Фильтр : 
              
                
                
              
              
                
                
              
              
                
                
              
              
                
                
              
            
            | Стандарт и/или проект | Этап | ТК | 
|---|---|---|
| 
                     Information and operations security and integrity requirements for lottery and gaming organizations 
                     | 
                  95.99 | ISO/TMBG | 
| 
                     Blockchain and distributed ledger technologies – Use cases 
                     | 
                  60.60 | ISO/TC 307 | 
| 
                     Information security — Secure multiparty computation — Part 1: General 
                     | 
                  60.60 | ISO/IEC JTC 1/SC 27 | 
| 
                     Information security — Secure multiparty computation — Part 2: Mechanisms based on secret sharing 
                     | 
                  60.60 | ISO/IEC JTC 1/SC 27 | 
| 
                     Information security, cybersecurity and privacy protection — Hardware monitoring technology for hardware security assessment 
                     | 
                  60.60 | ISO/IEC JTC 1/SC 27 | 
| 
                     Cybersecurity — Multi-party coordinated vulnerability disclosure and handling 
                     | 
                  60.60 | ISO/IEC JTC 1/SC 27 | 
| 
                     Blockchain and distributed ledger technologies — Identifiers of subjects and objects for the design of blockchain systems 
                     | 
                  60.60 | ISO/TC 307 | 
| 
                     Cybersecurity — Security considerations throughout the product life cycle 
                     | 
                  60.60 | ISO/IEC JTC 1/SC 27 | 
| 
                     Blockchain and distributed ledger technologies — Data flow models for blockchain and DLT use cases 
                     | 
                  90.92 | ISO/TC 307 | 
| 
                     Data processing — Check character systems 
                     | 
                  95.99 | ISO/IEC JTC 1/SC 32 | 
| 
                     Information technology — Security techniques — Check character systems 
                     | 
                  90.93 | ISO/IEC JTC 1/SC 27 | 
| 
                     Information processing — Modes of operation for a 64-bit block cipher algorithm 
                     | 
                  95.99 | ISO/IEC JTC 1/SC 27 | 
| 
                     Information security, cybersecurity and privacy protection — Evaluation criteria for IT security — Patch Management Extension for the ISO/IEC 15408 series and ISO/IEC 18045 
                     | 
                  60.60 | ISO/IEC JTC 1/SC 27 | 
| 
                     Information technology — Security techniques — Digital signature schemes giving message recovery — Part 2: Mechanisms using a hash-function 
                     | 
                  95.99 | ISO/IEC JTC 1/SC 27 | 
| 
                     Information technology — Security techniques — Digital signature schemes giving message recovery — Part 2: Integer factorization based mechanisms 
                     | 
                  95.99 | ISO/IEC JTC 1/SC 27 | 
| 
                     Information technology — Security techniques — Digital signature schemes giving message recovery — Part 2: Integer factorization based mechanisms — Amendment 1 
                     | 
                  95.99 | ISO/IEC JTC 1/SC 27 | 
| 
                     Information technology — Security techniques — Digital signature schemes giving message recovery — Part 2: Integer factorization based mechanisms 
                     | 
                  90.93 | ISO/IEC JTC 1/SC 27 | 
| 
                     Information technology — Security techniques — Digital signature schemes giving message recovery — Part 3: Discrete logarithm based mechanisms 
                     | 
                  95.99 | ISO/IEC JTC 1/SC 27 | 
| 
                     Information technology — Security techniques — Digital signature schemes giving message recovery — Part 3: Discrete logarithm based mechanisms 
                     | 
                  90.93 | ISO/IEC JTC 1/SC 27 | 
| 
                     Information technology — Security techniques — Digital signature scheme giving message recovery 
                     | 
                  95.99 | ISO/IEC JTC 1/SC 27 | 
| 
                     Information technology — Security techniques — Message Authentication Codes (MACs) — Part 1: Mechanisms using a block cipher 
                     | 
                  95.99 | ISO/IEC JTC 1/SC 27 | 
| 
                     Information technology — Security techniques — Message Authentication Codes (MACs) — Part 1: Mechanisms using a block cipher 
                     | 
                  90.93 | ISO/IEC JTC 1/SC 27 | 
| 
