ISO/IEC 27000:2016
Withdrawn
A Withdrawn Standard is one, which is removed from sale, and its unique number can no longer be used. The Standard can be withdrawn and not replaced, or it can be withdrawn and replaced by a Standard with a different number.
View Superseded by
Information technology — Security techniques — Information security management systems — Overview and vocabulary
Hardcopy , PDF
English, French
15-02-2016
09-04-2025
ISO/IEC 27000:2016 the overview of information security management systems, and terms and definitions commonly used in the ISMS family of standards. This International Standard is applicable to all types and sizes of organization (e.g. commercial enterprises, government agencies, not-for-profit organizations).
| Committee |
ISO/IEC JTC 1/SC 27
|
| DocumentType |
Standard
|
| Pages |
34
|
| PublisherName |
International Organization for Standardization
|
| Status |
Withdrawn
|
| SupersededBy | |
| Supersedes |
| Standards | Relationship |
| BS EN ISO/IEC 27000:2017 | Identical |
| OVE/ONORM EN ISO/IEC 27000 : NOV 2017 | Identical |
| UNE-EN ISO/IEC 27000:2019 | Identical |
| SAC GB/T 29246 : 2012 | Identical |
| UNE-ISO/IEC 27000:2014 | Identical |
| NF EN ISO/IEC 27000 : 2017 | Identical |
| PN EN ISO/IEC 27000 : 2017 | Identical |
| DIN EN ISO/IEC 27000:2017-10 | Identical |
| NF ISO/IEC 27000 : 2016 | Identical |
| NS EN ISO/IEC 27000 : 2017 | Identical |
| I.S. EN ISO/IEC 27000:2017 | Identical |
| DIN ISO/IEC 27000:2015-12 (Draft) | Identical |
| NEN ISO/IEC 27000 : 2016 | Identical |
| INCITS/ISO/IEC 27000 : 2014 | Identical |
| EN ISO/IEC 27000:2017 | Identical |
| NBN ISO/IEC 27000 : 2016 | Identical |
| GOST R ISO/IEC 27000 : 2012 | Identical |
| NEN EN ISO/IEC 27000 : 2017 | Identical |
| BIS IS/ISO/IEC 27000 : 2009 | Identical |
| CEI UNI EN ISO/IEC 27000 : 2017 | Identical |
| NS ISO/IEC 27000 : 2016 | Identical |
| PN ISO/IEC 27000 : 2014 | Identical |
| I.S. ISO/IEC 27001:2013 | INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - INFORMATION SECURITY MANAGEMENT SYSTEMS - REQUIREMENTS |
| BS ISO/IEC 29134:2017 | Information technology. Security techniques. Guidelines for privacy impact assessment |
| PD CEN/TS 16850:2015 | Societal and Citizen Security. Guidance for managing security in healthcare facilities |
| BS EN ISO/IEC 27041:2016 | Information technology. Security techniques. Guidance on assuring suitability and adequacy of incident investigative method |
| PD ISO/TR 12859:2009 | Intelligent transport systems. System architecture. Privacy aspects in ITS standards and systems |
| 18/30346433 DC : 0 | BS ISO/IEC 19086-4 - INFORMATION TECHNOLOGY - CLOUD COMPUTING SERVICE LEVEL AGREEMENT (SLA) FRAMEWORK - PART 4: SECURITY AND PRIVACY |
| BS ISO/IEC 27037 : 2012 | INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - GUIDELINES FOR IDENTIFICATION, COLLECTION, ACQUISITION, AND PRESERVATION OF DIGITAL EVIDENCE |
| 15/30299331 DC : 0 | BS ISO/IEC 27011 - INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - CODE OF PRACTICE FOR INFORMATION SECURITY CONTROLS BASED ON ISO/IEC 27002 FOR TELECOMMUNICATIONS ORGANIZATIONS |
| 15/30285726 DC : 0 | BS ISO/IEC 27009 - INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - SECTOR-SPECIFIC APPLICATION OF ISO/IEC 27001 - REQUIREMENTS |
| INCITS/ISO/IEC 30111 : 2014 | INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - VULNERABILITY HANDLING PROCESSES |
| 12/30269414 DC : 0 | BS EN 16495 - AIR TRAFFIC MANAGEMENT - INFORMATION SECURITY FOR ORGANISATIONS SUPPORTING CIVIL AVIATION OPERATIONS |
| DIN EN ISO/IEC 27001:2017-06 | Information technology - Security techniques - Information security management systems - Requirements (ISO/IEC 27001:2013 including Cor 1:2014 and Cor 2:2015) |
| PD CEN/TR 16742:2014 | Intelligent transport systems. Privacy aspects in ITS standards and systems in Europe |
| CEI UNI EN ISO/IEC 27041 : 1ED 2017 | INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - GUIDANCE ON ASSURING SUITABILITY AND ADEQUACY OF INCIDENT INVESTIGATIVE METHOD |
| ISO/IEC 38505-1:2017 | Information technology — Governance of IT — Governance of data — Part 1: Application of ISO/IEC 38500 to the governance of data |
| ISO/IEC 20648:2016 | Information technology — TLS specification for storage systems |
| 17/30354834 DC : 0 | BS EN ISO 19011 - GUIDELINES FOR AUDITING MANAGEMENT SYSTEMS |
| 14/30268906 DC : 0 | BS ISO/IEC 17789 - INFORMATION TECHNOLOGY - CLOUD COMPUTING - REFERENCE ARCHITECTURE |
| DIN EN 15224:2016-04 (Draft) | QUALITY MANAGEMENT SYSTEMS - EN ISO 9001:2015 FOR HEALTHCARE |
| PD ISO/IEC TR 90006:2013 | Information technology. Guidelines for the application of ISO 9001:2008 to IT service management and its integration with ISO/IEC 20000-1:2011 |
| 15/30266416 DC : 0 | BS ISO/IEC 27006 - INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - REQUIREMENTS FOR BODIES PROVIDING AUDIT AND CERTIFICATION OF INFORMATION SECURITY MANAGEMENT SYSTEMS |
| BS EN ISO 27789:2013 | Health informatics. Audit trails for electronic health records |
| BS EN ISO/IEC 27037:2016 | Information technology. Security techniques. Guidelines for identification, collection, acquisition and preservation of digital evidence |
| PD CEN/TR 16968:2016 | Electronic Fee Collection. Assessment of security measures for applications using Dedicated Short-Range Communication |
| 12/30249455 DC : 0 | BS ISO/IEC 27036-1 - INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - INFORMATION SECURITY FOR SUPPLIER RELATIONSHIPS - PART 1: OVERVIEW AND CONCEPTS |
| BS EN ISO 19011:2011 | Guidelines for auditing management systems |
| S.R. CEN ISO/TS 14441:2013 | HEALTH INFORMATICS - SECURITY AND PRIVACY REQUIREMENTS OF EHR SYSTEMS FOR USE IN CONFORMITY ASSESSMENT (ISO/TS 14441:2013) |
| ISO/IEC 27004:2016 | Information technology — Security techniques — Information security management — Monitoring, measurement, analysis and evaluation |
| ISO/IEC 27009:2016 | Information technology — Security techniques — Sector-specific application of ISO/IEC 27001 — Requirements |
| ISO/TR 12859:2009 | Intelligent transport systems — System architecture — Privacy aspects in ITS standards and systems |
