ISO/IEC JTC 1/SC 27
| Registration number (WIID) | Project No. | Title | Status |
|---|---|---|---|
| 50341 | ISO/IEC 15408-1:2009 | Information technology Security techniques Evaluation criteria for IT security | Atcelts |
| 39978 | ISO/IEC 18033-4:2005 | Information technology — Security techniques — Encryption algorithms — Part 4: Stream ciphers | Atcelts |
| 44715 | ISO/IEC TR 15446:2009 | Information technology — Security techniques — Guide for the production of Protection Profiles and Security Targets | Atcelts |
| 54534 | ISO/IEC 27001:2013 | Information technology — Security techniques — Information security management systems — Requirements | Atcelts |
| 84248 | ISO/IEC 24760-1:2019/Amd 1:2023 | IT Security and Privacy — A framework for identity management — Part 1: Terminology and concepts — Amendment 1 | Atcelts |
| 56889 | ISO/IEC 27039:2015 | Information technology — Security techniques — Selection, deployment and operations of intrusion detection and prevention systems (IDPS) | Atcelts |
| 61498 | ISO/IEC 27018:2014 | Information technology — Security techniques — Code of practice for protection of personally identifiable information (PII) in public clouds acting as PII processors | Atcelts |
| 17663 | ISO/IEC 9798-3:1993 | Information technology — Security techniques — Entity authentication mechanisms — Part 3: Entity authentication using a public key algorithm | Atcelts |
| 59144 | ISO/IEC 27006:2011 | Information technology — Security techniques — Requirements for bodies providing audit and certification of information security management systems | Atcelts |
| 46542 | ISO/IEC 11770-3:2008 | Information technology — Security techniques — Key management — Part 3: Mechanisms using asymmetric techniques | Atcelts |
Displaying 301-310 of 791 results.
