ISO/IEC 27034-1:2011
Current
The latest, up-to-date edition.
Information technology — Security techniques — Application security — Part 1: Overview and concepts
Hardcopy , PDF , PDF 3 Users , PDF 5 Users , PDF 9 Users
21-11-2011
ISO/IEC 27034 provides guidance to assist organizations in integrating security into the processes used for managing their applications.
ISO/IEC 27034-1:2011 presents an overview of application security. It introduces definitions, concepts, principles and processes involved in application security.
ISO/IEC 27034 is applicable to in-house developed applications, applications acquired from third parties, and where the development or the operation of the application is outsourced.
DocumentType |
Standard
|
Pages |
67
|
ProductNote |
THIS STANDARD ALSO REFERS TO ISO/IEC TR 29193, NIST SP 800-48:2008, NIST SP 800-53 Revision 3:2009, NIST SP 800-77:2005, NIST SP 800-94:2007, NIST SP 800-97:2007.
|
PublisherName |
International Organization for Standardization
|
Status |
Current
|
Standards | Relationship |
BS ISO/IEC 27034-1:2011 | Identical |
GOST R ISO/IEC 27034-1 : 2014 | Identical |
NEN ISO/IEC 27034-1 : 2011 C1 2014 | Identical |
NBN ISO/IEC 27034-1 : 2014 COR 2014 | Identical |
CSA ISO/IEC 27034-1:2012 | Identical |
CAN/CSA-ISO/IEC 27034-1:12 (R2017) | Identical |
BS ISO/IEC 27034-2:2015 | Information technology. Security techniques. Application security Organization normative framework |
16/30327034 DC : 0 | BS ISO/IEC 27034-7 - INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - APPLICATION SECURITY - PART 7: APPLICATION SECURITY ASSURANCE PREDICTION MODEL |
BS ISO/IEC 27034-5:2017 | Information technology. Security techniques. Application security Protocols and application security controls data structure |
ISO/IEC 27034-7:2018 | Information technology — Application security — Part 7: Assurance prediction framework |
BS ISO/IEC 27034-6:2016 | Information technology. Security techniques. Application security Case studies |
14/30213618 DC : 0 | BS ISO/IEC 27034-2 - INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - APPLICATION SECURITY - PART 2: ORGANIZATION NORMATIVE FRAMEWORK |
PD ISO/IEC TS 30103:2015 | Software and Systems Engineering. Lifecycle Processes. Framework for Product Quality Achievement |
ISO/IEC 27034-3:2018 | Information technology — Application security — Part 3: Application security management process |
ISO/IEC 27034-2:2015 | Information technology Security techniques Application security Part 2: Organization normative framework |
SAE AS 9115 : 2017 | QUALITY MANAGEMENT SYSTEMS - REQUIREMENTS FOR AVIATION, SPACE, AND DEFENSE ORGANIZATIONS - DELIVERABLE SOFTWARE (SUPPLEMENT TO 9100:2016) |
ISO/IEC 27034-6:2016 | Information technology Security techniques Application security Part 6: Case studies |
17/30349211 DC : 0 | BS ISO/IEC 29147 - INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - VULNERABILITY DISCLOSURE |
16/30213627 DC : 0 | BS ISO/IEC 27034-5 - INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - APPLICATION SECURITY - PART 5: PROTOCOLS AND APPLICATION SECURITY CONTROLS DATA STRUCTURE |
CAN/CSA-ISO/IEC 27034-2:16 | Information technology Security techniques Application security Part 2: Organization normative framework (Adopted ISO/IEC 27034-2:2015, first edition, 2015-08-15) |
ISO/IEC TS 27034-5-1:2018 | Information technology Application security Part 5-1: Protocols and application security controls data structure, XML schemas |
ISO/IEC TS 30103:2015 | Software and Systems Engineering — Lifecycle Processes — Framework for Product Quality Achievement |
16/30338037 DC : 0 | BS ISO/IEC 30754 - INFORMATION TECHNOLOGY - SOFTWARE TRUSTWORTHINESS - GOVERNANCE AND MANAGEMENT - SPECIFICATION |
17/30213621 DC : 0 | BS ISO/IEC 27034-3 - INFORMATION TECHNOLOGY - APPLICATION SECURITY - PART 3: APPLICATION SECURITY MANAGEMENT PROCESS |
15/30268493 DC : 0 | BS ISO/IEC 27034-6 - INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - APPLICATION SECURITY - PART 6: SECURITY GUIDANCE FOR SPECIFIC APPLICATIONS |
PREN 9115 : 200P1 | QUALITY MANAGEMENT SYSTEMS - REQUIREMENTS FOR AVIATION, SPACE AND DEFENSE ORGANIZATIONS - DELIVERABLE SOFTWARE (SUPPLEMENT TO EN 9100) |
ISO/IEC 27034-5:2017 | Information technology — Security techniques — Application security — Part 5: Protocols and application security controls data structure |
CAN/CSA-ISO/IEC 27034-6:18 | Information technology — Security techniques — Application security — Part 6: Case studies (Adopted ISO/IEC 27034-6:2016, first edition, 2016-10-01) |
ISO/IEC 2382-7:2000 | Information technology Vocabulary Part 7: Computer programming |
ISO/IEC 27001:2013 | Information technology — Security techniques — Information security management systems — Requirements |
ISO/IEC/IEEE 29148:2011 | Systems and software engineering Life cycle processes Requirements engineering |
ISO/IEC 15408-3:2008 | Information technology — Security techniques — Evaluation criteria for IT security — Part 3: Security assurance components |
ISO/IEC 15289:2006 | Systems and software engineering Content of systems and software life cycle process information products (Documentation) |
ISO/IEC/IEEE 24765:2017 | Systems and software engineering — Vocabulary |
ISO/IEC 27002:2013 | Information technology Security techniques Code of practice for information security controls |
ISO/IEC TR 20000-4:2010 | Information technology Service management Part 4: Process reference model |
ISO/IEC 21827:2008 | Information technology Security techniques Systems Security Engineering Capability Maturity Model (SSE-CMM) |
ISO/IEC 15288:2008 | Systems and software engineering — System life cycle processes |
ISO/IEC 18019:2004 | Software and system engineering Guidelines for the design and preparation of user documentation for application software |
ISO/IEC 27005:2011 | Information technology Security techniques Information security risk management |
ISO/IEC 12207:2008 | Systems and software engineering — Software life cycle processes |
ISO 9000:2015 | Quality management systems — Fundamentals and vocabulary |
ISO/IEC 27000:2016 | Information technology Security techniques Information security management systems Overview and vocabulary |
Access your standards online with a subscription
Features
-
Simple online access to standards, technical information and regulations.
-
Critical updates of standards and customisable alerts and notifications.
-
Multi-user online standards collection: secure, flexible and cost effective.