I.S. EN ISO 19011:2011
|
GUIDELINES FOR AUDITING MANAGEMENT SYSTEMS (ISO 19011:2011) |
12/30236518 DC : 0
|
BS ISO/IEC 27000 - INFORMATION SECURITY - SECURITY TECHNIQUES - INFORMATION SECURITY MANAGEMENT SYSTEMS - OVERVIEW AND VOCABULARY |
I.S. ISO/IEC 27001:2013
|
INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - INFORMATION SECURITY MANAGEMENT SYSTEMS - REQUIREMENTS |
AAMI IEC TIR 80001-2-2 : 2012
|
APPLICATION OF RISK MANAGEMENT FOR IT-NETWORKS INCORPORATING MEDICAL DEVICES - PART 2-2: GUIDANCE FOR THE DISCLOSURE AND COMMUNICATION OF MEDICAL DEVICE SECURITY NEEDS, RISKS AND CONTROLS |
07/30117272 DC : 0
|
BS ISO/IEC 27005 - INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - INFORMATION SECURITY RISK MANAGEMENT |
BS ISO/IEC 29134:2017
|
Information technology. Security techniques. Guidelines for privacy impact assessment |
BS ISO/IEC 19770-1:2017
|
Information technology. IT asset management IT asset management systems. Requirements |
CSA ISO/IEC TR 24729-4:14 (R2019)
|
Information technology - Radio frequency identification for item management - Implementation guidelines - Part 4: Tag data security (Adopted ISO/IEC TR 24729-4:2009, first edition, 2009-03-15) |
PD CEN/TS 16850:2015
|
Societal and Citizen Security. Guidance for managing security in healthcare facilities |
BS IEC 62855:2016
|
Nuclear power plants. Electrical power systems. Electrical power systems analysis |
18/30361485 DC : 0
|
BS ISO/IEC 19896-3 - INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - COMPETENCE REQUIREMENTS FOR INFORMATION SECURITY TESTERS AND EVALUATORS - PART 3: KNOWLEDGE, SKILLS AND EFFECTIVENESS REQUIREMENTS FOR ISO/IEC 15408 EVALUATORS |
18/30346433 DC : 0
|
BS ISO/IEC 19086-4 - INFORMATION TECHNOLOGY - CLOUD COMPUTING SERVICE LEVEL AGREEMENT (SLA) FRAMEWORK - PART 4: SECURITY AND PRIVACY |
PD ISO/TR 12859:2009
|
Intelligent transport systems. System architecture. Privacy aspects in ITS standards and systems |
DD ISO/TS 21547:2010
|
Health informatics. Security requirements for archiving of electronic health records. Principles |
12/30232747 DC : DRAFT JAN 2013
|
BS ISO/IEC 29182-4 - INFORMATION TECHNOLOGY-SENSOR NETWORKS: SENSOR NETWORK REFERENCE ARCHITECTURE (SNRA) - PART 4: ENTITY MODELS |
BS ISO/IEC 27037 : 2012
|
INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - GUIDELINES FOR IDENTIFICATION, COLLECTION, ACQUISITION, AND PRESERVATION OF DIGITAL EVIDENCE |
PD CEN/TS 15480-4:2012
|
Identification card systems. European Citizen Card Recommendations for European Citizen Card issuance, operation and use |
11/30168516 DC : 0
|
BS ISO/IEC 27032 - INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - GUIDELINES FOR CYBERSECURITY |
15/30299331 DC : 0
|
BS ISO/IEC 27011 - INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - CODE OF PRACTICE FOR INFORMATION SECURITY CONTROLS BASED ON ISO/IEC 27002 FOR TELECOMMUNICATIONS ORGANIZATIONS |
15/30285726 DC : 0
|
BS ISO/IEC 27009 - INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - SECTOR-SPECIFIC APPLICATION OF ISO/IEC 27001 - REQUIREMENTS |
12/30269414 DC : 0
|
BS EN 16495 - AIR TRAFFIC MANAGEMENT - INFORMATION SECURITY FOR ORGANISATIONS SUPPORTING CIVIL AVIATION OPERATIONS |
DIN EN ISO/IEC 27001:2017-06
|
Information technology - Security techniques - Information security management systems - Requirements (ISO/IEC 27001:2013 including Cor 1:2014 and Cor 2:2015) |
15/30319488 DC : 0
|
BS ISO/IEC 27000 - INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - INFORMATION SECURITY MANAGEMENT SYSTEMS - OVERVIEW AND VOCABULARY |
CSA ISO/IEC 27000 : 2018
|
INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - INFORMATION SECURITY MANAGEMENT SYSTEMS - OVERVIEW AND VOCABULARY |
BIP 0064 : 2007
|
INFORMATION SECURITY INCIDENT MANAGEMENT - A METHODOLOGY |
BS ISO/IEC 19086-1:2016
|
Information technology. Cloud computing. Service level agreement (SLA) framework Overview and concepts |
PD CEN/TR 16742:2014
|
Intelligent transport systems. Privacy aspects in ITS standards and systems in Europe |
OLF 104 : 2016
|
INFORMATION SECURITY BASELINE REQUIREMENTS FOR PROCESS CONTROL, SAFETY AND SUPPORT ICT SYSTEMS |
ISO/IEC 38505-1:2017
|
Information technology — Governance of IT — Governance of data — Part 1: Application of ISO/IEC 38500 to the governance of data |
PD ISO/IEC TR 20000-5:2013
|
Information technology. Service management Exemplar implementation plan for ISO/IEC 20000-1 |
11/30192880 DC : 0
|
BS ISO 22857 - HEALTH INFORMATICS - GUIDELINES ON DATA PROTECTION TO FACILITATE TRANS-BORDER FLOWS OF PERSONAL HEALTH INFORMATION |
ISO/IEC 29182-1:2013
|
Information technology Sensor networks: Sensor Network Reference Architecture (SNRA) Part 1: General overview and requirements |
BS TICKIT GUIDE : ISSUE 5.5
|
A GUIDE TO SOFTWARE QUALITY MANAGEMENT SYSTEM CONSTRUCTION AND CERTIFICATION TO ISO 9001:2000 |
17/30351843 DC : 0
|
BS 10754-1 - INFORMATION TECHNOLOGY - SOFTWARE TRUSTWORTHINESS - PART 1 - GOVERNANCE AND MANAGEMENT SPECIFICATION |
EN 319 401 : 2.2.1
|
ELECTRONIC SIGNATURES AND INFRASTRUCTURES (ESI); GENERAL POLICY REQUIREMENTS FOR TRUST SERVICE PROVIDERS |
PD ISO/IEC TR 20000-3:2009
|
Information technology. Service management Guidance on scope definition and applicability of ISO/IEC 20000-1 |
14/30268906 DC : 0
|
BS ISO/IEC 17789 - INFORMATION TECHNOLOGY - CLOUD COMPUTING - REFERENCE ARCHITECTURE |
BS ISO 22313 : 2012
|
SOCIETAL SECURITY - BUSINESS CONTINUITY MANAGEMENT SYSTEMS - GUIDANCE |
12/30204847 DC : 0
|
BS ISO/IEC 29147 - INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - VULNERABILITY DISCLOSURE |
BS ISO/IEC 27000 : 2016
|
INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - INFORMATION SECURITY MANAGEMENT SYSTEMS - OVERVIEW AND VOCABULARY |
CAN/CSA-ISO/IEC 27034-1:12 (R2017)
|
Information technology - Security techniques - Application security - Part 1: Overview and concepts (Adopted ISO/IEC 27034-1:2011, first edition, 2011-11-15) |
ISO 19011:2011
|
Guidelines for auditing management systems |
ISO/IEC 27017:2015
|
Information technology — Security techniques — Code of practice for information security controls based on ISO/IEC 27002 for cloud services |
BS EN ISO/IEC 27037:2016
|
Information technology. Security techniques. Guidelines for identification, collection, acquisition and preservation of digital evidence |
DD IEC/PAS 62443-3:2008
|
Security for industrial process measurement and control Network and system security |
BS ISO/IEC 15026-4:2012
|
Systems and software engineering. Systems and software assurance Assurance in the life cycle |
12/30249455 DC : 0
|
BS ISO/IEC 27036-1 - INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - INFORMATION SECURITY FOR SUPPLIER RELATIONSHIPS - PART 1: OVERVIEW AND CONCEPTS |
DIN EN ISO 22600-2 E : 2015
|
HEALTH INFORMATICS - PRIVILEGE MANAGEMENT AND ACCESS CONTROL - PART 2: FORMAL MODELS (ISO 22600-2:2014) |
INCITS/ISO/IEC 27011 : 2009(R2014)
|
INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - INFORMATION SECURITY MANAGEMENT GUIDELINES FOR TELECOMMUNICATIONS ORGANIZATIONS BASED ON ISO/IEC 27002 |
ISO/IEC 27009:2016
|
Information technology Security techniques Sector-specific application of ISO/IEC 27001 Requirements |
CAN/CSA-ISO/IEC 27033-1:16
|
Information technology - Security techniques - Network security - Part 1: Overview and concepts (Adopted ISO/IEC 27033-1:2015, second edition, 2015-08-15) |
INCITS/ISO/IEC 29182-4 : 2014
|
INFORMATION TECHNOLOGY - SENSOR NETWORKS: SENSOR NETWORK REFERENCE ARCHITECTURE (SNRA) - PART 4: ENTITY MODELS |
CSA TELECOM ORGANIZATIONS PACKAGE : 2018
|
CONSISTS OF CAN/CSA-ISO/IEC 27000:18 - INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - INFORMATION SECURITY MANAGEMENT SYSTEMS - OVERVIEW AND VOCABULARY; CAN/CSA-ISO/IEC 27001:14, INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - INFORMATION SECURITY MANAGEMENT SYSTEMS - REQUIREMENTS; CAN/CSA-ISO/IEC 27002:15 - INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - CODE OF PRACTICE FOR |
CSA ISO/IEC 27034-1:2012
|
INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - APPLICATION SECURITY - PART 1: OVERVIEW AND CONCEPTS |
PD ISO/TR 18638:2017
|
Health informatics. Guidance on health information privacy education in healthcare organizations |
S.R. CEN ISO/TS 14441:2013
|
HEALTH INFORMATICS - SECURITY AND PRIVACY REQUIREMENTS OF EHR SYSTEMS FOR USE IN CONFORMITY ASSESSMENT (ISO/TS 14441:2013) |
ISO/IEC TR 27016:2014
|
