ISO/IEC JTC 1/SC 27
| Registration number (WIID) | Project No. | Title | Status |
|---|---|---|---|
| 40613 | ISO/IEC 15408-2:2005 | Information technology — Security techniques — Evaluation criteria for IT security — Part 2: Security functional requirements | Atcelts |
| 77722 | ISO/IEC 27006:2015/Amd 1:2020 | Information technology — Security techniques — Requirements for bodies providing audit and certification of information security management systems — Amendment 1 | Atcelts |
| 31142 | ISO/IEC TR 13335-5:2001 | Information technology — Guidelines for the management of IT Security — Part 5: Management guidance on network security | Atcelts |
| 54528 | ISO/IEC 18033-1:2005/Amd 1:2011 | Information technology — Security techniques — Encryption algorithms — Part 1: General — Amendment 1 | Atcelts |
| 39733 | ISO/IEC TR 15443-1:2005 | Information technology — Security techniques — A framework for IT security assurance — Part 1: Overview and framework | Atcelts |
| 57915 | ISO/IEC 24760-2:2015 | Information technology — Security techniques — A framework for identity management — Part 2: Reference architecture and requirements | Atcelts |
| 42103 | ISO/IEC 27001:2005 | Information technology — Security techniques — Information security management systems — Requirements | Atcelts |
| 75281 | ISO/IEC 27005:2018 | Information technology — Security techniques — Information security risk management | Atcelts |
| 29240 | ISO/IEC TR 13335-4:2000 | Information technology — Guidelines for the management of IT Security — Part 4: Selection of safeguards | Atcelts |
| 53472 | ISO/IEC 9798-6:2005/Cor 1:2009 | Information technology — Security techniques — Entity authentication — Part 6: Mechanisms using manual data transfer — Technical Corrigendum 1 | Atcelts |
Displaying 481-490 of 793 results.
