I.S. ISO/IEC 27001:2013
|
INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - INFORMATION SECURITY MANAGEMENT SYSTEMS - REQUIREMENTS |
BS ISO/IEC 29134:2017
|
Information technology. Security techniques. Guidelines for privacy impact assessment |
PD CEN/TS 16850:2015
|
Societal and Citizen Security. Guidance for managing security in healthcare facilities |
BS EN ISO/IEC 27041:2016
|
INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - GUIDANCE ON ASSURING SUITABILITY AND ADEQUACY OF INCIDENT INVESTIGATIVE METHOD (ISO/IEC 27041:2015) |
PD ISO/TR 12859:2009
|
INTELLIGENT TRANSPORT SYSTEMS - SYSTEM ARCHITECTURE - PRIVACY ASPECTS IN ITS STANDARDS AND SYSTEMS |
18/30346433 DC : 0
|
BS ISO/IEC 19086-4 - INFORMATION TECHNOLOGY - CLOUD COMPUTING SERVICE LEVEL AGREEMENT (SLA) FRAMEWORK - PART 4: SECURITY AND PRIVACY |
BS ISO/IEC 27037 : 2012
|
INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - GUIDELINES FOR IDENTIFICATION, COLLECTION, ACQUISITION, AND PRESERVATION OF DIGITAL EVIDENCE |
15/30299331 DC : 0
|
BS ISO/IEC 27011 - INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - CODE OF PRACTICE FOR INFORMATION SECURITY CONTROLS BASED ON ISO/IEC 27002 FOR TELECOMMUNICATIONS ORGANIZATIONS |
15/30285726 DC : 0
|
BS ISO/IEC 27009 - INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - SECTOR-SPECIFIC APPLICATION OF ISO/IEC 27001 - REQUIREMENTS |
INCITS/ISO/IEC 30111 : 2014
|
INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - VULNERABILITY HANDLING PROCESSES |
12/30269414 DC : 0
|
BS EN 16495 - AIR TRAFFIC MANAGEMENT - INFORMATION SECURITY FOR ORGANISATIONS SUPPORTING CIVIL AVIATION OPERATIONS |
DIN EN ISO/IEC 27001:2017-06
|
INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - INFORMATION SECURITY MANAGEMENT SYSTEMS - REQUIREMENTS (ISO/IEC 27001:2013 INCLUDING COR 1:2014 AND COR 2:2015) |
PD CEN/TR 16742:2014
|
Intelligent transport systems. Privacy aspects in ITS standards and systems in Europe |
CEI UNI EN ISO/IEC 27041 : 1ED 2017
|
INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - GUIDANCE ON ASSURING SUITABILITY AND ADEQUACY OF INCIDENT INVESTIGATIVE METHOD |
ISO/IEC 38505-1:2017
|
Information technology — Governance of IT — Governance of data — Part 1: Application of ISO/IEC 38500 to the governance of data |
CSA ISO/IEC 27050-1 : 2018
|
INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - ELECTRONIC DISCOVERY - PART 1: OVERVIEW AND CONCEPTS |
ISO/IEC 20648:2016
|
Information technology — TLS specification for storage systems |
17/30354834 DC : 0
|
BS EN ISO 19011 - GUIDELINES FOR AUDITING MANAGEMENT SYSTEMS |
14/30268906 DC : 0
|
BS ISO/IEC 17789 - INFORMATION TECHNOLOGY - CLOUD COMPUTING - REFERENCE ARCHITECTURE |
DIN EN 15224:2016-04 (Draft)
|
QUALITY MANAGEMENT SYSTEMS - EN ISO 9001:2015 FOR HEALTHCARE |
PD ISO/IEC TR 90006:2013
|
Information technology. Guidelines for the application of ISO 9001:2008 to IT service management and its integration with ISO/IEC 20000-1:2011 |
CAN/CSA-ISO/IEC 27034-1:12 (R2017)
|
Information technology - Security techniques - Application security - Part 1: Overview and concepts (Adopted ISO/IEC 27034-1:2011, first edition, 2011-11-15) |
15/30266416 DC : 0
|
BS ISO/IEC 27006 - INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - REQUIREMENTS FOR BODIES PROVIDING AUDIT AND CERTIFICATION OF INFORMATION SECURITY MANAGEMENT SYSTEMS |
BS EN ISO 27789:2013
|
HEALTH INFORMATICS - AUDIT TRAILS FOR ELECTRONIC HEALTH RECORDS (ISO 27789:2013) |
BS EN ISO/IEC 27037:2016
|
Information technology. Security techniques. Guidelines for identification, collection, acquisition and preservation of digital evidence |
PD CEN/TR 16968:2016
|
ELECTRONIC FEE COLLECTION - ASSESSMENT OF SECURITY MEASURES FOR APPLICATIONS USING DEDICATED SHORT-RANGE COMMUNICATION |
12/30249455 DC : 0
|
BS ISO/IEC 27036-1 - INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - INFORMATION SECURITY FOR SUPPLIER RELATIONSHIPS - PART 1: OVERVIEW AND CONCEPTS |
CAN/CSA-ISO/IEC 27031:13 (R2017)
|
Information technology - Security techniques - Guidelines for information and communication technology readiness for business continuity (Adopted ISO/IEC 27031:2011, first edition, 2011-03-01) |
CSA TELECOM ORGANIZATIONS PACKAGE : 2018
|
CONSISTS OF CAN/CSA-ISO/IEC 27000:18 - INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - INFORMATION SECURITY MANAGEMENT SYSTEMS - OVERVIEW AND VOCABULARY; CAN/CSA-ISO/IEC 27001:14, INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - INFORMATION SECURITY MANAGEMENT SYSTEMS - REQUIREMENTS; CAN/CSA-ISO/IEC 27002:15 - INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - CODE OF PRACTICE FOR |
CSA ISO/IEC 27034-1:2012
|
INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - APPLICATION SECURITY - PART 1: OVERVIEW AND CONCEPTS |
CSA ISO/IEC 20000-1 :2013
|
INFORMATION TECHNOLOGY - SERVICE MANAGEMENT - PART 1: SERVICE MANAGEMENT SYSTEM REQUIREMENTS |
BS EN ISO 19011:2011
|
Guidelines for auditing management systems |
CSA ISO/IEC 27035 : 2013 : R2017
|
INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - INFORMATION SECURITY INCIDENT MANAGEMENT |
S.R. CEN ISO/TS 14441:2013
|
HEALTH INFORMATICS - SECURITY AND PRIVACY REQUIREMENTS OF EHR SYSTEMS FOR USE IN CONFORMITY ASSESSMENT (ISO/TS 14441:2013) |
CSA ISO/IEC TR 27008 : 2013 : R2017
|
INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - GUIDELINES FOR AUDITORS ON INFORMATION SECURITY CONTROLS |
ISO/IEC 27004:2016
|
Information technology — Security techniques — Information security management — Monitoring, measurement, analysis and evaluation |
ISO/IEC 27009:2016
|
Information technology Security techniques Sector-specific application of ISO/IEC 27001 Requirements |
ISO/TR 12859:2009
|
Intelligent transport systems System architecture Privacy aspects in ITS standards and systems |
BS ISO/IEC 20000-1:2011
|
Information technology. Service management Service management system requirements |
UNE-ISO/IEC 20000-1:2011
|
Information technology. Service management. Part 1: Service Management System requirements |
BS EN ISO 12813 : 2015
|
ELECTRONIC FEE COLLECTION - COMPLIANCE CHECK COMMUNICATION FOR AUTONOMOUS SYSTEMS |
PD ISO/IEC/TR 15026-1:2010
|
Systems and software engineering. Systems and software assurance Concepts and vocabulary |
I.S. EN 62734:2015
|
INDUSTRIAL NETWORKS - WIRELESS COMMUNICATION NETWORK AND COMMUNICATION PROFILES - ISA 100.11A |
ISO/IEC TR 27023:2015
|
Information technology — Security techniques — Mapping the revised editions of ISO/IEC 27001 and ISO/IEC 27002 |
ISO/IEC 30111:2013
|
Information technology Security techniques Vulnerability handling processes |
ISO/IEC 27033-2:2012
|
Information technology — Security techniques — Network security — Part 2: Guidelines for the design and implementation of network security |
I.S. EN ISO 12813:2015
|
ELECTRONIC FEE COLLECTION - COMPLIANCE CHECK COMMUNICATION FOR AUTONOMOUS SYSTEMS (ISO 12813:2015) |
UNI EN ISO 19011 : 2012
|
GUIDELINES FOR AUDITING MANAGEMENT SYSTEMS |
UNE-EN 15224:2017
|
Quality management systems - EN ISO 9001:2015 for healthcare |
IEC TR 62351-13:2016
|
Power systems management and associated information exchange - Data and communications security - Part 13: Guidelines on security topics to be covered in standards and specifications |
