ISO/IEC 18028-5:2006
|
Information technology Security techniques IT network security Part 5: Securing communications across networks using virtual private networks |
I.S. EN ISO 19011:2011
|
GUIDELINES FOR AUDITING MANAGEMENT SYSTEMS (ISO 19011:2011) |
12/30236518 DC : 0
|
BS ISO/IEC 27000 - INFORMATION SECURITY - SECURITY TECHNIQUES - INFORMATION SECURITY MANAGEMENT SYSTEMS - OVERVIEW AND VOCABULARY |
I.S. ISO/IEC 27001:2013
|
INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - INFORMATION SECURITY MANAGEMENT SYSTEMS - REQUIREMENTS |
BS ISO/IEC 29134:2017
|
Information technology. Security techniques. Guidelines for privacy impact assessment |
BS ISO/IEC 19770-1:2017
|
Information technology. IT asset management IT asset management systems. Requirements |
PD ISO/TR 27809:2007
|
Health informatics. Measures for ensuring patient safety of health software |
PD ISO/TR 12859:2009
|
Intelligent transport systems. System architecture. Privacy aspects in ITS standards and systems |
ANSI X9.111 : 2011
|
FINANCIAL SERVICES - PENETRATION TESTING WITHIN THE FINANCIAL SERVICES INDUSTRY |
11/30168516 DC : 0
|
BS ISO/IEC 27032 - INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - GUIDELINES FOR CYBERSECURITY |
15/30299331 DC : 0
|
BS ISO/IEC 27011 - INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - CODE OF PRACTICE FOR INFORMATION SECURITY CONTROLS BASED ON ISO/IEC 27002 FOR TELECOMMUNICATIONS ORGANIZATIONS |
12/30269414 DC : 0
|
BS EN 16495 - AIR TRAFFIC MANAGEMENT - INFORMATION SECURITY FOR ORGANISATIONS SUPPORTING CIVIL AVIATION OPERATIONS |
DIN EN ISO/IEC 27001:2017-06
|
Information technology - Security techniques - Information security management systems - Requirements (ISO/IEC 27001:2013 including Cor 1:2014 and Cor 2:2015) |
BS EN 16571:2014
|
Information technology. RFID privacy impact assessment process |
15/30319488 DC : 0
|
BS ISO/IEC 27000 - INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - INFORMATION SECURITY MANAGEMENT SYSTEMS - OVERVIEW AND VOCABULARY |
CSA ISO/IEC 27000 : 2018
|
INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - INFORMATION SECURITY MANAGEMENT SYSTEMS - OVERVIEW AND VOCABULARY |
PD CEN/TR 16742:2014
|
Intelligent transport systems. Privacy aspects in ITS standards and systems in Europe |
BS ISO/IEC 27000 : 2016
|
INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - INFORMATION SECURITY MANAGEMENT SYSTEMS - OVERVIEW AND VOCABULARY |
EN 319 401 : 2.2.1
|
ELECTRONIC SIGNATURES AND INFRASTRUCTURES (ESI); GENERAL POLICY REQUIREMENTS FOR TRUST SERVICE PROVIDERS |
INCITS/ISO/IEC 27040 : 2017
|
INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - STORAGE SECURITY |
CAN/CSA-ISO/IEC 27034-1:12 (R2017)
|
Information technology - Security techniques - Application security - Part 1: Overview and concepts (Adopted ISO/IEC 27034-1:2011, first edition, 2011-11-15) |
ISO/IEC 27031:2011
|
Information technology Security techniques Guidelines for information and communication technology readiness for business continuity |
12/30249455 DC : 0
|
BS ISO/IEC 27036-1 - INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - INFORMATION SECURITY FOR SUPPLIER RELATIONSHIPS - PART 1: OVERVIEW AND CONCEPTS |
INCITS/ISO/IEC 27011 : 2009(R2014)
|
INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - INFORMATION SECURITY MANAGEMENT GUIDELINES FOR TELECOMMUNICATIONS ORGANIZATIONS BASED ON ISO/IEC 27002 |
CAN/CSA-ISO/IEC 27033-1:16
|
Information technology - Security techniques - Network security - Part 1: Overview and concepts (Adopted ISO/IEC 27033-1:2015, second edition, 2015-08-15) |
IEEE 20000-2-2013
|
IEEE Standard -- Adoption of ISO/IEC 20000-2:2012, Information technology -- Service management -- Part 2: Guidance on the application of service management systems |
CSA TELECOM ORGANIZATIONS PACKAGE : 2018
|
CONSISTS OF CAN/CSA-ISO/IEC 27000:18 - INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - INFORMATION SECURITY MANAGEMENT SYSTEMS - OVERVIEW AND VOCABULARY; CAN/CSA-ISO/IEC 27001:14, INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - INFORMATION SECURITY MANAGEMENT SYSTEMS - REQUIREMENTS; CAN/CSA-ISO/IEC 27002:15 - INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - CODE OF PRACTICE FOR |
CSA ISO/IEC 27034-1:2012
|
INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - APPLICATION SECURITY - PART 1: OVERVIEW AND CONCEPTS |
PD ISO/TR 18638:2017
|
Health informatics. Guidance on health information privacy education in healthcare organizations |
S.R. CEN ISO/TS 14441:2013
|
HEALTH INFORMATICS - SECURITY AND PRIVACY REQUIREMENTS OF EHR SYSTEMS FOR USE IN CONFORMITY ASSESSMENT (ISO/TS 14441:2013) |
CSA ISO/IEC TR 27008 : 2013 : R2017
|
INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - GUIDELINES FOR AUDITORS ON INFORMATION SECURITY CONTROLS |
INCITS/ISO/IEC 18028-1 : 2008
|
INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - IT NETWORK SECURITY - PART 1: NETWORK SECURITY MANAGEMENT |
ISO/TR 12859:2009
|
Intelligent transport systems System architecture Privacy aspects in ITS standards and systems |
