ISO/IEC JTC 1/SC 27
| Registration number (WIID) | Project No. | Title | Status |
|---|---|---|---|
| 29240 | ISO/IEC TR 13335-4:2000 | Information technology — Guidelines for the management of IT Security — Part 4: Selection of safeguards | Atcelts |
| 33441 | ISO/IEC 17799:2000 | Information technology Code of practice for information security management | Atcelts |
| 39612 | ISO/IEC 17799:2005 | Information technology Security techniques Code of practice for information security management | Atcelts |
| 23231 | ISO/IEC 13888-3:1997 | Information technology — Security techniques — Non-repudiation — Part 3: Mechanisms using asymmetric techniques | Atcelts |
| 40612 | ISO/IEC 15408-1:2005 | Information technology — Security techniques — Evaluation criteria for IT security — Part 1: Introduction and general model | Atcelts |
| 75281 | ISO/IEC 27005:2018 | Information technology — Security techniques — Information security risk management | Atcelts |
| 42103 | ISO/IEC 27001:2005 | Information technology — Security techniques — Information security management systems — Requirements | Atcelts |
| 57915 | ISO/IEC 24760-2:2015 | Information technology — Security techniques — A framework for identity management — Part 2: Reference architecture and requirements | Atcelts |
| 46414 | ISO/IEC 15408-2:2008 | Information technology — Security techniques — Evaluation criteria for IT security — Part 2: Security functional components | Atcelts |
| 41532 | ISO/IEC 24762:2008 | Information technology — Security techniques — Guidelines for information and communications technology disaster recovery services | Atcelts |
Displaying 281-290 of 793 results.
