ISO/IEC JTC 1/SC 27
| Registration number (WIID) | Project No. | Title | Status |
|---|---|---|---|
| 66672 | ISO/IEC NP TS 14516-3 | Information technology — Security techniques — Guidelines for the use and management of electronic trust service providers — Part 3: Guidelines on information security for PKI trust service providers | Izstrādē |
| 53247 | ISO/IEC WD TR 30127 | Information technology — Security techniques — Detailing software penetration testing under ISO/IEC 15408 and ISO/IEC 18045 vulnerability analysis | Izstrādē |
| 90714 | ISO/IEC CD 19086-4 | Cloud computing — Service level agreement (SLA) framework — Part 4: Components of security and of protection of PII | Izstrādē |
| 62548 | ISO/IEC NP 27036-5 | Information technology — Security techniques — Information security for supplier relationships — Part 5: Guidelines for security of cloud services | Izstrādē |
| 38740 | ISO/IEC 15408-3:1999/CD Cor 1 | Information technology — Security techniques — Evaluation criteria for IT security — Part 3: Security assurance requirements — Technical Corrigendum 1 | Izstrādē |
| 66525 | ISO/IEC NP 19896 | Information technology — Security techniques — Competence requirements for information security testers and evaluators | Izstrādē |
| 90717 | ISO/IEC NP 27574 | Information security, cybersecurity and privacy protection — Privacy in brain computer interface (BCI) applications | Izstrādē |
| 71517 | ISO/IEC 11770-3:2015/NP Amd 2 | Information technology — Security techniques — Key management — Part 3: Mechanisms using asymmetric techniques — Amendment 2 | Izstrādē |
| 71290 | ISO/IEC NP 18032 | Information technology Security techniques Prime number generation | Izstrādē |
| 76152 | ISO/IEC PWI 27031 | Information technology Security techniques Guidelines for information and communication technology readiness for business continuity | Izstrādē |
Displaying 681-690 of 791 results.