UNE-ISO/IEC 20000-1:2011
|
Information technology. Service management. Part 1: Service Management System requirements |
AAMI TIR57 : 2016
|
PRINCIPLES FOR MEDICAL DEVICE SECURITY - RISK MANAGEMENT |
ISO/IEC 27036-2:2014
|
Information technology Security techniques Information security for supplier relationships Part 2: Requirements |
PD ISO/IEC/TR 15026-1:2010
|
Systems and software engineering. Systems and software assurance Concepts and vocabulary |
UNI EN ISO 19011 : 2012
|
GUIDELINES FOR AUDITING MANAGEMENT SYSTEMS |
14/30249803 DC : 0
|
BS ISO/IEC 27040 - INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - STORAGE SECURITY |
ISO/IEC 27002:2013
|
Information technology Security techniques Code of practice for information security controls |
CEN ISO/TS 19299 : 2015
|
ELECTRONIC FEE COLLECTION - SECURITY FRAMEWORK (ISO/TS 19299:2015) |
15/30299325 DC : 0
|
BS ISO/IEC 27013 - INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - GUIDANCE ON THE INTEGRATED IMPLEMENTATION OF ISO/IEC 27001 AND ISO/IEC 20000-1 |
DIN ISO/IEC 27001 : 2017
|
INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - INFORMATION SECURITY MANAGEMENT SYSTEMS - REQUIREMENTS (ISO/IEC 27001:2013 + COR. 1:2014) |
I.S. EN ISO 21091:2013
|
HEALTH INFORMATICS - DIRECTORY SERVICES FOR HEALTHCARE PROVIDERS, SUBJECTS OF CARE AND OTHER ENTITIES (ISO 21091:2013) |
DIN EN ISO/IEC 27001 E : 2017
|
INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - INFORMATION SECURITY MANAGEMENT SYSTEMS - REQUIREMENTS (ISO/IEC 27001:2013 INCLUDING COR 1:2014 AND COR 2:2015) |
CSA ISO/IEC 27018 : 2015
|
INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - CODE OF PRACTICE FOR PROTECTION OF PERSONALLY IDENTIFIABLE INFORMATION (PII) IN PUBLIC CLOUDS ACTING AS PII PROCESSORS |
BS ISO/IEC 27034-2:2015
|
Information technology. Security techniques. Application security Organization normative framework |
16/30286013 DC : 0
|
BS ISO/IEC 27003 - INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - INFORMATION SECURITY MANAGEMENT SYSTEM - GUIDANCE |
BS EN ISO 21091:2013
|
Health informatics. Directory services for healthcare providers, subjects of care and other entities |
DIN ISO/IEC 27000:2015-12 (Draft)
|
INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - INFORMATION SECURITY MANAGEMENT SYSTEMS - OVERVIEW AND VOCABULARY |
BS ISO/IEC 18028-5:2006
|
Information technology. Security techniques. IT network security Securing communications across networks using virtual private networks |
ISO/IEC 15026-2:2011
|
Systems and software engineering — Systems and software assurance — Part 2: Assurance case |
S.R. CEN/TS 16439:2013
|
ELECTRONIC FEE COLLECTION - SECURITY FRAMEWORK |
ISO/TR 27809:2007
|
Health informatics Measures for ensuring patient safety of health software |
18/30267404 DC : 0
|
BS EN 62443-3-2 - SECURITY FOR INDUSTRIAL AUTOMATION AND CONTROL SYSTEMS - PART 3-2: SECURITY RISK ASSESSMENT AND SYSTEM DESIGN |
PD ISO/IEC TR 27008:2011
|
Information technology. Security techniques. Guidelines for auditors on information security controls |
15/30268877 DC : 0
|
BS ISO/IEC 27035-2 - INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - INFORMATION SECURITY INCIDENT MANAGEMENT - PART 2: GUIDELINES TO PLAN AND PREPARE FOR INCIDENT RESPONSE |
I.S. EN ISO/IEC 27040:2016
|
INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - STORAGE SECURITY (ISO/IEC 27040:2015) |
11/30204593 DC : DRAFT MAY 2011
|
BS ISO/IEC 27010 - INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - INFORMATION SECURITY MANAGEMENT FOR INTER-SECTOR AND INTER-ORGANIZATIONAL COMMUNICATIONS |
AAMI IEC TIR 80001-2-2 : 2012
|
APPLICATION OF RISK MANAGEMENT FOR IT-NETWORKS INCORPORATING MEDICAL DEVICES - PART 2-2: GUIDANCE FOR THE DISCLOSURE AND COMMUNICATION OF MEDICAL DEVICE SECURITY NEEDS, RISKS AND CONTROLS |
ISO/IEC 15026-1:2013
|
Systems and software engineering Systems and software assurance Part 1: Concepts and vocabulary |
CSA ISO/IEC 27002 : 2015
|
INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - CODE OF PRACTICE FOR INFORMATION SECURITY CONTROLS |
BS ISO/IEC 27033-1:2015
|
Information technology. Security techniques. Network security Overview and concepts |
09/30168526 DC : 0
|
BS ISO/IEC 27033-1 - INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - NETWORK SECURITY - PART 1: GUIDELINES FOR NETWORK SECURITY |
UNI CEI ISO/IEC 27001 : 2014
|
INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - INFORMATION SECURITY MANAGEMENT SYSTEMS - REQUIREMENTS |
BS ISO/IEC 20000-1:2011
|
Information technology. Service management Service management system requirements |
08/30133461 DC : 0
|
ISO/IEC 27003 - INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - INFORMATION SECURITY MANAGEMENT SYSTEM IMPLEMENTATION GUIDANCE |
17/30354834 DC : 0
|
BS EN ISO 19011 - GUIDELINES FOR AUDITING MANAGEMENT SYSTEMS |
CAN/CSA-ISO/IEC 27013:16
|
Information technology - Security techniques - Guidance on the integrated implementation of ISO/IEC 27001 and ISO/IEC 20000-1 (Adopted ISO/IEC 27013:2015, second edition, 2015-12-01) |
