ISO/IEC 24760-2:2015
Withdrawn
Withdrawn
A Withdrawn Standard is one, which is removed from sale, and its unique number can no longer be used. The Standard can be withdrawn and not replaced, or it can be withdrawn and replaced by a Standard with a different number.
View Superseded by
Information technology — Security techniques — A framework for identity management — Part 2: Reference architecture and requirements
Available format(s)
Hardcopy , PDF
Language(s)
English, French
Published date
03-06-2015
Withdrawn date
06-01-2026
Superseded by
€65.00
Excluding VAT
ISO/IEC 24760-2:2015
- provides guidelines for the implementation of systems for the management of identity information, and
- specifies requirements for the implementation and operation of a framework for identity management.
ISO/IEC 24760-2:2015 is applicable to any information system where information relating to identity is processed or stored.
| Committee |
ISO/IEC JTC 1/SC 27
|
| DocumentType |
Standard
|
| Pages |
47
|
| PublisherName |
International Organization for Standardization
|
| Status |
Withdrawn
|
| SupersededBy | |
| UnderRevision |
| Standards | Relationship |
| DS/EN ISO/IEC 24760-2:2022 | Identical |
| NF EN ISO/IEC 24760-2:2022 | Identical |
| PN-EN ISO/IEC 24760-2:2023-02 | Identical |
| NEN-EN-ISO/IEC 24760-2:2022 | Identical |
| NEN ISO/IEC 24760-2 : 2015 | Identical |
| DS ISO/IEC 24760-2 : 2015 | Identical |
| CEI UNI EN ISO/IEC 24760-2:2023 | Identical |
| ÖVE/ÖNORM EN ISO/IEC 24760-2:2023 04 15 | Identical |
| BS EN ISO/IEC 24760-2:2022 | Identical |
| UNE-EN ISO/IEC 24760-2:2022 | Identical |
| BS ISO/IEC 29146:2016 | Information technology. Security techniques. A framework for access management |
| 15/30192160 DC : 0 | BS ISO/IEC 29146 - INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - A FRAMEWORK FOR ACCESS MANAGEMENT |
| ISO/IEC 29146:2016 | Information technology — Security techniques — A framework for access management |
| ISO/IEC 29146:2016 | Information technology — Security techniques — A framework for access management |
| ISO/IEC 24760-1:2011 | Information technology — Security techniques — A framework for identity management — Part 1: Terminology and concepts |
| ISO/IEC 27002:2013 | Information technology — Security techniques — Code of practice for information security controls |
| ISO/IEC 29115:2013 | Information technology — Security techniques — Entity authentication assurance framework |
| ISO/IEC 42010:2007 | Systems and software engineering — Recommended practice for architectural description of software-intensive systems |
Summarise