ISO/IEC JTC 1/SC 27
Registration number (WIID) | Project No. | Title | Status |
---|---|---|---|
60803 | ISO/IEC 27035-1:2016 | Information technology — Security techniques — Information security incident management — Part 1: Principles of incident management | Atcelts |
25996 | ISO/IEC 14888-3:1998 | Information technology — Security techniques — Digital signatures with appendix — Part 3: Certificate-based mechanisms | Atcelts |
56742 | ISO/IEC 27005:2011 | Information technology Security techniques Information security risk management | Atcelts |
64143 | ISO/IEC 27011:2016 | Information technology — Security techniques — Code of practice for Information security controls based on ISO/IEC 27002 for telecommunications organizations | Atcelts |
59688 | ISO/IEC 27036-3:2013 | Information technology — Security techniques — Information security for supplier relationships — Part 3: Guidelines for information and communication technology supply chain security | Atcelts |
42105 | ISO/IEC 27003:2010 | Information technology Security techniques Information security management system implementation guidance | Atcelts |
45169 | ISO/IEC 29146:2016 | Information technology — Security techniques — A framework for access management | Atcelts |
38192 | ISO/IEC 13888-1:2004 | IT security techniques Non-repudiation | Atcelts |
41531 | ISO/IEC 24761:2009 | Information technology — Security techniques — Authentication context for biometrics | Atcelts |
76487 | ISO/IEC 27011:2016/Cor 1:2018 | Information technology — Security techniques — Code of practice for Information security controls based on ISO/IEC 27002 for telecommunications organizations — Technical Corrigendum 1 | Atcelts |
Displaying 341-350 of 770 results.