BS ISO/IEC 27003:2017
|
Information technology. Security techniques. Information security management systems. Guidance |
CAN/CSA-ISO/IEC 27034-2:16
|
Information technology Security techniques Application security Part 2: Organization normative framework (Adopted ISO/IEC 27034-2:2015, first edition, 2015-08-15) |
ISO/IEC TR 27008:2011
|
Information technology Security techniques Guidelines for auditors on information security controls |
13/30284691 DC : 0
|
BS ISO/IEC 27000 - INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - INFORMATION SECURITY MANAGEMENT SYSTEMS - OVERVIEW AND VOCABULARY |
BS ISO/IEC 27035-2:2016
|
Information technology. Security techniques. Information security incident management Guidelines to plan and prepare for incident response |
UNE-ISO/IEC 27002:2015
|
Information technology -- Security techniques -- Code of practice for information security controls |
CAN/CSA-ISO/IEC 27031:13 (R2017)
|
Information technology - Security techniques - Guidelines for information and communication technology readiness for business continuity (Adopted ISO/IEC 27031:2011, first edition, 2011-03-01) |
BS ISO/IEC 27035-1:2016
|
Information technology. Security techniques. Information security incident management Principles of incident management |
CSA ISO/IEC 27035 : 2013
|
INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - INFORMATION SECURITY INCIDENT MANAGEMENT |
CSA ISO/IEC 27035 : 2013 : R2017
|
INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - INFORMATION SECURITY INCIDENT MANAGEMENT |
CSA ISO/IEC TR 27008: 2013
|
INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - GUIDELINES FOR AUDITORS ON INFORMATION SECURITY CONTROLS |
CSA ISO/IEC 15026-2 : 2013
|
SYSTEMS AND SOFTWARE ENGINEERING - SYSTEMS AND SOFTWARE ASSURANCE - PART 2: ASSURANCE CASE |
CEI UNI EN ISO/IEC 27040 : 1ED 2017
|
INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - STORAGE SECURITY |
CSA ISO/IEC 20000-1 : 2013 : R2017
|
INFORMATION TECHNOLOGY - SERVICE MANAGEMENT - PART 1: SERVICE MANAGEMENT SYSTEM REQUIREMENTS |
CEI UNI ISO/IEC 27001 : 2014
|
INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - INFORMATION SECURITY MANAGEMENT SYSTEMS - REQUIREMENTS |
UNE-ISO/IEC TR 19791:2013 IN
|
Information technology. Security techniques. Security assessment of operational systems |
INCITS/ISO/IEC 18028-5 : 2008
|
INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - IT NETWORK SECURITY - PART 5: SECURING COMMUNICATIONS BETWEEN NETWORKS USING VIRTUAL PRIVATE NETWORKS |
BS ISO/IEC 27002 : 2013
|
INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - CODE OF PRACTICE FOR INFORMATION SECURITY CONTROLS |
S.R. CEN/TR 16742:2014
|
INTELLIGENT TRANSPORT SYSTEMS - PRIVACY ASPECTS IN ITS STANDARDS AND SYSTEMS IN EUROPE |
ISO/IEC 27036-1:2014
|
Information technology Security techniques Information security for supplier relationships Part 1: Overview and concepts |
UNE-EN ISO/IEC 27002:2017
|
Information technology - Security techniques - Code of practice for information security controls (ISO/IEC 27002:2013 including Cor 1:2014 and Cor 2:2015) |
ISO/IEC 27034-1:2011
|
Information technology — Security techniques — Application security — Part 1: Overview and concepts |
ISO/IEC TR 27016:2014
|
Information technology Security techniques Information security management Organizational economics |
DIN EN ISO/IEC 27040:2016-04 (Draft)
|
INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - STORAGE SECURITY (ISO/IEC 27040:2015) |
ISO/IEC 27000:2018
|
Information technology — Security techniques — Information security management systems — Overview and vocabulary |
UNI CEN ISO/TS 14441 : 2014
|
HEALTH INFORMATICS - SECURITY AND PRIVACY REQUIREMENTS OF HER SYSTEMS FOR USE IN CONFORMITY ASSESSMENT |
CSA ISO/IEC TR 15026-1 : 2013
|
SYSTEMS AND SOFTWARE ENGINEERING - SYSTEMS AND SOFTWARE ASSURANCE - PART 1: CONCEPTS AND VOCABULARY |
NASA CCSDS 350.1-G : ISSUE 2
|
SECURITY THREATS AGAINST SPACE MISSIONS |
CSA ISO/IEC 15026-1 : 2015
|
SYSTEMS AND SOFTWARE ENGINEERING - SYSTEMS AND SOFTWARE ASSURANCE - PART 1: CONCEPTS AND VOCABULARY |
ISO/IEC 27013:2015
|
Information technology Security techniques Guidance on the integrated implementation of ISO/IEC 27001 and ISO/IEC 20000-1 |
VDI/VDE 2182 Blatt 1:2011-01
|
IT-security for industrial automation - General model |
UNE-ISO/IEC 20000-2:2015
|
Information technology. Service management. Part 2: Guidance on the application of service management systems |
CSA ISO/IEC 27007 : 2013 : R2017
|
INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - GUIDELINES FOR INFORMATION SECURITY MANAGEMENT SYSTEMS AUDITING |
DIN EN ISO/IEC 27002 E : 2017
|
INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - CODE OF PRACTICE FOR INFORMATION SECURITY CONTROLS (ISO/IEC 27002:2013 INCLUDING COR 1:2014 AND COR 2:2015) |
DIN EN 16571:2014-10
|
INFORMATION TECHNOLOGY - RFID PRIVACY IMPACT ASSESSMENT PROCESS |
16/30278511 DC : 0
|