CEN/TS 16702-2:2015
|
Electronic fee collection - Secure monitoring for autonomous toll systems - Part 2: Trusted recorder |
14/30249803 DC : 0
|
BS ISO/IEC 27040 - INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - STORAGE SECURITY |
ISO/IEC 27002:2013
|
Information technology Security techniques Code of practice for information security controls |
CEN ISO/TS 19299 : 2015
|
ELECTRONIC FEE COLLECTION - SECURITY FRAMEWORK (ISO/TS 19299:2015) |
EN 15224:2016
|
Quality management systems - EN ISO 9001:2015 for healthcare |
EN 62734:2015
|
Industrial networks - Wireless communication network and communication profiles - ISA 100.11a |
CEN/TS 16850:2015
|
Societal and Citizen Security - Guidance for managing security in healthcare facilities |
DIN ISO/IEC 17789:2017-07
|
INFORMATION TECHNOLOGY - CLOUD COMPUTING - REFERENCE ARCHITECTURE (ISO/IEC 17789:2014) |
NBR ISO/IEC 27002 : 2013
|
INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - CODE OF PRACTICE FOR INFORMATION SECURITY CONTROLS |
NBR ISO/IEC 27031 : 2015
|
INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - GUIDELINES FOR INFORMATION AND COMMUNICATION TECHNOLOGY READINESS FOR BUSINESS CONTINUITY |
INCITS/ISO/IEC 27013 : 2014
|
INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - GUIDANCE ON THE INTEGRATED IMPLEMENTATION OF ISO/IEC 27001 AND ISO/IEC 20000-1 |
15/30299325 DC : 0
|
BS ISO/IEC 27013 - INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - GUIDANCE ON THE INTEGRATED IMPLEMENTATION OF ISO/IEC 27001 AND ISO/IEC 20000-1 |
TS 103 337 : 1.1.1
|
SATELLITE EARTH STATIONS AND SYSTEMS (SES); SATELLITE EMERGENCY COMMUNICATIONS; MULTIPLE ALERT MESSAGE ENCAPSULATION OVER SATELLITE (MAMES) |
DIN ISO/IEC 27001 : 2017
|
INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - INFORMATION SECURITY MANAGEMENT SYSTEMS - REQUIREMENTS (ISO/IEC 27001:2013 + COR. 1:2014) |
INCITS/ISO/IEC 27037 : 2014
|
INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - GUIDELINES FOR IDENTIFICATION, COLLECTION, ACQUISITION AND PRESERVATION OF DIGITAL EVIDENCE |
DIN EN ISO/IEC 27001 E : 2017
|
INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - INFORMATION SECURITY MANAGEMENT SYSTEMS - REQUIREMENTS (ISO/IEC 27001:2013 INCLUDING COR 1:2014 AND COR 2:2015) |
CSA ISO/IEC 27018 : 2015
|
INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - CODE OF PRACTICE FOR PROTECTION OF PERSONALLY IDENTIFIABLE INFORMATION (PII) IN PUBLIC CLOUDS ACTING AS PII PROCESSORS |
BS ISO/IEC 27034-2:2015
|
INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - APPLICATION SECURITY - PART 2: ORGANIZATION NORMATIVE FRAMEWORK |
BS ISO/IEC 27041 : 2015
|
INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - GUIDANCE ON ASSURING SUITABILITY AND ADEQUACY OF INCIDENT INVESTIGATIVE METHOD |
DIN ISO/IEC 17788 E : 2016
|
INFORMATION TECHNOLOGY - CLOUD COMPUTING - OVERVIEW AND VOCABULARY (ISO/IEC 17788:2014) |
IEEE 1062 : 1998
|
RECOMMENDED PRACTICE FOR SOFTWARE ACQUISITION |
14/30260166 DC : 0
|
BS ISO/IEC 27041 - INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - GUIDANCE ON ASSURING SUITABILITY AND ADEQUACY OF INCIDENT INVESTIGATIVE METHODS |
16/30286013 DC : 0
|
BS ISO/IEC 27003 - INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - INFORMATION SECURITY MANAGEMENT SYSTEM - GUIDANCE |
ISO/IEC 15026-1:2013
|
Systems and software engineering Systems and software assurance Part 1: Concepts and vocabulary |
BS EN ISO 21091:2013
|
Health informatics. Directory services for healthcare providers, subjects of care and other entities |
EN 50657:2017
|
Railways Applications - Rolling stock applications - Software on Board Rolling Stock |
BS EN ISO 9004:2018
|
Quality management. Quality of an organization. Guidance to achieve sustained success |
S.R. CEN/TS 16702-2:2015
|
ELECTRONIC FEE COLLECTION - SECURE MONITORING FOR AUTONOMOUS TOLL SYSTEMS - PART 2: TRUSTED RECORDER |
PD ISO/IEC TR 27008:2011
|
Information technology. Security techniques. Guidelines for auditors on information security controls |
15/30268877 DC : 0
|
BS ISO/IEC 27035-2 - INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - INFORMATION SECURITY INCIDENT MANAGEMENT - PART 2: GUIDELINES TO PLAN AND PREPARE FOR INCIDENT RESPONSE |
11/30204593 DC : DRAFT MAY 2011
|
BS ISO/IEC 27010 - INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - INFORMATION SECURITY MANAGEMENT FOR INTER-SECTOR AND INTER-ORGANIZATIONAL COMMUNICATIONS |
11/30168516 DC : 0
|
BS ISO/IEC 27032 - INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - GUIDELINES FOR CYBERSECURITY |
PD IEC/TR 62351-10:2012
|
Power systems management and associated information exchange. Data and communications security Security architecture guidelines |
S.R. CWA 16649:2013
|
MANAGING EMERGING TECHNOLOGY-RELATED RISKS |
BS ISO/IEC 27036-1:2014
|
Information technology. Security techniques. Information security for supplier relationships Overview and concepts |
CSA ISO/IEC 27002 : 2015
|
INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - CODE OF PRACTICE FOR INFORMATION SECURITY CONTROLS |
PD ISO/IEC TR 27023:2015
|
Information technology. Security techniques. Mapping the revised editions of ISO/IEC 27001 and ISO/IEC 27002 |
BS ISO/IEC 17789:2014
|
Information technology. Cloud computing. Reference architecture |
13/30258396 DC : 0
|
BS ISO 17582 - QUALITY MANAGEMENT SYSTEMS - PARTICULAR REQUIREMENTS FOR THE APPLICATION OF ISO 9001:2008 FOR ELECTORAL ORGANIZATIONS AT ALL LEVELS OF GOVERNMENT |
09/30168526 DC : 0
|
BS ISO/IEC 27033-1 - INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - NETWORK SECURITY - PART 1: GUIDELINES FOR NETWORK SECURITY |
UNI CEI ISO/IEC 27001 : 2014
|
INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - INFORMATION SECURITY MANAGEMENT SYSTEMS - REQUIREMENTS |
CAN/CSA-ISO/IEC 27013:16
|
Information technology - Security techniques - Guidance on the integrated implementation of ISO/IEC 27001 and ISO/IEC 20000-1 (Adopted ISO/IEC 27013:2015, second edition, 2015-12-01) |
BS ISO/IEC 27003:2017
|
Information technology. Security techniques. Information security management systems. Guidance |
CAN/CSA-ISO/IEC 27034-2:16
|
Information technology Security techniques Application security Part 2: Organization normative framework (Adopted ISO/IEC 27034-2:2015, first edition, 2015-08-15) |
16/30327034 DC : 0
|
BS ISO/IEC 27034-7 - INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - APPLICATION SECURITY - PART 7: APPLICATION SECURITY ASSURANCE PREDICTION MODEL |
TR 103 118 : 1.1.1
|
MACHINE-TO-MACHINE COMMUNICATIONS (M2M); SMART ENERGY INFRASTRUCTURES SECURITY; REVIEW OF EXISTING SECURITY MEASURES AND CONVERGENCE INVESTIGATIONS |
17/30355373 DC : 0
|
BS ISO/IEC 27019 - INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - INFORMATION SECURITY CONTROLS FOR THE ENERGY UTILITY INDUSTRY |
ISO/IEC TR 27008:2011
|
Information technology Security techniques Guidelines for auditors on information security controls |
BS ISO/IEC 29151:2017
|
Information technology. Security techniques. Code of practice for personally identifiable information protection |
18/30331887 DC : 0
|
BS ISO/IEC 20889 - INFORMATION TECHNOLOGY- SECURITY TECHNIQUES - PRIVACY ENHANCING DATA DE-IDENTIFICATION TECHNIQUES |
