISO 13491-2:2017
|
Financial services — Secure cryptographic devices (retail) — Part 2: Security compliance checklists for devices used in financial transactions |
ISO/IEC 30107-3:2017
|
Information technology — Biometric presentation attack detection — Part 3: Testing and reporting |
TS 102 573 : 2.1.1
|
ELECTRONIC SIGNATURES AND INFRASTRUCTURES (ESI); POLICY REQUIREMENTS FOR TRUST SERVICE PROVIDERS SIGNING AND/OR STORING DATA OBJECTS |
17/30351770 DC : 0
|
BS EN ISO 25110 - ELECTRONIC FEE COLLECTION - INTERFACE DEFINITION FOR ON-BOARD ACCOUNT USING INTEGRATED CIRCUIT CARD (ICC) |
DIN EN 419211-2:2013-12
|
Protection profiles for secure signature creation device - Part 2: Device with key generation |
BS ISO/IEC 19792:2009
|
Information technology. Security techniques. Security evaluation of biometrics |
DIN EN 419211-2 E : 2013
|
PROTECTION PROFILES FOR SECURE SIGNATURE CREATION DEVICE - PART 2: DEVICE WITH KEY GENERATION |
BS EN 419251-1:2013
|
Security requirements for device for authentication Protection profile for core functionality |
EG 202 549 : 1.1.1
|
TELECOMMUNICATIONS AND INTERNET CONVERGED SERVICES AND PROTOCOLS FOR ADVANCED NETWORKING (TISPAN); DESIGN GUIDE; APPLICATION OF SECURITY COUNTERMEASURES TO SERVICE CAPABILITIES |
ISO/IEC 29167-14:2015
|
Information technology Automatic identification and data capture techniques Part 14: Crypto suite AES OFB security services for air interface communications |
EN 319 411-2 : 2.2.2
|
ELECTRONIC SIGNATURES AND INFRASTRUCTURES (ESI); POLICY AND SECURITY REQUIREMENTS FOR TRUST SERVICE PROVIDERS ISSUING CERTIFICATES; PART 2: REQUIREMENTS FOR TRUST SERVICE PROVIDERS ISSUING EU QUALIFIED CERTIFICATES |
08/30133461 DC : 0
|
ISO/IEC 27003 - INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - INFORMATION SECURITY MANAGEMENT SYSTEM IMPLEMENTATION GUIDANCE |
ISO/IEC 29167-12:2015
|
Information technology Automatic identification and data capture techniques Part 12: Crypto suite ECC-DH security services for air interface communications |
13/30277648 DC : 0
|
BS EN 50436-6 - ALCOHOL INTERLOCKS - TEST METHODS AND PERFORMANCE REQUIREMENTS - PART 6: DATA SECURITY |
07/30169475 DC : 0
|
BS ISO 15782-1 - CERTIFICATE MANAGEMENT FOR FINANCIAL SERVICES - PART 1: PUBLIC KEY CERTIFICATES |
CSA ISO/IEC 15292 : 2004
|
INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - PROTECTION PROFILE REGISTRATION PROCEDURES |
ISO/IEC TR 15446:2017
|
Information technology Security techniques Guidance for the production of protection profiles and security targets |
BS ISO/IEC 15945:2002
|
Information technology. Security techniques. Specification of TTP services to support the application of digital signatures |
BS ISO 13491-2:2017
|
Financial services. Secure cryptographic devices (retail) Security compliance checklists for devices used in financial transactions |
CSA ISO/IEC 15408-1 : 2010
|
INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - EVALUATION CRITERIA FOR IT SECURITY - PART 1: INTRODUCTION AND GENERAL MODEL |
CAN/CSA-ISO/IEC 15945-04 (R2017)
|
Information Technology - Security Techniques - Specification of TTP Services to Support the Application of Digital Signatures (Adopted ISO/IEC 15945:2002, first edition, 2002-02-01) |
CSA ISO/IEC TR 15446 : 2010
|
INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - GUIDE FOR THE PRODUCTION OF PROTECTION PROFILES AND SECURITY TARGETS |
IEEE DRAFT 1074 : 0
|
DEVELOPING SOFTWARE LIFE CYCLE PROCESSES |
INCITS/ISO/IEC 15408-1 : 2012
|
INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - EVALUATION CRITERIA FOR IT SECURITY - PART 1: INTRODUCTION AND GENERAL MODEL |
IEC 62443-2-1:2010
|