Information technology Security techniques Information security management Organizational economics |
INCITS/ISO/IEC 27039 : 2017
|
INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - SELECTION, DEPLOYMENT AND OPERATIONS OF INTRUSION DETECTION AND PREVENTION SYSTEMS (IDPS) |
CSA ISO/IEC 24762: 2008
|
INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - GUIDELINES FOR INFORMATION AND COMMUNICATIONS TECHNOLOGY DISASTER RECOVERY SERVICES |
ISO/TS 21089:2018
|
Health informatics Trusted end-to-end information flows |
CSA ISO/IEC TR 27008 : 2013 : R2017
|
INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - GUIDELINES FOR AUDITORS ON INFORMATION SECURITY CONTROLS |
I.S. EN 16747:2015
|
MARITIME AND PORT SECURITY SERVICES |
ISO/IEC 27036-2:2014
|
Information technology Security techniques Information security for supplier relationships Part 2: Requirements |
PD ISO/IEC/TR 15026-1:2010
|
Systems and software engineering. Systems and software assurance Concepts and vocabulary |
ISO/TS 13606-4:2009
|
Health informatics Electronic health record communication Part 4: Security |
ISO/IEC TR 27023:2015
|
Information technology — Security techniques — Mapping the revised editions of ISO/IEC 27001 and ISO/IEC 27002 |
AAMI/IEC TIR80001-2-3:2012
|
APPLICATION OF RISK MANAGEMENT FOR IT-NETWORKS INCORPORATING MEDICAL DEVICES - PART 2-3: GUIDANCE FOR WIRELESS NETWORKS |
DIN EN ISO/IEC 27040:2016-04 (Draft)
|
INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - STORAGE SECURITY (ISO/IEC 27040:2015) |
ISO/IEC 27033-2:2012
|
Information technology — Security techniques — Network security — Part 2: Guidelines for the design and implementation of network security |
ISO 10008:2013
|
Quality management — Customer satisfaction — Guidelines for business-to-consumer electronic commerce transactions |
BS EN ISO/IEC 27000:2017
|
Information technology. Security techniques. Information security management systems. Overview and vocabulary |
CAN/CSA-ISO/IEC 27011:18
|
Information technology ? Security techniques ? Code of practice for information security controls based on ISO/IEC 27002 for telecommunications organizations (Adopted ISO/IEC 27011:2016, second edition, 2016-12-01) |
UNI EN ISO 22600-2 : 2014
|
HEALTH INFORMATICS - PRIVILEGE MANAGEMENT AND ACCESS CONTROL - PART 2: FORMAL MODELS |
UNI EN ISO 19011 : 2012
|
GUIDELINES FOR AUDITING MANAGEMENT SYSTEMS |
I.S. EN ISO 22313:2014
|
SOCIETAL SECURITY - BUSINESS CONTINUITY MANAGEMENT SYSTEMS - GUIDANCE (ISO 22313:2012) |
EN IEC 62443-4-1:2018
|
Security for industrial automation and control systems - Part 4-1: Secure product development lifecycle requirements |
I.S. EN ISO 27799:2016
|
HEALTH INFORMATICS - INFORMATION SECURITY MANAGEMENT IN HEALTH USING ISO/IEC 27002 |
CEN/TS 17159:2018
|
Societal and citizen security - Guidance for the security of hazardous materials (CBRNE) in healthcare facilities |
ISO/IEC 19086-1:2016
|
Information technology Cloud computing Service level agreement (SLA) framework Part 1: Overview and concepts |
ISO/IEC 27000:2018
|
Information technology — Security techniques — Information security management systems — Overview and vocabulary |
14/30249803 DC : 0
|
BS ISO/IEC 27040 - INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - STORAGE SECURITY |
ISO/IEEE 11073-00103:2015
|
Health informatics Personal health device communication Part 00103: Overview |
IEC 61069-5:2016
|
Industrial-process measurement, control and automation - Evaluation of system properties for the purpose of system assessment - Part 5: Assessment of system dependability |
CEN ISO/TS 19299 : 2015
|
ELECTRONIC FEE COLLECTION - SECURITY FRAMEWORK (ISO/TS 19299:2015) |
CEN/TS 15480-4:2012
|
Identification card systems - European Citizen Card - Part 4: Recommendations for European Citizen Card issuance, operation and use |
CEN/TS 16850:2015
|
Societal and Citizen Security - Guidance for managing security in healthcare facilities |
DIN ISO/IEC 17789:2017-07
|
INFORMATION TECHNOLOGY - CLOUD COMPUTING - REFERENCE ARCHITECTURE (ISO/IEC 17789:2014) |
PD ISO/IEC TR 27019:2013
|
Information technology. Security techniques. Information security management guidelines based on ISO/IEC 27002 for process control systems specific to the energy utility industry |
ISO/TR 21548:2010
|
Health informatics Security requirements for archiving of electronic health records Guidelines |
15/30299325 DC : 0
|
BS ISO/IEC 27013 - INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - GUIDANCE ON THE INTEGRATED IMPLEMENTATION OF ISO/IEC 27001 AND ISO/IEC 20000-1 |
TR 101 564 : 1.1.1
|
ELECTRONIC SIGNATURES AND INFRASTRUCTURES (ESI); GUIDANCE ON ETSI TS 102 042 FOR ISSUING EXTENDED VALIDATION CERTIFICATES FOR AUDITORS AND CSPS |
DIN ISO/IEC 27001 : 2017
|
INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - INFORMATION SECURITY MANAGEMENT SYSTEMS - REQUIREMENTS (ISO/IEC 27001:2013 + COR. 1:2014) |
INCITS/ISO/IEC 27037 : 2014
|
INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - GUIDELINES FOR IDENTIFICATION, COLLECTION, ACQUISITION AND PRESERVATION OF DIGITAL EVIDENCE |
DIN EN ISO/IEC 27001 E : 2017
|
INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - INFORMATION SECURITY MANAGEMENT SYSTEMS - REQUIREMENTS (ISO/IEC 27001:2013 INCLUDING COR 1:2014 AND COR 2:2015) |
CSA ISO/IEC 27018 : 2015
|
INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - CODE OF PRACTICE FOR PROTECTION OF PERSONALLY IDENTIFIABLE INFORMATION (PII) IN PUBLIC CLOUDS ACTING AS PII PROCESSORS |
18/30348902 DC : 0
|
BS ISO/IEC 21878 - INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - SECURITY GUIDELINES FOR DESIGN AND IMPLEMENTATION OF VIRTUALIZED SERVERS |
BS ISO/IEC 15408-1:2009
|
Information technology. Security techniques. Evaluation criteria for IT security Introduction and general model |
ISO/IEC TR 27103:2018
|
Information technology — Security techniques — Cybersecurity and ISO and IEC Standards |
SAE AS 9115 : 2017
|
QUALITY MANAGEMENT SYSTEMS - REQUIREMENTS FOR AVIATION, SPACE, AND DEFENSE ORGANIZATIONS - DELIVERABLE SOFTWARE (SUPPLEMENT TO 9100:2016) |
15/30279952 DC : 0
|
BS ISO/IEC 30124 - CODE OF PRACTICE FOR THE IMPLEMENTATION OF A BIOMETRIC SYSTEM |
16/30286013 DC : 0
|
BS ISO/IEC 27003 - INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - INFORMATION SECURITY MANAGEMENT SYSTEM - GUIDANCE |
BS ISO/IEEE 11073-00103 : 2015
|
HEALTH INFORMATICS - PERSONAL HEALTH DEVICE COMMUNICATION - PART 00103: OVERVIEW |
BS EN ISO 9004:2018
|
Quality management. Quality of an organization. Guidance to achieve sustained success |
DIN ISO/IEC 27000:2015-12 (Draft)
|
INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - INFORMATION SECURITY MANAGEMENT SYSTEMS - OVERVIEW AND VOCABULARY |
TS 102 573 : 2.1.1
|
ELECTRONIC SIGNATURES AND INFRASTRUCTURES (ESI); POLICY REQUIREMENTS FOR TRUST SERVICE PROVIDERS SIGNING AND/OR STORING DATA OBJECTS |
13/30268559 DC : 0
|
BS ISO/IEC 15026-1 - SYSTEMS AND SOFTWARE ENGINEERING - SYSTEMS AND SOFTWARE ASSURANCE - PART 1: CONCEPTS AND VOCABULARY |
BIS IS/ISO/IEC 27005 : 2008
|
INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - INFORMATION SECURITY RISK MANAGEMENT |
16/30313398 DC : 0
|
BS ISO/IEC 15944-12 - INFORMATION TECHNOLOGY - BUSINESS OPERATIONAL VIEW - PART 12: PRIVACY PROTECTION REQUIREMENTS ON INFORMATION LIFE CYCLE MANAGEMENT (ILCM) AND EDI OF PERSONAL INFORMATION |
17/30347919 DC : 0
|
BS ISO 10005 - QUALITY MANAGEMENT SYSTEMS - GUIDELINES FOR QUALITY PLANS |
15/30268877 DC : 0
|
BS ISO/IEC 27035-2 - INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - INFORMATION SECURITY INCIDENT MANAGEMENT - PART 2: GUIDELINES TO PLAN AND PREPARE FOR INCIDENT RESPONSE |
11/30204593 DC : DRAFT MAY 2011
|
BS ISO/IEC 27010 - INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - INFORMATION SECURITY MANAGEMENT FOR INTER-SECTOR AND INTER-ORGANIZATIONAL COMMUNICATIONS |
BS ISO/IEC 27010:2015
|
Information technology. Security techniques. Information security management for inter-sector and inter-organizational communications |
BS ISO 17090-1:2013
|
Health informatics. Public key infrastructure Overview of digital certificate services |
PD IEC/TR 62351-10:2012
|
Power systems management and associated information exchange. Data and communications security Security architecture guidelines |
BS ISO/IEC 24762:2008
|
Information technology. Security techniques. Guidelines for information and communications technology disaster recovery services |
PD ISO/IEC TR 27023:2015
|
