Registration number (WIID)Project No.TitleStatus
85919ISO/IEC CD 27003.3Information technology — Security techniques — Information security management systems — GuidanceIzstrādē
85851ISO/IEC DIS 29128-3Information security, cybersecurity and privacy protection — Verification of cryptographic protocols — Part 3: Evaluation methods and activities for protocol implementation verificationAptauja slēgta
85850ISO/IEC FDIS 29128-2Information security, cybersecurity and privacy protection — Verification of Cryptographic Protocols — Part 2: Evaluation Methods and Activities for Cryptographic ProtocolsIzstrādē
85819ISO/IEC 27701:2025Information security, cybersecurity and privacy protection — Privacy information management systems — Requirements and guidanceStandarts spēkā
85057ISO/IEC TS 27103:2026Cybersecurity — Guidance on using ISO and IEC standards in a cybersecurity frameworkStandarts spēkā
85056ISO/IEC 27019:2024Information security, cybersecurity and privacy protection — Information security controls for the energy utility industryStandarts spēkā
85009ISO/IEC WD 24760-4IT Security and Privacy — A framework for identity management — Part 4: Authenticators, Credentials and AuthenticationIzstrādē
85008ISO/IEC PWI 6109Guidelines for data security monitoring based on loggingIzstrādē
85000ISO/IEC PWI 29128-3Information security, cybersecurity and privacy protection — Verification of cryptographic protocols — Part 3: Part 3: Evaluation Methods and Activities for Protocol Implementation VerificationIzstrādē
84999ISO/IEC PWI 29128-2Information security, cybersecurity and privacy protection — Verification of Cryptographic Protocols — Part 2: Evaluation Methods and Activities for Cryptographic ProtocolsIzstrādē
Displaying 171-180 of 807 results.