BS ISO/IEC 29134 - INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - PRIVACY IMPACT ASSESSMENT - GUIDELINES |
PD ISO/IEC TR 15443-3:2007
|
Information technology. Security techniques. A framework for IT security assurance Analysis of assurance methods |
BS ISO/IEC 27035:2011
|
Information technology. Security techniques. Information security incident management |
17/30342692 DC : 0
|
BS ISO/IEC 27007 - INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - GUIDELINES FOR INFORMATION SECURITY MANAGEMENT SYSTEMS AUDITING |
ISO/IEC 27017:2015
|
Information technology — Security techniques — Code of practice for information security controls based on ISO/IEC 27002 for cloud services |
BIP 0076 : 2010
|
INFORMATION SECURITY RISK MANAGEMENT - HANDBOOK FOR ISO/IEC 27001 |
BIP 0139 : 2013
|
AN INTRODUCTION TO ISO/IEC 27001:2013 |
BS EN ISO/IEC 27002:2017
|
Information technology. Security techniques. Code of practice for information security controls |
14/30278505 DC : 0
|
BS ISO/IEC 27033-1 - INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - NETWORK SECURITY PART 1: OVERVIEW AND CONCEPTS |
13/30268559 DC : 0
|
BS ISO/IEC 15026-1 - SYSTEMS AND SOFTWARE ENGINEERING - SYSTEMS AND SOFTWARE ASSURANCE - PART 1: CONCEPTS AND VOCABULARY |
BS ISO/IEC 18028-1:2006
|
Information technology. Security techniques. IT network security Network security management |
ISO/IEC TR 19791:2010
|
Information technology Security techniques Security assessment of operational systems |
10/30184432 DC : 0
|
BS ISO/IEC 27035 - INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - INFORMATION SECURITY INCIDENT MANAGEMENT |
IEEE 15026-3-2013
|
IEEE Standard Adoption of ISO/IEC 15026-3 -- Systems and Software Engineering -- Systems and Software Assurance -- Part 3: System Integrity Levels |
UNE-EN ISO/IEC 27001:2017
|
Information technology - Security techniques - Information security management systems - Requirements (ISO/IEC 27001:2013 including Cor 1:2014 and Cor 2:2015) |
ISO/IEC TR 15443-3:2007
|
Information technology Security techniques A framework for IT security assurance Part 3: Analysis of assurance methods |
ISO/IEC TR 27015:2012
|
Information technology Security techniques Information security management guidelines for financial services |
BS ISO/IEC 27033-5:2013
|
Information technology. Security techniques. Network security Securing communications across networks using Virtual Private Networks (VPNs) |
17/30342673 DC : 0
|
BS ISO/IEC 27021 - INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - COMPETENCE REQUIREMENTS FOR INFORMATION SECURITY MANAGEMENT SYSTEMS PROFESSIONALS |
BS ISO/IEC 27032:2012
|
Information technology. Security techniques. Guidelines for cybersecurity |
DIN EN ISO/IEC 27002:2017-06
|
Information technology - Security techniques - Code of practice for information security controls (ISO/IEC 27002:2013 including Cor 1:2014 and Cor 2:2015) |
ISO/IEC 29134:2017
|
Information technology — Security techniques — Guidelines for privacy impact assessment |
CSA ISO/IEC 27003 : 2010 : R2015
|
INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - INFORMATION SECURITY MANAGEMENT SYSTEM IMPLEMENTATION GUIDANCE |
ISO/IEC 27021:2017
|
Information technology — Security techniques — Competence requirements for information security management systems professionals |
CSA ISO/IEC 20000-2 : 2013 : R2017
|
INFORMATION TECHNOLOGY - SERVICE MANAGEMENT - PART 2: GUIDANCE ON THE APPLICATION OF SERVICE MANAGEMENT SYSTEMS |
CSA ISO/IEC 27031 : 2013
|
INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - GUIDELINES FOR INFORMATION AND COMMUNICATION TECHNOLOGY READINESS FOR BUSINESS CONTINUITY |
DIN CEN ISO/TS 19299;DIN SPEC 74125:2016-02
|
ELECTRONIC FEE COLLECTION - SECURITY FRAMEWORK (ISO/TS 19299:2015) |
INCITS/ISO/IEC 27033-5 : 2014
|
INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - NETWORK SECURITY - PART 5: SECURING COMMUNICATIONS ACROSSS NETWORKS USING VIRTUAL PRIVATE NETWORKS (VPNS) |
IEC TR 80001-2-2:2012
|
Application of risk management for IT-networks incorporating medical devices - Part 2-2: Guidance for the disclosure and communication of medical device security needs, risks and controls |
ISO/IEC 27034-3:2018
|
Information technology — Application security — Part 3: Application security management process |
CAN/CSA-ISO/IEC 27035-2:18
|
Information technology — Security techniques — Information security incident management — Part 2: Guidelines to plan and prepare for incident response (Adopted ISO/IEC 27035-2:2016, first edition, 2016-11-01) |
I.S. EN ISO/IEC 27000:2017
|
INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - INFORMATION SECURITY MANAGEMENT SYSTEMS - OVERVIEW AND VOCABULARY (ISO/IEC 27000:2016) |
EN ISO 19011:2011 COR 2011
|
GUIDELINES FOR AUDITING MANAGEMENT SYSTEMS (ISO 19011:2011) |
ISO/IEC TR 15443-1:2012
|
Information technology Security techniques Security assurance framework Part 1: Introduction and concepts |
CSA ISO 19011 : 2012 : R2017
|
GUIDELINES FOR AUDITING MANAGEMENT SYSTEMS |
CSA ISO/IEC 18028-5 : 2006