Industrial communication networks - Network and system security - Part 2-1: Establishing an industrial automation and control system security program |
ISO/IEC TS 20540:2018
|
Information technology — Security techniques — Testing cryptographic modules in their operational environment |
UNE-ISO/IEC TR 19791:2013 IN
|
Information technology. Security techniques. Security assessment of operational systems |
UNE 71512:2011
|
Applications with the Spanish DNIe. Electronic signature creation and verification. Type 2 for personal computers, and with a Evaluation Assurance Level «EAL1» |
PD CEN/TS 419221-2:2016
|
Protection Profiles for TSP cryptographic modules Cryptographic module for CSP signing operations with backup |
BIS IS 14990-1 : 2012
|
INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - EVALUATION CRITERIA FOR IT SECURITY - PART 1: INTRODUCTION AND GENERAL MODEL |
I.S. CWA 14365-1:2004
|
GUIDE ON THE USE OF ELECTRONIC SIGNATURES - PART 1: LEGAL AND TECHNICAL ASPECTS |
EG 202 387 : 1.1.1
|
TELECOMMUNICATIONS AND INTERNET CONVERGED SERVICES AND PROTOCOLS FOR ADVANCED NETWORKING (TISPAN); SECURITY DESIGN GUIDE; METHOD FOR APPLICATION OF COMMON CRITERIA TO ETSI DELIVERABLES |
TR 102 420 : 1.1.1
|
TELECOMMUNICATIONS AND INTERNET CONVERGED SERVICES AND PROTOCOLS FOR ADVANCED NETWORKING (TISPAN); REVIEW OF ACTIVITY ON SECURITY |
ISO/IEC 27034-1:2011
|
Information technology — Security techniques — Application security — Part 1: Overview and concepts |
PREN 419241-2 : DRAFT 2017
|
TRUSTWORTHY SYSTEMS SUPPORTING SERVER SIGNING - PART 2: PROTECTION PROFILE FOR QSCD FOR SERVER SIGNING |
UNI CEN ISO/TS 14441 : 2014
|
HEALTH INFORMATICS - SECURITY AND PRIVACY REQUIREMENTS OF HER SYSTEMS FOR USE IN CONFORMITY ASSESSMENT |
UNE 71511:2011
|
Applications with the Spanish DNIe. Electronic signature creation and verification. Type 1 for IT platforms that allow an exclusive control of signer’s interfaces, and with a Evaluation Assurance Level «EAL3» |
I.S. CWA 14172-3:2004
|
EESSI CONFORMITY ASSESSMENT GUIDANCE - PART 3: TRUSTWORTHY SYSTEMS MANAGING CERTIFICATES FOR ELECTRONIC SIGNATURES |
UNE 71513:2011
|
Applications with the Spanish DNIe. Electronic signature creation and verification. Type 2 for personal computers, and with a Evaluation Assurance Level «EAL3» |
UNE-ISO/IEC TR 15446:2013 IN
|
Information technology. Security techniques. Guide for the production of Protection Profiles and Security Targets |
CSA ISO/IEC 15026-1 : 2015
|
SYSTEMS AND SOFTWARE ENGINEERING - SYSTEMS AND SOFTWARE ASSURANCE - PART 1: CONCEPTS AND VOCABULARY |
I.S. CWA 14355:2004
|
GUIDELINES FOR THE IMPLEMENTATION OF SECURE SIGNATURE-CREATION DEVICES |
VDI/VDE 2182 Blatt 2.1:2013-02
|
IT-security for industrial automation - Example of use of the general model for device manufacturer in factory automation - Programmable logic controller (PLC) |
DIN EN 419251-2:2013-06
|
SECURITY REQUIREMENTS FOR DEVICE FOR AUTHENTICATION - PART 2: PROTECTION PROFILE FOR EXTENSION FOR TRUSTED CHANNEL TO CERTIFICATE GENERATION APPLICATION |
04/30040790 DC : DRAFT MARCH 2004
|
ISO/IEC DTR 15443-2 - INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - A FRAMEWORK FOR IT SECURITY ASSURANCE - PART 2 - ASSURANCE METHODS |
BS EN 419211-2:2013
|
Protection profiles for secure signature creation device Device with key generation |
ISO/IEC 15945:2002
|
Information technology — Security techniques — Specification of TTP services to support the application of digital signatures |
DIN EN 419251-3 E : 2013
|
SECURITY REQUIREMENTS FOR DEVICE FOR AUTHENTICATION - PART 3: ADDITIONAL FUNCTIONALITY FOR SECURITY TARGETS |
GS NFV-SEC 014 : 3.1.1