| BS ISO/IEC 20000-1:2011 | Information technology. Service management Service management system requirements |
| BS EN ISO 12813 : 2015 | ELECTRONIC FEE COLLECTION - COMPLIANCE CHECK COMMUNICATION FOR AUTONOMOUS SYSTEMS |
| PD ISO/IEC/TR 15026-1:2010 | Systems and software engineering. Systems and software assurance Concepts and vocabulary |
| I.S. EN 62734:2015 | INDUSTRIAL NETWORKS - WIRELESS COMMUNICATION NETWORK AND COMMUNICATION PROFILES - ISA 100.11A |
| ISO/IEC TR 27023:2015 | Information technology — Security techniques — Mapping the revised editions of ISO/IEC 27001 and ISO/IEC 27002 |
| ISO/IEC 30111:2013 | Information technology — Security techniques — Vulnerability handling processes |
| ISO/IEC 27033-2:2012 | Information technology — Security techniques — Network security — Part 2: Guidelines for the design and implementation of network security |
| I.S. EN ISO 12813:2015 | ELECTRONIC FEE COLLECTION - COMPLIANCE CHECK COMMUNICATION FOR AUTONOMOUS SYSTEMS (ISO 12813:2015) |
| IEC TR 62351-13:2016 | Power systems management and associated information exchange - Data and communications security - Part 13: Guidelines on security topics to be covered in standards and specifications |
| CEN/TS 16702-2:2015 | Electronic fee collection - Secure monitoring for autonomous toll systems - Part 2: Trusted recorder |
| 14/30249803 DC : 0 | BS ISO/IEC 27040 - INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - STORAGE SECURITY |
| ISO/IEC 27002:2013 | Information technology — Security techniques — Code of practice for information security controls |
| CEN ISO/TS 19299:2015 | Electronic fee collection - Security framework (ISO/TS 19299:2015) |
| EN 15224:2016 | Quality management systems - EN ISO 9001:2015 for healthcare |
| EN 62734:2015 | Industrial networks - Wireless communication network and communication profiles - ISA 100.11a |
| CEN/TS 16850:2015 | Societal and Citizen Security - Guidance for managing security in healthcare facilities |
| DIN ISO/IEC 17789:2017-07 | INFORMATION TECHNOLOGY - CLOUD COMPUTING - REFERENCE ARCHITECTURE (ISO/IEC 17789:2014) |
| NBR ISO/IEC 27002 : 2013 | INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - CODE OF PRACTICE FOR INFORMATION SECURITY CONTROLS |
| NBR ISO/IEC 27031 : 2015 | INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - GUIDELINES FOR INFORMATION AND COMMUNICATION TECHNOLOGY READINESS FOR BUSINESS CONTINUITY |
| INCITS/ISO/IEC 27013 : 2014 | INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - GUIDANCE ON THE INTEGRATED IMPLEMENTATION OF ISO/IEC 27001 AND ISO/IEC 20000-1 |
| 15/30299325 DC : 0 | BS ISO/IEC 27013 - INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - GUIDANCE ON THE INTEGRATED IMPLEMENTATION OF ISO/IEC 27001 AND ISO/IEC 20000-1 |
| DIN ISO/IEC 27001 : 2017 | INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - INFORMATION SECURITY MANAGEMENT SYSTEMS - REQUIREMENTS (ISO/IEC 27001:2013 + COR. 1:2014) |
| INCITS/ISO/IEC 27037 : 2014 | INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - GUIDELINES FOR IDENTIFICATION, COLLECTION, ACQUISITION AND PRESERVATION OF DIGITAL EVIDENCE |
| DIN EN ISO/IEC 27001 E : 2017 | INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - INFORMATION SECURITY MANAGEMENT SYSTEMS - REQUIREMENTS (ISO/IEC 27001:2013 INCLUDING COR 1:2014 AND COR 2:2015) |
| BS ISO/IEC 27034-2:2015 | Information technology. Security techniques. Application security Organization normative framework |
| BS ISO/IEC 27041 : 2015 | INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - GUIDANCE ON ASSURING SUITABILITY AND ADEQUACY OF INCIDENT INVESTIGATIVE METHOD |
| IEEE 1062-1998 | IEEE Recommended Practice for Software Acquisition, 1998 Edition |
| 14/30260166 DC : 0 | BS ISO/IEC 27041 - INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - GUIDANCE ON ASSURING SUITABILITY AND ADEQUACY OF INCIDENT INVESTIGATIVE METHODS |
| 16/30286013 DC : 0 | BS ISO/IEC 27003 - INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - INFORMATION SECURITY MANAGEMENT SYSTEM - GUIDANCE |
| ISO/IEC 15026-1:2013 | Systems and software engineering — Systems and software assurance — Part 1: Concepts and vocabulary |
| BS EN ISO 21091:2013 | Health informatics. Directory services for healthcare providers, subjects of care and other entities |
| EN 50657:2017 | Railways Applications - Rolling stock applications - Software on Board Rolling Stock |
| BS EN ISO 9004:2018 | Quality management. Quality of an organization. Guidance to achieve sustained success |
| S.R. CEN/TS 16702-2:2015 | ELECTRONIC FEE COLLECTION - SECURE MONITORING FOR AUTONOMOUS TOLL SYSTEMS - PART 2: TRUSTED RECORDER |
| PD ISO/IEC TR 27008:2011 | Information technology. Security techniques. Guidelines for auditors on information security controls |
| 15/30268877 DC : 0 | BS ISO/IEC 27035-2 - INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - INFORMATION SECURITY INCIDENT MANAGEMENT - PART 2: GUIDELINES TO PLAN AND PREPARE FOR INCIDENT RESPONSE |
| 11/30204593 DC : DRAFT MAY 2011 | BS ISO/IEC 27010 - INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - INFORMATION SECURITY MANAGEMENT FOR INTER-SECTOR AND INTER-ORGANIZATIONAL COMMUNICATIONS |
| 11/30168516 DC : 0 | BS ISO/IEC 27032 - INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - GUIDELINES FOR CYBERSECURITY |
| PD IEC/TR 62351-10:2012 | Power systems management and associated information exchange. Data and communications security Security architecture guidelines |
| S.R. CWA 16649:2013 | MANAGING EMERGING TECHNOLOGY-RELATED RISKS |
| BS ISO/IEC 27036-1:2014 | Information technology. Security techniques. Information security for supplier relationships Overview and concepts |
| PD ISO/IEC TR 27023:2015 | Information technology. Security techniques. Mapping the revised editions of ISO/IEC 27001 and ISO/IEC 27002 |
| BS ISO/IEC 17789:2014 | Information technology. Cloud computing. Reference architecture |
| 09/30168526 DC : 0 | BS ISO/IEC 27033-1 - INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - NETWORK SECURITY - PART 1: GUIDELINES FOR NETWORK SECURITY |
| BS ISO/IEC 27003:2017 | Information technology. Security techniques. Information security management systems. Guidance |