|
INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - IT NETWORK SECURITY - PART 5: SECURING COMMUNICATIONS ACROSS NETWORKS USING VIRTUAL PRIVATE NETWORKS |
CAN/CSA-ISO/IEC 27017:16
|
Information technology Security techniques Code of practice for information security controls based on ISO/IEC 27002 for cloud services (Adopted ISO/IEC 27017:2015, first edition, 2015-12-15) |
BS EN 16495:2014
|
Air Traffic Management. Information security for organisations supporting civil aviation operations |
UNI EN 16495 : 2014
|
AIR TRAFFIC MANAGEMENT - INFORMATION SECURITY FOR ORGANIZATIONS SUPPORTING CIVIL AVIATION OPERATIONS |
ISO/IEC 27035:2011
|
Information technology Security techniques Information security incident management |
ISO/IEC 27032:2012
|
Information technology — Security techniques — Guidelines for cybersecurity |
ISO/IEC 27034-2:2015
|
Information technology Security techniques Application security Part 2: Organization normative framework |
ISO/TS 19299:2015
|
Electronic fee collection Security framework |
DIN EN ISO/IEC 27040 E : 2017
|
INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - STORAGE SECURITY (ISO/IEC 27040:2015) |
EN ISO 21091:2013
|
Health informatics - Directory services for healthcare providers, subjects of care and other entities (ISO 21091:2013) |
UNI/TS 11465-1 : 2012
|
ELECTRONIC SIGNATURES AND INFRASTRUCTURES (ESI) - DATA PRESERVATION SYSTEMS SECURITY - PART 1: REQUIREMENTS FOR IMPLEMENTATION AND MANAGEMENT |
ISO/IEC 27003:2017
|
Information technology — Security techniques — Information security management systems — Guidance |
UNI EN 16571 : 2014
|
INFORMATION TECHNOLOGY - RFID PRIVACY IMPACT ASSESSMENT PROCESS |
BS ISO/IEC 27036-3:2013
|
Information technology. Security techniques. Information security for supplier relationships Guidelines for information and communication technology supply chain security |
BS ISO/IEC 27018:2014
|
Information technology. Security techniques. Code of practice for protection of personally identifiable information (PII) in public clouds acting as PII processors |
BS ISO/IEC 29151:2017
|
Information technology. Security techniques. Code of practice for personally identifiable information protection |
12/30250178 DC : 0
|
BS ISO/IEC 27036-3 - INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - INFORMATION SECURITY FOR SUPPLIER RELATIONSHIPS - PART 3: GUIDELINES FOR ICT SUPPLY CHAIN SECURITY |
10/30162769 DC : DRAFT NOV 2010
|
BS ISO/IEC 27007 - INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - GUIDELINES FOR INFORMATION SECURITY MANAGEMENT SYSTEMS AUDITING |
BS ISO/IEC 27017:2015
|
Information technology. Security techniques. Code of practice for information security controls based on ISO/IEC 27002 for cloud services |
10/30230297 DC : 0
|
BS ISO/IEC 15026-3 - SYSTEMS AND SOFTWARE ENGINEERING - SYSTEMS AND SOFTWARE ASSURANCE - PART 3: SYSTEM INTEGRITY LEVELS |
12/30250175 DC : 0
|
BS ISO/IEC 27036-2 - INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - INFORMATION SECURITY FOR SUPPLIER RELATIONSHIPS - PART 2: COMMON REQUIREMENTS |
CSA INFORMATION SECURITY PACKAGE : 2018
|
CONSISTS OF CAN/CSA-ISO/IEC 27000:18 - INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - INFORMATION SECURITY MANAGEMENT SYSTEMS - OVERVIEW AND VOCABULARY; CAN/CSA-ISO/IEC 27001:14, INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - INFORMATION SECURITY MANAGEMENT SYSTEMS - REQUIREMENTS; CAN/CSA-ISO/IEC 27002:15 - INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - CODE OF PRACTICE FOR INFORMATION |
14/30304350 DC : 0
|
BS EN ISO 27799 - HEALTH INFORMATICS - INFORMATION SECURITY MANAGEMENT IN HEALTH USING ISO/IEC 27002 |
PD IEC/TR 80001-2-2:2012
|
Application of risk management for IT-networks incorporating medical devices Guidance for the disclosure and communication of medical device security needs, risks and controls |
INCITS/ISO/IEC 27002 : 2014
|
INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - CODE OF PRACTICE FOR INFORMATION SECURITY CONTROLS |
BIP 0071 : 2014
|
GUIDELINES ON REQUIREMENTS AND PREPARATION FOR ISMS CERTIFICATION BASED ON ISO/IEC 27001 |
BS ISO/IEC 27007:2017
|
Information technology. Security techniques. Guidelines for information security management systems auditing |
BS EN ISO/IEC 27001:2017
|
Information technology. Security techniques. Information security management systems. Requirements |
12/30192064 DC : 0
|
BS ISO/IEC 27001 - INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - INFORMATION SECURITY MANAGEMENT SYSTEM - REQUIREMENTS |
18/30348902 DC : 0
|
BS ISO/IEC 21878 - INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - SECURITY GUIDELINES FOR DESIGN AND IMPLEMENTATION OF VIRTUALIZED SERVERS |
ISO/IEC 27036-3:2013
|
Information technology — Security techniques — Information security for supplier relationships — Part 3: Guidelines for information and communication technology supply chain security |
BS ISO/IEC 27034-1:2011
|
Information technology. Security techniques. Application security Overview and concepts |