Information technology. Security techniques. Mapping the revised editions of ISO/IEC 27001 and ISO/IEC 27002 |
ISO/IEC TR 20000-3:2009
|
Information technology — Service management — Part 3: Guidance on scope definition and applicability of ISO/IEC 20000-1 |
BS ISO/IEC 17789:2014
|
Information technology. Cloud computing. Reference architecture |
PD ISO/IEC TR 27008:2011
|
Information technology. Security techniques. Guidelines for auditors on information security controls |
09/30168526 DC : 0
|
BS ISO/IEC 27033-1 - INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - NETWORK SECURITY - PART 1: GUIDELINES FOR NETWORK SECURITY |
UNI CEI ISO/IEC 27001 : 2014
|
INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - INFORMATION SECURITY MANAGEMENT SYSTEMS - REQUIREMENTS |
17/30354834 DC : 0
|
BS EN ISO 19011 - GUIDELINES FOR AUDITING MANAGEMENT SYSTEMS |
EN 319 411-2 : 2.2.2
|
ELECTRONIC SIGNATURES AND INFRASTRUCTURES (ESI); POLICY AND SECURITY REQUIREMENTS FOR TRUST SERVICE PROVIDERS ISSUING CERTIFICATES; PART 2: REQUIREMENTS FOR TRUST SERVICE PROVIDERS ISSUING EU QUALIFIED CERTIFICATES |
CAN/CSA-ISO/IEC 27013:16
|
Information technology - Security techniques - Guidance on the integrated implementation of ISO/IEC 27001 and ISO/IEC 20000-1 (Adopted ISO/IEC 27013:2015, second edition, 2015-12-01) |
BS ISO/IEC 27003:2017
|
Information technology. Security techniques. Information security management systems. Guidance |
BS ISO/IEC 29146:2016
|
Information technology. Security techniques. A framework for access management |
TR 101 533-2 : 1.3.1
|
ELECTRONIC SIGNATURES AND INFRASTRUCTURES (ESI); DATA PRESERVATION SYSTEMS SECURITY; PART 2: GUIDELINES FOR ASSESSORS |
17/30355373 DC : 0
|
BS ISO/IEC 27019 - INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - INFORMATION SECURITY CONTROLS FOR THE ENERGY UTILITY INDUSTRY |
PD ISO/TR 21548:2010
|
Health informatics. Security requirements for archiving of electronic health records. Guidelines |
BS EN 61069-5:2016
|
Industrial-process measurement, control and automation. Evaluation of system properties for the purpose of system assessment Assessment of system dependability |
PD ISO/TS 17975:2015
|
Health informatics. Principles and data requirements for consent in the Collection, Use or Disclosure of personal health information |
12/30192106 DC : 0
|
BS ISO/IEC 27033-4 - INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - IT NETWORK SECURITY - PART 4: SECURING COMMUNICATIONS BETWEEN NETWORKS USING SECURITY GATEWAYS |
BS ISO 12931:2012
|
Performance criteria for authentication solutions used to combat counterfeiting of material goods |
BS ISO/IEC 27035-2:2016
|
Information technology. Security techniques. Information security incident management Guidelines to plan and prepare for incident response |
BS EN ISO 22313:2014
|
SOCIETAL SECURITY - BUSINESS CONTINUITY MANAGEMENT SYSTEMS - GUIDANCE |
15/30192160 DC : 0
|
BS ISO/IEC 29146 - INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - A FRAMEWORK FOR ACCESS MANAGEMENT |
S.R. CEN/TS 16439:2013
|
ELECTRONIC FEE COLLECTION - SECURITY FRAMEWORK |
TS 102 640-4 : 2.1.2
|
ELECTRONIC SIGNATURES AND INFRASTRUCTURES (ESI); REGISTERED ELECTRONIC MAIL (REM) PART 4: REM-MD CONFORMANCE PROFILES |
UNI EN 16082 : 2011
|
AIRPORT AND AVIATION SECURITY SERVICES |
CAN/CSA-ISO/IEC 27031:13 (R2017)
|
Information technology - Security techniques - Guidelines for information and communication technology readiness for business continuity (Adopted ISO/IEC 27031:2011, first edition, 2011-03-01) |
BS ISO/IEC 27035-1:2016
|
Information technology. Security techniques. Information security incident management Principles of incident management |
ANSI X9.95 : 2016
|
FINANCIAL SERVICES - TRUSTED TIME STAMP MANAGEMENT AND SECURITY |
CSA ISO/IEC 27035 : 2013
|
INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - INFORMATION SECURITY INCIDENT MANAGEMENT |
CSA ISO/IEC 27035 : 2013 : R2017
|
INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - INFORMATION SECURITY INCIDENT MANAGEMENT |
CSA ISO/IEC 15408-1 : 2010
|
INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - EVALUATION CRITERIA FOR IT SECURITY - PART 1: INTRODUCTION AND GENERAL MODEL |
ISO/TR 11633-2:2009
|
Health informatics Information security management for remote maintenance of medical devices and medical information systems Part 2: Implementation of an information security management system (ISMS) |
TS 119 101 : 1.1.1
|
ELECTRONIC SIGNATURES AND INFRASTRUCTURES (ESI); POLICY AND SECURITY REQUIREMENTS FOR APPLICATIONS FOR SIGNATURE CREATION AND SIGNATURE VALIDATION |
CSA ISO/IEC TR 27008: 2013
|
INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - GUIDELINES FOR AUDITORS ON INFORMATION SECURITY CONTROLS |
INCITS/ISO/IEC 15408-1 : 2012
|
INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - EVALUATION CRITERIA FOR IT SECURITY - PART 1: INTRODUCTION AND GENERAL MODEL |
BS ISO/IEC 20000-3:2012
|
Information technology. Service management Guidance on scope definition and applicability of ISO/IEC 20000-1 |
CEI UNI ISO/IEC 27001 : 2014
|
INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - INFORMATION SECURITY MANAGEMENT SYSTEMS - REQUIREMENTS |
ISO/IEC TR 24729-4:2009
|
Information technology Radio frequency identification for item management Implementation guidelines Part 4: Tag data security |
TS 119 403 : 2.2.1
|
ELECTRONIC SIGNATURES AND INFRASTRUCTURES (ESI); TRUST SERVICE PROVIDER CONFORMITY ASSESSMENT - REQUIREMENTS FOR CONFORMITY ASSESSMENT BODIES ASSESSING TRUST SERVICE PROVIDERS |
ISO/IEC 29146:2016
|
Information technology — Security techniques — A framework for access management |
TR 103 123 : 1.1.1
|
ELECTRONIC SIGNATURES AND INFRASTRUCTURES (ESI); GUIDANCE FOR AUDITORS AND CSPS ON ETSI TS 102 042 FOR ISSUING PUBLICLY-TRUSTED TLS/SSL CERTIFICATES |
ISO/IEC 24767-1:2008
|
Information technology Home network security Part 1: Security requirements |
CSA ISO/IEC 27005 : 2011 : R2016
|
INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - INFORMATION SECURITY RISK MANAGEMENT |
ISO/IEC TS 20540:2018
|
Information technology — Security techniques — Testing cryptographic modules in their operational environment |
UNE-ISO/IEC TR 19791:2013 IN
|
Information technology. Security techniques. Security assessment of operational systems |
ISO/TR 11633-1:2009
|
Health informatics Information security management for remote maintenance of medical devices and medical information systems Part 1: Requirements and risk analysis |
ISO/IEC/IEEE 15289:2017
|
Systems and software engineering Content of life-cycle information items (documentation) |
ISO/TR 12859:2009
|
Intelligent transport systems System architecture Privacy aspects in ITS standards and systems |
S.R. CEN/TR 16742:2014
|
INTELLIGENT TRANSPORT SYSTEMS - PRIVACY ASPECTS IN ITS STANDARDS AND SYSTEMS IN EUROPE |
ABS 0252 : 2016
|
DATA INTEGRITY FOR MARINE AND OFFSHORE OPERATIONS - CYBERSAFETY[TM] VOLUME 3 |
ISO/IEC 27036-1:2014
|
Information technology Security techniques Information security for supplier relationships Part 1: Overview and concepts |
ISO/IEC 27034-1:2011
|
Information technology — Security techniques — Application security — Part 1: Overview and concepts |
ISO 21188:2018
|
Public key infrastructure for financial services — Practices and policy framework |
UNI CEN ISO/TS 14441 : 2014
|
HEALTH INFORMATICS - SECURITY AND PRIVACY REQUIREMENTS OF HER SYSTEMS FOR USE IN CONFORMITY ASSESSMENT |
CSA ISO/IEC 27005 : 2011
|
INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - INFORMATION SECURITY RISK MANAGEMENT |
BS ISO/IEC 29147:2014
|
Information technology. Security techniques. Vulnerability disclosure |
BS ISO/IEC/IEEE 15289:2011
|
Systems and software engineering. Content of life-cycle information products (documentation) |
DIN EN 16082:2011-11
|
Airport and aviation security services |
BS ISO/IEC/IEEE 15289:2019
|
Systems and software engineering. Content of life-cycle information items (documentation) |
CSA ISO/IEC TR 15026-1 : 2013
|
SYSTEMS AND SOFTWARE ENGINEERING - SYSTEMS AND SOFTWARE ASSURANCE - PART 1: CONCEPTS AND VOCABULARY |
UNI CEN/TS 15480-4 : 2012
|
IDENTIFICATION CARD SYSTEMS - EUROPEAN CITIZEN CARD - PART 4: RECOMMENDATIONS FOR EUROPEAN CITIZEN CARD ISSUANCE, OPERATION AND USE |
CSA ISO/IEC 15026-1 : 2015
|
SYSTEMS AND SOFTWARE ENGINEERING - SYSTEMS AND SOFTWARE ASSURANCE - PART 1: CONCEPTS AND VOCABULARY |
ISO/IEC 27005:2011
|