BS ISO/IEC 27035-2:2016
|
Information technology. Security techniques. Information security incident management Guidelines to plan and prepare for incident response |
UNE-ISO/IEC 27002:2015
|
Information technology -- Security techniques -- Code of practice for information security controls |
BS ISO/IEC 27035-1:2016
|
Information technology. Security techniques. Information security incident management Principles of incident management |
CSA ISO/IEC TR 27008: 2013
|
INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - GUIDELINES FOR AUDITORS ON INFORMATION SECURITY CONTROLS |
CSA ISO/IEC 27035 : 2013
|
INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - INFORMATION SECURITY INCIDENT MANAGEMENT |
CEI UNI EN ISO/IEC 27001 : 1ED 2017
|
INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - INFORMATION SECURITY MANAGEMENT SYSTEMS - REQUIREMENTS |
CEI UNI EN ISO/IEC 27040 : 1ED 2017
|
INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - STORAGE SECURITY |
CSA ISO/IEC 20000-1 : 2013 : R2017
|
INFORMATION TECHNOLOGY - SERVICE MANAGEMENT - PART 1: SERVICE MANAGEMENT SYSTEM REQUIREMENTS |
CEI UNI ISO/IEC 27001 : 2014
|
INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - INFORMATION SECURITY MANAGEMENT SYSTEMS - REQUIREMENTS |
I.S. EN ISO 21091:2013
|
HEALTH INFORMATICS - DIRECTORY SERVICES FOR HEALTHCARE PROVIDERS, SUBJECTS OF CARE AND OTHER ENTITIES (ISO 21091:2013) |
ISO/IEC 27034-7:2018
|
Information technology — Application security — Part 7: Assurance prediction framework |
ISO 19011:2011
|
Guidelines for auditing management systems |
CSA ISO/IEC 27005 : 2011 : R2016
|
INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - INFORMATION SECURITY RISK MANAGEMENT |
BS ISO/IEC 27002 : 2013
|
INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - CODE OF PRACTICE FOR INFORMATION SECURITY CONTROLS |
S.R. CEN/TR 16742:2014
|
INTELLIGENT TRANSPORT SYSTEMS - PRIVACY ASPECTS IN ITS STANDARDS AND SYSTEMS IN EUROPE |
I.S. EN ISO/IEC 27043:2016
|
INFORMATION TECHNOLOGY - SECURITY TECHNIQUES INCIDENT INVESTIGATION PRINCIPLES AND PROCESSES (ISO/IEC 27043:2015) |
EN ISO 19011:2011 COR 2011
|
GUIDELINES FOR AUDITING MANAGEMENT SYSTEMS (ISO 19011:2011) |
ABS 0252 : 2016
|
DATA INTEGRITY FOR MARINE AND OFFSHORE OPERATIONS - CYBERSAFETY[TM] VOLUME 3 |
UNE-EN ISO/IEC 27002:2017
|
Information technology - Security techniques - Code of practice for information security controls (ISO/IEC 27002:2013 including Cor 1:2014 and Cor 2:2015) |
ISO/IEC 27050-3:2017
|
Information technology Security techniques Electronic discovery Part 3: Code of practice for electronic discovery |
DIN EN ISO/IEC 27040:2016-04 (Draft)
|
INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - STORAGE SECURITY (ISO/IEC 27040:2015) |
ISO/IEC TR 27016:2014
|
Information technology Security techniques Information security management Organizational economics |
CAN/CSA-ISO/IEC 20648:18
|
Information technology ? TLS specification for storage systems (Adopted ISO/IEC 20648:2016, first edition, 2016-03-01) |
UNI CEN ISO/TS 14441 : 2014
|
HEALTH INFORMATICS - SECURITY AND PRIVACY REQUIREMENTS OF HER SYSTEMS FOR USE IN CONFORMITY ASSESSMENT |
ISO/IEC TS 24748-1:2016
|
Systems and software engineering Life cycle management Part 1: Guidelines for life cycle management |
CSA ISO/IEC 27005 : 2011
|
INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - INFORMATION SECURITY RISK MANAGEMENT |
BS ISO/IEC 29147:2014
|
Information technology. Security techniques. Vulnerability disclosure |
CSA ISO/IEC TR 15026-1 : 2013
|
SYSTEMS AND SOFTWARE ENGINEERING - SYSTEMS AND SOFTWARE ASSURANCE - PART 1: CONCEPTS AND VOCABULARY |
TR 187 020 : 1.1.1
|
RADIO FREQUENCY IDENTIFICATION (RFID); COORDINATED ESO RESPONSE TO PHASE 1 OF EU MANDATE M436 |
CSA ISO/IEC 15026-1 : 2015
|
SYSTEMS AND SOFTWARE ENGINEERING - SYSTEMS AND SOFTWARE ASSURANCE - PART 1: CONCEPTS AND VOCABULARY |
ISO/IEC 27005:2011
|
Information technology Security techniques Information security risk management |
ISO/IEC 27013:2015
|
Information technology Security techniques Guidance on the integrated implementation of ISO/IEC 27001 and ISO/IEC 20000-1 |
ISO/IEC 27043:2015
|
Information technology Security techniques Incident investigation principles and processes |
NBR ISO/IEC 27001 : 2013
|
INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - INFORMATION SECURITY MANAGEMENT SYSTEMS - REQUIREMENTS |
ISO/IEC 19941:2017
|
Information technology — Cloud computing — Interoperability and portability |
CSA ISO/IEC 27007 : 2013 : R2017
|
INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - GUIDELINES FOR INFORMATION SECURITY MANAGEMENT SYSTEMS AUDITING |
BS ISO/IEC 20243:2015
|
INFORMATION TECHNOLOGY - OPEN TRUSTED TECHNOLOGY PROVIDER[TM] STANDARD (O-TTPS) - MITIGATING MALICIOUSLY TAINTED AND COUNTERFEIT PRODUCTS |
ISO/IEC TR 20000-11:2015
|
Information technology Service management Part 11: Guidance on the relationship between ISO/IEC 20000-1:2011 and service management frameworks: ITIL |
16/30278511 DC : 0
|
BS ISO/IEC 29134 - INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - PRIVACY IMPACT ASSESSMENT - GUIDELINES |
PD ISO/IEC TR 20000-12:2016
|
Information technology. Service management Guidance on the relationship between ISO/IEC 20000-1:2011 and service management frameworks: CMMI-SVC® |
BS PAS 7000(2014) : 2014
|
SUPPLY CHAIN RISK MANAGEMENT - SUPPLIER PREQUALIFICATION |
BS ISO/IEC 27035:2011
|
Information technology. Security techniques. Information security incident management |
BS ISO 18788:2015
|
Management system for private security operations. Requirements with guidance for use |
DIN EN ISO/IEC 27002 E : 2017
|
INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - CODE OF PRACTICE FOR INFORMATION SECURITY CONTROLS (ISO/IEC 27002:2013 INCLUDING COR 1:2014 AND COR 2:2015) |
14/30266434 DC : 0
|
BS ISO/IEC 17788 - INFORMATION TECHNOLOGY - CLOUD COMPUTING - OVERVIEW AND VOCABULARY |
PD CEN/TS 16702-2:2015
|
ELECTRONIC FEE COLLECTION - SECURE MONITORING FOR AUTONOMOUS TOLL SYSTEMS - PART 2: TRUSTED RECORDER |
S.R. CEN/TR 419010:2017
|
FRAMEWORK FOR STANDARDIZATION OF SIGNATURES - EXTENDED STRUCTURE INCLUDING ELECTRONIC IDENTIFICATION AND AUTHENTICATION |
GS NFV-SEC 014 : 3.1.1
|
NETWORK FUNCTIONS VIRTUALISATION (NFV) RELEASE 3; NFV SECURITY; SECURITY SPECIFICATION FOR MANO COMPONENTS AND REFERENCE POINTS |
17/30342692 DC : 0
|
BS ISO/IEC 27007 - INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - GUIDELINES FOR INFORMATION SECURITY MANAGEMENT SYSTEMS AUDITING |
14/30304350 DC : 0
|
BS EN ISO 27799 - HEALTH INFORMATICS - INFORMATION SECURITY MANAGEMENT IN HEALTH USING ISO/IEC 27002 |
BIP 0139 : 2013
|
AN INTRODUCTION TO ISO/IEC 27001:2013 |
BS ISO/IEC 27043 : 2015
|
INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - INCIDENT INVESTIGATION PRINCIPLES AND PROCESSES |
BS EN ISO/IEC 27002:2017
|
Information technology. Security techniques. Code of practice for information security controls |
BS ISO/IEC 24745:2011
|
Information technology. Security techniques. Biometric information protection |
BS EN 50657:2017
|
Railways Applications. Rolling stock applications. Software on Board Rolling Stock |
BS ISO/IEC 27009:2016
|
INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - SECTOR-SPECIFIC APPLICATION OF ISO/IEC 27001 - REQUIREMENTS |
