ISO/IEC 24760-2:2015
Superseded
Superseded
A superseded Standard is one, which is fully replaced by another Standard, which is a new edition of the same Standard.
View Superseded by
Information technology — Security techniques — A framework for identity management — Part 2: Reference architecture and requirements
Available format(s)
Hardcopy , PDF
Language(s)
English, French
Published date
03-06-2015
Superseded date
16-09-2025
Superseded by
€63.00
Excluding VAT
ISO/IEC 24760-2:2015
- provides guidelines for the implementation of systems for the management of identity information, and
- specifies requirements for the implementation and operation of a framework for identity management.
ISO/IEC 24760-2:2015 is applicable to any information system where information relating to identity is processed or stored.
| Committee |
ISO/IEC JTC 1/SC 27
|
| DocumentType |
Standard
|
| Pages |
47
|
| PublisherName |
International Organization for Standardization
|
| Status |
Superseded
|
| SupersededBy | |
| UnderRevision |
| Standards | Relationship |
| DS/EN ISO/IEC 24760-2:2022 | Identical |
| NF EN ISO/IEC 24760-2:2022 | Identical |
| PN-EN ISO/IEC 24760-2:2023-02 | Identical |
| NEN-EN-ISO/IEC 24760-2:2022 | Identical |
| NEN ISO/IEC 24760-2 : 2015 | Identical |
| DS ISO/IEC 24760-2 : 2015 | Identical |
| CEI UNI EN ISO/IEC 24760-2:2023 | Identical |
| ÖVE/ÖNORM EN ISO/IEC 24760-2:2023 04 15 | Identical |
| BS EN ISO/IEC 24760-2:2022 | Identical |
| UNE-EN ISO/IEC 24760-2:2022 | Identical |
| BS ISO/IEC 29146:2016 | Information technology. Security techniques. A framework for access management |
| 15/30192160 DC : 0 | BS ISO/IEC 29146 - INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - A FRAMEWORK FOR ACCESS MANAGEMENT |
| ISO/IEC 29146:2016 | Information technology — Security techniques — A framework for access management |
| ISO/IEC 29146:2016 | Information technology — Security techniques — A framework for access management |
| ISO/IEC 24760-1:2011 | Information technology — Security techniques — A framework for identity management — Part 1: Terminology and concepts |
| ISO/IEC 27002:2013 | Information technology — Security techniques — Code of practice for information security controls |
| ISO/IEC 29115:2013 | Information technology — Security techniques — Entity authentication assurance framework |
| ISO/IEC 42010:2007 | Systems and software engineering — Recommended practice for architectural description of software-intensive systems |
Summarise
Access your standards online with a subscription
-
Simple online access to standards, technical information and regulations.
-
Critical updates of standards and customisable alerts and notifications.
-
Multi-user online standards collection: secure, flexible and cost effective.