BS ISO/IEC 11770-5:2011
|
Information technology Security techniques. Key management Group key management |
BS ISO/IEC 19896-1:2018
|
IT security techniques. Competence requirements for information security testers and evaluators Introduction, concepts and general requirements |
CAN/CSA-ISO/IEC 17825:18
|
Information technology — Security techniques — Testing methods for the mitigation of non-invasive attack classes against cryptographic modules (Adopted ISO/IEC 17825:2016, first edition, 2016-01-15) |
05/30144069 DC : DRAFT DEC 2005
|
ISO 13491-1 - BANKING - SECURE CRYPTOGRAPHIC DEVICES (RETAIL) - PART 1: CONCEPTS, REQUIREMENTS AND EVALUATION METHODS |
EN 319 411-1 : 1.2.2
|
ELECTRONIC SIGNATURES AND INFRASTRUCTURES (ESI); POLICY AND SECURITY REQUIREMENTS FOR TRUST SERVICE PROVIDERS ISSUING CERTIFICATES; PART 1: GENERAL REQUIREMENTS |
PREN 419221-5 : DRAFT 2016
|
PROTECTION PROFILES FOR TRUST SERVICE PROVIDER CRYPTOGRAPHIC MODULES - PART 5: CRYPTOGRAPHIC MODULE FOR TRUST SERVICES |
14/30265618 DC : 0
|
BS ISO 13491-2 - BANKING - SECURE CRYPTOGRAPHIC DEVICES (RETAIL) - PART 2: SECURITY COMPLIANCE CHECKLISTS FOR DEVICES USED IN FINANCIAL TRANSACTIONS |
INCITS/ISO/IEC 27040 : 2017
|
INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - STORAGE SECURITY |
12/30204795 DC : 0
|
BS ISO/IEC 19790 - INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - SECURITY REQUIREMENTS FOR CRYPTOGRAPHIC MODULES |
BS ISO/IEC 17922:2017
|
Information technology. Security techniques. Telebiometric authentication framework using biometric hardware security module |
BS ISO/IEC 15408-1:2009
|
Information technology. Security techniques. Evaluation criteria for IT security Introduction and general model |
BS ISO 21188:2006
|
Public key infrastructure for financial services. Practices and policy framework |
PD ISO/IEC TR 15443-1:2012
|
Information technology. Security techniques. Security assurance framework Introduction and concepts |
CSA ISO/IEC 11770-1 : 2012
|
INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - KEY MANAGEMENT - PART 1: FRAMEWORK |
I.S. EN 62734:2015
|
INDUSTRIAL NETWORKS - WIRELESS COMMUNICATION NETWORK AND COMMUNICATION PROFILES - ISA 100.11A |
CEN/TS 16702-2:2015
|
Electronic fee collection - Secure monitoring for autonomous toll systems - Part 2: Trusted recorder |
14/30249803 DC : 0
|
BS ISO/IEC 27040 - INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - STORAGE SECURITY |
CEN ISO/TS 19299 : 2015
|
ELECTRONIC FEE COLLECTION - SECURITY FRAMEWORK (ISO/TS 19299:2015) |
CEN/TS 419261:2015
|
Security requirements for trustworthy systems managing certificates and time-stamps |
EN 62734:2015
|
Industrial networks - Wireless communication network and communication profiles - ISA 100.11a |
EN 319 421 : 1.1.1
|
ELECTRONIC SIGNATURES AND INFRASTRUCTURES (ESI); POLICY AND SECURITY REQUIREMENTS FOR TRUST SERVICE PROVIDERS ISSUING TIME-STAMPS |
ISO/IEC 11770-5:2011
|
Information technology Security techniques Key management Part 5: Group key management |
ISO 13491-2:2017
|
Financial services — Secure cryptographic devices (retail) — Part 2: Security compliance checklists for devices used in financial transactions |
INCITS/ISO/IEC 29115 : 2014
|
INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - ENTITY AUTHENTICATION ASSURANCE FRAMEWORK |
S.R. CEN/TS 16702-2:2015
|
ELECTRONIC FEE COLLECTION - SECURE MONITORING FOR AUTONOMOUS TOLL SYSTEMS - PART 2: TRUSTED RECORDER |
BS ISO/IEC 24761:2009
|
Information technology. Security techniques. Authentication context for biometrics |
10/30228327 DC : 0
|