TR 101 582 : 1.1.1
|
METHODS FOR TESTING AND SPECIFICATION (MTS); SECURITY TESTING; CASE STUDY EXPERIENCES |
BS TICKITPLUS - KICK START GUIDE : 2011
|
KICK START GUIDE, TICKITPLUS - SOFTWARE AND IT QUALITY MANAGEMENT AND CERTIFICATION |
DIN ISO/IEC 17788:2016-04
|
INFORMATION TECHNOLOGY - CLOUD COMPUTING - OVERVIEW AND VOCABULARY (ISO/IEC 17788:2014) |
17/30333753 DC : 0
|
BS EN ISO 19650-1 - ORGANIZATION OF INFORMATION ABOUT CONSTRUCTION WORKS - INFORMATION MANAGEMENT USING BUILDING INFORMATION MODELLING - PART 1: CONCEPTS AND PRINCIPLES |
10/30184432 DC : 0
|
BS ISO/IEC 27035 - INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - INFORMATION SECURITY INCIDENT MANAGEMENT |
CEI UNI EN ISO/IEC 27043 : 1ED 2017
|
INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - INCIDENT INVESTIGATION PRINCIPLES AND PROCESSES |
TS 187 001 : 3.9.1
|
NETWORK TECHNOLOGIES (NTECH); NGN SECURITY (SEC); REQUIREMENTS |
ISO/IEC TR 27015:2012
|
Information technology Security techniques Information security management guidelines for financial services |
I.S. EN ISO/IEC 27041:2016
|
INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - GUIDANCE ON ASSURING SUITABILITY AND ADEQUACY OF INCIDENT INVESTIGATIVE METHOD (ISO/IEC 27041:2015) |
BS ISO/IEC 27006:2015
|
Information technology. Security techniques. Requirements for bodies providing audit and certification of information security management systems |
12/30186137 DC : 0
|
BS ISO/IEC 27002 - INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - CODE OF PRACTICE FOR INFORMATION SECURITY CONTROLS |
16/30286027 DC : 0
|
BS ISO/IEC 27004 - INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - INFORMATION SECURITY MANAGEMENT - MONITORING, MEASUREMENT, ANALYSIS AND EVALUATION |
17/30342673 DC : 0
|
BS ISO/IEC 27021 - INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - COMPETENCE REQUIREMENTS FOR INFORMATION SECURITY MANAGEMENT SYSTEMS PROFESSIONALS |
16/30337310 DC : 0
|
BS ISO/IEC 27050-3 - INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - ELECTRONIC DISCOVERY - PART 3: CODE OF PRACTICE FOR ELECTRONIC DISCOVERY |
ISO/IEC 27031:2011
|
Information technology Security techniques Guidelines for information and communication technology readiness for business continuity |
BS ISO/IEC 38505-1:2017
|
Information technology. Governance of IT. Governance of data Application of ISO/IEC 38500 to the governance of data |
BS ISO/IEC 20648:2016
|
Information technology. TLS specification for storage systems |
BS ISO/IEC 27005:2011
|
INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - INFORMATION SECURITY RISK MANAGEMENT |
PD CEN/TR 419010:2017
|
Framework for standardization of signatures. Extended structure including electronic identification and authentication |
BS ISO/IEC 27032:2012
|
Information technology. Security techniques. Guidelines for cybersecurity |
DIN EN ISO/IEC 27002:2017-06
|
INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - CODE OF PRACTICE FOR INFORMATION SECURITY CONTROLS (ISO/IEC 27002:2013 INCLUDING COR 1:2014 AND COR 2:2015) |
CAN/CSA-ISO/IEC 27033-6:18
|
Information technology — Security techniques — Network security — Part 6: Securing wireless IP network access (Adopted ISO/IEC 27033-6:2016, first edition, 2016-06-01) |
14/30213618 DC : 0
|
BS ISO/IEC 27034-2 - INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - APPLICATION SECURITY - PART 2: ORGANIZATION NORMATIVE FRAMEWORK |
CSA ISO/IEC 27003 : 2010 : R2015
|
INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - INFORMATION SECURITY MANAGEMENT SYSTEM IMPLEMENTATION GUIDANCE |
CEI UNI EN ISO/IEC 27002 : 1ED 2017
|
INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - CODE OF PRACTICE FOR INFORMATION SECURITY CONTROLS |
ISO/IEC 27021:2017
|
Information technology — Security techniques — Competence requirements for information security management systems professionals |
BIS IS/ISO/IEC 27003 : 2010
|
INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - INFORMATION SECURITY MANAGEMENT SYSTEM IMPLEMENTATION GUIDANCE |
BS EN 62734:2015
|
Industrial networks. Wireless communication network and communication profiles. ISA 100.11a |
CSA ISO/IEC 27031 : 2013
|
INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - GUIDELINES FOR INFORMATION AND COMMUNICATION TECHNOLOGY READINESS FOR BUSINESS CONTINUITY |
DIN CEN ISO/TS 19299;DIN SPEC 74125:2016-02
|
ELECTRONIC FEE COLLECTION - SECURITY FRAMEWORK (ISO/TS 19299:2015) |
CSA ISO 19011 : 2012
|
GUIDELINES FOR AUDITING MANAGEMENT SYSTEMS |
CAN/CSA-ISO/IEC 17788:16
|
Information technology Cloud computing Overview and vocabulary (Adopted ISO/IEC 17788:2014, first edition, 2014-10-15) |
ISO/IEC 27018:2014
|
Information technology Security techniques Code of practice for protection of personally identifiable information (PII) in public clouds acting as PII processors |
CEI UNI EN ISO/IEC 27037 : 1ED 2017
|
INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - GUIDELINES FOR IDENTIFICATION, COLLECTION, ACQUISITION AND PRESERVATION OF DIGITAL EVIDENCE |
TR 119 000 : 1.2.1
|
ELECTRONIC SIGNATURES AND INFRASTRUCTURES (ESI); THE FRAMEWORK FOR STANDARDIZATION OF SIGNATURES: OVERVIEW |
ARINC 842 : 2013
|
GUIDANCE FOR USAGE OF DIGITAL CERTIFICATES |
ISO/IEC TR 29110-5-3:2018
|
Systems and software engineering — Lifecycle profiles for Very Small Entities (VSEs) — Part 5-3: Service delivery guidelines |
IEC TR 62351-10:2012
|
Power systems management and associated information exchange - Data and communications security - Part 10: Security architecture guidelines |
ISO/IEC 27034-3:2018
|
Information technology — Application security — Part 3: Application security management process |
CAN/CSA-ISO/IEC 27035-2:18
|
Information technology — Security techniques — Information security incident management — Part 2: Guidelines to plan and prepare for incident response (Adopted ISO/IEC 27035-2:2016, first edition, 2016-11-01) |
UNI ISO 30300 : 2013
|
INFORMATION AND DOCUMENTATION - MANAGEMENT SYSTEMS FOR RECORDS - FUNDAMENTALS AND VOCABULARY |
I.S. EN 15224:2016
|
QUALITY MANAGEMENT SYSTEMS - EN ISO 9001:2015 FOR HEALTHCARE |
CEN/TR 16968:2016
|
Electronic Fee Collection - Assessment of security measures for applications using Dedicated Short-Range Communication |
ISO/IEC TR 90006:2013
|
Information technology Guidelines for the application of ISO 9001:2008 to IT service management and its integration with ISO/IEC 20000-1:2011 |
S.R. CEN ISO/TS 19299:2015
|
ELECTRONIC FEE COLLECTION - SECURITY FRAMEWORK (ISO/TS 19299:2015) |
CSA ISO 19011 : 2012 : R2017
|
GUIDELINES FOR AUDITING MANAGEMENT SYSTEMS |
ISO/IEC TR 20000-10:2015
|
Information technology Service management Part 10: Concepts and terminology |
CAN/CSA-ISO/IEC 27017:16
|
Information technology Security techniques Code of practice for information security controls based on ISO/IEC 27002 for cloud services (Adopted ISO/IEC 27017:2015, first edition, 2015-12-15) |
BS EN 16495:2014
|
Air Traffic Management. Information security for organisations supporting civil aviation operations |
CEN/TR 419010:2017
|
Framework for standardization of signatures - Extended structure including electronic identification and authentication |
UNI EN 16495 : 2014