|
NETWORK FUNCTIONS VIRTUALISATION (NFV) RELEASE 3; NFV SECURITY; SECURITY SPECIFICATION FOR MANO COMPONENTS AND REFERENCE POINTS |
DIN CEN ISO/TS 14907-1;DIN SPEC 91192:2015-12
|
ELECTRONIC FEE COLLECTION - TEST PROCEDURES FOR USER AND FIXED EQUIPMENT - PART 1: DESCRIPTION OF TEST PROCEDURES (ISO/TS 14907-1:2015) |
DIN EN 419251-1:2013-05
|
SECURITY REQUIREMENTS FOR DEVICE FOR AUTHENTICATION - PART 1: PROTECTION PROFILE FOR CORE FUNCTIONALITY |
BS ISO/IEC TR 14516:2002
|
Information technology. Security techniques. Guidelines for the use and management of trusted third party services |
ES 202 382 : 1.1.1
|
TELECOMMUNICATIONS AND INTERNET CONVERGED SERVICES AND PROTOCOLS FOR ADVANCED NETWORKING (TISPAN); SECURITY DESIGN GUIDE; METHOD AND PROFORMA FOR DEFINING PROTECTION PROFILES |
ISO/IEC TR 19791:2010
|
Information technology Security techniques Security assessment of operational systems |
S.R. CEN/TS 419221-4:2016
|
PROTECTION PROFILES FOR TSP CRYPTOGRAPHIC MODULES - PART 4: CRYPTOGRAPHIC MODULE FOR CSP SIGNING OPERATIONS WITHOUT BACKUP |
SR 002 564 : 2.0.0
|
APPLICABILITY OF EXISTING ETSI AND ETSI/3GPP DELIVERABLES TO EHEALTH |
BS IEC 62443-2-1 : 2010
|
INDUSTRIAL COMMUNICATION NETWORKS - NETWORK AND SYSTEM SECURITY - PART 2-1: ESTABLISHING AN INDUSTRIAL AUTOMATION AND CONTROL SYSTEM SECURITY PROGRAM |
PD ISO/IEC TR 20004:2015
|
Information technology. Security techniques. Refining software vulnerability analysis under ISO/IEC 15408 and ISO/IEC 18045 |
DIN EN 419211-6 E : 2014
|
PROTECTION PROFILES FOR SECURE SIGNATURE CREATION DEVICE - PART 6: EXTENSION FOR DEVICE WITH KEY IMPORT AND TRUSTED CHANNEL TO SIGNATURE CREATION APPLICATION |
INCITS/ISO 19153 : 2014
|
GEOGRAPHIC INFORMATION - GEOSPATIAL DIGITAL RIGHTS MANAGEMENT REFERENCE MODEL (GEODRM RM) |
BS EN 419251-3:2013
|
Security requirements for device for authentication Additional functionality for security targets |
07/30161079 DC : 0
|
BS EN 14890-1 - APPLICATION INTERFACE FOR SMART CARDS USED AS SECURE SIGNATURE CREATION DEVICES - PART 1: BASIC SERVICES |
ISO/IEC 15408-1:2009
|
Information technology — Security techniques — Evaluation criteria for IT security — Part 1: Introduction and general model |
07/30143790 DC : 0
|
BS ISO/IEC 24759 - INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - TEST REQUIREMENTS FOR CRYPTOGRAPHIC MODULES |
ISA 99.02.01 : 2009
|
SECURITY FOR INDUSTRIAL AUTOMATION AND CONTROL SYSTEMS: ESTABLISHING AN INDUSTRIAL AUTOMATION AND CONTROL SYSTEMS SECURITY PROGRAM |
10/30192143 DC : 0
|
BS ISO/IEC 29128 - INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - VERIFICATION OF CRYPTOGRAPHIC PROTOCOLS |
07/30107763 DC : 0
|
BS ISO/IEC 24713-2 - INFORMATION TECHNOLOGY - BIOMETRIC PROFILES FOR INTEROPERABILITY AND DATA INTERCHANGE - PART 2: PHYSICAL ACCESS CONTROL FOR EMPLOYEES AT AIRPORTS |
I.S. EN 419251-2:2013
|
SECURITY REQUIREMENTS FOR DEVICE FOR AUTHENTICATION - PART 2: PROTECTION PROFILE FOR EXTENSION FOR TRUSTED CHANNEL TO CERTIFICATE GENERATION APPLICATION |
CSA ISO/IEC 27003 : 2010 : R2015
|
INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - INFORMATION SECURITY MANAGEMENT SYSTEM IMPLEMENTATION GUIDANCE |
CAN/CSA-ISO/IEC 29167-12:16
|
Information technology Automatic identification and data capture techniques Part 12: Crypto suite ECC-DH security services for air interface communication (Adopted ISO/IEC 29167-12:2015, first edition, 2015-05-15) |
TR 187 011 : 2.1.1
|
TELECOMMUNICATIONS AND INTERNET CONVERGED SERVICES AND PROTOCOLS FOR ADVANCED NETWORKING (TISPAN); NGN SECURITY; APPLICATION OF ISO-15408-2 REQUIREMENTS TO ETSI STANDARDS - GUIDE, METHOD AND APPLICATION WITH EXAMPLES |