Information technology Security techniques Information security risk management |
IEC TR 80001-2-1:2012
|
Application of risk management for IT-networks incorporating medical devices - Part 2-1: Step by step risk management of medical IT-networks - Practical applications and examples |
ISO/IEC 27013:2015
|
Information technology Security techniques Guidance on the integrated implementation of ISO/IEC 27001 and ISO/IEC 20000-1 |
NEMA CPSP 1 : 2015
|
SUPPLY CHAIN BEST PRACTICES |
VDI/VDE 2182 Blatt 1:2011-01
|
IT-security for industrial automation - General model |
UNE-ISO/IEC 20000-2:2015
|
Information technology. Service management. Part 2: Guidance on the application of service management systems |
UNE-EN 16082:2012
|
Airport and aviation security services |
CSA ISO/IEC 27007 : 2013 : R2017
|
INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - GUIDELINES FOR INFORMATION SECURITY MANAGEMENT SYSTEMS AUDITING |
INCITS/ISO/IEC 24762 : 2009(R2014)
|
INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - GUIDELINES FOR INFORMATION AND COMMUNICATIONS TECHNOLOGY DISASTER RECOVERY SERVICES |
12/30209299 DC : 0
|
BS ISO 10008 - QUALITY MANAGEMENT - CUSTOMER SATISFACTION - GUIDELINES FOR BUSINESS-TO-CONSUMER ELECTRONIC COMMERCE TRANSACTIONS |
TR 103 305 : 1.1.1
|
CYBER; CRITICAL SECURITY CONTROLS FOR EFFECTIVE CYBER DEFENCE |
I.S. EN ISO 11073-00103:2017
|
HEALTH INFORMATICS - PERSONAL HEALTH DEVICE COMMUNICATION - PART 00103: OVERVIEW (ISO/IEEE 11073-00103:2015) |
PD ISO/IEC TR 15443-3:2007
|
Information technology. Security techniques. A framework for IT security assurance Analysis of assurance methods |
CEI EN 61069-5 : 1996
|
INDUSTRIAL-PROCESS MEASUREMENT, CONTROL AND AUTOMATION - EVALUATION OF SYSTEM PROPERTIES FOR THE PURPOSE OF SYSTEM ASSESSMENT - PART 5: ASSESSMENT OF SYSTEM DEPENDABILITY |
DIN EN ISO 22313:2016-05
|
SOCIETAL SECURITY - BUSINESS CONTINUITY MANAGEMENT SYSTEMS - GUIDANCE (ISO 22313:2012) |
BS PAS 7000(2014) : 2014
|
SUPPLY CHAIN RISK MANAGEMENT - SUPPLIER PREQUALIFICATION |
BS ISO/IEC 27035:2011
|
Information technology. Security techniques. Information security incident management |
17/30281253 DC : 0
|
BS ISO 21188 - PUBLIC KEY INFRASTRUCTURE FOR FINANCIAL SERVICES - PRACTICES AND POLICY FRAMEWORK |
16/30331802 DC : 0
|
BS EN 62887 ED 1.0 - NUCLEAR POWER PLANTS - INSTRUMENTATION SYSTEMS IMPORTANT TO SAFETY - PRESSURE TRANSMITTERS: CHARACTERISTICS AND TEST METHODS |
ISO/IEC TR 38505-2:2018
|
Information technology — Governance of IT — Governance of data — Part 2: Implications of ISO/IEC 38505-1 for data management |
17/30342692 DC : 0
|
BS ISO/IEC 27007 - INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - GUIDELINES FOR INFORMATION SECURITY MANAGEMENT SYSTEMS AUDITING |
14/30304350 DC : 0
|
BS EN ISO 27799 - HEALTH INFORMATICS - INFORMATION SECURITY MANAGEMENT IN HEALTH USING ISO/IEC 27002 |
11/30207799 DC : 0
|
BS ISO/IEC 27037 - INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - GUIDELINES FOR IDENTIFICATION, COLLECTION, ACQUISITION AND PRESERVATION OF DIGITAL EVIDENCE |
BS ISO/IEC 20000-2:2012
|
Information technology. Service management Guidance on the application of service management systems |
BIP 0139 : 2013
|
AN INTRODUCTION TO ISO/IEC 27001:2013 |
14/30278505 DC : 0
|
BS ISO/IEC 27033-1 - INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - NETWORK SECURITY PART 1: OVERVIEW AND CONCEPTS |
15/30285708 DC : 0
|
BS EN ISO 25237 - HEALTH INFORMATICS - PSEUDONYMISATION |
UNE-ISO/IEC 20000-3:2015
|
Information technology. Service management. Part 3: Guidance on scope definition and applicability of ISO/IEC 20000-1 |
BS ISO/IEC 27033-4:2014
|
Information technology. Security techniques. Network security Securing communications between networks using security gateways |
BS ISO/IEC 27009:2016
|
Information technology. Security techniques. Sector-specific application of ISO/IEC 27001. Requirements |
ISO/IEC TR 19791:2010
|
Information technology Security techniques Security assessment of operational systems |
DIN EN 16747 E : 2015
|
MARITIME AND PORT SECURITY SERVICES |
10/30184432 DC : 0
|
BS ISO/IEC 27035 - INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - INFORMATION SECURITY INCIDENT MANAGEMENT |
BS EN ISO/IEC 27001:2017
|
Information technology. Security techniques. Information security management systems. Requirements |
12/30257208 DC : DRAFT FEB 2012
|
BS ISO/IEC 20000-3 - INFORMATION TECHNOLOGY - SERVICE MANAGEMENT - PART 3: GUIDANCE ON SCOPE DEFINITION AND APPLICABILITY OF ISO/IEC 20000-1 |
UNE-EN ISO/IEC 27001:2017
|
Information technology - Security techniques - Information security management systems - Requirements (ISO/IEC 27001:2013 including Cor 1:2014 and Cor 2:2015) |
TS 118 111 : 2.4.1
|
ONEM2M; COMMON TERMINOLOGY (ONEM2M TS-0011 VERSION 2.4.1 RELEASE 2) |
OLF 112-2 : 2013
|
DEPLOYMENT OF RADIO FREQUENCY IDENTIFICATION (RFID) IN THE OIL AND GAS INDUSTRY - PART 2: ARCHITECTURE AND INTEGRATION |
ISO/IEC TR 27015:2012
|
Information technology Security techniques Information security management guidelines for financial services |
BS ISO/IEC 27033-5:2013
|
Information technology. Security techniques. Network security Securing communications across networks using Virtual Private Networks (VPNs) |
11/30199101 DC : 0
|
BS ISO 12931 - PERFORMANCE CRITERIA FOR AUTHENTICATION SOLUTIONS FOR ANTI-COUNTERFEITING IN THE FIELD OF MATERIAL GOODS |
BS EN ISO 22600-2:2014
|
Health informatics. Privilege management and access control Formal models |
17/30342673 DC : 0
|
BS ISO/IEC 27021 - INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - COMPETENCE REQUIREMENTS FOR INFORMATION SECURITY MANAGEMENT SYSTEMS PROFESSIONALS |
ISO/IEC 15408-1:2009
|
Information technology — Security techniques — Evaluation criteria for IT security — Part 1: Introduction and general model |
PD ISO/TR 11633-2:2009
|
Health informatics. Information security management for remote maintenance of medical devices and medical information systems Implementation of an information security management system (ISMS) |
BS ISO 17090-3:2008
|
Health informatics. Public key infrastructure Policy management of certification authority |
ISO/IEC 27031:2011
|
Information technology Security techniques Guidelines for information and communication technology readiness for business continuity |
BS ISO/IEC 38505-1:2017
|
Information technology. Governance of IT. Governance of data Application of ISO/IEC 38500 to the governance of data |
BS EN 16082:2011
|
Airport and aviation security services |
BS ISO/IEC 27005:2011
|
INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - INFORMATION SECURITY RISK MANAGEMENT |
BS ISO/IEC 27032:2012
|
Information technology. Security techniques. Guidelines for cybersecurity |
ISO/IEC 29134:2017
|
Information technology — Security techniques — Guidelines for privacy impact assessment |
12/30254927 DC : 0
|
BS EN 16372 - AESTHETIC SURGERY SERVICES |
ISO/IEC 27021:2017
|
Information technology — Security techniques — Competence requirements for information security management systems professionals |
CSA ISO/IEC 20000-2 : 2013 : R2017
|
INFORMATION TECHNOLOGY - SERVICE MANAGEMENT - PART 2: GUIDANCE ON THE APPLICATION OF SERVICE MANAGEMENT SYSTEMS |
UNE-ISO/IEC 29182-1:2016
|
Information technology - Sensor networks: Sensor Network Reference Architecture (SNRA) - Part 1: General overview and requirements |
CSA ISO/IEC 27031 : 2013
|
INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - GUIDELINES FOR INFORMATION AND COMMUNICATION TECHNOLOGY READINESS FOR BUSINESS CONTINUITY |
DIN CEN ISO/TS 19299;DIN SPEC 74125:2016-02
|
ELECTRONIC FEE COLLECTION - SECURITY FRAMEWORK (ISO/TS 19299:2015) |
INCITS/ISO/IEC 27033-5 : 2014
|
INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - NETWORK SECURITY - PART 5: SECURING COMMUNICATIONS ACROSSS NETWORKS USING VIRTUAL PRIVATE NETWORKS (VPNS) |
ISO/IEC 15026-1:2013
|
Systems and software engineering Systems and software assurance Part 1: Concepts and vocabulary |
ISO/IEC TR 15443-3:2007
|
Information technology Security techniques A framework for IT security assurance Part 3: Analysis of assurance methods |
ANSI X9.112-1 : 2009
|
WIRELESS MANAGEMENT AND SECURITY - PART 1: GENERAL REQUIREMENTS |
IEC PAS 62443-3:2008
|
Security for industrial process measurement and control - Network and system security |
IEC TR 62351-10:2012
|
Power systems management and associated information exchange - Data and communications security - Part 10: Security architecture guidelines |
