ISO/IEC 20648:2016
Superseded
A superseded Standard is one, which is fully replaced by another Standard, which is a new edition of the same Standard.
View Superseded by
Information technology — TLS specification for storage systems
Hardcopy , PDF , PDF 3 Users , PDF 5 Users , PDF 9 Users
17-07-2024
English
03-03-2016
ISO/IEC 20648:2016 details the requirements for use of the Transport Layer Security (TLS) protocol in conjunction with data storage technologies. The requirements set out in this specification are intended to facilitate secure interoperability of storage clients and servers as well as non-storage technologies that may have similar interoperability needs.
ISO/IEC 20648:2016 is relevant to anyone involved in owning, operating or using data storage devices. This includes senior managers, acquirers of storage product and service, and other non-technical managers or users, in addition to managers and administrators who have specific responsibilities for information security and/or storage security, storage operation, or who are responsible for an organization's overall security program and security policy development. It is also relevant to anyone involved in the planning, design and implementation of the architectural aspects of storage security.
Committee |
ISO/IEC JTC 1
|
DocumentType |
Standard
|
Pages |
11
|
ProductNote |
THIS STANDARD ALSO REFERS TO IETF RFC 5280,IETF RFC 5246,IETF RFC 5746,IETF RFC 2045,IETF RFC 2246,IETF RFC 4279,IETF RFC 4346,IETF RFC 5116,IETF RFC 5288,IETF RFC 5289,IETF RFC 5487,IETF RFC 6066,IETF RFC 6101,IETF RFC 6176,IETF RFC 6460,IETF RFC 6960,
|
PublisherName |
International Organization for Standardization
|
Status |
Superseded
|
SupersededBy | |
UnderRevision |
Standards | Relationship |
BS ISO/IEC 20648:2016 | Identical |
NEN ISO/IEC 20648 : 2016 | Identical |
CAN/CSA-ISO/IEC 20648:18 | Identical |
ISO/IEC 11770-5:2011 | Information technology Security techniques Key management Part 5: Group key management |
ISO/IEC 9594-8:2017 | Information technology Open Systems Interconnection The Directory Part 8: Public-key and attribute certificate frameworks |
ISO/IEC 17826:2016 | Information technology Cloud Data Management Interface (CDMI) |
ISO/IEC 9797-2:2011 | Information technology Security techniques Message Authentication Codes (MACs) Part 2: Mechanisms using a dedicated hash-function |
ISO/IEC 27000:2016 | Information technology Security techniques Information security management systems Overview and vocabulary |
Access your standards online with a subscription
Features
-
Simple online access to standards, technical information and regulations.
-
Critical updates of standards and customisable alerts and notifications.
-
Multi-user online standards collection: secure, flexible and cost effective.