ISO/IEC 30111:2013
|
Information technology Security techniques Vulnerability handling processes |
ISO/IEC 19792:2009
|
Information technology Security techniques Security evaluation of biometrics |
I.S. CWA 14169:2004
|
SECURE SIGNATURE-CREATION DEVICES 'EAL 4+' |
TR 102 572 : 1.1.1
|
BEST PRACTICES FOR HANDLING ELECTRONIC SIGNATURES AND SIGNED DATA FOR DIGITAL ACCOUNTING |
UNE 71510:2011
|
Applications with the Spanish DNIe. Electronic signature creation and verification. Type 1 for IT platforms that allow an exclusive control of signer’s interfaces, and with a Evaluation Assurance Level «EAL1». |
TS 102 165-1 : 4.2.3
|
CYBER; METHODS AND PROTOCOLS; PART 1: METHOD AND PRO FORMA FOR THREAT, VULNERABILITY, RISK ANALYSIS (TVRA) |
UNE EN 419211-2 : 2016
|
PROTECTION PROFILES FOR SECURE SIGNATURE CREATION DEVICE - PART 2: DEVICE WITH KEY GENERATION |
UNI EN 419211-6 : 2014
|
PROTECTION PROFILES FOR SECURE SIGNATURE CREATION DEVICE - PART 6: EXTENSION FOR DEVICE WITH KEY IMPORT AND TRUSTED CHANNEL TO SIGNATURE CREATION APPLICATION |
ISO/TS 25110:2013
|
Electronic fee collection Interface definition for on-board account using integrated circuit card (ICC) |
I.S. EN 419211-6:2014
|
PROTECTION PROFILES FOR SECURE SIGNATURE CREATION DEVICE - PART 6: EXTENSION FOR DEVICE WITH KEY IMPORT AND TRUSTED CHANNEL TO SIGNATURE CREATION APPLICATION |
S.R. CEN/TS 419221-3:2016
|
PROTECTION PROFILES FOR TSP CRYPTOGRAPHIC MODULES - PART 3: CRYPTOGRAPHIC MODULE FOR CSP KEY GENERATION SERVICES |
ISO/IEC 29167-11:2014
|
Information technology — Automatic identification and data capture techniques — Part 11: Crypto suite PRESENT-80 security services for air interface communications |
PD ISO/IEC TR 15446:2009
|
Information technology. Security techniques. Guide for the production of protection profiles and security targets |
PD IEC/TR 80001-2-8:2016
|
Application of risk management for IT-networks incorporating medical devices Application guidance. Guidance on standards for establishing the security capabilities identified in IEC TR 80001-2-2 |
TS 102 158 : 1.1.1
|
ELECTRONIC SIGNATURES AND INFRASTRUCTURES (ESI); POLICY REQUIREMENTS FOR CERTIFICATION SERVICE PROVIDERS ISSUING ATTRIBUTE CERTIFICATES USABLE WITH QUALIFIED CERTIFICATES |
08/30182164 DC : DRAFT MAY 2008
|
BS ISO 31000 - RISK MANAGEMENT - PRINCIPLES AND GUIDELINES ON IMPLEMENTATION |
I.S. EN ISO 25110:2017
|
ELECTRONIC FEE COLLECTION - INTERFACE DEFINITION FOR ON-BOARD ACCOUNT USING INTEGRATED CIRCUIT CARD (ICC) (ISO 25110:2017) |
CSA INFORMATION SECURITY PACKAGE : 2018
|
CONSISTS OF CAN/CSA-ISO/IEC 27000:18 - INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - INFORMATION SECURITY MANAGEMENT SYSTEMS - OVERVIEW AND VOCABULARY; CAN/CSA-ISO/IEC 27001:14, INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - INFORMATION SECURITY MANAGEMENT SYSTEMS - REQUIREMENTS; CAN/CSA-ISO/IEC 27002:15 - INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - CODE OF PRACTICE FOR INFORMATION |
TS 102 181 : 1.2.1
|
EMERGENCY COMMUNICATIONS (EMTEL); REQUIREMENTS FOR COMMUNICATION BETWEEN AUTHORITIES/ORGANIZATIONS DURING EMERGENCIES |
BS ISO/IEC 29128:2011
|
Information technology. Security techniques. Verification of cryptographic protocols |
BIS IS/ISO 21188 : 2006
|
PUBLIC KEY INFRASTRUCTURE FOR FINANCIAL SERVICES - PRACTICES AND POLICY FRAMEWORK |
PD IEC/TR 80001-2-2:2012
|
Application of risk management for IT-networks incorporating medical devices Guidance for the disclosure and communication of medical device security needs, risks and controls |
05/30107197 DC : DRAFT APR 2005
|
ISO 20828 - ROAD VEHICLES - SECURITY CERTIFICATE MANAGEMENT |