ISO/IEC 27034-3:2018
|
Information technology — Application security — Part 3: Application security management process |
ISO/IEC 24762:2008
|
Information technology Security techniques Guidelines for information and communications technology disaster recovery services |
TR 119 400 : 1.1.1
|
ELECTRONIC SIGNATURES AND INFRASTRUCTURES (ESI); GUIDANCE ON THE USE OF STANDARDS FOR TRUST SERVICE PROVIDERS SUPPORTING DIGITAL SIGNATURES AND RELATED SERVICES |
CAN/CSA-ISO/IEC 27035-2:18
|
Information technology — Security techniques — Information security incident management — Part 2: Guidelines to plan and prepare for incident response (Adopted ISO/IEC 27035-2:2016, first edition, 2016-11-01) |
S.R. CWA 16460:2012
|
GOOD PRACTICE: E-INVOICING COMPLIANCE GUIDELINES - THE COMMENTARY |
I.S. EN ISO/IEC 27000:2017
|
INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - INFORMATION SECURITY MANAGEMENT SYSTEMS - OVERVIEW AND VOCABULARY (ISO/IEC 27000:2016) |
AAMI/IEC TIR80001-2-8:2016
|
APPLICATION OF RISK MANAGEMENT FOR IT NETWORKS INCORPORATING MEDICAL DEVICES - PART 2-8: APPLICATION GUIDANCE - GUIDANCE ON STANDARDS FOR ESTABLISHING THE SECURITY CAPABILITIES IDENTIFIED IN IEC 80001-2-2 |
EN ISO 19011:2011 COR 2011
|
GUIDELINES FOR AUDITING MANAGEMENT SYSTEMS (ISO 19011:2011) |
ISO/IEC 27014:2013
|
Information technology Security techniques Governance of information security |
S.R. CEN ISO/TS 19299:2015
|
ELECTRONIC FEE COLLECTION - SECURITY FRAMEWORK (ISO/TS 19299:2015) |
ISO/IEC TR 15443-1:2012
|
Information technology Security techniques Security assurance framework Part 1: Introduction and concepts |
CSA ISO 19011 : 2012 : R2017
|
GUIDELINES FOR AUDITING MANAGEMENT SYSTEMS |
TR 103 331 : 1.1.1
|
CYBER; STRUCTURED THREAT INFORMATION SHARING |
CAN/CSA-ISO/IEC 27017:16
|
Information technology Security techniques Code of practice for information security controls based on ISO/IEC 27002 for cloud services (Adopted ISO/IEC 27017:2015, first edition, 2015-12-15) |
ISO 12931:2012
|
Performance criteria for authentication solutions used to combat counterfeiting of material goods |
ANSI X9.112 : 2016
|
WIRELESS MANAGEMENT AND SECURITY - PART 1: GENERAL REQUIREMENTS |
BS EN 16495:2014
|
Air Traffic Management. Information security for organisations supporting civil aviation operations |
UNI EN 16495 : 2014
|
AIR TRAFFIC MANAGEMENT - INFORMATION SECURITY FOR ORGANIZATIONS SUPPORTING CIVIL AVIATION OPERATIONS |
TS 102 165-1 : 4.2.3
|
CYBER; METHODS AND PROTOCOLS; PART 1: METHOD AND PRO FORMA FOR THREAT, VULNERABILITY, RISK ANALYSIS (TVRA) |
ISO/IEC 27035:2011
|
Information technology Security techniques Information security incident management |
ISO/IEC 27033-4:2014
|
Information technology Security techniques Network security Part 4: Securing communications between networks using security gateways |
ISO/IEC 27032:2012
|
Information technology — Security techniques — Guidelines for cybersecurity |
ISO/IEC 27039:2015
|
Information technology Security techniques Selection, deployment and operations of intrusion detection and prevention systems (IDPS) |
ISO/TS 21547:2010
|
Health informatics Security requirements for archiving of electronic health records Principles |
ISO/IEC 15026-4:2012
|
Systems and software engineering Systems and software assurance Part 4: Assurance in the life cycle |
ISO/IEC 27037:2012
|
Information technology — Security techniques — Guidelines for identification, collection, acquisition and preservation of digital evidence |
ISO/TS 19299:2015
|
Electronic fee collection Security framework |
DIN EN ISO/IEC 27040 E : 2017
|
INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - STORAGE SECURITY (ISO/IEC 27040:2015) |
EN ISO 22600-2:2014
|
Health informatics - Privilege management and access control - Part 2: Formal models (ISO 22600-2:2014) |
UNI/TS 11465-1 : 2012
|
ELECTRONIC SIGNATURES AND INFRASTRUCTURES (ESI) - DATA PRESERVATION SYSTEMS SECURITY - PART 1: REQUIREMENTS FOR IMPLEMENTATION AND MANAGEMENT |
UNI/TS 11291-10 : 2013
|
GAS MEASUREMENT SYSTEMS - HOURLY BASED GAS METERING SYSTEMS - PART 10: SAFETY |
CSA ISO/IEC 27009 : 2018
|
INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - SECTOR-SPECIFIC APPLICATION OF ISO/IEC 27001 - REQUIREMENTS |
ISO/IEC 27003:2017
|
Information technology — Security techniques — Information security management systems — Guidance |
12/30250175 DC : 0
|
BS ISO/IEC 27036-2 - INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - INFORMATION SECURITY FOR SUPPLIER RELATIONSHIPS - PART 2: COMMON REQUIREMENTS |
BS ISO/IEC 27036-3:2013
|
Information technology. Security techniques. Information security for supplier relationships Guidelines for information and communication technology supply chain security |
BS ISO/IEC 27018:2014
|
Information technology. Security techniques. Code of practice for protection of personally identifiable information (PII) in public clouds acting as PII processors |
UNI CEI ISO/IEC TR 20000-3 : 2010
|
INFORMATION TECHNOLOGY - SERVICE MANAGEMENT - PART 3: GUIDANCE ON SCOPE DEFINITION AND APPLICABILITY OF ISO/IEC 20000-1 |
BS ISO/IEC 29151:2017
|
Information technology. Security techniques. Code of practice for personally identifiable information protection |
PD IEC/TR 80001-2-3:2012
|
Application of risk management for IT-networks incorporating medical devices Guidance for wireless networks |
10/30162769 DC : DRAFT NOV 2010
|
BS ISO/IEC 27007 - INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - GUIDELINES FOR INFORMATION SECURITY MANAGEMENT SYSTEMS AUDITING |
12/30250178 DC : 0
|
BS ISO/IEC 27036-3 - INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - INFORMATION SECURITY FOR SUPPLIER RELATIONSHIPS - PART 3: GUIDELINES FOR ICT SUPPLY CHAIN SECURITY |
PD IEC/TR 80001-2-8:2016
|
Application of risk management for IT-networks incorporating medical devices Application guidance. Guidance on standards for establishing the security capabilities identified in IEC TR 80001-2-2 |
CAN/CSA-ISO/IEC 27010:16
|
Information technology - Security techniques - Information security management for inter-sector and inter-organizational communications (Adopted ISO/IEC 27010:2015, second edition, 2015-11-15) |
ISO 17090-1:2013
|
Health informatics Public key infrastructure Part 1: Overview of digital certificate services |
BS ISO/IEC 27017:2015
|
Information technology. Security techniques. Code of practice for information security controls based on ISO/IEC 27002 for cloud services |
INCITS/ISO/IEC 27010 : 2017
|
INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - INFORMATION SECURITY MANAGEMENT FOR INTER-SECTOR AND INTER-ORGANIZATIONAL COMMUNICATIONS |
DIN EN ISO 22313 E : 2016
|
SOCIETAL SECURITY - BUSINESS CONTINUITY MANAGEMENT SYSTEMS - GUIDANCE (ISO 22313:2012) |
CSA INFORMATION SECURITY PACKAGE : 2018
|
CONSISTS OF CAN/CSA-ISO/IEC 27000:18 - INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - INFORMATION SECURITY MANAGEMENT SYSTEMS - OVERVIEW AND VOCABULARY; CAN/CSA-ISO/IEC 27001:14, INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - INFORMATION SECURITY MANAGEMENT SYSTEMS - REQUIREMENTS; CAN/CSA-ISO/IEC 27002:15 - INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - CODE OF PRACTICE FOR INFORMATION |
BS ISO 10008:2013
|
Quality management. Customer satisfaction. Guidelines for business-to-consumer electronic commerce transactions |
12/30192109 DC : 0
|
BS ISO/IEC 27033-5 - INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - IT NETWORK SECURITY - PART 5: SECURING COMMUNICATIONS ACROSS NETWORKS USING VIRTUAL PRIVATE NETWORK (VPNS) |
PD ISO/IEC TR 24714-1:2008
|
Information technology. Biometrics. Jurisdictional and societal considerations for commercial applications General guidance |
BS ISO/IEC 27039:2015
|
Information technology. Security techniques. Selection, deployment and operations of intrusion detection and prevention systems (IDPS) |
09/30184534 DC : DRAFT JAN 2009
|
BS ISO/IEC 20000-1 - INFORMATION TECHNOLOGY - SERVICE MANAGEMENT - PART 1: SERVICE MANAGEMENT SYSTEM REQUIREMENTS |
PD IEC/TR 80001-2-2:2012
|
Application of risk management for IT-networks incorporating medical devices Guidance for the disclosure and communication of medical device security needs, risks and controls |
BS ISO/IEC 15026-1:2013
|
Systems and software engineering. Systems and software assurance Concepts and vocabulary |
PD IEC/TR 80001-2-1:2012
|
