ISO/IEC JTC 1/SC 27
Registration number (WIID) | Project No. | Title | Status |
---|---|---|---|
62548 | ISO/IEC NP 27036-5 | Information technology — Security techniques — Information security for supplier relationships — Part 5: Guidelines for security of cloud services | Izstrādē |
53247 | ISO/IEC WD TR 30127 | Information technology — Security techniques — Detailing software penetration testing under ISO/IEC 15408 and ISO/IEC 18045 vulnerability analysis | Izstrādē |
44377 | ISO/IEC NP 27033 | Information technology — IT Network security | Izstrādē |
73909 | ISO/IEC WD 29115.4 | Information technology — Security techniques — Entity authentication assurance framework | Izstrādē |
90716 | ISO/IEC PWI 25548 | Cybersecurity framework for smart cities | Izstrādē |
77618 | ISO/IEC NP 24036 | Information technology — Security techniques — Secure management and preservation of documents through digital systems — Certified mail | Izstrādē |
61006 | ISO/IEC AWI TR 27024 | Information security, cybersecurity and privacy protection — Government and regulatory use of ISO/IEC 27001, ISO/IEC 27002 and other information security standards | Izstrādē |
82882 | ISO/IEC PWI 7680 | Requirements for the competence of ICT products cybersecurity conformity assessment body personnel – Knowledge, skills and effectiveness for ISO/IEC 15408 and ISO/IEC 19790 validators | Izstrādē |
89505 | ISO/IEC PWI 25226 | Inclusion of FHE scheme switching techniques in ISO/IEC JTC 1/SC 27/WG 2 standards | Izstrādē |
89319 | ISO/IEC DTS 27564 | Privacy protection — Guidance on the use of models for privacy engineering | Izstrādē |
Displaying 171-180 of 774 results.