ISO/IEC JTC 1/SC 27
Registration number (WIID) | Project No. | Title | Status |
---|---|---|---|
62070 | ISO/IEC 18031:2005/NP Amd 1 | Information technology — Security techniques — Random bit generation — Amendment 1 | Izstrādē |
61498 | ISO/IEC 27018:2014 | Information technology — Security techniques — Code of practice for protection of personally identifiable information (PII) in public clouds acting as PII processors | Atcelts |
61263 | ISO/IEC 13888-2:2010/Cor 1:2012 | Information technology — Security techniques — Non-repudiation — Part 2: Mechanisms using symmetric techniques — Technical Corrigendum 1 | Standarts spēkā |
61191 | ISO/IEC 9798-4:1999/Cor 2:2012 | Information technology — Security techniques — Entity authentication — Part 4: Mechanisms using a cryptographic check function — Technical Corrigendum 2 | Standarts spēkā |
61024 | ISO/IEC NP 17923 | Code of practice for data protection controls for public cloud computing services | Izstrādē |
61023 | ISO/IEC 17922:2017 | Information technology — Security techniques — Telebiometric authentication framework using biometric hardware security module | Standarts spēkā |
61008 | ISO/IEC CD TR 27029 | additional document for ISO/IEC 27002 and ISO and IEC standards | Izstrādē |
61007 | ISO/IEC DIS 27028 | Information security, cyber security and privacy protection — Guidance on ISO/IEC 27002 attributes | Aptauja |
61006 | ISO/IEC AWI TR 27024 | Information security, cybersecurity and privacy protection — Government and regulatory use of ISO/IEC 27001, ISO/IEC 27002 and other information security standards | Izstrādē |
61005 | ISO/IEC TR 27023:2015 | Information technology — Security techniques — Mapping the revised editions of ISO/IEC 27001 and ISO/IEC 27002 | Atcelts |
Displaying 401-410 of 774 results.