BS ISO/IEC 18031 - INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - RANDOM BIT GENERATION |
I.S. EN ISO/IEC 27040:2016
|
INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - STORAGE SECURITY (ISO/IEC 27040:2015) |
12/30259506 DC : DRAFT JAN 2012
|
BS EN 62734 - INDUSTRIAL COMMUNICATION NETWORKS - FIELDBUS SPECIFICATIONS - WIRELESS SYSTEMS FOR INDUSTRIAL AUTOMATION: PROCESS CONTROL AND RELATED APPLICATIONS (BASED ON ISA 100.11A) |
14/30259616 DC : 0
|
BS ISO/IEC 17825 - INFORMATION TECHNOLOGY - SECURITY TECHNIQUE - TESTING METHODS FOR THE MTIGATION OF NON-INVASIVE ATTACK CLASSES AGAINST CRYPTOGRAPHIC MODULES |
BS ISO/IEC 29115:2013
|
Information technology. Security techniques. Entity authentication assurance framework |
PD ISO/TS 12812-2:2017
|
Core banking. Mobile financial services Security and data protection for mobile financial services |
PD CEN/TS 419261:2015
|
Security requirements for trustworthy systems managing certificates and time-stamps |
ISO 13491-1:2016
|
Financial services Secure cryptographic devices (retail) Part 1: Concepts, requirements and evaluation methods |
S.R. CEN/TS 16439:2013
|
ELECTRONIC FEE COLLECTION - SECURITY FRAMEWORK |
BS ISO/IEC 18367:2016
|
Information technology. Security techniques. Cryptographic algorithms and security mechanisms conformance testing |
BS ISO 13491-2:2017
|
Financial services. Secure cryptographic devices (retail) Security compliance checklists for devices used in financial transactions |
CSA ISO/IEC 15408-1 : 2010
|
INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - EVALUATION CRITERIA FOR IT SECURITY - PART 1: INTRODUCTION AND GENERAL MODEL |
IEC TS 62351-2:2008
|
Power systems management and associated information exchange - Data and communications security - Part 2: Glossary of terms |
ISO/IEC TS 20540:2018
|
Information technology — Security techniques — Testing cryptographic modules in their operational environment |
BS ISO/IEC 18031 : 2011
|
INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - RANDOM BIT GENERATION |
CAN/CSA-ISO/IEC 18367:18
|
Information technology — Security techniques — Cryptographic algorithms and security mechanisms conformance testing (Adopted ISO/IEC 18367:2016, first edition, 2016-12-15) |
DIN EN ISO/IEC 27040:2016-04 (Draft)
|
INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - STORAGE SECURITY (ISO/IEC 27040:2015) |
PREN 419241-2 : DRAFT 2017
|
TRUSTWORTHY SYSTEMS SUPPORTING SERVER SIGNING - PART 2: PROTECTION PROFILE FOR QSCD FOR SERVER SIGNING |
PREN 419241-1 : DRAFT 2017
|
TRUSTWORTHY SYSTEMS SUPPORTING SERVER SIGNING - PART 1: GENERAL SYSTEM SECURITY REQUIREMENTS |
ISO/IEC 18367:2016
|
Information technology Security techniques Cryptographic algorithms and security mechanisms conformance testing |
IEC 62351-9:2017
|
Power systems management and associated information exchange - Data and communications security - Part 9: Cyber security key management for power system equipment |
ISO 19092:2008
|
Financial services — Biometrics — Security framework |
PD ISO/IEC TR 15443-3:2007
|
Information technology. Security techniques. A framework for IT security assurance Analysis of assurance methods |
14/30265615 DC : 0
|
BS ISO 13491-1 - BANKING - SECURE CRYPTOGRAPHIC DEVICES (RETAIL) - PART 1: CONCEPTS, REQUIREMENTS AND EVALUATION METHODS |
PD ISO/IEC TS 30104:2015
|
Information Technology. Security Techniques. Physical Security Attacks, Mitigation Techniques and Security Requirements |
17/30281253 DC : 0
|
BS ISO 21188 - PUBLIC KEY INFRASTRUCTURE FOR FINANCIAL SERVICES - PRACTICES AND POLICY FRAMEWORK |
17/30354862 DC : 0
|