|
AIR TRAFFIC MANAGEMENT - INFORMATION SECURITY FOR ORGANIZATIONS SUPPORTING CIVIL AVIATION OPERATIONS |
ISO/IEC TS 33072:2016
|
Information technology — Process assessment — Process capability assessment model for information security management |
UNI EN ISO 27789 : 2013
|
HEALTH INFORMATICS - AUDIT TRAILS FOR ELECTRONIC HEALTH RECORDS |
ISO/IEC 27035:2011
|
Information technology Security techniques Information security incident management |
ISO/IEC 27032:2012
|
Information technology — Security techniques — Guidelines for cybersecurity |
ISO/IEC 27036-1:2014
|
Information technology Security techniques Information security for supplier relationships Part 1: Overview and concepts |
ISO/IEC 27034-2:2015
|
Information technology Security techniques Application security Part 2: Organization normative framework |
ISO 18788:2015
|
Management system for private security operations Requirements with guidance for use |
ISO 5127:2017
|
Information and documentation Foundation and vocabulary |
ISO/IEC 27037:2012
|
Information technology — Security techniques — Guidelines for identification, collection, acquisition and preservation of digital evidence |
ISO/TS 19299:2015
|
Electronic fee collection Security framework |
IEC 62734:2014
|
Industrial networks - Wireless communication network and communication profiles - ISA 100.11a |
DIN EN ISO/IEC 27040 E : 2017
|
INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - STORAGE SECURITY (ISO/IEC 27040:2015) |
EN ISO/IEC 27042:2016
|
Information technology - Security techniques - Guidelines for the analysis and interpretation of digital evidence (ISO/IEC 27042:2015) |
EN ISO 21091:2013
|
Health informatics - Directory services for healthcare providers, subjects of care and other entities (ISO 21091:2013) |
EN ISO/IEC 27043:2016
|
Information technology - Security techniques - Incident investigation principles and processes (ISO/IEC 27043:2015) |
UNI/TS 11465-1 : 2012
|
ELECTRONIC SIGNATURES AND INFRASTRUCTURES (ESI) - DATA PRESERVATION SYSTEMS SECURITY - PART 1: REQUIREMENTS FOR IMPLEMENTATION AND MANAGEMENT |
ISO/IEC 27034-1:2011
|
Information technology — Security techniques — Application security — Part 1: Overview and concepts |
CSA ISO/IEC 27009 : 2018
|
INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - SECTOR-SPECIFIC APPLICATION OF ISO/IEC 27001 - REQUIREMENTS |
ISO/IEC 27003:2017
|
Information technology — Security techniques — Information security management systems — Guidance |
ISO/IEC 27033-6:2016
|
Information technology Security techniques Network security Part 6: Securing wireless IP network access |
PD ISO/TR 37152:2016
|
Smart community infrastructures. Common framework for development and operation |
16/30287629 DC : 0
|
BS ISO/IEC 27050-1 - INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - ELECTRONIC DISCOVERY - PART 1 OVERVIEW AND CONCEPTS |
BS ISO/IEC 27018:2014
|
Information technology. Security techniques. Code of practice for protection of personally identifiable information (PII) in public clouds acting as PII processors |
BS ISO/IEC 27033-3:2010
|
Information technology. Security techniques. Network security Reference networking scenarios. Threats, design techniques and control issues |
10/30162769 DC : DRAFT NOV 2010
|
BS ISO/IEC 27007 - INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - GUIDELINES FOR INFORMATION SECURITY MANAGEMENT SYSTEMS AUDITING |
CAN/CSA-ISO/IEC 27010:16
|
Information technology - Security techniques - Information security management for inter-sector and inter-organizational communications (Adopted ISO/IEC 27010:2015, second edition, 2015-11-15) |
BS ISO/IEC 27017:2015
|
Information technology. Security techniques. Code of practice for information security controls based on ISO/IEC 27002 for cloud services |
CAN/CSA-ISO/IEC 27004:18
|
Information technology ? Security techniques ? Information security management ? Monitoring, measurement, analysis and evaluation (Adopted ISO/IEC 27004:2016, second edition, 2016-12-15) |
INCITS/ISO/IEC 27010 : 2017
|
INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - INFORMATION SECURITY MANAGEMENT FOR INTER-SECTOR AND INTER-ORGANIZATIONAL COMMUNICATIONS |
CAN/CSA-ISO/IEC TS 33072:18
|
Information technology ? Process assessment ? Process capability assessment model for information security management (Adopted ISO/IEC TS 33072:2016, first edition, 2016-07-15, corrected version 2016-09-01) |
ISO/IEC TR 38505-2:2018
|
Information technology — Governance of IT — Governance of data — Part 2: Implications of ISO/IEC 38505-1 for data management |
12/30250175 DC : 0
|
BS ISO/IEC 27036-2 - INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - INFORMATION SECURITY FOR SUPPLIER RELATIONSHIPS - PART 2: COMMON REQUIREMENTS |
11/30207799 DC : 0
|
BS ISO/IEC 27037 - INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - GUIDELINES FOR IDENTIFICATION, COLLECTION, ACQUISITION AND PRESERVATION OF DIGITAL EVIDENCE |
CSA INFORMATION SECURITY PACKAGE : 2018
|
CONSISTS OF CAN/CSA-ISO/IEC 27000:18 - INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - INFORMATION SECURITY MANAGEMENT SYSTEMS - OVERVIEW AND VOCABULARY; CAN/CSA-ISO/IEC 27001:14, INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - INFORMATION SECURITY MANAGEMENT SYSTEMS - REQUIREMENTS; CAN/CSA-ISO/IEC 27002:15 - INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - CODE OF PRACTICE FOR INFORMATION |
CAN/CSA-ISO/IEC 20243:16
|
Information Technology Open Trusted Technology Provider TM Standard (O-TTPS) Mitigating maliciously tainted and counterfeit products (Adopted ISO/IEC 20243:2015, first edition, 2015-09-15) |
UNE-ISO 30300:2011
|
Information and documentation. Management system for records. Fundamentals and vocabulary . |
DIN EN ISO 27789:2013-06
|
Health informatics - Audit trails for electronic health records (ISO 27789:2013) |
10/30136309 DC : 0
|
BS ISO/IEC 24745 - INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - BIOMETRIC INFORMATION PROTECTION |
BS ISO/IEC 15026-1:2013
|
Systems and software engineering. Systems and software assurance Concepts and vocabulary |
14/30255584 DC : 0
|
BS ISO 5127 - INFORMATION AND DOCUMENTATION - FOUNDATION AND VOCABULARY |
INCITS/ISO/IEC 27002 : 2014
|
INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - CODE OF PRACTICE FOR INFORMATION SECURITY CONTROLS |
BIP 0071 : 2014
|
GUIDELINES ON REQUIREMENTS AND PREPARATION FOR ISMS CERTIFICATION BASED ON ISO/IEC 27001 |
BS ISO/IEC 27007:2017
|
Information technology. Security techniques. Guidelines for information security management systems auditing |
BS ISO/IEC 27010:2015
|
INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - INFORMATION SECURITY MANAGEMENT FOR INTER-SECTOR AND INTER-ORGANIZATIONAL COMMUNICATIONS |
12/30192064 DC : 0
|
BS ISO/IEC 27001 - INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - INFORMATION SECURITY MANAGEMENT SYSTEM - REQUIREMENTS |
BS ISO 5127:2017
|
Information and documentation. Foundation and vocabulary |
BS ISO/IEC 17788:2014
|
Information technology. Cloud computing. Overview and vocabulary |
13/30268559 DC : 0
|
BS ISO/IEC 15026-1 - SYSTEMS AND SOFTWARE ENGINEERING - SYSTEMS AND SOFTWARE ASSURANCE - PART 1: CONCEPTS AND VOCABULARY |
BS EN ISO/IEC 27001:2017
|