| 16/30327034 DC : 0 | BS ISO/IEC 27034-7 - INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - APPLICATION SECURITY - PART 7: APPLICATION SECURITY ASSURANCE PREDICTION MODEL |
| 17/30355373 DC : 0 | BS ISO/IEC 27019 - INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - INFORMATION SECURITY CONTROLS FOR THE ENERGY UTILITY INDUSTRY |
| ISO/IEC TR 27008:2011 | Information technology — Security techniques — Guidelines for auditors on information security controls |
| BS ISO/IEC 29151:2017 | Information technology. Security techniques. Code of practice for personally identifiable information protection |
| 18/30331887 DC : 0 | BS ISO/IEC 20889 - INFORMATION TECHNOLOGY- SECURITY TECHNIQUES - PRIVACY ENHANCING DATA DE-IDENTIFICATION TECHNIQUES |
| BS ISO/IEC 27035-2:2016 | Information technology. Security techniques. Information security incident management Guidelines to plan and prepare for incident response |
| BS ISO/IEC 27035-1:2016 | Information technology. Security techniques. Information security incident management Principles of incident management |
| CEI UNI EN ISO/IEC 27001 : 1ED 2017 | INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - INFORMATION SECURITY MANAGEMENT SYSTEMS - REQUIREMENTS |
| CEI UNI EN ISO/IEC 27040 : 1ED 2017 | INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - STORAGE SECURITY |
| CEI UNI ISO/IEC 27001 : 2014 | INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - INFORMATION SECURITY MANAGEMENT SYSTEMS - REQUIREMENTS |
| I.S. EN ISO 21091:2013 | HEALTH INFORMATICS - DIRECTORY SERVICES FOR HEALTHCARE PROVIDERS, SUBJECTS OF CARE AND OTHER ENTITIES (ISO 21091:2013) |
| ISO/IEC 27034-7:2018 | Information technology — Application security — Part 7: Assurance prediction framework |
| ISO 19011:2011 | Guidelines for auditing management systems |
| BS ISO/IEC 27002 : 2013 | INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - CODE OF PRACTICE FOR INFORMATION SECURITY CONTROLS |
| S.R. CEN/TR 16742:2014 | INTELLIGENT TRANSPORT SYSTEMS - PRIVACY ASPECTS IN ITS STANDARDS AND SYSTEMS IN EUROPE |
| I.S. EN ISO/IEC 27043:2016 | INFORMATION TECHNOLOGY - SECURITY TECHNIQUES INCIDENT INVESTIGATION PRINCIPLES AND PROCESSES (ISO/IEC 27043:2015) |
| EN ISO 19011:2011 COR 2011 | GUIDELINES FOR AUDITING MANAGEMENT SYSTEMS (ISO 19011:2011) |
| ABS 0252 : 2016 | DATA INTEGRITY FOR MARINE AND OFFSHORE OPERATIONS - CYBERSAFETY[TM] VOLUME 3 |
| ISO/IEC 27050-3:2017 | Information technology — Security techniques — Electronic discovery — Part 3: Code of practice for electronic discovery |
| DIN EN ISO/IEC 27040:2016-04 (Draft) | INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - STORAGE SECURITY (ISO/IEC 27040:2015) |
| ISO/IEC TR 27016:2014 | Information technology — Security techniques — Information security management — Organizational economics |
| ISO/IEC TS 24748-1:2016 | Systems and software engineering — Life cycle management — Part 1: Guidelines for life cycle management |
| BS ISO/IEC 29147:2014 | Information technology. Security techniques. Vulnerability disclosure |
| ISO/IEC 27005:2011 | Information technology — Security techniques — Information security risk management |
| ISO/IEC 27013:2015 | Information technology — Security techniques — Guidance on the integrated implementation of ISO/IEC 27001 and ISO/IEC 20000-1 |
| ISO/IEC 27043:2015 | Information technology — Security techniques — Incident investigation principles and processes |
| NBR ISO/IEC 27001 : 2013 | INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - INFORMATION SECURITY MANAGEMENT SYSTEMS - REQUIREMENTS |
| ISO/IEC 19941:2017 | Information technology — Cloud computing — Interoperability and portability |
| BS ISO/IEC 20243:2015 | Information Technology. Open Trusted Technology ProviderTM Standard (O-TTPS). Mitigating maliciously tainted and counterfeit products |
| ISO/IEC TR 20000-11:2015 | Information technology — Service management — Part 11: Guidance on the relationship between ISO/IEC 20000-1:2011 and service management frameworks: ITIL® |
| 16/30278511 DC : 0 | BS ISO/IEC 29134 - INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - PRIVACY IMPACT ASSESSMENT - GUIDELINES |
| PD ISO/IEC TR 20000-12:2016 | Information technology. Service management Guidance on the relationship between ISO/IEC 20000-1:2011 and service management frameworks: CMMI-SVC® |
| BS PAS 7000(2014) : 2014 | SUPPLY CHAIN RISK MANAGEMENT - SUPPLIER PREQUALIFICATION |
| BS ISO/IEC 27035:2011 | Information technology. Security techniques. Information security incident management |
| BS ISO 18788:2015 | Management system for private security operations. Requirements with guidance for use |
| DIN EN ISO/IEC 27002 E : 2017 | INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - CODE OF PRACTICE FOR INFORMATION SECURITY CONTROLS (ISO/IEC 27002:2013 INCLUDING COR 1:2014 AND COR 2:2015) |
| 14/30266434 DC : 0 | BS ISO/IEC 17788 - INFORMATION TECHNOLOGY - CLOUD COMPUTING - OVERVIEW AND VOCABULARY |
| PD CEN/TS 16702-2:2015 | Electronic fee collection. Secure monitoring for autonomous toll systems Trusted recorder |
| S.R. CEN/TR 419010:2017 | FRAMEWORK FOR STANDARDIZATION OF SIGNATURES - EXTENDED STRUCTURE INCLUDING ELECTRONIC IDENTIFICATION AND AUTHENTICATION |
| 17/30342692 DC : 0 | BS ISO/IEC 27007 - INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - GUIDELINES FOR INFORMATION SECURITY MANAGEMENT SYSTEMS AUDITING |
| 14/30304350 DC : 0 | BS EN ISO 27799 - HEALTH INFORMATICS - INFORMATION SECURITY MANAGEMENT IN HEALTH USING ISO/IEC 27002 |
| BIP 0139 : 2013 | AN INTRODUCTION TO ISO/IEC 27001:2013 |
| BS ISO/IEC 27043 : 2015 | INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - INCIDENT INVESTIGATION PRINCIPLES AND PROCESSES |
| BS EN ISO/IEC 27002:2017 | Information technology. Security techniques. Code of practice for information security controls |
| BS ISO/IEC 24745:2011 | Information technology. Security techniques. Biometric information protection |
| BS EN 50657:2017 | Railways Applications. Rolling stock applications. Software on Board Rolling Stock |
| BS ISO/IEC 27009:2016 | Information technology. Security techniques. Sector-specific application of ISO/IEC 27001. Requirements |
