ISO/IEC JTC 1/SC 27
| Registration number (WIID) | Project No. | Title | Status |
|---|---|---|---|
| 62289 | ISO/IEC 29134:2017 | Information technology — Security techniques — Guidelines for privacy impact assessment | Atcelts |
| 62288 | ISO/IEC 18370-1:2016 | Information technology — Security techniques — Blind digital signatures — Part 1: General | Standarts spēkā |
| 62287 | ISO/IEC WD 27044 | Guidelines for Security Information and Event Management (SIEM) | Standarts spēkā |
| 62286 | ISO/IEC 18367:2016 | Information technology — Security techniques — Cryptographic algorithms and security mechanisms conformance testing | Standarts spēkā |
| 62073 | ISO/IEC 18033-3:2010/NP Amd 1 | Information technology — Security techniques — Encryption algorithms — Part 3: Block ciphers — Amendment 1 | Izstrādē |
| 62072 | ISO/IEC PDTS 27035-3 | Information technology — Security techniques — Information security incident management — Part 3: Guidelines for incident response operations | Standarts spēkā |
| 62071 | ISO/IEC 27035-2:2016 | Information technology — Security techniques — Information security incident management — Part 2: Guidelines to plan and prepare for incident response | Atcelts |
| 62070 | ISO/IEC 18031:2005/NP Amd 1 | Information technology — Security techniques — Random bit generation — Amendment 1 | Izstrādē |
| 61498 | ISO/IEC 27018:2014 | Information technology — Security techniques — Code of practice for protection of personally identifiable information (PII) in public clouds acting as PII processors | Atcelts |
| 61263 | ISO/IEC 13888-2:2010/Cor 1:2012 | Information technology — Security techniques — Non-repudiation — Part 2: Mechanisms using symmetric techniques — Technical Corrigendum 1 | Standarts spēkā |
Displaying 411-420 of 791 results.