UNI EN 419211-2 : 2014
|
PROTECTION PROFILES FOR SECURE SIGNATURE CREATION DEVICE - PART 2: DEVICE WITH KEY GENERATION |
BS ISO/IEC 27034-1:2011
|
Information technology. Security techniques. Application security Overview and concepts |
UNI EN 419251-3 : 2013
|
SECURITY REQUIREMENTS FOR DEVICE FOR AUTHENTICATION - PART 3: ADDITIONAL FUNCTIONALITY FOR SECURITY TARGETS |
UNI EN 419251-1 : 2013
|
SECURITY REQUIREMENTS FOR DEVICE FOR AUTHENTICATION - PART 1: PROTECTION PROFILE FOR CORE FUNCTIONALITY |
PD ISO/IEC/TR 19249:2017
|
Information technology. Security techniques Catalogue of architectural and design principles for secure products, systems and applications |
17/30346588 DC : 0
|
BS EN 419221-5 - PROTECTION PROFILES FOR TRUST SERVICE PROVIDER CRYPTOGRAPHIC MODULES - PART 5: CRYPTOGRAPHIC MODULE FOR TRUST SERVICES |
DD CEN ISO/TS 25110:2008
|
Electronic fee collection. Interface definition for on-board account using integrated circuit card (ICC) |
CSA ISO/IEC 15408-1 : 2010 : R2015
|
INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - EVALUATION CRITERIA FOR IT SECURITY - PART 1: INTRODUCTION AND GENERAL MODEL |
03/652682 DC : DRAFT NOV 2003
|
BS ISO/IEC TR 15446 - INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - GUIDE FOR THE PRODUCTION OF PROTECTION PROFILES AND SECURITY TARGETS |
CSA ISO/IEC TR 15446 : 2010 : R2015
|
INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - GUIDE FOR THE PRODUCTION OF PROTECTION PROFILES AND SECURITY TARGETS |
07/30161082 DC : 0
|
BS EN 14890-2 - APPLICATION INTERFACE FOR SMART CARDS USED AS SECURE SIGNATURE CREATION DEVICES - PART 2: ADDITIONAL SERVICES |
CSA ISO/IEC 27003 : 2010
|
INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - INFORMATION SECURITY MANAGEMENT SYSTEM IMPLEMENTATION GUIDANCE |
SR 019 020 : 1.1.2
|
THE FRAMEWORK FOR STANDARDIZATION OF SIGNATURES; STANDARDS FOR ADES DIGITAL SIGNATURES IN MOBILE AND DISTRIBUTED ENVIRONMENTS |
TS 187 016 : 3.1.1
|
TELECOMMUNICATIONS AND INTERNET CONVERGED SERVICES AND PROTOCOLS FOR ADVANCED NETWORKING (TISPAN); NGN SECURITY; IDENTITY PROTECTION (PROTECTION PROFILE) |
CR 14301 : 2002
|
HEALTH INFORMATICS - FRAMEWORK FOR SECURITY PROTECTION OF HEALTHCARE COMMUNICATION |
CAN/CSA-ISO/IEC 29167-14:16
|
Information technology Automatic identification and data capture techniques Part 14: Crypto suite AES OFB security services for air interface communications (Adopted ISO/IEC 29167-14:2015, first edition, 2015-10-15) |
CSA ISO/IEC 15945 : 2004
|
INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - SPECIFICATION OF TTP SERVICES TO SUPPORT THE APPLICATION OF DIGITAL SIGNATURES |
ES 202 383 : 1.1.1
|
TELECOMMUNICATIONS AND INTERNET CONVERGED SERVICES AND PROTOCOLS FOR ADVANCED NETWORKING (TISPAN); SECURITY DESIGN GUIDE; METHOD AND PROFORMA FOR DEFINING SECURITY TARGETS |
S.R. CEN ISO/TS 17574:2017
|
ELECTRONIC FEE COLLECTION - GUIDELINES FOR SECURITY PROTECTION PROFILES (ISO/TS 17574:2017) |
ISO/IEC TR 14516:2002
|
Information technology Security techniques Guidelines for the use and management of Trusted Third Party services |
I.S. EN IEC 62443-4-1:2018
|
SECURITY FOR INDUSTRIAL AUTOMATION AND CONTROL SYSTEMS - PART 4-1: SECURE PRODUCT DEVELOPMENT LIFECYCLE REQUIREMENTS |
GS ISI 001-2 : 1.1.2
|
INFORMATION SECURITY INDICATORS (ISI); INDICATORS (INC); PART 2: GUIDE TO SELECT OPERATIONAL INDICATORS BASED ON THE FULL SET GIVEN IN PART 1 |
I.S. CWA 14838-2:2003
|
FACILITATING SMART CARD TECHNOLOGY FOR ELECTRONIC TICKETING AND SEAMLESS TRAVEL - PART 2: DEVELOPMENT OF SMART CARD BASED INTEROPERABLE TICKETING SYSTEMS |
SAE J 3061 : 2016
|