                     Information technology — Security techniques — Message Authentication Codes (MACs) — Part 1: Mechanisms using a block cipher — Amendment 1 
                     | 
                  60.60 | ISO/IEC JTC 1/SC 27 | 
| 
                     Information technology — Security techniques — Message Authentication Codes (MACs) — Part 2: Mechanisms using a dedicated hash-function 
                     | 
                  95.99 | ISO/IEC JTC 1/SC 27 | 
| 
                     Information technology — Security techniques — Message Authentication Codes (MACs) — Part 2: Mechanisms using a dedicated hash-function 
                     | 
                  95.99 | ISO/IEC JTC 1/SC 27 | 
| 
                     Information security — Message authentication codes (MACs) — Part 2: Mechanisms using a dedicated hash-function 
                     | 
                  60.60 | ISO/IEC JTC 1/SC 27 | 
| 
                     Information security — Message authentication codes (MACs) — Part 2: Mechanisms using a dedicated hash-function — Technical Corrigendum 1 
                     | 
                  60.60 | ISO/IEC JTC 1/SC 27 | 
| 
                     Information technology — Security techniques — Message Authentication Codes (MACs) — Part 3: Mechanisms using a universal hash-function 
                     | 
                  90.93 | ISO/IEC JTC 1/SC 27 | 
| 
                     Information technology — Security techniques — Message Authentication Codes (MACs) — Part 3: Mechanisms using a universal hash-function — Amendment 1 
                     | 
                  60.60 | ISO/IEC JTC 1/SC 27 | 
| 
                     Data cryptographic techniques — Data integrity mechanism using a cryptographic check function employing a block cipher algorithm 
                     | 
                  95.99 | ISO/IEC JTC 1/SC 27 | 
| 
                     Information technology — Security techniques — Data integrity mechanism using a cryptographic check function employing a block cipher algorithm 
                     | 
                  95.99 | ISO/IEC JTC 1/SC 27 | 
| 
                     Information technology — Security techniques — Entity authentication mechanisms — Part 1: General model 
                     | 
                  95.99 | ISO/IEC JTC 1/SC 27 | 
| 
                     Information technology — Security techniques — Entity authentication — Part 1: General 
                     | 
                  95.99 | ISO/IEC JTC 1/SC 27 | 
| 
                     Information technology — Security techniques — Entity authentication — Part 1: General 
                     | 
                  90.93 | ISO/IEC JTC 1/SC 27 | 
| 
                     Information technology — Security techniques — Entity authentication — Part 2: Mechanisms using symmetric encipherment algorithms 
                     | 
                  95.99 | ISO/IEC JTC 1/SC 27 | 
| 
                     Information technology — Security techniques — Entity authentication — Part 2: Mechanisms using symmetric encipherment algorithms 
                     | 
                  95.99 | ISO/IEC JTC 1/SC 27 | 
| 
                     Information technology — Security techniques — Entity authentication — Part 2: Mechanisms using symmetric encipherment algorithms — Technical Corrigendum 1 
                     | 
                  95.99 | ISO/IEC JTC 1/SC 27 | 
| 
                     Information technology — Security techniques — Entity authentication — Part 2: Mechanisms using symmetric encipherment algorithms 
                     | 
                  95.99 | ISO/IEC JTC 1/SC 27 | 
| 
                     Information technology — Security techniques — Entity authentication — Part 2: Mechanisms using symmetric encipherment algorithms — Technical Corrigendum 1 
                     | 
                  95.99 | ISO/IEC JTC 1/SC 27 | 
| 
                     Information technology — Security techniques — Entity authentication — Part 2: Mechanisms using symmetric encipherment algorithms — Technical Corrigendum 2 
                     | 
                  95.99 | ISO/IEC JTC 1/SC 27 | 
| 
                     Information technology — Security techniques — Entity authentication — Part 2: Mechanisms using symmetric encipherment algorithms — Technical Corrigendum 3 
                     | 
                  95.99 | ISO/IEC JTC 1/SC 27 | 
| 
                     IT Security techniques — Entity authentication — Part 2: Mechanisms using authenticated encryption 
                     | 
                  90.93 | ISO/IEC JTC 1/SC 27 | 
| 
                     Information technology — Security techniques — Entity authentication mechanisms — Part 3: Entity authentication using a public key algorithm 
                     | 
                  95.99 | ISO/IEC JTC 1/SC 27 | 
| 
                     Information technology — Security techniques — Entity authentication — Part 3: Mechanisms using digital signature techniques 
                     | 