| BS TICKITPLUS - KICK START GUIDE : 2011 | KICK START GUIDE, TICKITPLUS - SOFTWARE AND IT QUALITY MANAGEMENT AND CERTIFICATION |
| DIN ISO/IEC 17788:2016-04 | INFORMATION TECHNOLOGY - CLOUD COMPUTING - OVERVIEW AND VOCABULARY (ISO/IEC 17788:2014) |
| 17/30333753 DC : 0 | BS EN ISO 19650-1 - ORGANIZATION OF INFORMATION ABOUT CONSTRUCTION WORKS - INFORMATION MANAGEMENT USING BUILDING INFORMATION MODELLING - PART 1: CONCEPTS AND PRINCIPLES |
| 10/30184432 DC : 0 | BS ISO/IEC 27035 - INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - INFORMATION SECURITY INCIDENT MANAGEMENT |
| CEI UNI EN ISO/IEC 27043 : 1ED 2017 | INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - INCIDENT INVESTIGATION PRINCIPLES AND PROCESSES |
| ISO/IEC TR 27015:2012 | Information technology — Security techniques — Information security management guidelines for financial services |
| I.S. EN ISO/IEC 27041:2016 | INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - GUIDANCE ON ASSURING SUITABILITY AND ADEQUACY OF INCIDENT INVESTIGATIVE METHOD (ISO/IEC 27041:2015) |
| BS ISO/IEC 27006:2015 | Information technology. Security techniques. Requirements for bodies providing audit and certification of information security management systems |
| 12/30186137 DC : 0 | BS ISO/IEC 27002 - INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - CODE OF PRACTICE FOR INFORMATION SECURITY CONTROLS |
| 16/30286027 DC : 0 | BS ISO/IEC 27004 - INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - INFORMATION SECURITY MANAGEMENT - MONITORING, MEASUREMENT, ANALYSIS AND EVALUATION |
| 17/30342673 DC : 0 | BS ISO/IEC 27021 - INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - COMPETENCE REQUIREMENTS FOR INFORMATION SECURITY MANAGEMENT SYSTEMS PROFESSIONALS |
| 16/30337310 DC : 0 | BS ISO/IEC 27050-3 - INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - ELECTRONIC DISCOVERY - PART 3: CODE OF PRACTICE FOR ELECTRONIC DISCOVERY |
| ISO/IEC 27031:2011 | Information technology — Security techniques — Guidelines for information and communication technology readiness for business continuity |
| BS ISO/IEC 38505-1:2017 | Information technology. Governance of IT. Governance of data Application of ISO/IEC 38500 to the governance of data |
| BS ISO/IEC 20648:2016 | Information technology. TLS specification for storage systems |
| BS ISO/IEC 27005:2011 | Information technology. Security techniques. Information security risk management |
| PD CEN/TR 419010:2017 | Framework for standardization of signatures. Extended structure including electronic identification and authentication |
| BS ISO/IEC 27032:2012 | Information technology. Security techniques. Guidelines for cybersecurity |
| DIN EN ISO/IEC 27002:2017-06 | Information technology - Security techniques - Code of practice for information security controls (ISO/IEC 27002:2013 including Cor 1:2014 and Cor 2:2015) |
| 14/30213618 DC : 0 | BS ISO/IEC 27034-2 - INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - APPLICATION SECURITY - PART 2: ORGANIZATION NORMATIVE FRAMEWORK |
| CEI UNI EN ISO/IEC 27002 : 1ED 2017 | INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - CODE OF PRACTICE FOR INFORMATION SECURITY CONTROLS |
| ISO/IEC 27021:2017 | Information technology — Security techniques — Competence requirements for information security management systems professionals |
| BIS IS/ISO/IEC 27003 : 2010 | INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - INFORMATION SECURITY MANAGEMENT SYSTEM IMPLEMENTATION GUIDANCE |
| BS EN 62734:2015 | Industrial networks. Wireless communication network and communication profiles. ISA 100.11a |
| ISO/IEC 27018:2014 | Information technology — Security techniques — Code of practice for protection of personally identifiable information (PII) in public clouds acting as PII processors |
| CEI UNI EN ISO/IEC 27037 : 1ED 2017 | INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - GUIDELINES FOR IDENTIFICATION, COLLECTION, ACQUISITION AND PRESERVATION OF DIGITAL EVIDENCE |
| ARINC 842 : 2013 | GUIDANCE FOR USAGE OF DIGITAL CERTIFICATES |
| ISO/IEC TR 29110-5-3:2018 | Systems and software engineering — Lifecycle profiles for Very Small Entities (VSEs) — Part 5-3: Service delivery guidelines |
| IEC TR 62351-10:2012 | Power systems management and associated information exchange - Data and communications security - Part 10: Security architecture guidelines |
| ISO/IEC 27034-3:2018 | Information technology — Application security — Part 3: Application security management process |
| I.S. EN 15224:2016 | QUALITY MANAGEMENT SYSTEMS - EN ISO 9001:2015 FOR HEALTHCARE |
| CEN/TR 16968:2016 | Electronic Fee Collection - Assessment of security measures for applications using Dedicated Short-Range Communication |
| ISO/IEC TR 90006:2013 | Information technology — Guidelines for the application of ISO 9001:2008 to IT service management and its integration with ISO/IEC 20000-1:2011 |
| S.R. CEN ISO/TS 19299:2015 | ELECTRONIC FEE COLLECTION - SECURITY FRAMEWORK (ISO/TS 19299:2015) |
| ISO/IEC TR 20000-10:2015 | Information technology — Service management — Part 10: Concepts and terminology |
| BS EN 16495:2014 | Air Traffic Management. Information security for organisations supporting civil aviation operations |
| CEN/TR 419010:2017 | Framework for standardization of signatures - Extended structure including electronic identification and authentication |
| ISO/IEC TS 33072:2016 | Information technology — Process assessment — Process capability assessment model for information security management |
| ISO/IEC 27035:2011 | Information technology — Security techniques — Information security incident management |
| ISO/IEC 27032:2012 | Information technology — Security techniques — Guidelines for cybersecurity |
| ISO/IEC 27036-1:2014 | Information technology — Security techniques — Information security for supplier relationships — Part 1: Overview and concepts |
| ISO/IEC 27034-2:2015 | Information technology — Security techniques — Application security — Part 2: Organization normative framework |
| ISO 18788:2015 | Management system for private security operations — Requirements with guidance for use |
| ISO 5127:2017 | Information and documentation — Foundation and vocabulary |