BS ISO/IEC 19896-2 - INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - COMPETENCE REQUIREMENTS FOR INFORMATION SECURITY TESTERS AND EVALUATORS - PART 2: KNOWLEDGE, SKILLS AND EFFECTIVENESS REQUIREMENTS FOR ISO/IEC 19790 TESTERS |
PD CEN/TS 16702-2:2015
|
Electronic fee collection. Secure monitoring for autonomous toll systems Trusted recorder |
16/30266969 DC : 0
|
BS ISO/IEC 17922 - INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - TELEBIOMETRIC AUTHENTICATION FRAMEWORK USING BIOMETRIC HARDWARE SECURITY MODULE |
17/30354142 DC : 0
|
BS EN 419231 - PROTECTION PROFILE FOR TRUSTWORTHY SYSTEMS SUPPORTING TIME STAMPING |
15/30281583 DC : 0
|
BS ISO 12812-2 - CORE BANKING - MOBILE FINANCIAL SERVICES - PART 2: SECURITY AND DATA PROTECTION FOR MOBILE FINANCIAL SERVICES |
ISO/IEC TR 15443-3:2007
|
Information technology Security techniques A framework for IT security assurance Part 3: Analysis of assurance methods |
13/30249039 DC : 0
|
BS ISO/IEC 24759 - INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - TEST REQUIREMENTS FOR CRYPTOGRAPHIC MODULES |
BS EN 62351-9:2017
|
Power systems management and associated information exchange. Data and communications security Cyber security key management for power system equipment |
04/30040736 DC : DRAFT DEC 2004
|
ISO/IEC 18031 - INFORMATION TECHNOLOGY - RANDOM NUMBER GENERATION |
09/30204756 DC : 0
|
BS ISO/IEC 11770-1 - INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - KEY MANAGEMENT - PART 1: FRAMEWORK |
ISO/IEC 15408-1:2009
|
Information technology — Security techniques — Evaluation criteria for IT security — Part 1: Introduction and general model |
07/30143790 DC : 0
|
BS ISO/IEC 24759 - INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - TEST REQUIREMENTS FOR CRYPTOGRAPHIC MODULES |
CAN/CSA-ISO/IEC 11770-1:12 (R2016)
|
Information technology - Security techniques - Key management - Part 1: Framework (Adopted ISO/IEC 11770-1:2010, second edition, 2010-12-01) |
CAN/CSA-ISO/IEC 18031:13 (R2017)
|
Information technology - Security techniques - Random bit generation (Adopted ISO/IEC 18031:2011, second edition, 2011-11-15) |
DIN CEN ISO/TS 19299;DIN SPEC 74125:2016-02
|
ELECTRONIC FEE COLLECTION - SECURITY FRAMEWORK (ISO/TS 19299:2015) |
CSA ISO/IEC 18031 : 2013
|
INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - RANDOM BIT GENERATION |
INCITS/ISO/IEC 11770-5 : 2012
|
INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - KEY MANAGEMENT - PART 5: GROUP KEY MANAGEMENT |
S.R. CEN/TS 419241:2014
|
SECURITY REQUIREMENTS FOR TRUSTWORTHY SYSTEMS SUPPORTING SERVER SIGNING |
CEN/TS 419241:2014
|
Security Requirements for Trustworthy Systems Supporting Server Signing |
ISO/IEC 20248:2018
|
Information technology Automatic identification and data capture techniques Data structures Digital signature meta structure |
ISO/IEC 18031:2011
|
Information technology Security techniques Random bit generation |
ISO/IEC TR 15443-1:2012
|
Information technology Security techniques Security assurance framework Part 1: Introduction and concepts |
S.R. CEN ISO/TS 19299:2015
|
ELECTRONIC FEE COLLECTION - SECURITY FRAMEWORK (ISO/TS 19299:2015) |
ISO/TS 12812-2:2017
|
Core banking — Mobile financial services — Part 2: Security and data protection for mobile financial services |
ISO/IEC 11770-1:2010
|
Information technology Security techniques Key management Part 1: Framework |
ISO/TR 13569:2005
|
Financial services Information security guidelines |
ISO/TS 19299:2015
|
Electronic fee collection Security framework |
IEC 62734:2014
|
Industrial networks - Wireless communication network and communication profiles - ISA 100.11a |
