ISO/IEC JTC 1/SC 27
Registration number (WIID) | Project No. | Title | Status |
---|---|---|---|
69725 | ISO/IEC 30111:2019 | Information technology — Security techniques — Vulnerability handling processes | Standarts spēkā |
69403 | ISO/IEC NP 20897 | Information technology — Security techniques — Security requirements, test and evaluation methods for physically unclonable functions for generating nonstored security parameters | Izstrādē |
69379 | ISO/IEC 27002:2013/Cor 2:2015 | Information technology — Security techniques — Code of practice for information security controls — Technical Corrigendum 2 | Atcelts |
69378 | ISO/IEC 27001:2013/Cor 2:2015 | Information technology — Security techniques — Information security management systems — Requirements — Technical Corrigendum 2 | Atcelts |
69373 | ISO/IEC 20889:2018 | Privacy enhancing data de-identification terminology and classification of techniques | Standarts spēkā |
68904 | ISO/IEC TR 15446:2017 | Information technology — Security techniques — Guidance for the production of protection profiles and security targets | Standarts spēkā |
68838 | ISO/IEC NP TR 20004-2 | Information technology — Security techniques — Refining software vulnerability analysis under ISO/IEC 15408 and ISO/IEC 18045 — Part 2: CWE and CAPEC based software penetration testing | Izstrādē |
68837 | ISO/IEC TR 20004:2015 | Information technology — Security techniques — Refining software vulnerability analysis under ISO/IEC 15408 and ISO/IEC 18045 | Standarts spēkā |
68530 | ISO/IEC 24759:2014/Cor 1:2015 | Information technology — Security techniques — Test requirements for cryptographic modules — Technical Corrigendum 1 | Atcelts |
68529 | ISO/IEC 19790:2012/Cor 1:2015 | Information technology — Security techniques — Security requirements for cryptographic modules — Technical Corrigendum 1 | Atcelts |
Displaying 311-320 of 774 results.