ISO/IEC JTC 1/SC 27
| Registration number (WIID) | Project No. | Title | Status |
|---|---|---|---|
| 85919 | ISO/IEC CD 27003.3 | Information technology — Security techniques — Information security management systems — Guidance | Izstrādē |
| 85851 | ISO/IEC DIS 29128-3 | Information security, cybersecurity and privacy protection — Verification of cryptographic protocols — Part 3: Evaluation methods and activities for protocol implementation verification | Aptauja slēgta |
| 85850 | ISO/IEC FDIS 29128-2 | Information security, cybersecurity and privacy protection — Verification of Cryptographic Protocols — Part 2: Evaluation Methods and Activities for Cryptographic Protocols | Izstrādē |
| 85819 | ISO/IEC 27701:2025 | Information security, cybersecurity and privacy protection — Privacy information management systems — Requirements and guidance | Standarts spēkā |
| 85057 | ISO/IEC TS 27103:2026 | Cybersecurity — Guidance on using ISO and IEC standards in a cybersecurity framework | Standarts spēkā |
| 85056 | ISO/IEC 27019:2024 | Information security, cybersecurity and privacy protection — Information security controls for the energy utility industry | Standarts spēkā |
| 85009 | ISO/IEC WD 24760-4 | IT Security and Privacy — A framework for identity management — Part 4: Authenticators, Credentials and Authentication | Izstrādē |
| 85008 | ISO/IEC PWI 6109 | Guidelines for data security monitoring based on logging | Izstrādē |
| 85000 | ISO/IEC PWI 29128-3 | Information security, cybersecurity and privacy protection — Verification of cryptographic protocols — Part 3: Part 3: Evaluation Methods and Activities for Protocol Implementation Verification | Izstrādē |
| 84999 | ISO/IEC PWI 29128-2 | Information security, cybersecurity and privacy protection — Verification of Cryptographic Protocols — Part 2: Evaluation Methods and Activities for Cryptographic Protocols | Izstrādē |
Displaying 171-180 of 807 results.