| ISO/IEC 27037:2012 | Information technology — Security techniques — Guidelines for identification, collection, acquisition and preservation of digital evidence |
| ISO/TS 19299:2015 | Electronic fee collection — Security framework |
| IEC 62734:2014 | Industrial networks - Wireless communication network and communication profiles - ISA 100.11a |
| EN ISO/IEC 27042:2016 | Information technology - Security techniques - Guidelines for the analysis and interpretation of digital evidence (ISO/IEC 27042:2015) |
| EN ISO 21091:2013 | Health informatics - Directory services for healthcare providers, subjects of care and other entities (ISO 21091:2013) |
| EN ISO/IEC 27043:2016 | Information technology - Security techniques - Incident investigation principles and processes (ISO/IEC 27043:2015) |
| ISO/IEC 27034-1:2011 | Information technology — Security techniques — Application security — Part 1: Overview and concepts |
| ISO/IEC 27003:2017 | Information technology — Security techniques — Information security management systems — Guidance |
| ISO/IEC 27033-6:2016 | Information technology — Security techniques — Network security — Part 6: Securing wireless IP network access |
| PD ISO/TR 37152:2016 | Smart community infrastructures. Common framework for development and operation |
| 16/30287629 DC : 0 | BS ISO/IEC 27050-1 - INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - ELECTRONIC DISCOVERY - PART 1 OVERVIEW AND CONCEPTS |
| BS ISO/IEC 27018:2014 | Information technology. Security techniques. Code of practice for protection of personally identifiable information (PII) in public clouds acting as PII processors |
| BS ISO/IEC 27033-3:2010 | Information technology. Security techniques. Network security Reference networking scenarios. Threats, design techniques and control issues |
| 10/30162769 DC : DRAFT NOV 2010 | BS ISO/IEC 27007 - INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - GUIDELINES FOR INFORMATION SECURITY MANAGEMENT SYSTEMS AUDITING |
| BS ISO/IEC 27017:2015 | Information technology. Security techniques. Code of practice for information security controls based on ISO/IEC 27002 for cloud services |
| INCITS/ISO/IEC 27010 : 2017 | INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - INFORMATION SECURITY MANAGEMENT FOR INTER-SECTOR AND INTER-ORGANIZATIONAL COMMUNICATIONS |
| ISO/IEC TR 38505-2:2018 | Information technology — Governance of IT — Governance of data — Part 2: Implications of ISO/IEC 38505-1 for data management |
| 12/30250175 DC : 0 | BS ISO/IEC 27036-2 - INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - INFORMATION SECURITY FOR SUPPLIER RELATIONSHIPS - PART 2: COMMON REQUIREMENTS |
| 11/30207799 DC : 0 | BS ISO/IEC 27037 - INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - GUIDELINES FOR IDENTIFICATION, COLLECTION, ACQUISITION AND PRESERVATION OF DIGITAL EVIDENCE |
| DIN EN ISO 27789:2013-06 | Health informatics - Audit trails for electronic health records (ISO 27789:2013) |
| 10/30136309 DC : 0 | BS ISO/IEC 24745 - INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - BIOMETRIC INFORMATION PROTECTION |
| BS ISO/IEC 15026-1:2013 | Systems and software engineering. Systems and software assurance Concepts and vocabulary |
| 14/30255584 DC : 0 | BS ISO 5127 - INFORMATION AND DOCUMENTATION - FOUNDATION AND VOCABULARY |
| INCITS/ISO/IEC 27002 : 2014 | INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - CODE OF PRACTICE FOR INFORMATION SECURITY CONTROLS |
| BIP 0071 : 2014 | GUIDELINES ON REQUIREMENTS AND PREPARATION FOR ISMS CERTIFICATION BASED ON ISO/IEC 27001 |
| BS ISO/IEC 27007:2017 | Information technology. Security techniques. Guidelines for information security management systems auditing |
| BS ISO/IEC 27010:2015 | Information technology. Security techniques. Information security management for inter-sector and inter-organizational communications |
| 12/30192064 DC : 0 | BS ISO/IEC 27001 - INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - INFORMATION SECURITY MANAGEMENT SYSTEM - REQUIREMENTS |
| BS ISO 5127:2017 | Information and documentation. Foundation and vocabulary |
| BS ISO/IEC 17788:2014 | Information technology. Cloud computing. Overview and vocabulary |
| 13/30268559 DC : 0 | BS ISO/IEC 15026-1 - SYSTEMS AND SOFTWARE ENGINEERING - SYSTEMS AND SOFTWARE ASSURANCE - PART 1: CONCEPTS AND VOCABULARY |
| BS EN ISO/IEC 27001:2017 | Information technology. Security techniques. Information security management systems. Requirements |
| 17/30349211 DC : 0 | BS ISO/IEC 29147 - INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - VULNERABILITY DISCLOSURE |
| ISO/IEC 27036-3:2013 | Information technology — Security techniques — Information security for supplier relationships — Part 3: Guidelines for information and communication technology supply chain security |
| DIN ISO/IEC 17789:2016-10 (Draft) | INFORMATION TECHNOLOGY - CLOUD COMPUTING - REFERENCE ARCHITECTURE (ISO/IEC 17789:2014) |
| BS ISO/IEC 19941:2017 | Information technology. Cloud computing. Interoperability and portability |
| DIN CEN ISO/TS 19299;DIN SPEC 74125:2016-02 | ELECTRONIC FEE COLLECTION - SECURITY FRAMEWORK (ISO/TS 19299:2015) |
| ISO/IEC 27017:2015 | Information technology — Security techniques — Code of practice for information security controls based on ISO/IEC 27002 for cloud services |
| ISO/IEC 20243:2015 | Information Technology — Open Trusted Technology ProviderTM Standard (O-TTPS) — Mitigating maliciously tainted and counterfeit products |
| BS EN ISO/IEC 27043:2016 | Information technology. Security techniques. Incident investigation principles and processes |
| 15/30321754 DC : 0 | BS ISO/IEC 20648 - INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - TLS SPECIFICATION FOR STORAGE SYSTEMS |
| PD CEN ISO/TS 19299:2015 | Electronic fee collection. Security framework |
| BS ISO/IEC 27031:2011 | Information technology. Security techniques. Guidelines for information and communication technology readiness for business continuity |
| PD ISO/IEC TS 24748-6:2016 | Systems and software engineering. Life cycle management System integration engineering |
| BS ISO/IEC 27042 : 2015 | INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - GUIDELINES FOR THE ANALYSIS AND INTERPRETATION OF DIGITAL EVIDENCE |