CYBERSECURITY GUIDEBOOK FOR CYBER-PHYSICAL VEHICLE SYSTEMS |
I.S. CWA 14172-1:2004
|
EESSI CONFORMITY ASSESSMENT GUIDANCE - PART 1: GENERAL INTRODUCTION |
TR 102 512 : 1.1.1
|
TERRESTRIAL TRUNKED RADIO (TETRA); SECURITY; SECURITY REQUIREMENTS ANALYSIS FOR MODULATION ENHANCEMENTS TO TETRA |
I.S. CWA 14890-2:2004
|
APPLICATION INTERFACE FOR SMART CARDS USED AS SECURE SIGNATURE CREATION DEVICES - PART 2: ADDITIONAL SERVICES |
I.S. CWA 14365:2003
|
GUIDE ON THE USE OF ELECTRONIC SIGNATURES |
I.S. EN 419221-5:2018
|
PROTECTION PROFILES FOR TSP CRYPTOGRAPHIC MODULES - PART 5: CRYPTOGRAPHIC MODULE FOR TRUST SERVICES |
IEC TR 80001-2-8:2016
|
Application of risk management for IT-networks incorporating medical devices - Part 2-8: Application guidance - Guidance on standards for establishing the security capabilities identified in IEC TR 80001-2-2 |
CEN/TS 419221-2:2016
|
Protection Profiles for TSP cryptographic modules - Part 2: Cryptographic module for CSP signing operations with backup |
I.S. CWA 14365-2:2004
|
GUIDE ON THE USE OF ELECTRONIC SIGNATURES - PART 2: PROTECTION PROFILE FOR SOFTWARE SIGNATURE CREATION DEVICES |
I.S. CWA 14172-6:2004
|
EESSI CONFORMITY ASSESSMENT GUIDANCE - PART 6: SIGNATURE-CREATION DEVICE SUPPORTING SIGNATURES OTHER THAN QUALIFIED |
S.R. CWA 15929:2009
|
BEST PRACTICES FOR THE DESIGN AND DEVELOPMENT OF CRITICAL INFORMATION SYSTEMS |
IEC TR 80001-2-2:2012
|
Application of risk management for IT-networks incorporating medical devices - Part 2-2: Guidance for the disclosure and communication of medical device security needs, risks and controls |
I.S. CEN ISO TS 17574:2005
|
ROAD TRANSPORT AND TRAFFIC TELEMATICS - ELECTRONIC FEE COLLECTION (EFC) - GUIDELINES FOR EFC SECURITY PROTECTION PROFILES |
ANSI X9.97-1 : 2009
|
FINANCIAL SERVICES - SECURE CRYPTOGRAPHIC DEVICES (RETAIL) - PART 1: CONCEPTS, REQUIREMENTS AND EVALUATION METHODS |
ISO/TS 14907-1:2015
|
Electronic fee collection Test procedures for user and fixed equipment Part 1: Description of test procedures |
ISO/TS 14441:2013
|
Health informatics — Security and privacy requirements of EHR systems for use in conformity assessment |
ISO/TS 17574:2017
|
Electronic fee collection — Guidelines for security protection profiles |
EN 419221-5:2018
|
Protection Profiles for TSP Cryptographic Modules - Part 5: Cryptographic Module for Trust Services |
EN 419251-2:2013
|
Security requirements for device for authentication - Part 2: Protection profile for extension for trusted channel to certificate generation application |
EN 419251-3:2013
|
Security requirements for device for authentication - Part 3: Additional functionality for security targets |
EN 419251-1:2013
|
Security requirements for device for authentication - Part 1: Protection profile for core functionality |
EN 419211-6:2014
|
Protection profiles for secure signature creation device - Part 6: Extension for device with key import and trusted channel to signature creation application |
EN 419211-2:2013
|
Protection profiles for secure signature creation device - Part 2: Device with key generation |
PREN 50436-6 : DRAFT 2013
|
ALCOHOL INTERLOCKS - TEST METHODS AND PERFORMANCE REQUIREMENTS - PART 6: DATA SECURITY |
16/30329605 DC : 0
|
BS ISO/IEC 30107-3 - INFORMATION TECHNOLOGY - BIOMETRIC PRESENTATION ATTACK DETECTION - PART 3: TESTING AND REPORTING |
PD ISO/IEC TR 15443-3:2007
|
Information technology. Security techniques. A framework for IT security assurance Analysis of assurance methods |
08/30193508 DC : DRAFT NOV 2008
|
BS EN 61508-1 - FUNCTIONAL SAFETY OF ELECTRICAL/ELECTRONIC/PROGRAMMABLE ELECTRONIC SAFETY-RELATED SYSTEMS - PART 1: GENERAL REQUIREMENTS |