DIN EN ISO/IEC 27040 E : 2017
|
INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - STORAGE SECURITY (ISO/IEC 27040:2015) |
UNI CEN/TS 419241 : 2014
|
SECURITY REQUIREMENTS FOR TRUSTWORTHY SYSTEMS SUPPORTING SERVER SIGNING |
UNI/TS 11291-10 : 2013
|
GAS MEASUREMENT SYSTEMS - HOURLY BASED GAS METERING SYSTEMS - PART 10: SAFETY |
BS ISO/IEC 11770-1:2010
|
Information technology. Security techniques. Key management Framework |
BS ISO/IEC 24759:2017
|
Information technology. Security techniques. Test requirements for cryptographic modules |
15/30279582 DC : 0
|
BS ISO/IEC 18367 - INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - CRYPTOGRAPHIC ALGORITHMS AND SECURITY MECHANISMS CONFORMANCE TESTING |
DIN CEN ISO/TS 19299;DIN SPEC 74125:2016-02
|
ELECTRONIC FEE COLLECTION - SECURITY FRAMEWORK (ISO/TS 19299:2015) |
INCITS/ISO/IEC 18031 : 2012
|
INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - RANDOM BIT GENERATION |
BS EN 62734:2015
|
Industrial networks. Wireless communication network and communication profiles. ISA 100.11a |
17/30346588 DC : 0
|
BS EN 419221-5 - PROTECTION PROFILES FOR TRUST SERVICE PROVIDER CRYPTOGRAPHIC MODULES - PART 5: CRYPTOGRAPHIC MODULE FOR TRUST SERVICES |
PD CEN ISO/TS 19299:2015
|
Electronic fee collection. Security framework |
ISO/IEC 24761:2009
|
Information technology Security techniques Authentication context for biometrics |
CSA ISO/IEC 15408-1 : 2010 : R2015
|
INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - EVALUATION CRITERIA FOR IT SECURITY - PART 1: INTRODUCTION AND GENERAL MODEL |
DD IEC/TS 62351-2:2008
|
Power systems management and associated information exchange. Data and communications security Glossary of terms |
UNI CEN/TS 16439 : 2013
|
ELECTRONIC FEE COLLECTION - SECURITY FRAMEWORK |
07/30143287 DC : 0
|
BS ISO/IEC 24761 - INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - AUTHENTICATION CONTEXT FOR BIOMETRICS |
CAN/CSA-IEC 62443-3-3:17
|
Industrial communication networks — Network and system security — Part 3-3: System security requirements and security levels (Adopted IEC 62443-3-3:2013, first edition, 2013-08) |
INCITS/ISO/IEC 15408-1 : 2012
|
INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - EVALUATION CRITERIA FOR IT SECURITY - PART 1: INTRODUCTION AND GENERAL MODEL |
ISO/IEC 24759:2017
|
Information technology Security techniques Test requirements for cryptographic modules |
INCITS/ISO/IEC 24761 : 2009(R2014)
|
INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - AUTHENTICATION CONTEXT FOR BIOMETRICS |
ISO 19092-1:2006
|
Financial services Biometrics Part 1: Security framework |
CSA ISO/IEC TR 15443-1 : 2015
|
INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - SECURITY ASSURANCE FRAMEWORK - PART 1: INTRODUCTION AND CONCEPTS |
I.S. EN 419221-5:2018
|
PROTECTION PROFILES FOR TSP CRYPTOGRAPHIC MODULES - PART 5: CRYPTOGRAPHIC MODULE FOR TRUST SERVICES |
17/30348282 DC : 0
|
BS EN 419241-1 - TRUSTWORTHY SYSTEMS SUPPORTING SERVER SIGNING - PART 1: GENERAL SYSTEM SECURITY REQUIREMENTS |
ANSI X9.97-2 : 2009(R2017)
|
BANKING - SECURE CRYPTOGRAPHIC DEVICES (RETAIL) - PART 2: SECURITY COMPLIANCE CHECKLISTS FOR DEVICES USED IN FINANCIAL TRANSACTIONS |
ISO/IEC 14776-333:2013
|
Information technology Small Computer System Interface (SCSI) Part 333: SCSI Stream Commands - 3 (SSC-3) |
ISO/IEC TS 30104:2015
|
Information Technology Security Techniques Physical Security Attacks, Mitigation Techniques and Security Requirements |
ISO/IEC 14543-5-1:2010
|
Information technology Home electronic system (HES) architecture Part 5-1: Intelligent grouping and resource sharing for Class 2 and Class 3 Core protocol |