BS ISO/IEC 15026-2:2011
|
Systems and software engineering. Systems and software assurance Assurance case |
DIN CEN ISO/TS 19299;DIN SPEC 74125:2016-02
|
ELECTRONIC FEE COLLECTION - SECURITY FRAMEWORK (ISO/TS 19299:2015) |
CAN/CSA-ISO/IEC 30100-2:18
|
Information technology — Home network resource management — Part 2: Architecture (Adopted ISO/IEC 30100-2:2016, first edition, 2016-04) |
10/30215541 DC : 0
|
BS ISO/IEC 15026-2 - SYSTEMS AND SOFTWARE ENGINEERING - SYSTEMS AND SOFTWARE ASSURANCE - PART 2: ASSURANCE CASE |
PD CEN ISO/TS 19299:2015
|
Electronic fee collection. Security framework |
BS ISO/IEC 27031:2011
|
Information technology. Security techniques. Guidelines for information and communication technology readiness for business continuity |
13/30266767 DC : 0
|
BS ISO/IEC 27018 - INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - CODE OF PRACTICE FOR P2 PROTECTION IN PUBLIC CLOUD ACTING AS P2 PROCESSORS |
BS EN ISO 27799:2008
|
Health informatics. Information security management in health using ISO/IEC 27002 |
08/30134763 DC : DRAFT JUNE 2008
|
BS ISO/IEC 27004 - INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - INFORMATION SECURITY MANAGEMENT - MEASUREMENT |
12/30209825 DC : 0
|
BS ISO/IEC 27014 - INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - GOVERNANCE OF INFORMATION SECURITY |
BIS IS/ISO 19011 : 2011(R2016)
|
GUIDELINES FOR AUDITING MANAGEMENT SYSTEMS |
PD ISO/IEC TR 15443-1:2012
|
Information technology. Security techniques. Security assurance framework Introduction and concepts |
INCITS/ISO/IEC 27033-2 : 2014
|
INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - NETWORK SECURITY - PART 2: GUIDELINES FOR THE DESIGN AND IMPLEMENTATION OF NETWORK SECURITY |
UNI CEN/TS 16439 : 2013
|
ELECTRONIC FEE COLLECTION - SECURITY FRAMEWORK |
TS 119 401 : 2.0.1
|
ELECTRONIC SIGNATURES AND INFRASTRUCTURES (ESI); GENERAL POLICY REQUIREMENTS FOR TRUST SERVICE PROVIDERS |
16/30326000 DC : 0
|
BS ISO/IEC 19770-1 - INFORMATION TECHNOLOGY - IT ASSET MANAGEMENT - PART 1: IT ASSET MANAGEMENT SYSTEMS - REQUIREMENTS |
CSA ISO 19011 : 2012
|
GUIDELINES FOR AUDITING MANAGEMENT SYSTEMS |
CAN/CSA-ISO/IEC 27035-1:18
|
Information technology — Security techniques — Information security incident management — Part 1: Principles of incident management (Adopted ISO/IEC 27035-1:2016, first edition, 2016-11-01) |
CSA ISO/IEC 20000-2:2013
|
INFORMATION TECHNOLOGY - SERVICE MANAGEMENT - PART 2: GUIDANCE ON THE APPLICATION OF SERVICE MANAGEMENT SYSTEMS |
I.S. EN 16571:2014
|
INFORMATION TECHNOLOGY - RFID PRIVACY IMPACT ASSESSMENT PROCESS |
CSA ISO/IEC 20000-1 :2013
|
INFORMATION TECHNOLOGY - SERVICE MANAGEMENT - PART 1: SERVICE MANAGEMENT SYSTEM REQUIREMENTS |
CSA ISO/IEC 27003 : 2010
|
INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - INFORMATION SECURITY MANAGEMENT SYSTEM IMPLEMENTATION GUIDANCE |
TR 187 023 : 1.1.1
|
TELECOMMUNICATIONS AND INTERNET CONVERGED SERVICES AND PROTOCOLS FOR ADVANCED NETWORKING (TISPAN); SECURITY ASSURANCE PROFILE FOR SECURED TELECOMMUNICATIONS OPERATIONS; STATEMENT OF NEEDS FOR SECURITY ASSURANCE MEASUREMENT IN OPERATIONAL TELECOM INFRASTRUCTURES |
15/30267674 DC : 0
|
BS ISO/IEC 27035-1 - INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - INFORMATION SECURITY INCIDENT MANAGEMENT - PART 1: PRINCIPLES OF INCIDENT MANAGEMENT |
I.S. EN ISO/IEC 27001:2017
|
INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - INFORMATION SECURITY MANAGEMENT SYSTEMS - REQUIREMENTS (ISO/IEC 27001:2013 INCLUDING COR 1:2014 AND COR 2:2015) |
UNE-ISO/IEC 27000:2014
|
Information technology -- Security techniques -- Information security management systems -- Overview and vocabulary |
ISO/IEC 19770-1:2017
|
Information technology — IT asset management — Part 1: IT asset management systems — Requirements |
IEEE 15026-2-2011
|
IEEE Standard--Adoption of ISO/IEC 15026-2:2011 Systems and Software Engineering--Systems and Software Assurance--Part 2: Assurance Case |
GS ISI 001-2 : 1.1.2
|
INFORMATION SECURITY INDICATORS (ISI); INDICATORS (INC); PART 2: GUIDE TO SELECT OPERATIONAL INDICATORS BASED ON THE FULL SET GIVEN IN PART 1 |
ISO/TS 20405:2018
|
Health informatics Framework of event data and reporting definitions for the safety of health software |
BS EN ISO/IEC 27000:2017
|
Information technology. Security techniques. Information security management systems. Overview and vocabulary |
S.R. CEN ISO/TS 19299:2015
|
ELECTRONIC FEE COLLECTION - SECURITY FRAMEWORK (ISO/TS 19299:2015) |
ISO/TR 18128:2014
|
Information and documentation — Risk assessment for records processes and systems |
CSA ISO/IEC TR 15443-1 : 2015
|
INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - SECURITY ASSURANCE FRAMEWORK - PART 1: INTRODUCTION AND CONCEPTS |
IEEE 1012-2012
|
IEEE Standard for System and Software Verification and Validation |
ISO/IEC 27033-5:2013
|
Information technology — Security techniques — Network security — Part 5: Securing communications across networks using Virtual Private Networks (VPNs) |