Application of risk management for IT-networks incorporating medical devices Step-by-step risk management of medical IT-networks. Practical applications and examples |
S.R. CEN/TS 15480-4:2012
|
IDENTIFICATION CARD SYSTEMS - EUROPEAN CITIZEN CARD - PART 4: RECOMMENDATIONS FOR EUROPEAN CITIZEN CARD ISSUANCE, OPERATION AND USE |
BIP 0071 : 2014
|
GUIDELINES ON REQUIREMENTS AND PREPARATION FOR ISMS CERTIFICATION BASED ON ISO/IEC 27001 |
12/30192064 DC : 0
|
BS ISO/IEC 27001 - INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - INFORMATION SECURITY MANAGEMENT SYSTEM - REQUIREMENTS |
BS ISO 21188:2006
|
Public key infrastructure for financial services. Practices and policy framework |
ISO/IEC 29182-4:2013
|
Information technology Sensor networks: Sensor Network Reference Architecture (SNRA) Part 4: Entity models |
PD IEC/TR 63084:2017
|
Nuclear power plants. Instrumentation and control important to safety. Platform qualification for systems important to safety |
PD ISO/TR 11633-1:2009
|
Health informatics. Information security management for remote maintenance of medical devices and medical information systems Requirements and risk analysis |
ISO/IEC 27036-3:2013
|
Information technology — Security techniques — Information security for supplier relationships — Part 3: Guidelines for information and communication technology supply chain security |
ANSI/AAMI/IEC TIR80001-2-1:2012
|
APPLICATION OF RISK MANAGEMENT FOR IT-NETWORKS INCORPORATING MEDICAL DEVICES - PART 2-1: STEP BY STEP RISK MANAGEMENT OF MEDICAL IT-NETWORKS - PRACTICAL APPLICATIONS AND EXAMPLES |
BS ISO/IEC 27034-1:2011
|
Information technology. Security techniques. Application security Overview and concepts |
CEI UNI ISO/IEC TR 20000-3 : 2011
|
INFORMATION TECHNOLOGY - SERVICE MANAGEMENT - PART 3: GUIDANCE ON SCOPE DEFINITION AND APPLICABILITY OF ISO/IEC 20000-1 |
DIN ISO/IEC 17789:2016-10 (Draft)
|
INFORMATION TECHNOLOGY - CLOUD COMPUTING - REFERENCE ARCHITECTURE (ISO/IEC 17789:2014) |
DIN CEN ISO/TS 19299;DIN SPEC 74125:2016-02
|
ELECTRONIC FEE COLLECTION - SECURITY FRAMEWORK (ISO/TS 19299:2015) |
ISO/IEC 24760-3:2016
|
Information technology — Security techniques — A framework for identity management — Part 3: Practice |
16/30316173 DC : 0
|
BS ISO/IEC 19086-1 - INFORMATION TECHNOLOGY - CLOUD COMPUTING - SERVICE LEVEL AGREEMENT (SLA) FRAMEWORK - PART 1: OVERVIEW AND CONCEPTS |
CAN/CSA-ISO/IEC 30100-2:18
|
Information technology — Home network resource management — Part 2: Architecture (Adopted ISO/IEC 30100-2:2016, first edition, 2016-04) |
BS EN ISO 11073-00103:2017
|
Health informatics. Personal health device communication Overview |
07/30166242 DC : 0
|
BS ISO/IEC 27011 - INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - INFORMATION SECURITY MANAGEMENT GUIDELINES FOR TELECOMMUNICATIONS |
PD CEN ISO/TS 19299:2015
|
Electronic fee collection. Security framework |
BS ISO/IEC 27031:2011
|
Information technology. Security techniques. Guidelines for information and communication technology readiness for business continuity |
15/30320354 DC : 0
|
BS ISO/IEC 27010 - INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - INFORMATION SECURITY MANAGEMENT FOR INTER-SECTOR AND INTER-ORGANIZATIONAL COMMUNICATIONS |
DIN EN ISO 22600-2:2015-02
|
HEALTH INFORMATICS - PRIVILEGE MANAGEMENT AND ACCESS CONTROL - PART 2: FORMAL MODELS (ISO 22600-2:2014) |
BS ISO/IEC 29182-4:2013
|
Information technology. Sensor networks: Sensor Network Reference Architecture (SNRA) Entity models |
13/30266767 DC : 0
|
BS ISO/IEC 27018 - INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - CODE OF PRACTICE FOR P2 PROTECTION IN PUBLIC CLOUD ACTING AS P2 PROCESSORS |
BS EN ISO 27799:2008
|
Health informatics. Information security management in health using ISO/IEC 27002 |
BS ISO/IEC 29182-1:2013
|
Information technology. Sensor networks: Sensor Network Reference Architecture (SNRA) General overview and requirements |
14/30299515 DC : 0
|
BS EN 16747 - MARITIME AND PORT SECURITY SERVICES |
08/30134763 DC : DRAFT JUNE 2008
|
BS ISO/IEC 27004 - INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - INFORMATION SECURITY MANAGEMENT - MEASUREMENT |
12/30209825 DC : 0
|
BS ISO/IEC 27014 - INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - GOVERNANCE OF INFORMATION SECURITY |
BIS IS/ISO 19011 : 2011(R2016)
|
GUIDELINES FOR AUDITING MANAGEMENT SYSTEMS |
PD ISO/IEC TR 15443-1:2012
|
Information technology. Security techniques. Security assurance framework Introduction and concepts |
CSA ISO/IEC 15408-1 : 2010 : R2015
|
INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - EVALUATION CRITERIA FOR IT SECURITY - PART 1: INTRODUCTION AND GENERAL MODEL |
INCITS/ISO/IEC 27033-2 : 2014
|
INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - NETWORK SECURITY - PART 2: GUIDELINES FOR THE DESIGN AND IMPLEMENTATION OF NETWORK SECURITY |
DD IEC/TS 62351-2:2008
|
Power systems management and associated information exchange. Data and communications security Glossary of terms |
UNI CEN/TS 16439 : 2013
|
ELECTRONIC FEE COLLECTION - SECURITY FRAMEWORK |
TS 119 401 : 2.0.1
|
ELECTRONIC SIGNATURES AND INFRASTRUCTURES (ESI); GENERAL POLICY REQUIREMENTS FOR TRUST SERVICE PROVIDERS |
16/30326000 DC : 0
|
BS ISO/IEC 19770-1 - INFORMATION TECHNOLOGY - IT ASSET MANAGEMENT - PART 1: IT ASSET MANAGEMENT SYSTEMS - REQUIREMENTS |
CSA ISO 19011 : 2012
|
GUIDELINES FOR AUDITING MANAGEMENT SYSTEMS |
IEEE 20000-2-2013
|
IEEE Standard -- Adoption of ISO/IEC 20000-2:2012, Information technology -- Service management -- Part 2: Guidance on the application of service management systems |
CAN/CSA-ISO/IEC 27035-1:18
|
Information technology — Security techniques — Information security incident management — Part 1: Principles of incident management (Adopted ISO/IEC 27035-1:2016, first edition, 2016-11-01) |
CSA ISO/IEC 20000-2:2013
|
INFORMATION TECHNOLOGY - SERVICE MANAGEMENT - PART 2: GUIDANCE ON THE APPLICATION OF SERVICE MANAGEMENT SYSTEMS |
CAN/CSA-IEC 62443-3-3:17
|
Industrial communication networks — Network and system security — Part 3-3: System security requirements and security levels (Adopted IEC 62443-3-3:2013, first edition, 2013-08) |
ISO/IEC 24760-2:2015
|
Information technology — Security techniques — A framework for identity management — Part 2: Reference architecture and requirements |
CAN/CSA-ISO/IEC 19086-1:18
|
Information technology — Cloud computing — Service level agreement (SLA) framework — Part 1: Overview and concepts (Adopted ISO/IEC 19086-1:2016, first edition, 2016-09-15) |
15/30267674 DC : 0
|
BS ISO/IEC 27035-1 - INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - INFORMATION SECURITY INCIDENT MANAGEMENT - PART 1: PRINCIPLES OF INCIDENT MANAGEMENT |
16/30298078 DC : 0
|
BS EN 82079-1 ED 2.0 - PREPARATION OF INSTRUCTIONS FOR USE - STRUCTURING, CONTENT AND PRESENTATION - PART 1: GENERAL PRINCIPLES AND DETAILED REQUIREMENTS |
ISO/IEC 27035-2:2016
|
Information technology — Security techniques — Information security incident management — Part 2: Guidelines to plan and prepare for incident response |
CSA ISO/IEC TR 20000-5 : 2015
|
INFORMATION TECHNOLOGY - SERVICE MANAGEMENT - PART 5: EXEMPLAR IMPLEMENTATION PLAN FOR ISO/IEC 20000-1 |
TS 119 172-1 : 1.1.1
|
ELECTRONIC SIGNATURES AND INFRASTRUCTURES (ESI); SIGNATURE POLICIES; PART 1: BUILDING BLOCKS AND TABLE OF CONTENTS FOR HUMAN READABLE SIGNATURE POLICY DOCUMENTS |
UNE-ISO/IEC 27000:2014
|
Information technology -- Security techniques -- Information security management systems -- Overview and vocabulary |
ISO/IEC 19770-1:2017
|
Information technology — IT asset management — Part 1: IT asset management systems — Requirements |
SR 003 391 : 2.1.1
|
CLOUD STANDARDS COORDINATION PHASE 2; INTEROPERABILITY AND SECURITY IN CLOUD COMPUTING |
I.S. EN IEC 62443-4-1:2018
|
SECURITY FOR INDUSTRIAL AUTOMATION AND CONTROL SYSTEMS - PART 4-1: SECURE PRODUCT DEVELOPMENT LIFECYCLE REQUIREMENTS |
INCITS/ISO/IEC 29182-1 : 2014
|
INFORMATION TECHNOLOGY - SENSOR NETWORKS: SENSOR NETWORK REFERENCE ARCHITECTURE (SNRA) - PART 1: GENERAL OVERVIEW AND REQUIREMENTS |
GS ISI 001-2 : 1.1.2
|
INFORMATION SECURITY INDICATORS (ISI); INDICATORS (INC); PART 2: GUIDE TO SELECT OPERATIONAL INDICATORS BASED ON THE FULL SET GIVEN IN PART 1 |
I.S. EN ISO/IEC 27037:2016
|
INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - GUIDELINES FOR IDENTIFICATION, COLLECTION, ACQUISITION AND PRESERVATION OF DIGITAL EVIDENCE (ISO/IEC 27037:2012) |
I.S. EN 16082:2011
|