Information technology. Security techniques. Information security management systems. Requirements |
17/30349211 DC : 0
|
BS ISO/IEC 29147 - INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - VULNERABILITY DISCLOSURE |
ISO/IEC 27036-3:2013
|
Information technology — Security techniques — Information security for supplier relationships — Part 3: Guidelines for information and communication technology supply chain security |
DIN ISO/IEC 17789:2016-10 (Draft)
|
INFORMATION TECHNOLOGY - CLOUD COMPUTING - REFERENCE ARCHITECTURE (ISO/IEC 17789:2014) |
BS ISO/IEC 19941:2017
|
Information technology. Cloud computing. Interoperability and portability |
DIN CEN ISO/TS 19299;DIN SPEC 74125:2016-02
|
ELECTRONIC FEE COLLECTION - SECURITY FRAMEWORK (ISO/TS 19299:2015) |
ISO/IEC 27017:2015
|
Information technology — Security techniques — Code of practice for information security controls based on ISO/IEC 27002 for cloud services |
ISO/IEC 20243:2015
|
Information Technology Open Trusted Technology ProviderTM Standard (O-TTPS) Mitigating maliciously tainted and counterfeit products |
BS EN ISO/IEC 27043 : 2016
|
INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - INCIDENT INVESTIGATION PRINCIPLES AND PROCESSES (ISO/IEC 27043:2015) |
CAN/CSA-ISO/IEC 30100-2:18
|
Information technology — Home network resource management — Part 2: Architecture (Adopted ISO/IEC 30100-2:2016, first edition, 2016-04) |
15/30321754 DC : 0
|
BS ISO/IEC 20648 - INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - TLS SPECIFICATION FOR STORAGE SYSTEMS |
PD CEN ISO/TS 19299:2015
|
Electronic fee collection. Security framework |
BS ISO/IEC 27031:2011
|
Information technology. Security techniques. Guidelines for information and communication technology readiness for business continuity |
PD ISO/IEC TS 24748-6:2016
|
Systems and software engineering. Life cycle management System integration engineering |
BS ISO/IEC 27042 : 2015
|
INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - GUIDELINES FOR THE ANALYSIS AND INTERPRETATION OF DIGITAL EVIDENCE |
15/30320354 DC : 0
|
BS ISO/IEC 27010 - INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - INFORMATION SECURITY MANAGEMENT FOR INTER-SECTOR AND INTER-ORGANIZATIONAL COMMUNICATIONS |
13/30266767 DC : 0
|
BS ISO/IEC 27018 - INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - CODE OF PRACTICE FOR P2 PROTECTION IN PUBLIC CLOUD ACTING AS P2 PROCESSORS |
ISO/IEC TR 20547-2:2018
|
Information technology Big data reference architecture Part 2: Use cases and derived requirements |
BS EN ISO 27799:2008
|
Health informatics. Information security management in health using ISO/IEC 27002 |
17/30329617 DC : 0
|
BS ISO/IEC 29110-4-3 - SYSTEMS AND SOFTWARE ENGINEERING - LIFECYCLE PROFILES FOR VERY SMALL ENTITIES (VSES) - PART 4-3: SERVICE DELIVERY - PROFILE SPECIFICATION |
BIS IS/ISO 19011 : 2011(R2016)
|
GUIDELINES FOR AUDITING MANAGEMENT SYSTEMS |
08/30134763 DC : DRAFT JUNE 2008
|
BS ISO/IEC 27004 - INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - INFORMATION SECURITY MANAGEMENT - MEASUREMENT |
12/30209825 DC : 0
|
BS ISO/IEC 27014 - INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - GOVERNANCE OF INFORMATION SECURITY |
BIS IS/ISO/IEC 27004 : 2009
|
INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - INFORMATION SECURITY MANAGEMENT - MEASUREMENT |
SR 001 604 : 1.1.1
|
RATIONALISED FRAMEWORK FOR ELECTRONIC SIGNATURE STANDARDISATION |
INCITS/ISO/IEC 27033-2 : 2014
|
INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - NETWORK SECURITY - PART 2: GUIDELINES FOR THE DESIGN AND IMPLEMENTATION OF NETWORK SECURITY |
UNI CEN/TS 16439 : 2013
|
ELECTRONIC FEE COLLECTION - SECURITY FRAMEWORK |
ISO/IEC TS 24748-6:2016
|
Systems and software engineering — Life cycle management — Part 6: System integration engineering |
INCITS/ISO/IEC 27041 : 2017
|
INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - GUIDANCE ON ASSURING SUITABILITY AND ADEQUACY OF INCIDENT INVESTIGATIVE METHOD |
ISO/IEC 29134:2017
|
Information technology — Security techniques — Guidelines for privacy impact assessment |
CAN/CSA-ISO/IEC 27035-1:18
|
Information technology — Security techniques — Information security incident management — Part 1: Principles of incident management (Adopted ISO/IEC 27035-1:2016, first edition, 2016-11-01) |
CSA ISO/IEC 27003 : 2010
|
INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - INFORMATION SECURITY MANAGEMENT SYSTEM IMPLEMENTATION GUIDANCE |
CSA ISO 9004 : 2009 : R2015
|
MANAGING FOR THE SUSTAINED SUCCESS OF AN ORGANIZATION - A QUALITY MANAGEMENT APPROACH |
16/30334735 DC : 0
|
BS EN 15224 - HEALTH CARE SERVICES - QUALITY MANAGEMENT SYSTEMS - REQUIREMENTS BASED ON EN ISO 9001:2015 |
15/30267674 DC : 0
|
BS ISO/IEC 27035-1 - INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - INFORMATION SECURITY INCIDENT MANAGEMENT - PART 1: PRINCIPLES OF INCIDENT MANAGEMENT |
ISO/IEC 27035-2:2016
|
Information technology — Security techniques — Information security incident management — Part 2: Guidelines to plan and prepare for incident response |
I.S. EN ISO/IEC 27001:2017
|
INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - INFORMATION SECURITY MANAGEMENT SYSTEMS - REQUIREMENTS (ISO/IEC 27001:2013 INCLUDING COR 1:2014 AND COR 2:2015) |
SR 003 391 : 2.1.1
|
CLOUD STANDARDS COORDINATION PHASE 2; INTEROPERABILITY AND SECURITY IN CLOUD COMPUTING |
S.R. CEN/TR 16968:2016
|
ELECTRONIC FEE COLLECTION - ASSESSMENT OF SECURITY MEASURES FOR APPLICATIONS USING DEDICATED SHORT-RANGE COMMUNICATION |
GS ISI 001-2 : 1.1.2
|
INFORMATION SECURITY INDICATORS (ISI); INDICATORS (INC); PART 2: GUIDE TO SELECT OPERATIONAL INDICATORS BASED ON THE FULL SET GIVEN IN PART 1 |
I.S. EN ISO/IEC 27037:2016
|
INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - GUIDELINES FOR IDENTIFICATION, COLLECTION, ACQUISITION AND PRESERVATION OF DIGITAL EVIDENCE (ISO/IEC 27037:2012) |
I.S. EN ISO/IEC 27042:2016
|
INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - GUIDELINES FOR THE ANALYSIS AND INTERPRETATION OF DIGITAL EVIDENCE (ISO/IEC 27042:2015) |
PREN 15224 : DRAFT 2016
|
HEALTH CARE SERVICES - QUALITY MANAGEMENT SYSTEMS - REQUIREMENTS BASED ON EN ISO 9001:2015 |
I.S. EN ISO/IEC 27002:2017
|
INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - CODE OF PRACTICE FOR INFORMATION SECURITY CONTROLS (ISO/IEC 27002:2013 INCLUDING COR 1:2014 AND COR 2:2015) |
ISO/IEC 30100-2:2016
|
Information technology Home network resource management Part 2: Architecture |
I.S. ISO/IEC 27002:2013
|
INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - CODE OF PRACTICE FOR INFORMATION SECURITY CONTROLS |
ISO 30300:2011
|
Information and documentation Management systems for records Fundamentals and vocabulary |
ISO/IEC 27050-1:2016
|
Information technology Security techniques Electronic discovery Part 1: Overview and concepts |
CAN/CSA-ISO/IEC 27011:18
|
Information technology ? Security techniques ? Code of practice for information security controls based on ISO/IEC 27002 for telecommunications organizations (Adopted ISO/IEC 27011:2016, second edition, 2016-12-01) |
CEI UNI ISO/IEC 27002 : 2014
|
INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - CODE OF PRACTICE FOR INFORMATION SECURITY CONTROLS |