DD CEN/TS 15480-1:2007
|
Identification card systems. European Citizen Card Physical, electrical and transport protocol characteristics |
CSA ISO/IEC TR 15942 : 2004 : R2014
|
INFORMATION TECHNOLOGY - PROGRAMMING LANGUAGES - GUIDE FOR THE USE OF THE ADA PROGRAMMING LANGUAGE IN HIGH INTEGRITY SYSTEMS |
17/30351732 DC : 0
|
BS ISO/IEC 19896-1 - INFORMATION TECHNOLOGY - IT SECURITY TECHNIQUES - COMPETENCE REQUIREMENTS FOR INFORMATION SECURITY TESTERS AND EVALUATORS - PART 1: INTRODUCTION, CONCEPTS AND GENERAL REQUIREMENTS |
DIN EN 419211-6:2014-12
|
PROTECTION PROFILES FOR SECURE SIGNATURE CREATION DEVICE - PART 6: EXTENSION FOR DEVICE WITH KEY IMPORT AND TRUSTED CHANNEL TO SIGNATURE CREATION APPLICATION |
BS ISO/IEC 15026-1:2013
|
Systems and software engineering. Systems and software assurance Concepts and vocabulary |
NASA CCSDS 350.4-G : ISSUE 1
|
CCSDS GUIDE FOR SECURE SYSTEM INTERCONNECTION |
PD CEN/TS 419221-3:2016
|
Protection Profiles for TSP Cryptographic modules Cryptographic module for CSP key generation services |
DIN EN 419251-2 E : 2013
|
SECURITY REQUIREMENTS FOR DEVICE FOR AUTHENTICATION - PART 2: PROTECTION PROFILE FOR EXTENSION FOR TRUSTED CHANNEL TO CERTIFICATE GENERATION APPLICATION |
05/30107724 DC : DRAFT JAN 2005
|
ISO/IEC 19794-1 - BIOMETRIC DATA INTERCHANGE - PART 1: FRAMEWORK |
PD IEC TR 62210:2003
|
Power system control and associated communications. Data and communication security |
EN 319 411-1 : 1.2.2
|
ELECTRONIC SIGNATURES AND INFRASTRUCTURES (ESI); POLICY AND SECURITY REQUIREMENTS FOR TRUST SERVICE PROVIDERS ISSUING CERTIFICATES; PART 1: GENERAL REQUIREMENTS |
DD CEN ISO/TS 17574:2009
|
Electronic fee collection. Guidelines for security protection profiles |
ISO/IEC 15026-1:2013
|
Systems and software engineering Systems and software assurance Part 1: Concepts and vocabulary |
TS 102 731 : 1.1.1
|
INTELLIGENT TRANSPORT SYSTEMS (ITS); SECURITY; SECURITY SERVICES AND ARCHITECTURE |
PD CEN ISO/TS 14441:2013
|
Health informatics. Security and privacy requirements of EHR systems for use in conformity assessment |
14/30285138 DC : 0
|
BS ISO/IEC 29167-14 - INFORMATION TECHNOLOGY - AUTOMATIC IDENTIFICATION AND DATA CAPTURE TECHNIQUES - PART 14: CRYPTO SUITE AES OFB SECURITY SERVICES FOR AIR INTERFACE COMMUNICATIONS |
CSA ISO/IEC 15945 : 2004 : R2012
|
INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - SPECIFICATION OF TTP SERVICES TO SUPPORT THE APPLICATION OF DIGITAL SIGNATURES |
UNE-EN 419211-6:2016
|
Protection profiles for secure signature creation device - Part 6: Extension for device with key import and trusted channel to signature creation application |
PD CEN/TS 15480-1:2012
|
Identification card systems. European Citizen Card Physical, electrical and transport protocol characteristics |
PD CEN/TS 419221-4:2016
|
Protection Profiles for TSP cryptographic modules Cryptographic module for CSP signing operations without backup |
BS ISO 20828:2006
|
Road vehicles. Security certificate management |
PD CEN ISO/TS 17574:2017
|
Electronic fee collection. Guidelines for security protection profiles |
CAN/CSA-ISO/IEC TR 14516-04 (R2017)
|
Information Technology - Security Techniques - Guidelines for the use and Management of Trusted Third Party Services (Adopted ISO/IEC TR 14516:2002, first edition, 2002-06-15) |
BS ISO/IEC 30111:2013
|
Information technology. Security techniques. Vulnerability handling processes |
UNI EN 419251-2 : 2013
|
SECURITY REQUIREMENTS FOR DEVICE FOR AUTHENTICATION - PART 2: PROTECTION PROFILE FOR EXTENSION FOR TRUSTED CHANNEL TO CERTIFICATE GENERATION APPLICATION |
IEC TR 62210:2003
|