AIRPORT AND AVIATION SECURITY SERVICES |
I.S. EN 61069-5:2016
|
INDUSTRIAL-PROCESS MEASUREMENT, CONTROL AND AUTOMATION - EVALUATION OF SYSTEM PROPERTIES FOR THE PURPOSE OF SYSTEM ASSESSMENT - PART 5: ASSESSMENT OF SYSTEM DEPENDABILITY |
SAE J 3061 : 2016
|
CYBERSECURITY GUIDEBOOK FOR CYBER-PHYSICAL VEHICLE SYSTEMS |
CSA ISO/IEC TR 15443-1 : 2015
|
INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - SECURITY ASSURANCE FRAMEWORK - PART 1: INTRODUCTION AND CONCEPTS |
ISO/IEC 27033-5:2013
|
Information technology Security techniques Network security Part 5: Securing communications across networks using Virtual Private Networks (VPNs) |
UNI/TS 11465-3 : 2013
|
Electronic Signatures and Infrastructures (ESI) - Security in Data Retention - Italian complement to ETSI TS 101 533-1 and ETSI TR 101 533-2 |
ISO/IEC 30100-2:2016
|
Information technology Home network resource management Part 2: Architecture |
IEC TR 80001-2-8:2016
|
Application of risk management for IT-networks incorporating medical devices - Part 2-8: Application guidance - Guidance on standards for establishing the security capabilities identified in IEC TR 80001-2-2 |
UNE-ISO/IEC TR 20000-3:2011 IN
|
Information technology. Service management. Part 3: Guidance on scope definition and applicability of ISO/IEC 20000-1 |
EN ISO 9004:2018
|
Quality management - Quality of an organization - Guidance to achieve sustained success (ISO 9004:2018) |
IEC TR 80001-2-3:2012
|
Application of risk management for IT-networks incorporating medical devices - Part 2-3: Guidance for wireless networks |
ISO/IEC TR 15026-1:2010
|
Systems and software engineering Systems and software assurance Part 1: Concepts and vocabulary |
ISO/IEC 27010:2015
|
Information technology Security techniques Information security management for inter-sector and inter-organizational communications |
ISO/IEC 29187-1:2013
|
Information technology — Identification of privacy protection requirements pertaining to learning, education and training (LET) — Part 1: Framework and reference model |
ISO/IEC 29147:2014
|
Information technology Security techniques Vulnerability disclosure |
IEC TS 62351-2:2008
|
Power systems management and associated information exchange - Data and communications security - Part 2: Glossary of terms |
IEC 62855:2016
|
Nuclear power plants - Electrical power systems - Electrical power systems analysis |
ISO/IEC 27033-1:2015
|
Information technology Security techniques Network security Part 1: Overview and concepts |
IEC TR 80001-2-2:2012
|
Application of risk management for IT-networks incorporating medical devices - Part 2-2: Guidance for the disclosure and communication of medical device security needs, risks and controls |
ISO/IEC 27011:2016
|
Information technology Security techniques Code of practice for Information security controls based on ISO/IEC 27002 for telecommunications organizations |
BS ISO/IEC 27040 : 2015
|
INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - STORAGE SECURITY |
EN ISO 22313:2014
|
Societal security - Business continuity management systems - Guidance (ISO 22313:2012) |
BS EN ISO/IEC 27040:2016
|
Information technology. Security techniques. Storage security |
ISO/IEC 27040:2015
|
Information technology — Security techniques — Storage security |
ISO/IEC 20000-3:2012
|
Information technology Service management Part 3: Guidance on scope definition and applicability of ISO/IEC 20000-1 |
ISO 22600-2:2014
|
Health informatics Privilege management and access control Part 2: Formal models |
ISO/TS 14441:2013
|
Health informatics — Security and privacy requirements of EHR systems for use in conformity assessment |
UNI EN ISO 22313 : 2015
|
SOCIETAL SECURITY - BUSINESS CONTINUITY MANAGEMENT SYSTEMS - GUIDANCE |
UNE-EN ISO 22313:2015
|
Societal security - Business continuity management systems - Guidance (ISO 22313:2012) |
ISO/IEC 20000-2:2012
|
Information technology Service management Part 2: Guidance on the application of service management systems |
IEC TR 63084:2017
|
Nuclear power plants - Instrumentation and control important to safety - Platform qualification for systems important to safety |
ISO/IEC 27001:2013
|
Information technology — Security techniques — Information security management systems — Requirements |
ISO/IEC TR 20000-5:2013
|
Information technology Service management Part 5: Exemplar implementation plan for ISO/IEC 20000-1 |
EN ISO/IEC 27000:2017
|
Information technology - Security techniques - Information security management systems - Overview and vocabulary (ISO/IEC 27000:2016) |
EN 16082:2011
|
Airport and aviation security services |
EN ISO 11073-00103:2017
|
Health informatics - Personal health device communication - Part 00103: Overview (ISO/IEEE 11073-00103:2015) |
EN ISO/IEC 27040:2016
|
Information technology - Security techniques - Storage security (ISO/IEC 27040:2015) |
EN ISO 27799:2016
|
Health informatics - Information security management in health using ISO/IEC 27002 (ISO 27799:2016) |
EN ISO/IEC 27001:2017
|
Information technology - Security techniques - Information security management systems - Requirements (ISO/IEC 27001:2013 including Cor 1:2014 and Cor 2:2015) |
EN 16747:2015
|
Maritime and port security services |
EN ISO/IEC 27037:2016
|
Information technology - Security techniques - Guidelines for identification, collection, acquisition and preservation of digital evidence (ISO/IEC 27037:2012) |
EN 16495:2014
|
Air Traffic Management - Information security for organisations supporting civil aviation operations |
INCITS/ISO/IEC 27013 : 2014
|
INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - GUIDANCE ON THE INTEGRATED IMPLEMENTATION OF ISO/IEC 27001 AND ISO/IEC 20000-1 |
BS IEC 62443-3-3:2013
|
Industrial communication networks. Network and system security System security requirements and security levels |
BS ISO/IEC 27014:2013
|
Information technology. Security techniques. Governance of information security |
CSA ISO 10008 : 2015
|
QUALITY MANAGEMENT - CUSTOMER SATISFACTION - GUIDELINES FOR BUSINESS-TO-CONSUMER ELECTRONIC COMMERCE TRANSACTIONS |
BS ISO/IEC 27036-2:2014
|
Information technology. Security techniques. Information security for supplier relationships Requirements |
10/30184538 DC : 0
|
BS ISO/IEC 20000-2 - INFORMATION TECHNOLOGY - SERVICE MANAGEMENT - PART 2: GUIDANCE ON THE APPLICATION OF SERVICE MANAGEMENT SYSTEMS |
12/30249606 DC : 0
|
BS EN 62645 ED 1.0 - NUCLEAR POWER PLANTS - INSTRUMENTATION AND CONTROL SYSTEMS - REQUIREMENT S FOR SECURITY PROGRAMMES FOR COMPUTER-BASED SYSTEMS |
ISO/IEC TR 24714-1:2008
|
Information technology — Biometrics — Jurisdictional and societal considerations for commercial applications — Part 1: General guidance |
ISO/IEC TR 27008:2011
|
Information technology Security techniques Guidelines for auditors on information security controls |
BS ISO/IEC 15944-8:2012
|
Information technology. Business Operational View Identification of privacy protection requirements as external constraints on business transactions |
CAN/CSA-ISO/IEC 17789:16
|
Information technology Cloud computing Reference architecture (Adopted ISO/IEC 17789:2014, first edition, 2014-10-15) |
BS ISO/IEC 27036-1:2014
|
Information technology. Security techniques. Information security for supplier relationships Overview and concepts |
BS EN 16747:2015
|
Maritime and port security services |
CSA ISO/IEC 24762 : 2008 : R2013
|
INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - GUIDELINES FOR INFORMATION AND COMMUNICATIONS TECHNOLOGY DISASTER RECOVERY SERVICES |
BS ISO/IEC 27007:2017
|
Information technology. Security techniques. Guidelines for information security management systems auditing |
ISO/IEC 27035-1:2016
|
Information technology — Security techniques — Information security incident management — Part 1: Principles of incident management |
DIN ISO/IEC 17789 E : 2017
|
INFORMATION TECHNOLOGY - CLOUD COMPUTING - REFERENCE ARCHITECTURE (ISO/IEC 17789:2014) |
ISO 17090-3:2008
|
Health informatics Public key infrastructure Part 3: Policy management of certification authority |
CSA ISO/IEC 27007 : 2013
|
INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - GUIDELINES FOR INFORMATION SECURITY MANAGEMENT SYSTEMS AUDITING |
NASA CCSDS 350.7-G : ISSUE 1
|
SECURITY GUIDE FOR MISSION PLANNERS |
ISO/IEC 27007:2017
|
Information technology Security techniques Guidelines for information security management systems auditing |
GS ISI 001-1 : 1.1.2
|