I.S. EN ISO/IEC 27002:2017
|
INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - CODE OF PRACTICE FOR INFORMATION SECURITY CONTROLS (ISO/IEC 27002:2013 INCLUDING COR 1:2014 AND COR 2:2015) |
ISO/IEC 30100-2:2016
|
Information technology Home network resource management Part 2: Architecture |
CAN/CSA-ISO/IEC 27011:18
|
Information technology ? Security techniques ? Code of practice for information security controls based on ISO/IEC 27002 for telecommunications organizations (Adopted ISO/IEC 27011:2016, second edition, 2016-12-01) |
ISO/IEC TR 15026-1:2010
|
Systems and software engineering Systems and software assurance Part 1: Concepts and vocabulary |
CEI UNI ISO/IEC 27002 : 2014
|
INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - CODE OF PRACTICE FOR INFORMATION SECURITY CONTROLS |
ISO/IEC 18028-1:2006
|
Information technology Security techniques IT network security Part 1: Network security management |
ISO/IEC 27033-1:2015
|
Information technology Security techniques Network security Part 1: Overview and concepts |
ISO/IEC 27011:2016
|
Information technology — Security techniques — Code of practice for Information security controls based on ISO/IEC 27002 for telecommunications organizations |
ISO/IEC 20000-1:2011
|
Information technology Service management Part 1: Service management system requirements |
BS ISO/IEC 27040 : 2015
|
INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - STORAGE SECURITY |
ISO 21091:2013
|
Health informatics — Directory services for healthcare providers, subjects of care and other entities |
BS EN ISO/IEC 27040:2016
|
Information technology. Security techniques. Storage security |
ISO/IEC 27040:2015
|
Information technology — Security techniques — Storage security |
ISO/TS 14441:2013
|
Health informatics — Security and privacy requirements of EHR systems for use in conformity assessment |
ISO/IEC 20000-2:2012
|
Information technology Service management Part 2: Guidance on the application of service management systems |
UNE-ISO/TR 18128:2014 IN
|
Information and documentation — Risk assessment for records processes and systems. |
ISO/IEC 27001:2013
|
Information technology — Security techniques — Information security management systems — Requirements |
EN ISO/IEC 27000:2017
|
Information technology - Security techniques - Information security management systems - Overview and vocabulary (ISO/IEC 27000:2016) |
EN ISO/IEC 27002:2017
|
Information technology - Security techniques - Code of practice for information security controls (ISO/IEC 27002:2013 including Cor 1:2014 and Cor 2:2015) |
EN ISO/IEC 27040:2016
|
Information technology - Security techniques - Storage security (ISO/IEC 27040:2015) |
EN ISO 27799:2016
|
Health informatics - Information security management in health using ISO/IEC 27002 (ISO 27799:2016) |
EN ISO/IEC 27001:2017
|
Information technology - Security techniques - Information security management systems - Requirements (ISO/IEC 27001:2013 including Cor 1:2014 and Cor 2:2015) |
EN 16571:2014
|
Information technology - RFID privacy impact assessment process |
EN 16495:2014
|
Air Traffic Management - Information security for organisations supporting civil aviation operations |
INCITS/ISO/IEC 27013 : 2014
|
INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - GUIDANCE ON THE INTEGRATED IMPLEMENTATION OF ISO/IEC 27001 AND ISO/IEC 20000-1 |
BS ISO/IEC 27014:2013
|
Information technology. Security techniques. Governance of information security |
BS ISO/IEC 27036-2:2014
|
Information technology. Security techniques. Information security for supplier relationships Requirements |
12/30249606 DC : 0
|
BS EN 62645 ED 1.0 - NUCLEAR POWER PLANTS - INSTRUMENTATION AND CONTROL SYSTEMS - REQUIREMENT S FOR SECURITY PROGRAMMES FOR COMPUTER-BASED SYSTEMS |
UNI EN ISO 21091 : 2013
|
HEALTH INFORMATICS - DIRECTORY SERVICES FOR HEALTHCARE PROVIDERS, SUBJECTS OF CARE AND OTHER ENTITIES |
BS ISO/IEC 20000-2:2012
|
Information technology. Service management Guidance on the application of service management systems |
ISO 19011:2011
|
Guidelines for auditing management systems |
BS ISO/IEC 27036-1:2014
|
Information technology. Security techniques. Information security for supplier relationships Overview and concepts |
BS ISO/IEC 15026-1:2013
|
Systems and software engineering. Systems and software assurance Concepts and vocabulary |
ISO/IEC 27035-1:2016
|
Information technology — Security techniques — Information security incident management — Part 1: Principles of incident management |
CSA ISO/IEC 27007 : 2013
|
INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - GUIDELINES FOR INFORMATION SECURITY MANAGEMENT SYSTEMS AUDITING |
CEI UNI ISO/IEC 20000-1 : 2012
|
INFORMATION TECHNOLOGY - SERVICE MANAGEMENT - PART 1: SERVICE MANAGEMENT SYSTEM REQUIREMENTS |
NASA CCSDS 350.7-G : ISSUE 1
|
SECURITY GUIDE FOR MISSION PLANNERS |
ISO/IEC 27007:2017
|
Information technology Security techniques Guidelines for information security management systems auditing |
PD ISO/TR 18128:2014
|