Power system control and associated communications - Data and communication security |
UNI CEN/TS 15480-1 : 2012
|
IDENTIFICATION CARD SYSTEMS - EUROPEAN CITIZEN CARD - PART 1: PHYSICAL, ELECTRICAL AND TRANSPORT PROTOCOL CHARACTERISTICS |
INCITS/ISO/IEC 15292 : 2001
|
INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - PROTECTION PROFILE REGISTRATION PROCEDURES |
ARINC 664-5 : 2005
|
AIRCRAFT DATA NETWORK - PART 5: NETWORK DOMAIN CHARACTERISTICS AND INTERCONNECTION |
INCITS/ISO/IEC 19792 : 2012
|
INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - SECURITY EVALUATION OF BIOMETRICS |
INCITS/ISO/IEC 15945 : 2002 : R2007
|
INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - SPECIFICATION OF TTP SERVICES TO SUPPORT THE APPLICATION OF DIGITAL SIGNATURES |
ISO 20828:2006
|
Road vehicles Security certificate management |
TR 187 014 : 2.1.1
|
TELECOMMUNICATIONS AND INTERNET CONVERGED SERVICES AND PROTOCOLS FOR ADVANCED NETWORKING (TISPAN); ESECURITY; USER GUIDE TO ETVRA WEB-DATABASE |
S.R. CEN ISO/TS 25110:2013
|
ELECTRONIC FEE COLLECTION - INTERFACE DEFINITION FOR ON-BOARD ACCOUNT USING INTEGRATED CIRCUIT CARD (ICC) (ISO/TS 25110:2013) |
IEEE/ISO/IEC 15026-1-2014
|
IEEE Standard Adoption of ISO/IEC 15026-1--Systems and Software Engineering--Systems and Software Assurance--Part 1: Concepts and Vocabulary |
I.S. EN 419211-2:2013
|
PROTECTION PROFILES FOR SECURE SIGNATURE CREATION DEVICE - PART 2: DEVICE WITH KEY GENERATION |
ISO/IEC 15292:2001
|
Information technology - Security techniques - Protection Profile registration procedures |
IEEE 1074-2006
|
IEEE Standard for Developing a Software Project Life Cycle Process |
I.S. EN 419251-3:2013
|
SECURITY REQUIREMENTS FOR DEVICE FOR AUTHENTICATION - PART 3: ADDITIONAL FUNCTIONALITY FOR SECURITY TARGETS |
I.S. EN CWA 14172-5:2004
|
EESSI CONFORMITY ASSESSMENT GUIDANCE - PART 5: SECURE SIGNATURE CREATION DEVICES |
I.S. EN 419251-1:2013
|
SECURITY REQUIREMENTS FOR DEVICE FOR AUTHENTICATION - PART 1: PROTECTION PROFILE FOR CORE FUNCTIONALITY |
17/30357420 DC : 0
|
BS EN 419241-2 - TRUSTWORTHY SYSTEMS SUPPORTING SERVER SIGNING - PART 2: PROTECTION PROFILE FOR QSCD FOR SERVER SIGNING |
TS 102 556 : 1.1.1
|
TELECOMMUNICATIONS AND INTERNET CONVERGED SERVICES AND PROTOCOLS FOR ADVANCED NETWORKING (TISPAN); PROTECTION PROFILE |
CSA ISO/IEC TR 15942:04 (R2019)
|
Information Technology - Programming Languages - Guide for the Use of the Ada Programming Language in High Integrity Systems (Adopted ISO/IEC TR 15942:2000, first edition, 2000-03-01) |
BS EN ISO 25110:2017
|
Electronic fee collection. Interface definition for on-board account using integrated circuit card (ICC) |
I.S. CR 14301:2002
|
HEALTH INFORMATICS - FRAMEWORK FOR SECURITY PROTECTION OF HEALTHCARE COMMUNICATION |
S.R. CEN/TS 15480-1:2012
|
IDENTIFICATION CARD SYSTEMS - EUROPEAN CITIZEN CARD - PART 1: PHYSICAL, ELECTRICAL AND TRANSPORT PROTOCOL CHARACTERISTICS |
I.S. CWA 14172-4:2004
|
EESSI CONFORMITY ASSESSMENT GUIDANCE - PART 4: SIGNATURE CREATION APPLICATIONS AND GENERAL GUIDELINES FOR ELECTRONIC SIGNATURE VERIFICATION |
CEN/TS 15480-1:2012
|
Identification card systems - European Citizen Card - Part 1: Physical, electrical and transport protocol characteristics |
CEN/TS 419221-4:2016
|
Protection Profiles for TSP cryptographic modules - Part 4: Cryptographic module for CSP signing operations without backup |
CEN/TS 419221-3:2016
|
Protection Profiles for TSP Cryptographic modules - Part 3: Cryptographic module for CSP key generation services |
CEN ISO/TS 14907-1:2015
|
Electronic fee collection - Test procedures for user and fixed equipment - Part 1: Description of test procedures (ISO/TS 14907-1:2015) |