CEI UNI EN ISO/IEC 27042 : 1ED 2017
|
INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - GUIDELINES FOR THE ANALYSIS AND INTERPRETATION OF DIGITAL EVIDENCE |
BS ISO/IEC 27019:2017
|
Information technology. Security techniques. Information security controls for the energy utility industry |
EN ISO 9004:2018
|
Quality management - Quality of an organization - Guidance to achieve sustained success (ISO 9004:2018) |
ISO/IEC TR 15026-1:2010
|
Systems and software engineering Systems and software assurance Part 1: Concepts and vocabulary |
ISO/IEC 27010:2015
|
Information technology Security techniques Information security management for inter-sector and inter-organizational communications |
ISO/IEC 29147:2014
|
Information technology Security techniques Vulnerability disclosure |
ISO/IEC 27033-3:2010
|
Information technology — Security techniques — Network security — Part 3: Reference networking scenarios — Threats, design techniques and control issues |
ISO/IEC 27011:2016
|
Information technology Security techniques Code of practice for Information security controls based on ISO/IEC 27002 for telecommunications organizations |
ISO/IEC 27041:2015
|
Information technology Security techniques Guidance on assuring suitability and adequacy of incident investigative method |
ISO 12813:2015
|
Electronic fee collection Compliance check communication for autonomous systems |
ISO 21091:2013
|
Health informatics — Directory services for healthcare providers, subjects of care and other entities |
BS ISO/IEC 27040 : 2015
|
INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - STORAGE SECURITY |
BS EN ISO/IEC 27040:2016
|
Information technology. Security techniques. Storage security |
ISO/IEC 27040:2015
|
Information technology Security techniques Storage security |
ISO/IEC 27042:2015
|
Information technology Security techniques Guidelines for the analysis and interpretation of digital evidence |
ISO/TS 14441:2013
|
Health informatics — Security and privacy requirements of EHR systems for use in conformity assessment |
ISO/IEC 27001:2013
|
Information technology — Security techniques — Information security management systems — Requirements |
EN ISO/IEC 27002:2017
|
Information technology - Security techniques - Code of practice for information security controls (ISO/IEC 27002:2013 including Cor 1:2014 and Cor 2:2015) |
EN ISO/IEC 27040:2016
|
Information technology - Security techniques - Storage security (ISO/IEC 27040:2015) |
EN ISO 27799:2016
|
Health informatics - Information security management in health using ISO/IEC 27002 (ISO 27799:2016) |
EN ISO/IEC 27001:2017
|
Information technology - Security techniques - Information security management systems - Requirements (ISO/IEC 27001:2013 including Cor 1:2014 and Cor 2:2015) |
EN ISO/IEC 27041:2016
|
Information technology - Security techniques - Guidance on assuring suitability and adequacy of incident investigative method (ISO/IEC 27041:2015) |
EN ISO/IEC 27037:2016
|
Information technology - Security techniques - Guidelines for identification, collection, acquisition and preservation of digital evidence (ISO/IEC 27037:2012) |
EN 16495:2014
|
Air Traffic Management - Information security for organisations supporting civil aviation operations |
I.S. EN ISO 19011:2011
|
GUIDELINES FOR AUDITING MANAGEMENT SYSTEMS (ISO 19011:2011) |
17/30355188 DC : 0
|
BS ISO/IEC 24748-1 - SYSTEMS AND SOFTWARE ENGINEERING - LIFE CYCLE MANAGEMENT - PART 1: GUIDELINES FOR LIFE CYCLE MANAGEMENT |
BS ISO/IEC 27014:2013
|
Information technology. Security techniques. Governance of information security |
BS EN 15224:2016
|
Quality management systems. EN ISO 9001:2015 for healthcare |
BS ISO/IEC 27036-2:2014
|
Information technology. Security techniques. Information security for supplier relationships Requirements |
12/30249606 DC : 0
|
BS EN 62645 ED 1.0 - NUCLEAR POWER PLANTS - INSTRUMENTATION AND CONTROL SYSTEMS - REQUIREMENT S FOR SECURITY PROGRAMMES FOR COMPUTER-BASED SYSTEMS |
BS ISO/IEC 27036-3:2013
|
Information technology. Security techniques. Information security for supplier relationships Guidelines for information and communication technology supply chain security |
UNI EN ISO 21091 : 2013
|
HEALTH INFORMATICS - DIRECTORY SERVICES FOR HEALTHCARE PROVIDERS, SUBJECTS OF CARE AND OTHER ENTITIES |
14/30315737 DC : 0
|
PD ISO/IEC/PAS 20243 - OPEN TRUSTED TECHNOLOGY PROVIDER STANDARD (O-TTPS) - MITIGATING MALICIOUSLY TAINTED AND COUNTERFEIT PRODUCTS |
BS EN ISO/IEC 27042:2016
|
INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - GUIDELINES FOR THE ANALYSIS AND INTERPRETATION OF DIGITAL EVIDENCE (ISO/IEC 27042:2015) |
INCITS/ISO/IEC 24745 : 2012(R2017)
|
INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - BIOMETRIC INFORMATION PROTECTION |
18/30358588 DC : 0
|
BS EN ISO 29001 - PETROLEUM, PETROCHEMICAL AND NATURAL GAS INDUSTRIES - SECTOR-SPECIFIC QUALITY MANAGEMENT SYSTEMS - REQUIREMENTS FOR PRODUCT AND SERVICE SUPPLY ORGANIZATIONS |
BS ISO/IEC 27050-3:2017
|
INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - ELECTRONIC DISCOVERY - PART 3: CODE OF PRACTICE FOR ELECTRONIC DISCOVERY |
I.S. EN ISO 27789:2013
|
HEALTH INFORMATICS - AUDIT TRAILS FOR ELECTRONIC HEALTH RECORDS (ISO 27789:2013) |
I.S. EN 50657:2017
|
RAILWAYS APPLICATIONS - ROLLING STOCK APPLICATIONS - SOFTWARE ON BOARD ROLLING STOCK |
PD ISO/IEC TR 20000-11:2015
|
Information technology. Service management Guidance on the relationship between ISO/IEC 20000-1:2011 and service management frameworks: ITIL® |
BS ISO/IEC 20243-1:2018
|
Information technology. Open Trusted Technology ProviderTM Standard (O-TTPS). Mitigating maliciously tainted and counterfeit products Requirements and recommendations |
CAN/CSA-ISO/IEC 17789:16
|
Information technology Cloud computing Reference architecture (Adopted ISO/IEC 17789:2014, first edition, 2014-10-15) |
16/30338037 DC : 0
|
BS ISO/IEC 30754 - INFORMATION TECHNOLOGY - SOFTWARE TRUSTWORTHINESS - GOVERNANCE AND MANAGEMENT - SPECIFICATION |
BS ISO 30300:2011
|
Information and documentation. Management systems for records. Fundamentals and vocabulary |
ISO/IEC/IEEE 12207:2017
|
Systems and software engineering — Software life cycle processes |
ISO/IEC 27035-1:2016
|
Information technology — Security techniques — Information security incident management — Part 1: Principles of incident management |
DIN ISO/IEC 17789 E : 2017
|
INFORMATION TECHNOLOGY - CLOUD COMPUTING - REFERENCE ARCHITECTURE (ISO/IEC 17789:2014) |
BS ISO/IEC 27033-6 : 2016
|
INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - NETWORK SECURITY - SECURING WIRELESS IP NETWORK ACCESS |
CSA ISO/IEC 27007 : 2013
|
INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - GUIDELINES FOR INFORMATION SECURITY MANAGEMENT SYSTEMS AUDITING |
CEI UNI ISO/IEC 20000-1 : 2012
|
INFORMATION TECHNOLOGY - SERVICE MANAGEMENT - PART 1: SERVICE MANAGEMENT SYSTEM REQUIREMENTS |
NASA CCSDS 350.7-G : ISSUE 1
|
SECURITY GUIDE FOR MISSION PLANNERS |
PD ISO/IEC TS 24748-1:2016
|
Systems and software engineering. Life cycle management Guidelines for life cycle management |
BS ISO/IEC 27033-2:2012
|
INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - NETWORK SECURITY - PART 2: GUIDELINES FOR THE DESIGN AND IMPLEMENTATION OF NETWORK SECURITY |
