ISO/IEC 24760-3:2016
Superseded
A superseded Standard is one, which is fully replaced by another Standard, which is a new edition of the same Standard.
View Superseded by
Information technology — Security techniques — A framework for identity management — Part 3: Practice
Hardcopy , PDF
English, French
21-07-2016
16-09-2025
ISO/IEC 24760-3:2016 provides guidance for the management of identity information and for ensuring that an identity management system conforms to ISO/IEC 24760-1 and ISO/IEC 24760-2.
ISO/IEC 24760-3:2016 is applicable to an identity management system where identifiers or PII relating to entities are acquired, processed, stored, transferred or used for the purposes of identifying or authenticating entities and/or for the purpose of decision making using attributes of entities. Practices for identity management can also be addressed in other standards.
| Committee |
ISO/IEC JTC 1/SC 27
|
| DocumentType |
Standard
|
| Pages |
31
|
| PublisherName |
International Organization for Standardization
|
| Status |
Superseded
|
| SupersededBy | |
| UnderRevision |
| Standards | Relationship |
| DS/EN ISO/IEC 24760-3:2022 | Identical |
| NF EN ISO/IEC 24760-3:2022 | Identical |
| PN-EN ISO/IEC 24760-3:2023-02 | Identical |
| DS ISO/IEC 24760-3 : 2016 | Identical |
| NEN ISO/IEC 24760-3 : 2016 | Identical |
| CEI UNI EN ISO/IEC 24760-3:2023-05 | Identical |
| NEN-EN-ISO/IEC 24760-3:2023 | Identical |
| BS EN ISO/IEC 24760-3:2016 | Identical |
| UNE-EN ISO/IEC 24760-3:2022 | Identical |
| BS EN ISO/IEC 24760-3:2022 | Identical |
| 15/30192160 DC : 0 | BS ISO/IEC 29146 - INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - A FRAMEWORK FOR ACCESS MANAGEMENT |
| CEI UNI EN ISO/IEC 27002:2023 | Information security, cybersecurity and privacy protection - Information security controls |
| ISO/IEC 29146:2016 | Information technology — Security techniques — A framework for access management |
| ISO/IEC 29151:2017 | Information technology — Security techniques — Code of practice for personally identifiable information protection |
| ISO/IEC 24760-1:2011 | Information technology — Security techniques — A framework for identity management — Part 1: Terminology and concepts |
| ISO/IEC 27002:2013 | Information technology — Security techniques — Code of practice for information security controls |
| ISO/IEC 27018:2014 | Information technology — Security techniques — Code of practice for protection of personally identifiable information (PII) in public clouds acting as PII processors |
| ISO/IEC 29115:2013 | Information technology — Security techniques — Entity authentication assurance framework |
| ISO/IEC 29134:2017 | Information technology — Security techniques — Guidelines for privacy impact assessment |
| ISO/IEC 29101:2013 | Information technology — Security techniques — Privacy architecture framework |
| ISO/IEC 29100:2011 | Information technology — Security techniques — Privacy framework |
Access your standards online with a subscription
-
Simple online access to standards, technical information and regulations.
-
Critical updates of standards and customisable alerts and notifications.
-
Multi-user online standards collection: secure, flexible and cost effective.