ISO/IEC JTC 1/SC 27
Registration number (WIID) | Project No. | Title | Status |
---|---|---|---|
88120 | ISO/IEC PWI TS 27022 | Information technology — Guidance on information security management system processes | Izstrādē |
88136 | ISO/IEC DIS 15408-3 | Information security, cybersecurity and privacy protection — Evaluation criteria for IT security — Part 3: Security assurance components | Izstrādē |
19684 | ISO/IEC WD 11767 | Information technology security techniques — Collection and analysis of requirements for information technology security evaluation criteria | Izstrādē |
61006 | ISO/IEC AWI TR 27024 | Information security, cybersecurity and privacy protection — Government and regulatory use of ISO/IEC 27001, ISO/IEC 27002 and other information security standards | Izstrādē |
88141 | ISO/IEC DIS 18045 | Information security, cybersecurity and privacy protection — Evaluation criteria for IT security — Requirements and methodology for IT security evaluation | Izstrādē |
89719 | ISO/IEC PWI 25279 | Inclusion of EdDSA and supporting additional hash functions in 14888-3 | Izstrādē |
85936 | ISO/IEC PWI 19562 | Investigation of the feasibility and implementation of changes to ISO/IEC 15408 and ISO/IEC 18045 | Izstrādē |
88130 | ISO/IEC CD 11770-4 | Information technology — Security techniques — Key management — Part 4: Mechanisms based on weak secrets | Izstrādē |
90013 | ISO/IEC 9797-2:2021/PWI Cor 2 | Information security — Message authentication codes (MACs) — Part 2: Mechanisms using a dedicated hash-function — Technical Corrigendum 2 | Izstrādē |
88140 | ISO/IEC FDIS 15408-5 | Information security, cybersecurity and privacy protection — Evaluation criteria for IT security — Part 5: Pre-defined packages of security requirements | Izstrādē |
Displaying 591-600 of 774 results.