15/30259619 DC : 0
|
BS ISO/IEC 27017 - INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - CODE OF PRACTICE FOR INFORMATION SECURITY CONTROLS BASED ON ISO/IEC 27002 FOR CLOUD SERVICES |
BS ISO/IEC 27001 : 2013
|
INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - INFORMATION SECURITY MANAGEMENT SYSTEMS - REQUIREMENTS |
PD ISO/IEC TS 33072:2016
|
Information technology. Process assessment. Process capability assessment model for information security management |
ISO/IEC 17788:2014
|
Information technology — Cloud computing — Overview and vocabulary |
ISO/IEC TR 20000-12:2016
|
Information technology Service management Part 12: Guidance on the relationship between ISO/IEC 20000-1:2011 and service management frameworks: CMMI-SVC |
ISO/IEC 20243-1:2018
|
Information technology — Open Trusted Technology ProviderTM Standard (O-TTPS) — Mitigating maliciously tainted and counterfeit products — Part 1: Requirements and recommendations |
DIN ISO/IEC 27018:2017-08
|
INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - CODE OF PRACTICE FOR PROTECTION OF PERSONALLY IDENTIFIABLE INFORMATION (PII) IN PUBLIC CLOUDS ACTING AS PII PROCESSORS (ISO/IEC 27018:2014) |
PD ISO/IEC TR 20000-10:2015
|
Information technology. Service management Concepts and terminology |
16/30333228 DC : 0
|
BS ISO/IEC 38505-1 - INFORMATION TECHNOLOGY - GOVERNANCE OF IT - PART 1: THE APPLICATION OF ISO/IEC 38500 TO THE GOVERNANCE OF DATA |
UNI CEI ISO/IEC 20000-1 : 2012
|
INFORMATION TECHNOLOGY - SERVICE MANAGEMENT - PART 1: SERVICE MANAGEMENT SYSTEM REQUIREMENTS |
PD CEN ISO/TS 14441:2013
|
Health informatics. Security and privacy requirements of EHR systems for use in conformity assessment |
13/30260172 DC : 0
|
BS ISO/IEC 27043 - INVESTIGATION TECHNOLOGY - SECURITY TECHNIQUES - INCIDENT INVESTIGATION PRINCIPLES AND PROCESSES |
INCITS/ISO/IEC 27043 : 2017
|
INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - INCIDENT INVESTIGATION PRINCIPLES AND PROCESSES |
11/30207802 DC : 0
|
BS ISO/IEC 27013 - INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - GUIDELINES ON THE INTEGRATED IMPLEMENTATION OF ISO/IEC 27001 AND ISO/IEC 20000-1 |
BS ISO/IEC 27034-1:2011
|
INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - APPLICATION SECURITY - PART 1: OVERVIEW AND CONCEPTS |
BS ISO/IEC 27021:2017
|
Information technology. Security techniques. Competence requirements for information security management systems professionals |
BS ISO/IEC 27013:2015
|
Information technology. Security techniques. Guidance on the integrated implementation of ISO/IEC 27001 and ISO/IEC 20000-1 |
PD CEN/TS 16439:2013
|
Electronic fee collection. Security framework |
PD ISO/IEC TR 27016:2014
|
Information technology. Security techniques. Information security management. Organizational economics |
14/30260169 DC : 0
|
BS ISO/IEC 27042 - INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - GUIDELINES FOR THE ANALYSIS AND INTERPRETATION OF DIGITAL EVIDENCE |
BS ISO/IEC 27004:2016
|
Information technology. Security techniques. Information security management. Monitoring, measurement, analysis and evaluation |
BS ISO/IEC 30111:2013
|
Information technology. Security techniques. Vulnerability handling processes |
CSA ISO 9004 : 2009
|
MANAGING FOR THE SUSTAINED SUCCESS OF AN ORGANIZATION - A QUALITY MANAGEMENT APPROACH |
CAN/CSA-ISO/IEC TR 20000-12:18
|
Information technology — Service management — Part 12: Guidance on the relationship between ISO/IEC 20000-1:2011 and service management frameworks: CMMI-SVC (Adopted ISO/IEC TR 20000-12:2016, first edition, 2016-10-01) |
CAN/CSA-ISO/CEI 27001:14
|
INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - INFORMATION SECURITY MANAGEMENT SYSTEMS - REQUIREMENTS |
GS ISI 002 : 1.2.1
|
INFORMATION SECURITY INDICATORS (ISI); EVENT MODEL A SECURITY EVENT CLASSIFICATION MODEL AND TAXONOMY |
ISO/IEC 27007:2017
|
Information technology Security techniques Guidelines for information security management systems auditing |
I.S. EN 16495:2014
|
AIR TRAFFIC MANAGEMENT - INFORMATION SECURITY FOR ORGANISATIONS SUPPORTING CIVIL AVIATION OPERATIONS |
IEEE/ISO/IEC 15026-1-2014
|
ADOPTION OF ISO/IEC 15026-1 - SYSTEMS AND SOFTWARE ENGINEERING - SYSTEMS AND SOFTWARE ASSURANCE - PART 1: CONCEPTS AND VOCABULARY |
I.S. EN ISO 9004:2009
|
QUALITY MANAGEMENT - QUALITY OF AN ORGANIZATION - GUIDANCE TO ACHIEVE SUSTAINED SUCCESS (ISO 9004:2018) |
ISO/IEC 29151:2017
|
Information technology — Security techniques — Code of practice for personally identifiable information protection |
ISO 9004:2018
|
Quality management — Quality of an organization — Guidance to achieve sustained success |
S.R. CEN/TS 16850:2015
|
SOCIETAL AND CITIZEN SECURITY - GUIDANCE FOR MANAGING SECURITY IN HEALTHCARE FACILITIES |
I.S. EN ISO/IEC 27040:2016
|
INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - STORAGE SECURITY (ISO/IEC 27040:2015) |
S.R. CEN/TS 16439:2013
|
ELECTRONIC FEE COLLECTION - SECURITY FRAMEWORK |
INCITS/ISO/IEC 27001 : 2014
|
INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - INFORMATION SECURITY MANAGEMENT SYSTEMS - REQUIREMENTS |
ISO/TS 17582:2014
|
Quality management systems Particular requirements for the application of ISO 9001:2008 for electoral organizations at all levels of government |
ISO/IEC 27014:2013
|
Information technology Security techniques Governance of information security |
ISO/IEC 27036-2:2014
|
Information technology Security techniques Information security for supplier relationships Part 2: Requirements |
CSA ISO/IEC TS 24748-1 : 2018
|
SYSTEMS AND SOFTWARE ENGINEERING - LIFE CYCLE MANAGEMENT - PART 1: GUIDELINES FOR LIFE CYCLE MANAGEMENT |
UNI CEI ISO/IEC 27002 : 2014
|
INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - CODE OF PRACTICE FOR INFORMATION SECURITY CONTROLS |
CAN/CSA-ISO/IEC 27006:16
|
Information technology - Security techniques - Requirements for bodies providing audit and certification of information security management systems (Adopted ISO/IEC 27006:2015, third edition, 2015-10-01) |
UNE-EN ISO 19011:2012
|
Guidelines for auditing management systems (ISO 19011:2011) |
ISO/IEC 27006:2015
|
Information technology — Security techniques — Requirements for bodies providing audit and certification of information security management systems |
ISO/IEC 17789:2014
|
Information technology — Cloud computing — Reference architecture |
ISO/IEC 24745:2011
|
Information technology Security techniques Biometric information protection |
EN ISO 12813:2015/A1:2017
|
ELECTRONIC FEE COLLECTION - COMPLIANCE CHECK COMMUNICATION FOR AUTONOMOUS SYSTEMS (ISO 12813:2015) |
ISO/TS 13131:2014
|
Health informatics Telehealth services Quality planning guidelines |
ISO 27789:2013
|
Health informatics Audit trails for electronic health records |
ISO/IEC 20000-1:2011
|
Information technology Service management Part 1: Service management system requirements |
DIN EN 15224:2017-05
|
QUALITY MANAGEMENT SYSTEMS - EN ISO 9001:2015 FOR HEALTHCARE |
EN ISO 27789:2013
|
Health informatics - Audit trails for electronic health records (ISO 27789:2013) |
CEN/TS 16439:2013
|
Electronic fee collection - Security framework |
CEN/TR 16742 : 2014
|
INTELLIGENT TRANSPORT SYSTEMS - PRIVACY ASPECTS IN ITS STANDARDS AND SYSTEMS IN EUROPE |