| 15/30320354 DC : 0 | BS ISO/IEC 27010 - INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - INFORMATION SECURITY MANAGEMENT FOR INTER-SECTOR AND INTER-ORGANIZATIONAL COMMUNICATIONS |
| 13/30266767 DC : 0 | BS ISO/IEC 27018 - INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - CODE OF PRACTICE FOR P2 PROTECTION IN PUBLIC CLOUD ACTING AS P2 PROCESSORS |
| ISO/IEC TR 20547-2:2018 | Information technology — Big data reference architecture — Part 2: Use cases and derived requirements |
| BS EN ISO 27799:2008 | Health informatics. Information security management in health using ISO/IEC 27002 |
| 17/30329617 DC : 0 | BS ISO/IEC 29110-4-3 - SYSTEMS AND SOFTWARE ENGINEERING - LIFECYCLE PROFILES FOR VERY SMALL ENTITIES (VSES) - PART 4-3: SERVICE DELIVERY - PROFILE SPECIFICATION |
| BIS IS/ISO 19011 : 2011(R2016) | GUIDELINES FOR AUDITING MANAGEMENT SYSTEMS |
| 08/30134763 DC : DRAFT JUNE 2008 | BS ISO/IEC 27004 - INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - INFORMATION SECURITY MANAGEMENT - MEASUREMENT |
| 12/30209825 DC : 0 | BS ISO/IEC 27014 - INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - GOVERNANCE OF INFORMATION SECURITY |
| BIS IS/ISO/IEC 27004 : 2009 | INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - INFORMATION SECURITY MANAGEMENT - MEASUREMENT |
| INCITS/ISO/IEC 27033-2 : 2014 | INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - NETWORK SECURITY - PART 2: GUIDELINES FOR THE DESIGN AND IMPLEMENTATION OF NETWORK SECURITY |
| ISO/IEC TS 24748-6:2016 | Systems and software engineering — Life cycle management — Part 6: System integration engineering |
| INCITS/ISO/IEC 27041 : 2017 | INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - GUIDANCE ON ASSURING SUITABILITY AND ADEQUACY OF INCIDENT INVESTIGATIVE METHOD |
| ISO/IEC 29134:2017 | Information technology — Security techniques — Guidelines for privacy impact assessment |
| 16/30334735 DC : 0 | BS EN 15224 - HEALTH CARE SERVICES - QUALITY MANAGEMENT SYSTEMS - REQUIREMENTS BASED ON EN ISO 9001:2015 |
| 15/30267674 DC : 0 | BS ISO/IEC 27035-1 - INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - INFORMATION SECURITY INCIDENT MANAGEMENT - PART 1: PRINCIPLES OF INCIDENT MANAGEMENT |
| ISO/IEC 27035-2:2016 | Information technology — Security techniques — Information security incident management — Part 2: Guidelines to plan and prepare for incident response |
| I.S. EN ISO/IEC 27001:2017 | INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - INFORMATION SECURITY MANAGEMENT SYSTEMS - REQUIREMENTS (ISO/IEC 27001:2013 INCLUDING COR 1:2014 AND COR 2:2015) |
| S.R. CEN/TR 16968:2016 | ELECTRONIC FEE COLLECTION - ASSESSMENT OF SECURITY MEASURES FOR APPLICATIONS USING DEDICATED SHORT-RANGE COMMUNICATION |
| ETSI GS ISI 001-2 V1.1.2 (2015-06) | Information Security Indicators (ISI); Indicators (INC); Part 2: Guide to select operational indicators based on the full set given in part 1 |
| I.S. EN ISO/IEC 27037:2016 | INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - GUIDELINES FOR IDENTIFICATION, COLLECTION, ACQUISITION AND PRESERVATION OF DIGITAL EVIDENCE (ISO/IEC 27037:2012) |
| I.S. EN ISO/IEC 27042:2016 | INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - GUIDELINES FOR THE ANALYSIS AND INTERPRETATION OF DIGITAL EVIDENCE (ISO/IEC 27042:2015) |
| PREN 15224 : DRAFT 2016 | HEALTH CARE SERVICES - QUALITY MANAGEMENT SYSTEMS - REQUIREMENTS BASED ON EN ISO 9001:2015 |
| I.S. EN ISO/IEC 27002:2017 | INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - CODE OF PRACTICE FOR INFORMATION SECURITY CONTROLS (ISO/IEC 27002:2013 INCLUDING COR 1:2014 AND COR 2:2015) |
| ISO/IEC 30100-2:2016 | Information technology — Home network resource management — Part 2: Architecture |
| I.S. ISO/IEC 27002:2013 | INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - CODE OF PRACTICE FOR INFORMATION SECURITY CONTROLS |
| ISO 30300:2011 | Information and documentation — Management systems for records — Fundamentals and vocabulary |
| ISO/IEC 27050-1:2016 | Information technology — Security techniques — Electronic discovery — Part 1: Overview and concepts |
| CEI UNI ISO/IEC 27002 : 2014 | INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - CODE OF PRACTICE FOR INFORMATION SECURITY CONTROLS |
| CEI UNI EN ISO/IEC 27042 : 1ED 2017 | INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - GUIDELINES FOR THE ANALYSIS AND INTERPRETATION OF DIGITAL EVIDENCE |
| EN ISO 9004:2018 | Quality management - Quality of an organization - Guidance to achieve sustained success (ISO 9004:2018) |
| ISO/IEC TR 15026-1:2010 | Systems and software engineering — Systems and software assurance — Part 1: Concepts and vocabulary |
| ISO/IEC 27010:2015 | Information technology — Security techniques — Information security management for inter-sector and inter-organizational communications |
| ISO/IEC 29147:2014 | Information technology — Security techniques — Vulnerability disclosure |
| ISO/IEC 27033-3:2010 | Information technology — Security techniques — Network security — Part 3: Reference networking scenarios — Threats, design techniques and control issues |
| ISO/IEC 27011:2016 | Information technology — Security techniques — Code of practice for Information security controls based on ISO/IEC 27002 for telecommunications organizations |
| ISO/IEC 27041:2015 | Information technology — Security techniques — Guidance on assuring suitability and adequacy of incident investigative method |
| ISO 12813:2015 | Electronic fee collection — Compliance check communication for autonomous systems |
| ISO 21091:2013 | Health informatics — Directory services for healthcare providers, subjects of care and other entities |
| BS ISO/IEC 27040 : 2015 | INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - STORAGE SECURITY |
| BS EN ISO/IEC 27040:2016 | Information technology. Security techniques. Storage security |
| ISO/IEC 27040:2015 | Information technology — Security techniques — Storage security |
| ISO/IEC 27042:2015 | Information technology — Security techniques — Guidelines for the analysis and interpretation of digital evidence |
| ISO/TS 14441:2013 | Health informatics — Security and privacy requirements of EHR systems for use in conformity assessment |
