CEN/CLC/TC 13
| Registration number (WIID) | Project No. | Title | Status |
|---|---|---|---|
| 82349 | prEN 40000-1-1 | Cybersecurity requirements for products with digital elements - Vocabulary | Aptauja slēgta |
| 81343 | prEN 40000-1-3 | Cybersecurity requirements for products with digital elements - Part 1-3: Vulnerability Handling | Aptauja slēgta |
| 79926 | prEN ISO/IEC 27017 | Information security, cybersecurity and privacy protection - Information security controls based on ISO/IEC 27002 for cloud services (ISO/IEC DIS 27017:2025) | Aptauja slēgta |
| 82987 | prEN ISO/IEC 29134 | Information technology - Security techniques - Guidelines for privacy impact assessment (ISO/IEC 29134:2023) | Aptauja |
| 69304 | LVS EN ISO/IEC 27006:2021 | Information technology - Security techniques - Requirements for bodies providing audit and certification of information security management systems (ISO/IEC 27006:2015, including Amd 1:2020) | Atcelts |
| 69297 | EN ISO/IEC 15408-1:2020 | Information technology - Security techniques - Evaluation criteria for IT security - Part 1: Introduction and general model (ISO/IEC 15408-1:2009) | Atcelts |
| 69299 | LVS EN ISO/IEC 15408-3:2020 | Information technology - Security techniques - Evaluation criteria for IT security - Part 3: Security assurance components (ISO/IEC 15408-3:2008, Corrected version 2011-05) | Atcelts |
| 62990 | EN ISO/IEC 27002:2017 | Information technology - Security techniques - Code of practice for information security controls (ISO/IEC 27002:2013 including Cor 1:2014 and Cor 2:2015) | Atcelts |
| 69298 | EN ISO/IEC 15408-2:2020 | Information technology - Security techniques - Evaluation criteria for IT security - Part 2: Security functional components (ISO/IEC 15408-2:2008) | Atcelts |
| 69298 | LVS EN ISO/IEC 15408-2:2020 | Information technology - Security techniques - Evaluation criteria for IT security - Part 2: Security functional components (ISO/IEC 15408-2:2008) | Atcelts |
Displaying 111-120 of 173 results.