                  95.99 | ISO/IEC JTC 1/SC 27 | 
| 
                     Information technology — Security techniques — Entity authentication — Part 3: Mechanisms using digital signature techniques — Amendment 1: . 
                     | 
                  95.99 | ISO/IEC JTC 1/SC 27 | 
| 
                     Information technology — Security techniques — Entity authentication — Part 3: Mechanisms using digital signature techniques — Technical Corrigendum 1 
                     | 
                  95.99 | ISO/IEC JTC 1/SC 27 | 
| 
                     Information technology — Security techniques — Entity authentication — Part 3: Mechanisms using digital signature techniques — Technical Corrigendum 2 
                     | 
                  95.99 | ISO/IEC JTC 1/SC 27 | 
| 
                     IT Security techniques — Entity authentication — Part 3: Mechanisms using digital signature techniques 
                     | 
                  90.93 | ISO/IEC JTC 1/SC 27 | 
| 
                     Information technology — Security techniques — Entity authentication — Part 4: Mechanisms using a cryptographic check function 
                     | 
                  95.99 | ISO/IEC JTC 1/SC 27 | 
| 
                     Information technology — Security techniques — Entity authentication — Part 4: Mechanisms using a cryptographic check function 
                     | 
                  90.93 | ISO/IEC JTC 1/SC 27 | 
| 
                     Information technology — Security techniques — Entity authentication — Part 4: Mechanisms using a cryptographic check function — Technical Corrigendum 1 
                     | 
                  60.60 | ISO/IEC JTC 1/SC 27 | 
| 
                     Information technology — Security techniques — Entity authentication — Part 4: Mechanisms using a cryptographic check function — Technical Corrigendum 2 
                     | 
                  60.60 | ISO/IEC JTC 1/SC 27 | 
| 
                     Information technology — Security techniques — Entity authentication — Part 5: Mechanisms using zero knowledge techniques 
                     | 
                  95.99 | ISO/IEC JTC 1/SC 27 | 
| 
                     Information technology — Security techniques — Entity authentication — Part 5: Mechanisms using zero-knowledge techniques 
                     | 
                  95.99 | ISO/IEC JTC 1/SC 27 | 
| 
                     Information technology — Security techniques — Entity authentication — Part 5: Mechanisms using zero-knowledge techniques 
                     | 
                  90.92 | ISO/IEC JTC 1/SC 27 | 
| 
                     Information technology — Security techniques — Entity authentication — Part 6: Mechanisms using manual data transfer 
                     | 
                  95.99 | ISO/IEC JTC 1/SC 27 | 
| 
                     Information technology — Security techniques — Entity authentication — Part 6: Mechanisms using manual data transfer — Technical Corrigendum 1 
                     | 
                  95.99 | ISO/IEC JTC 1/SC 27 | 
| 
                     Information technology — Security techniques — Entity authentication — Part 6: Mechanisms using manual data transfer 
                     | 
                  90.93 | ISO/IEC JTC 1/SC 27 | 
| 
                     Data cryptographic techniques — Procedures for the registration of cryptographic algorithms 
                     | 
                  95.99 | ISO/IEC JTC 1/SC 27 | 
| 
                     Information technology — Security techniques — Procedures for the registration of cryptographic algorithms 
                     | 
                  95.99 | ISO/IEC JTC 1/SC 27 | 
| 
                     Information technology — Modes of operation for an n-bit block cipher algorithm 
                     | 
                  95.99 | ISO/IEC JTC 1/SC 27 | 
| 
                     Information technology — Security techniques — Modes of operation for an n-bit block cipher 
                     | 
                  95.99 | ISO/IEC JTC 1/SC 27 | 
| 
                     Information technology — Security techniques — Modes of operation for an n-bit block cipher 
                     | 
                  95.99 | ISO/IEC JTC 1/SC 27 | 
| 
                     Information technology — Security techniques — Modes of operation for an n-bit block cipher — Technical Corrigendum 1 
                     | 
                  95.99 | ISO/IEC JTC 1/SC 27 | 
| 
                     Information technology — Security techniques — Modes of operation for an n-bit block cipher 
                     | 
                  90.93 | ISO/IEC JTC 1/SC 27 | 
| 
                     Information technology — Security techniques — Modes of operation for an n-bit block cipher — Amendment 1: CTR-ACPKM mode of operation 
                     | 
                  60.60 | ISO/IEC JTC 1/SC 27 | 
| 
                     Information technology — Security techniques — Hash-functions — Part 1: General 
