ISO/IEC JTC 1/SC 27
| Registration number (WIID) | Project No. | Title | Status |
|---|---|---|---|
| 61007 | ISO/IEC DIS 27028.2 | Information security, cybersecurity and privacy protection — Guidance on using information security control attributes | Aptauja slēgta |
| 61006 | ISO/IEC CD TR 27024 | Information security, cybersecurity and privacy protection — Government and regulatory use of ISO/IEC 27001, ISO/IEC 27002 and other information security standards | Izstrādē |
| 61005 | ISO/IEC TR 27023:2015 | Information technology — Security techniques — Mapping the revised editions of ISO/IEC 27001 and ISO/IEC 27002 | Atcelts |
| 61004 | ISO/IEC TS 27022:2021 | Information technology — Guidance on information security management system processes | Standarts spēkā |
| 61003 | ISO/IEC 27021:2017 | Information technology — Security techniques — Competence requirements for information security management systems professionals | Standarts spēkā |
| 60804 | ISO/IEC 27034-6:2016 | Information technology — Security techniques — Application security — Part 6: Case studies | Standarts spēkā |
| 60803 | ISO/IEC 27035-1:2016 | Information technology — Security techniques — Information security incident management — Part 1: Principles of incident management | Atcelts |
| 60612 | ISO/IEC 17825:2016 | Information technology — Security techniques — Testing methods for the mitigation of non-invasive attack classes against cryptographic modules | Atcelts |
| 60475 | ISO/IEC 10118-3:2004/Cor 1:2011 | Information technology — Security techniques — Hash-functions — Part 3: Dedicated hash-functions — Technical Corrigendum 1 | Atcelts |
| 60412 | ISO/IEC NP 20009-3 | Information technology — Security techniques — Anonymous entity authentication — Part 3: Mechanisms based on blind signatures | Standarts spēkā |
Displaying 441-450 of 807 results.