| ISO/IEC 27001:2013 | Information technology — Security techniques — Information security management systems — Requirements |
| EN ISO/IEC 27002:2017 | Information technology - Security techniques - Code of practice for information security controls (ISO/IEC 27002:2013 including Cor 1:2014 and Cor 2:2015) |
| EN ISO/IEC 27040:2016 | Information technology - Security techniques - Storage security (ISO/IEC 27040:2015) |
| EN ISO 27799:2016 | Health informatics - Information security management in health using ISO/IEC 27002 (ISO 27799:2016) |
| EN ISO/IEC 27001:2017 | Information technology - Security techniques - Information security management systems - Requirements (ISO/IEC 27001:2013 including Cor 1:2014 and Cor 2:2015) |
| EN ISO/IEC 27041:2016 | Information technology - Security techniques - Guidance on assuring suitability and adequacy of incident investigative method (ISO/IEC 27041:2015) |
| EN ISO/IEC 27037:2016 | Information technology - Security techniques - Guidelines for identification, collection, acquisition and preservation of digital evidence (ISO/IEC 27037:2012) |
| EN 16495:2014 | Air Traffic Management - Information security for organisations supporting civil aviation operations |
| I.S. EN ISO 19011:2011 | GUIDELINES FOR AUDITING MANAGEMENT SYSTEMS (ISO 19011:2011) |
| 17/30355188 DC : 0 | BS ISO/IEC 24748-1 - SYSTEMS AND SOFTWARE ENGINEERING - LIFE CYCLE MANAGEMENT - PART 1: GUIDELINES FOR LIFE CYCLE MANAGEMENT |
| BS ISO/IEC 27014:2013 | Information technology. Security techniques. Governance of information security |
| BS EN 15224:2016 | Quality management systems. EN ISO 9001:2015 for healthcare |
| BS ISO/IEC 27036-2:2014 | Information technology. Security techniques. Information security for supplier relationships Requirements |
| 12/30249606 DC : 0 | BS EN 62645 ED 1.0 - NUCLEAR POWER PLANTS - INSTRUMENTATION AND CONTROL SYSTEMS - REQUIREMENT S FOR SECURITY PROGRAMMES FOR COMPUTER-BASED SYSTEMS |
| BS ISO/IEC 27036-3:2013 | Information technology. Security techniques. Information security for supplier relationships Guidelines for information and communication technology supply chain security |
| 14/30315737 DC : 0 | PD ISO/IEC/PAS 20243 - OPEN TRUSTED TECHNOLOGY PROVIDER STANDARD (O-TTPS) - MITIGATING MALICIOUSLY TAINTED AND COUNTERFEIT PRODUCTS |
| BS EN ISO/IEC 27042:2016 | Information technology. Security techniques. Guidelines for the analysis and interpretation of digital evidence |
| INCITS/ISO/IEC 24745 : 2012(R2017) | INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - BIOMETRIC INFORMATION PROTECTION |
| 18/30358588 DC : 0 | BS EN ISO 29001 - PETROLEUM, PETROCHEMICAL AND NATURAL GAS INDUSTRIES - SECTOR-SPECIFIC QUALITY MANAGEMENT SYSTEMS - REQUIREMENTS FOR PRODUCT AND SERVICE SUPPLY ORGANIZATIONS |
| BS ISO/IEC 27050-3:2017 | Information technology. Security techniques. Electronic discovery Code of practice for electronic discovery |
| I.S. EN ISO 27789:2013 | HEALTH INFORMATICS - AUDIT TRAILS FOR ELECTRONIC HEALTH RECORDS (ISO 27789:2013) |
| I.S. EN 50657:2017 | RAILWAYS APPLICATIONS - ROLLING STOCK APPLICATIONS - SOFTWARE ON BOARD ROLLING STOCK |
| PD ISO/IEC TR 20000-11:2015 | Information technology. Service management Guidance on the relationship between ISO/IEC 20000-1:2011 and service management frameworks: ITIL® |
| BS ISO/IEC 20243-1:2018 | Information technology. Open Trusted Technology Provider<sup>TM</sup> Standard (O-TTPS). Mitigating maliciously tainted and counterfeit products Requirements and recommendations |
| 16/30338037 DC : 0 | BS ISO/IEC 30754 - INFORMATION TECHNOLOGY - SOFTWARE TRUSTWORTHINESS - GOVERNANCE AND MANAGEMENT - SPECIFICATION |
| BS ISO 30300:2011 | Information and documentation. Management systems for records. Fundamentals and vocabulary |
| ISO/IEC/IEEE 12207:2017 | Systems and software engineering — Software life cycle processes |
| ISO/IEC 27035-1:2016 | Information technology — Security techniques — Information security incident management — Part 1: Principles of incident management |
| BS ISO/IEC 27033-6:2016 | Information technology. Security techniques. Network security Securing wireless IP network access |
| CEI UNI ISO/IEC 20000-1 : 2012 | INFORMATION TECHNOLOGY - SERVICE MANAGEMENT - PART 1: SERVICE MANAGEMENT SYSTEM REQUIREMENTS |
| PD ISO/IEC TS 24748-1:2016 | Systems and software engineering. Life cycle management Guidelines for life cycle management |
| BS ISO/IEC 27033-2:2012 | Information technology. Security techniques. Network security Guidelines for the design and implementation of network security |
| 15/30259619 DC : 0 | BS ISO/IEC 27017 - INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - CODE OF PRACTICE FOR INFORMATION SECURITY CONTROLS BASED ON ISO/IEC 27002 FOR CLOUD SERVICES |
| BS ISO/IEC 27001 : 2013 | INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - INFORMATION SECURITY MANAGEMENT SYSTEMS - REQUIREMENTS |
| PD ISO/IEC TS 33072:2016 | Information technology. Process assessment. Process capability assessment model for information security management |
| ISO/IEC 17788:2014 | Information technology — Cloud computing — Overview and vocabulary |
| ISO/IEC TR 20000-12:2016 | Information technology — Service management — Part 12: Guidance on the relationship between ISO/IEC 20000-1:2011 and service management frameworks: CMMI-SVC |
| ISO/IEC 20243-1:2018 | Information technology — Open Trusted Technology ProviderTM Standard (O-TTPS) — Mitigating maliciously tainted and counterfeit products — Part 1: Requirements and recommendations |
| DIN ISO/IEC 27018:2017-08 | INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - CODE OF PRACTICE FOR PROTECTION OF PERSONALLY IDENTIFIABLE INFORMATION (PII) IN PUBLIC CLOUDS ACTING AS PII PROCESSORS (ISO/IEC 27018:2014) |
| PD ISO/IEC TR 20000-10:2015 | Information technology. Service management Concepts and terminology |
| 16/30333228 DC : 0 | BS ISO/IEC 38505-1 - INFORMATION TECHNOLOGY - GOVERNANCE OF IT - PART 1: THE APPLICATION OF ISO/IEC 38500 TO THE GOVERNANCE OF DATA |
| PD CEN ISO/TS 14441:2013 | Health informatics. Security and privacy requirements of EHR systems for use in conformity assessment |