Information and documentation. Risk assessment for records processes and systems |
BS ISO/IEC 27033-2:2012
|
Information technology. Security techniques. Network security Guidelines for the design and implementation of network security |
15/30259619 DC : 0
|
BS ISO/IEC 27017 - INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - CODE OF PRACTICE FOR INFORMATION SECURITY CONTROLS BASED ON ISO/IEC 27002 FOR CLOUD SERVICES |
BS ISO/IEC 27001 : 2013
|
INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - INFORMATION SECURITY MANAGEMENT SYSTEMS - REQUIREMENTS |
08/30146238 DC : DRAFT JUNE 2008
|
BS ISO/IEC 27000 - INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - INFORMATION SECURITY MANAGEMENT SYSTEM - OVERVIEW AND VOCABULARY |
DIN ISO/IEC 27018:2017-08
|
INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - CODE OF PRACTICE FOR PROTECTION OF PERSONALLY IDENTIFIABLE INFORMATION (PII) IN PUBLIC CLOUDS ACTING AS PII PROCESSORS (ISO/IEC 27018:2014) |
10/30168519 DC : DRAFT JUNE 2010
|
BS ISO/IEC 27034-1 - INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - APPLICATION SECURITY - PART 1: OVERVIEW AND CONCEPTS |
UNI CEI ISO/IEC 20000-1 : 2012
|
INFORMATION TECHNOLOGY - SERVICE MANAGEMENT - PART 1: SERVICE MANAGEMENT SYSTEM REQUIREMENTS |
PD CEN ISO/TS 14441:2013
|
Health informatics. Security and privacy requirements of EHR systems for use in conformity assessment |
11/30207802 DC : 0
|
BS ISO/IEC 27013 - INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - GUIDELINES ON THE INTEGRATED IMPLEMENTATION OF ISO/IEC 27001 AND ISO/IEC 20000-1 |
BS ISO/IEC 27021:2017
|
Information technology. Security techniques. Competence requirements for information security management systems professionals |
PD CEN/TS 16439:2013
|
Electronic fee collection. Security framework |
UNE-ISO/IEC 27001:2014
|
Information technology -- Security techniques -- Information security management systems -- Requirements |
BS ISO/IEC 27013:2015
|
Information technology. Security techniques. Guidance on the integrated implementation of ISO/IEC 27001 and ISO/IEC 20000-1 |
PD ISO/IEC TR 27016:2014
|
Information technology. Security techniques. Information security management. Organizational economics |
17/30213621 DC : 0
|
BS ISO/IEC 27034-3 - INFORMATION TECHNOLOGY - APPLICATION SECURITY - PART 3: APPLICATION SECURITY MANAGEMENT PROCESS |
DIN EN 16571 E : 2014
|
INFORMATION TECHNOLOGY - RFID PRIVACY IMPACT ASSESSMENT PROCESS |
BS EN ISO 19011:2011
|
Guidelines for auditing management systems |
ISO/IEC 27018:2014
|
Information technology Security techniques Code of practice for protection of personally identifiable information (PII) in public clouds acting as PII processors |
EA 0031:2013
|
Risk management system. |
CAN/CSA-ISO/CEI 27001:14
|
INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - INFORMATION SECURITY MANAGEMENT SYSTEMS - REQUIREMENTS |
CAN/CSA-ISO/IEC 15026-2:13 (R2017)
|
Systems and software engineering - Systems and software assurance - Part 2: Assurance case (Adopted ISO/IEC 15026-2:2011, first edition, 2011-02- 15) |
GS ISI 002 : 1.2.1
|
INFORMATION SECURITY INDICATORS (ISI); EVENT MODEL A SECURITY EVENT CLASSIFICATION MODEL AND TAXONOMY |
ISO/IEC 27035-2:2016
|
Information technology — Security techniques — Information security incident management — Part 2: Guidelines to plan and prepare for incident response |
I.S. EN 16495:2014
|
AIR TRAFFIC MANAGEMENT - INFORMATION SECURITY FOR ORGANISATIONS SUPPORTING CIVIL AVIATION OPERATIONS |
IEEE/ISO/IEC 15026-1-2014
|
IEEE Standard Adoption of ISO/IEC 15026-1--Systems and Software Engineering--Systems and Software Assurance--Part 1: Concepts and Vocabulary |
ISO/IEC 29151:2017
|
Information technology — Security techniques — Code of practice for personally identifiable information protection |
I.S. ISO/IEC 27002:2013
|
INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - CODE OF PRACTICE FOR INFORMATION SECURITY CONTROLS |
INCITS/ISO/IEC 27001 : 2014
|
INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - INFORMATION SECURITY MANAGEMENT SYSTEMS - REQUIREMENTS |
ISO/IEC 27014:2013
|
Information technology Security techniques Governance of information security |
ISO/TR 18638:2017
|
Health informatics Guidance on health information privacy education in healthcare organizations |
UNE-EN ISO 19011:2012
|
Guidelines for auditing management systems (ISO 19011:2011) |
ISO/IEC 27033-2:2012
|
Information technology — Security techniques — Network security — Part 2: Guidelines for the design and implementation of network security |
CSA ISO/IEC 18028-1 : 2006
|
INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - IT NETWORK SECURITY - PART 1: NETWORK SECURITY MANAGEMENT |
UNI CEI ISO/IEC 27002 : 2014
|
INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - CODE OF PRACTICE FOR INFORMATION SECURITY CONTROLS |
CEN/TS 16439:2013
|
Electronic fee collection - Security framework |
CEN/TR 16742 : 2014
|
INTELLIGENT TRANSPORT SYSTEMS - PRIVACY ASPECTS IN ITS STANDARDS AND SYSTEMS IN EUROPE |