ISO/IEC TR 15443-1:2012
Current
The latest, up-to-date edition.
Information technology — Security techniques — Security assurance framework — Part 1: Introduction and concepts
Hardcopy , PDF
English
19-11-2012
ISO/IEC TR 15443-1:2012 defines terms and establishes an extensive and organised set of concepts and their relationships for understanding IT security assurance, thereby establishing a basis for shared understanding of the concepts and principles central to ISO/IEC TR 15443 across its user communities. It provides information fundamental to users of ISO/IEC TR 15443-2.
| Committee |
ISO/IEC JTC 1/SC 27
|
| DevelopmentNote |
Supersedes ISO/IEC TR 15443-3. (11/2012)
|
| DocumentType |
Standard
|
| Pages |
51
|
| PublisherName |
International Organization for Standardization
|
| Status |
Current
|
| Supersedes |
| Standards | Relationship |
| NEN NPR ISO/IEC TR 15443-1 : 2012 | Identical |
| PD ISO/IEC TR 15443-1:2012 | Identical |
| SAC GB/Z 29830-1 : 2013 | Identical |
| CSA ISO/IEC TR 15443-1:15 (R2019) | Identical |
| INCITS/ISO/IEC TR 15443-1:2012(R2025) | Identical |
| INCITS/ISO/IEC TR 15443-1 : 2015 | Identical |
| INCITS/ISO/IEC TR 15443-1:2012(R2025) | Identical |
| 12/30204847 DC : 0 | BS ISO/IEC 29147 - INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - VULNERABILITY DISCLOSURE |
| DD IEC/PAS 62443-3:2008 | Security for industrial process measurement and control Network and system security |
| 08/30133461 DC : 0 | ISO/IEC 27003 - INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - INFORMATION SECURITY MANAGEMENT SYSTEM IMPLEMENTATION GUIDANCE |
| 04/30091043 DC : DRAFT DEC 2004 | ISO/IEC 19791 - INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - SECURITY ASSESSMENT OF OPERATIONAL SYSTEMS |
| BS ISO/IEC 29147:2014 | Information technology. Security techniques. Vulnerability disclosure |
| BS ISO/IEC 21827:2008 | Information technology. Security techniques. Systems security engineering. Capability maturity model (SSE- CMM) |
| ISO/IEC 15026-1:2013 | Systems and software engineering — Systems and software assurance — Part 1: Concepts and vocabulary |
| IEC PAS 62443-3:2008 | Security for industrial process measurement and control - Network and system security |
| ISO/IEC 21827:2008 | Information technology — Security techniques — Systems Security Engineering — Capability Maturity Model® (SSE-CMM®) |
| BS ISO/IEC 15026-1:2013 | Systems and software engineering. Systems and software assurance Concepts and vocabulary |
| ISO/IEC 29147:2014 | Information technology — Security techniques — Vulnerability disclosure |
| ISO/IEC TR 15443-2:2012 | Information technology — Security techniques — Security assurance framework — Part 2: Analysis |
| PD ISO/IEC TR 15443-2:2012 | Information technology. Security techniques. Security assurance framework Analysis |
| IEEE/ISO/IEC 15026-1-2014 | IEEE Standard Adoption of ISO/IEC 15026-1--Systems and Software Engineering--Systems and Software Assurance--Part 1: Concepts and Vocabulary |
| ISO/IEC 17025:2005 | General requirements for the competence of testing and calibration laboratories |
| ISO/IEC 17000:2004 | Conformity assessment — Vocabulary and general principles |
| ISO/IEC 27001:2013 | Information technology — Security techniques — Information security management systems — Requirements |
| ISO/IEC 17021:2011 | Conformity assessment — Requirements for bodies providing audit and certification of management systems |
| ISO/IEC 23988:2007 | Information technology — A code of practice for the use of information technology (IT) in the delivery of assessments |
| ISO/IEC 19790:2012 | Information technology — Security techniques — Security requirements for cryptographic modules |
| ISO/IEC 27002:2013 | Information technology — Security techniques — Code of practice for information security controls |
| ISO/IEC TR 15026-1:2010 | Systems and software engineering — Systems and software assurance — Part 1: Concepts and vocabulary |
| ISO/IEC 17030:2003 | Conformity assessment — General requirements for third-party marks of conformity |
| ISO/IEC 17020:2012 | Conformity assessment — Requirements for the operation of various types of bodies performing inspection |
| ISO/IEC TR 19791:2010 | Information technology — Security techniques — Security assessment of operational systems |
| ISO/IEC 27005:2011 | Information technology — Security techniques — Information security risk management |
| ISO/IEC 15026-2:2011 | Systems and software engineering — Systems and software assurance — Part 2: Assurance case |
| ISO/PAS 17005:2008 | Conformity assessment — Use of management systems — Principles and requirements |
| ISO/IEC 27036-1:2014 | Information technology — Security techniques — Information security for supplier relationships — Part 1: Overview and concepts |
| ISO/IEC 17024:2012 | Conformity assessment — General requirements for bodies operating certification of persons |
| ISO/IEC 17007:2009 | Conformity assessment — Guidance for drafting normative documents suitable for use for conformity assessment |
| ISO/IEC 18045:2008 | Information technology — Security techniques — Methodology for IT security evaluation |
| ISO/IEC 15026-3:2015 | Systems and software engineering — Systems and software assurance — Part 3: System integrity levels |
Access your standards online with a subscription
-
Simple online access to standards, technical information and regulations.
-
Critical updates of standards and customisable alerts and notifications.
-
Multi-user online standards collection: secure, flexible and cost effective.