ISO/IEC 29115:2013
|
Information technology Security techniques Entity authentication assurance framework |
ANSI X9.97-1 : 2009
|
FINANCIAL SERVICES - SECURE CRYPTOGRAPHIC DEVICES (RETAIL) - PART 1: CONCEPTS, REQUIREMENTS AND EVALUATION METHODS |
BS ISO/IEC 27040 : 2015
|
INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - STORAGE SECURITY |
BS EN ISO/IEC 27040:2016
|
Information technology. Security techniques. Storage security |
ISO/IEC 27040:2015
|
Information technology — Security techniques — Storage security |
EN 419221-5:2018
|
Protection Profiles for TSP Cryptographic Modules - Part 5: Cryptographic Module for Trust Services |
EN ISO/IEC 27040:2016
|
Information technology - Security techniques - Storage security (ISO/IEC 27040:2015) |
INCITS/ISO/IEC 11889-4 : 2009(R2014)
|
INFORMATION TECHNOLOGY - TRUSTED PLATFORM MODULE - PART 4: COMMANDS |
BS IEC 62443-3-3:2013
|
Industrial communication networks. Network and system security System security requirements and security levels |
18/30356051 DC : DRAFT APR 2018
|
BS ISO/IEC 20543 - INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - TEST AND ANALYSIS METHODS FOR RANDOM BIT GENERATORS WITHIN ISO/IEC 19790 AND ISO/IEC 15408 |
BS ISO/IEC 17825:2016
|
Information technology. Security techniques. Testing methods for the mitigation of non-invasive attack classes against cryptographic modules |
17/30351732 DC : 0
|
BS ISO/IEC 19896-1 - INFORMATION TECHNOLOGY - IT SECURITY TECHNIQUES - COMPETENCE REQUIREMENTS FOR INFORMATION SECURITY TESTERS AND EVALUATORS - PART 1: INTRODUCTION, CONCEPTS AND GENERAL REQUIREMENTS |
PD ISO/TR 13569:2005
|
Financial services. Information security guidelines |
I.S. EN 62351-9:2017
|
POWER SYSTEMS MANAGEMENT AND ASSOCIATED INFORMATION EXCHANGE - DATA AND COMMUNICATIONS SECURITY - PART 9: CYBER SECURITY KEY MANAGEMENT FOR POWER SYSTEM EQUIPMENT |
ISO/IEC 17922:2017
|
Information technology — Security techniques — Telebiometric authentication framework using biometric hardware security module |
BS ISO 13491-1:2007
|
Banking. Secure cryptographic devices (retail) Concepts, requirements and evaluation methods |
PD CEN/TS 16439:2013
|
Electronic fee collection. Security framework |
05/30116896 DC : DRAFT SEP 2005
|
ISO 19092-1 - FINANCIAL SERVICES - BIOMETRICS - PART 1: SECURITY FRAMEWORK |
INCITS/ISO/IEC 24759 : 2014
|
INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - TEST REQUIREMENTS FOR CRYPTOGRAPHIC MODULES |
PD CEN/TS 419241:2014
|
Security Requirements for Trustworthy Systems Supporting Server Signing |
ARINC 842 : 2013
|
GUIDANCE FOR USAGE OF DIGITAL CERTIFICATES |
ISO 21188:2018
|
Public key infrastructure for financial services — Practices and policy framework |
ISO/IEC 19896-1:2018
|
IT security techniques — Competence requirements for information security testers and evaluators — Part 1: Introduction, concepts and general requirements |
17/30357420 DC : 0
|
BS EN 419241-2 - TRUSTWORTHY SYSTEMS SUPPORTING SERVER SIGNING - PART 2: PROTECTION PROFILE FOR QSCD FOR SERVER SIGNING |
S.R. CEN/TS 419261:2015
|
SECURITY REQUIREMENTS FOR TRUSTWORTHY SYSTEMS MANAGING CERTIFICATES AND TIME-STAMPS |
ISO/IEC 17825:2016
|
Information technology — Security techniques — Testing methods for the mitigation of non-invasive attack classes against cryptographic modules |
CEN/TS 16439:2013
|
Electronic fee collection - Security framework |
EN 62351-9:2017
|
Power systems management and associated information exchange - Data and communications security - Part 9: Cyber security key management for power system equipment |