INFORMATION SECURITY INDICATORS (ISI); INDICATORS (INC); PART 1: A FULL SET OF OPERATIONAL INDICATORS FOR ORGANIZATIONS TO USE TO BENCHMARK THEIR SECURITY POSTURE |
GS ISI 004 : 1.1.1
|
INFORMATION SECURITY INDICATORS (ISI); GUIDELINES FOR EVENT DETECTION IMPLEMENTATION |
EN 319 411-1 : 1.2.2
|
ELECTRONIC SIGNATURES AND INFRASTRUCTURES (ESI); POLICY AND SECURITY REQUIREMENTS FOR TRUST SERVICE PROVIDERS ISSUING CERTIFICATES; PART 1: GENERAL REQUIREMENTS |
BS ISO/IEC 27033-2:2012
|
Information technology. Security techniques. Network security Guidelines for the design and implementation of network security |
15/30259619 DC : 0
|
BS ISO/IEC 27017 - INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - CODE OF PRACTICE FOR INFORMATION SECURITY CONTROLS BASED ON ISO/IEC 27002 FOR CLOUD SERVICES |
BS ISO/IEC 27001 : 2013
|
INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - INFORMATION SECURITY MANAGEMENT SYSTEMS - REQUIREMENTS |
UNE-EN 16747:2016
|
Maritime and port security services |
17/30349211 DC : 0
|
BS ISO/IEC 29147 - INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - VULNERABILITY DISCLOSURE |
BS ISO/IEC 27033-1:2015
|
Information technology. Security techniques. Network security Overview and concepts |
08/30146238 DC : DRAFT JUNE 2008
|
BS ISO/IEC 27000 - INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - INFORMATION SECURITY MANAGEMENT SYSTEM - OVERVIEW AND VOCABULARY |
DIN ISO/IEC 27018:2017-08
|
INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - CODE OF PRACTICE FOR PROTECTION OF PERSONALLY IDENTIFIABLE INFORMATION (PII) IN PUBLIC CLOUDS ACTING AS PII PROCESSORS (ISO/IEC 27018:2014) |
10/30168519 DC : DRAFT JUNE 2010
|
BS ISO/IEC 27034-1 - INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - APPLICATION SECURITY - PART 1: OVERVIEW AND CONCEPTS |
16/30333228 DC : 0
|
BS ISO/IEC 38505-1 - INFORMATION TECHNOLOGY - GOVERNANCE OF IT - PART 1: THE APPLICATION OF ISO/IEC 38500 TO THE GOVERNANCE OF DATA |
PD CEN ISO/TS 14441:2013
|
Health informatics. Security and privacy requirements of EHR systems for use in conformity assessment |
14/30298031 DC : 0
|
BS EN 61069-5 ED 2.0 - INDUSTRIAL-PROCESS MEASUREMENT AND CONTROL - EVALUATION OF SYSTEM PROPERTIES FOR THE PURPOSE OF SYSTEM ASSESSMENT - PART 5: ASSESSMENT OF SYSTEM DEPENDABILITY |
12/30232738 DC : 0
|
BS ISO/IEC 29182-1 - INFORMATION TECHNOLOGY - SENSOR NETWORKS: SENSOR NETWORK REFERENCE ARCHITECTURE (SNRA) - PART 1: GENERAL OVERVIEW AND REQUIREMENTS |
INCITS/ISO/IEC 27040 : 2017
|
INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - STORAGE SECURITY |
11/30207802 DC : 0
|
BS ISO/IEC 27013 - INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - GUIDELINES ON THE INTEGRATED IMPLEMENTATION OF ISO/IEC 27001 AND ISO/IEC 20000-1 |
IEEE 15026-4-2013
|
IEEE Standard Adoption of ISO/IEC 15026-4--Systems and Software Engineering--Systems and Software Assurance--Part 4: Assurance in the Life Cycle |
BS ISO/IEC 27021:2017
|
Information technology. Security techniques. Competence requirements for information security management systems professionals |
BS ISO/IEC 27013:2015
|
Information technology. Security techniques. Guidance on the integrated implementation of ISO/IEC 27001 and ISO/IEC 20000-1 |
PD CEN/TS 16439:2013
|
Electronic fee collection. Security framework |
UNE-ISO/IEC 27001:2014
|
Information technology -- Security techniques -- Information security management systems -- Requirements |
PD ISO/IEC TR 27016:2014
|
Information technology. Security techniques. Information security management. Organizational economics |
17/30213621 DC : 0
|
BS ISO/IEC 27034-3 - INFORMATION TECHNOLOGY - APPLICATION SECURITY - PART 3: APPLICATION SECURITY MANAGEMENT PROCESS |
13/30250756 DC : 0
|
BS ISO/IEC 27039 - INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - SELECTION, DEPLOYMENT AND OPERATIONS OF INTRUSION DETECTION SYSTEMS |
DIN EN 16747:2015-11
|
Maritime and port security services |
GS ISI 003 : 1.2.1
|
INFORMATION SECURITY INDICATORS (ISI); KEY PERFORMANCE SECURITY INDICATORS (KPSI) TO EVALUATE THE MATURITY OF SECURITY EVENT DETECTION |
BS EN ISO 19011:2011
|
Guidelines for auditing management systems |
BIP 2151 : 2012
|
AUDITING BUSINESS CONTINUITY MANAGEMENT PLANS - ASSESS AND IMPROVE YOUR PERFORMANCE AGAINST ISO 22301 |
CAN/CSA-ISO/CEI 27001:14
|
INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - INFORMATION SECURITY MANAGEMENT SYSTEMS - REQUIREMENTS |
GS ISI 002 : 1.2.1
|
INFORMATION SECURITY INDICATORS (ISI); EVENT MODEL A SECURITY EVENT CLASSIFICATION MODEL AND TAXONOMY |
ISO/IEC 27018:2014
|
Information technology Security techniques Code of practice for protection of personally identifiable information (PII) in public clouds acting as PII processors |
UNI/TR 11465-2 : 2012
|
ELECTRONIC SIGNATURES AND INFRASTRUCTURES (ESI) - DATA PRESERVATION SYSTEMS SECURITY - PART 2: GUIDELINES FOR ASSESSORS |
I.S. EN ISO/IEC 27001:2017
|
INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - INFORMATION SECURITY MANAGEMENT SYSTEMS - REQUIREMENTS (ISO/IEC 27001:2013 INCLUDING COR 1:2014 AND COR 2:2015) |
PREN 9115 : 200P1
|
QUALITY MANAGEMENT SYSTEMS - REQUIREMENTS FOR AVIATION, SPACE AND DEFENSE ORGANIZATIONS - DELIVERABLE SOFTWARE (SUPPLEMENT TO EN 9100) |
I.S. EN 16495:2014
|
AIR TRAFFIC MANAGEMENT - INFORMATION SECURITY FOR ORGANISATIONS SUPPORTING CIVIL AVIATION OPERATIONS |
IEEE 11073-00103-2012
|
Health informatics - Personal health device communication Part 00103: Overview |
IEEE/ISO/IEC 15026-1-2014
|
IEEE Standard Adoption of ISO/IEC 15026-1--Systems and Software Engineering--Systems and Software Assurance--Part 1: Concepts and Vocabulary |
I.S. EN ISO 9004:2009
|
QUALITY MANAGEMENT - QUALITY OF AN ORGANIZATION - GUIDANCE TO ACHIEVE SUSTAINED SUCCESS (ISO 9004:2018) |
ISO/IEC 29151:2017
|
Information technology — Security techniques — Code of practice for personally identifiable information protection |
ISO 9004:2018
|
Quality management — Quality of an organization — Guidance to achieve sustained success |
S.R. CEN/TS 16850:2015
|
SOCIETAL AND CITIZEN SECURITY - GUIDANCE FOR MANAGING SECURITY IN HEALTHCARE FACILITIES |
I.S. EN ISO/IEC 27040:2016
|
INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - STORAGE SECURITY (ISO/IEC 27040:2015) |
S.R. CEN/TS 17159:2018
|
SOCIETAL AND CITIZEN SECURITY - GUIDANCE FOR THE SECURITY OF HAZARDOUS MATERIALS (CBRNE) IN HEALTHCARE FACILITIES |
S.R. CWA 16036:2009
|
CYBER-IDENTITY - UNIQUE IDENTIFICATION SYSTEMS FOR ORGANIZATIONS AND PARTS THEREOF |
INCITS/ISO/IEC 27001 : 2014
|
INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - INFORMATION SECURITY MANAGEMENT SYSTEMS - REQUIREMENTS |
ISO/TR 18638:2017
|
Health informatics Guidance on health information privacy education in healthcare organizations |
CAN/CSA-ISO/IEC 24760-3:18
|
Information technology — Security techniques — A framework for identity management — Part 3: Practice (Adopted ISO/IEC 24760-3:2016, first edition, 2016-08-01) |
I.S. EN ISO 22600-2:2014
|
HEALTH INFORMATICS - PRIVILEGE MANAGEMENT AND ACCESS CONTROL - PART 2: FORMAL MODELS (ISO 22600-2:2014) |
ABS 0251 : 2016
|
CYBERSECURITY IMPLEMENTATION FOR THE MARINE AND OFFSHORE INDUSTRIES - CYBERSAFETY[TM] VOLUME 2 |
ISO/IEC 17789:2014
|
Information technology — Cloud computing — Reference architecture |
UNE-EN ISO 19011:2012
|
Guidelines for auditing management systems (ISO 19011:2011) |
ISO/TS 17975:2015
|
Health informatics — Principles and data requirements for consent in the Collection, Use or Disclosure of personal health information |
ISO/IEC 15944-8:2012
|
Information technology — Business operational view — Part 8: Identification of privacy protection requirements as external constraints on business transactions |
ISO/IEC TR 27019:2013
|
Information technology Security techniques Information security management guidelines based on ISO/IEC 27002 for process control systems specific to the energy utility industry |
ISO 22313:2012
|
Societal security Business continuity management systems Guidance |
EN 61069-5:2016
|
Industrial-process measurement, control and automation - Evaluation of system properties for the purpose of system assessment - Part 5: Assessment of system dependability |
CEN/TS 16439:2013
|
Electronic fee collection - Security framework |
UNE-ISO 22313:2013
|
Societal security.Business continuity management systems. Guidance |
CEN/TR 16742 : 2014
|
INTELLIGENT TRANSPORT SYSTEMS - PRIVACY ASPECTS IN ITS STANDARDS AND SYSTEMS IN EUROPE |