| 13/30260172 DC : 0 | BS ISO/IEC 27043 - INVESTIGATION TECHNOLOGY - SECURITY TECHNIQUES - INCIDENT INVESTIGATION PRINCIPLES AND PROCESSES |
| INCITS/ISO/IEC 27043 : 2017 | INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - INCIDENT INVESTIGATION PRINCIPLES AND PROCESSES |
| 11/30207802 DC : 0 | BS ISO/IEC 27013 - INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - GUIDELINES ON THE INTEGRATED IMPLEMENTATION OF ISO/IEC 27001 AND ISO/IEC 20000-1 |
| BS ISO/IEC 27034-1:2011 | Information technology. Security techniques. Application security Overview and concepts |
| BS ISO/IEC 27021:2017 | Information technology. Security techniques. Competence requirements for information security management systems professionals |
| BS ISO/IEC 27013:2015 | Information technology. Security techniques. Guidance on the integrated implementation of ISO/IEC 27001 and ISO/IEC 20000-1 |
| PD CEN/TS 16439:2013 | Electronic fee collection. Security framework |
| PD ISO/IEC TR 27016:2014 | Information technology. Security techniques. Information security management. Organizational economics |
| 14/30260169 DC : 0 | BS ISO/IEC 27042 - INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - GUIDELINES FOR THE ANALYSIS AND INTERPRETATION OF DIGITAL EVIDENCE |
| BS ISO/IEC 27004:2016 | Information technology. Security techniques. Information security management. Monitoring, measurement, analysis and evaluation |
| BS ISO/IEC 30111:2013 | Information technology. Security techniques. Vulnerability handling processes |
| ISO/IEC 27007:2017 | Information technology — Security techniques — Guidelines for information security management systems auditing |
| I.S. EN 16495:2014 | AIR TRAFFIC MANAGEMENT - INFORMATION SECURITY FOR ORGANISATIONS SUPPORTING CIVIL AVIATION OPERATIONS |
| IEEE/ISO/IEC 15026-1-2014 | IEEE Standard Adoption of ISO/IEC 15026-1--Systems and Software Engineering--Systems and Software Assurance--Part 1: Concepts and Vocabulary |
| I.S. EN ISO 9004:2009 | QUALITY MANAGEMENT - QUALITY OF AN ORGANIZATION - GUIDANCE TO ACHIEVE SUSTAINED SUCCESS (ISO 9004:2018) |
| ISO/IEC 29151:2017 | Information technology — Security techniques — Code of practice for personally identifiable information protection |
| ISO 9004:2018 | Quality management — Quality of an organization — Guidance to achieve sustained success |
| S.R. CEN/TS 16850:2015 | SOCIETAL AND CITIZEN SECURITY - GUIDANCE FOR MANAGING SECURITY IN HEALTHCARE FACILITIES |
| I.S. EN ISO/IEC 27040:2016 | INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - STORAGE SECURITY (ISO/IEC 27040:2015) |
| S.R. CEN/TS 16439:2013 | ELECTRONIC FEE COLLECTION - SECURITY FRAMEWORK |
| INCITS/ISO/IEC 27001 : 2014 | INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - INFORMATION SECURITY MANAGEMENT SYSTEMS - REQUIREMENTS |
| ISO/TS 17582:2014 | Quality management systems — Particular requirements for the application of ISO 9001:2008 for electoral organizations at all levels of government |
| ISO/IEC 27014:2013 | Information technology — Security techniques — Governance of information security |
| ISO/IEC 27036-2:2014 | Information technology — Security techniques — Information security for supplier relationships — Part 2: Requirements |
| ISO/IEC 27006:2015 | Information technology — Security techniques — Requirements for bodies providing audit and certification of information security management systems |
| ISO/IEC 17789:2014 | Information technology — Cloud computing — Reference architecture |
| ISO/IEC 24745:2011 | Information technology — Security techniques — Biometric information protection |
| ISO/TS 13131:2014 | Health informatics — Telehealth services — Quality planning guidelines |
| ISO 27789:2013 | Health informatics — Audit trails for electronic health records |
| ISO/IEC 20000-1:2011 | Information technology — Service management — Part 1: Service management system requirements |
| DIN EN 15224:2017-05 | QUALITY MANAGEMENT SYSTEMS - EN ISO 9001:2015 FOR HEALTHCARE |
| EN ISO 27789:2013 | Health informatics - Audit trails for electronic health records (ISO 27789:2013) |
| CEN/TS 16439:2013 | Electronic fee collection - Security framework |
| CEN/TR 16742:2014 | Intelligent transport systems - Privacy aspects in ITS standards and systems in Europe |
| IEEE/ISO/IEC 15288-2023 | ISO/IEC/IEEE International Standard - Systems and software engineering--System life cycle processes |
| UNE-ISO 30300:2011 | Information and documentation. Management system for records. Fundamentals and vocabulary . |
| UNE-EN 15224:2017 | Quality management systems - EN ISO 9001:2015 for healthcare |
| UNE-ISO/IEC 27002:2015 | Information technology -- Security techniques -- Code of practice for information security controls |
| UNE-ISO/IEC 20000-1:2011 | Information technology. Service management. Part 1: Service Management System requirements |
| UNE-EN ISO/IEC 27001:2017 | Information technology - Security techniques - Information security management systems - Requirements (ISO/IEC 27001:2013 including Cor 1:2014 and Cor 2:2015) |
| UNE-EN ISO 19011:2012 | Guidelines for auditing management systems (ISO 19011:2011) |
| UNE-EN ISO/IEC 27002:2017 | Information technology - Security techniques - Code of practice for information security controls (ISO/IEC 27002:2013 including Cor 1:2014 and Cor 2:2015) |
| UNE-ISO/IEC 27001:2014 | Information technology -- Security techniques -- Information security management systems -- Requirements |
| INCITS/ISO/IEC 27004:2016(2019) | Information technology — Security techniques — Information security management — Monitoring, measurement, analysis and evaluation<br> |
| NBR ISO/IEC 27032 : 2015 | INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - GUIDELINES FOR CYBERSECURITY |
| SA/SNZ TR ISO 21965:2020 | Information and documentation - Records management in enterprise architecture |
| AS ISO/IEC/IEEE 12207:2019 | Systems and software engineering - Software life cycle processes |
Access your standards online with a subscription
-
Simple online access to standards, technical information and regulations.
-
Critical updates of standards and customisable alerts and notifications.
-
Multi-user online standards collection: secure, flexible and cost effective.