ISO/IEC JTC 1/SC 27
| Registration number (WIID) | Project No. | Title | Status |
|---|---|---|---|
| 44380 | ISO/IEC NP 27036 | Information technology — Security techniques — Guidelines for security of outsourcing | Izstrādē |
| 62548 | ISO/IEC NP 27036-5 | Information technology — Security techniques — Information security for supplier relationships — Part 5: Guidelines for security of cloud services | Izstrādē |
| 66232 | ISO/IEC NP 27050-4 | Information technology — Security techniques — Electronic discovery — Part 4: ICT readiness for electronic discovery | Izstrādē |
| 90011 | ISO/IEC NP 27566-2.2 | Information security, cybersecurity and privacy protection — Age Assurance Systems — Part 2: Technical approaches and guidance for implementation | Izstrādē |
| 90717 | ISO/IEC NP 27574 | Information security, cybersecurity and privacy protection — Privacy in brain computer interface (BCI) applications | Izstrādē |
| 45154 | ISO/IEC NP 29131 | Verification of cryptographic protocols | Izstrādē |
| 52907 | ISO/IEC NP TR 15443-1 | Information technology — Security techniques — A framework for IT security assurance — Part 1: Overview and framework | Izstrādē |
| 52908 | ISO/IEC NP TR 15443-2 | Information technology — Security techniques — A framework for IT security assurance — Part 2: Assurance methods | Izstrādē |
| 52909 | ISO/IEC NP TR 15443-3 | Information technology — Security techniques — A framework for IT security assurance — Part 3: Analysis of assurance methods | Izstrādē |
| 64590 | ISO/IEC NP TR 19791 | Information technology — Security techniques — Security assessment of operational systems | Izstrādē |
Displaying 571-580 of 791 results.
