ISO/IEC 29146:2016
Superseded
A superseded Standard is one, which is fully replaced by another Standard, which is a new edition of the same Standard.
View Superseded by
Information technology — Security techniques — A framework for access management
Hardcopy , PDF , PDF 3 Users , PDF 5 Users , PDF 9 Users
19-01-2024
English, French
01-06-2016
ISO/IEC 29146:2016 defines and establishes a framework for access management (AM) and the secure management of the process to access information and Information and Communications Technologies (ICT) resources, associated with the accountability of a subject within some context.
This International Standard provides concepts, terms and definitions applicable to distributed access management techniques in network environments.
This International Standard also provides explanations about related architecture, components and management functions.
The subjects involved in access management might be uniquely recognized to access information systems, as defined in ISO/IEC 24760.
The nature and qualities of physical access control involved in access management systems are outside the scope of this International Standard.
Committee |
ISO/IEC JTC 1/SC 27
|
DocumentType |
Standard
|
Pages |
35
|
PublisherName |
International Organization for Standardization
|
Status |
Superseded
|
SupersededBy | |
UnderRevision |
Standards | Relationship |
DS/EN ISO/IEC 29146:2023 | Identical |
NEN ISO/IEC 29146 : 2016 | Identical |
BS ISO/IEC 29146:2016 | Identical |
INCITS/ISO/IEC 29146:2016[2019] | Identical |
DS ISO/IEC 29146 : 2016 | Identical |
PN-EN ISO/IEC 29146:2023-09 | Identical |
NEN-EN-ISO/IEC 29146:2023 | Identical |
UNE-EN ISO/IEC 29146:2023 | Identical |
17/30349181 DC : 0 | BS ISO/IEC 24760-1 AMENDMENT 1 - INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - A FRAMEWORK FOR IDENTITY MANAGEMENT - PART 1: TERMINOLOGY AND CONCEPTS |
10/30143797 DC : 0 | BS ISO/IEC 24760-1 - INFROMATION TECHNOLOGY - SECURITY TECHNIQUES - A FRAMEWORK FOR IDENTITY MANAGEMENT - PART 1: TERMINOLOGY AND CONCEPTS |
BS ISO/IEC 24760-1:2011 | Information technology. Security techniques. A framework for identity management Terminology and concepts |
ISO/IEC 24760-1:2011 | Information technology Security techniques A framework for identity management Part 1: Terminology and concepts |
ISO/IEC TR 30117:2014 | Information technology Guide to on-card biometric comparison standards and applications |
ISO/IEC 24760-3:2016 | Information technology — Security techniques — A framework for identity management — Part 3: Practice |
ISO/IEC 24760-2:2015 | Information technology — Security techniques — A framework for identity management — Part 2: Reference architecture and requirements |
CAN/CSA-ISO/IEC 24760-3:18 | Information technology — Security techniques — A framework for identity management — Part 3: Practice (Adopted ISO/IEC 24760-3:2016, first edition, 2016-08-01) |
ISO/IEC 24760-2:2015 | Information technology — Security techniques — A framework for identity management — Part 2: Reference architecture and requirements |
ISO/IEC 24760-1:2011 | Information technology Security techniques A framework for identity management Part 1: Terminology and concepts |
ISO/IEC 27002:2013 | Information technology Security techniques Code of practice for information security controls |
ISO/IEC 29115:2013 | Information technology — Security techniques — Entity authentication assurance framework |
ISO/IEC 10181-3:1996 | Information technology Open Systems Interconnection Security frameworks for open systems: Access control framework |
ISO/IEC 9594-8:2017 | Information technology Open Systems Interconnection The Directory Part 8: Public-key and attribute certificate frameworks |
Access your standards online with a subscription
Features
-
Simple online access to standards, technical information and regulations.
-
Critical updates of standards and customisable alerts and notifications.
-
Multi-user online standards collection: secure, flexible and cost effective.