ISO/IEC JTC 1/SC 27
Registration number (WIID) | Project No. | Title | Status |
---|---|---|---|
62072 | ISO/IEC PDTS 27035-3 | Information technology — Security techniques — Information security incident management — Part 3: Guidelines for incident response operations | Standarts spēkā |
45272 | ISO/IEC PDTR 29193 | Secure system design principles and techniques | Izstrādē |
80400 | ISO/IEC NP TS 27568 | Security and privacy of digital twins | Izstrādē |
80397 | ISO/IEC NP TS 27564 | Privacy — Guidance on the use of models for engineering | Izstrādē |
75948 | ISO/IEC NP TS 23532-2 | IT Security Techniques — Requirements for the competence of IT security testing and evaluation laboratories — Part 2: Part 1: Testing and evaluation for ISO/IEC 15408Part 2: Testing for ISO/IEC 19790 | Izstrādē |
66672 | ISO/IEC NP TS 14516-3 | Information technology — Security techniques — Guidelines for the use and management of electronic trust service providers — Part 3: Guidelines on information security for PKI trust service providers | Izstrādē |
66671 | ISO/IEC NP TS 14516-2 | Information technology — Security techniques — Guidelines for the use and management of electronic trust service providers — Part 2: Guidelines on information security for CA trust service providers | Izstrādē |
66670 | ISO/IEC NP TS 14516-1 | Information technology — Security techniques — Guidelines for the use and management of electronic trust service providers — Part 1: Overview and concepts | Izstrādē |
68838 | ISO/IEC NP TR 20004-2 | Information technology — Security techniques — Refining software vulnerability analysis under ISO/IEC 15408 and ISO/IEC 18045 — Part 2: CWE and CAPEC based software penetration testing | Izstrādē |
64590 | ISO/IEC NP TR 19791 | Information technology — Security techniques — Security assessment of operational systems | Izstrādē |
Displaying 191-200 of 770 results.