                     | 
                  95.99 | ISO/IEC JTC 1/SC 27 | 
| 
                     Information technology — Security techniques — Hash-functions — Part 1: General 
                     | 
                  95.99 | ISO/IEC JTC 1/SC 27 | 
| 
                     Information technology — Security techniques — Hash-functions — Part 1: General 
                     | 
                  90.93 | ISO/IEC JTC 1/SC 27 | 
| 
                     Information technology — Security techniques — Hash-functions — Part 1: General — Amendment 1: Padding methods for sponge functions 
                     | 
                  60.60 | ISO/IEC JTC 1/SC 27 | 
| 
                     Information technology — Security techniques — Hash-functions — Part 2: Hash-functions using an n-bit block cipher algorithm 
                     | 
                  95.99 | ISO/IEC JTC 1/SC 27 | 
| 
                     Information technology — Security techniques — Hash-functions — Part 2: Hash-functions using an n-bit block cipher 
                     | 
                  95.99 | ISO/IEC JTC 1/SC 27 | 
| 
                     Information technology — Security techniques — Hash-functions — Part 2: Hash-functions using an n-bit block cipher — Technical Corrigendum 1 
                     | 
                  95.99 | ISO/IEC JTC 1/SC 27 | 
| 
                     Information technology — Security techniques — Hash-functions — Part 2: Hash-functions using an n-bit block cipher — Technical Corrigendum 2 
                     | 
                  95.99 | ISO/IEC JTC 1/SC 27 | 
| 
                     Information technology — Security techniques — Hash-functions — Part 2: Hash-functions using an n-bit block cipher 
                     | 
                  90.93 | ISO/IEC JTC 1/SC 27 | 
| 
                     Information technology — Security techniques — Hash-functions — Part 2: Hash-functions using an n-bit block cipher — Technical Corrigendum 1 
                     | 
                  60.60 | ISO/IEC JTC 1/SC 27 | 
| 
                     Information technology — Security techniques — Hash-functions — Part 3: Dedicated hash-functions 
                     | 
                  95.99 | ISO/IEC JTC 1/SC 27 | 
| 
                     Information technology — Security techniques — Hash-functions — Part 3: Dedicated hash-functions 
                     | 
                  95.99 | ISO/IEC JTC 1/SC 27 | 
| 
                     Information technology — Security techniques — Hash-functions — Part 3: Dedicated hash-functions 
                     | 
                  95.99 | ISO/IEC JTC 1/SC 27 | 
| 
                     Information technology — Security techniques — Hash-functions — Part 3: Dedicated hash-functions — Amendment 1: Dedicated Hash-Function 8 (SHA-224) 
                     | 
                  95.99 | ISO/IEC JTC 1/SC 27 | 
| 
                     Information technology — Security techniques — Hash-functions — Part 3: Dedicated hash-functions — Technical Corrigendum 1 
                     | 
                  95.99 | ISO/IEC JTC 1/SC 27 | 
| 
                     IT Security techniques — Hash-functions — Part 3: Dedicated hash-functions 
                     | 
                  90.93 | ISO/IEC JTC 1/SC 27 | 
| 
                     Information technology — Security techniques — Hash-functions — Part 4: Hash-functions using modular arithmetic 
                     | 
                  90.93 | ISO/IEC JTC 1/SC 27 | 
| 
                     Information technology — Security techniques — Hash-functions — Part 4: Hash-functions using modular arithmetic — Amendment 1: Object identifiers 
                     | 
                  60.60 | ISO/IEC JTC 1/SC 27 | 
| 
                     Information technology — Security techniques — Hash-functions — Part 4: Hash-functions using modular arithmetic — Technical Corrigendum 1 
                     | 
                  60.60 | ISO/IEC JTC 1/SC 27 | 
| 
                     Information technology — Security techniques — Key management — Part 1: Framework 
                     | 
                  95.99 | ISO/IEC JTC 1/SC 27 | 
| 
                     Information technology — Security techniques — Key management — Part 1: Framework 
                     | 
                  90.93 | ISO/IEC JTC 1/SC 27 | 
| 
                     Information technology — Security techniques — Key management — Part 2: Mechanisms using symmetric techniques 
                     | 
                  95.99 | ISO/IEC JTC 1/SC 27 | 
| 
                     Information technology — Security techniques — Key management — Part 2: Mechanisms using symmetric techniques — Technical Corrigendum 1 
                     | 
                  95.99 | ISO/IEC JTC 1/SC 27 | 
| 
                     Information technology — Security techniques — Key management — Part 2: Mechanisms using symmetric techniques 
                     | 
                  95.99 | ISO/IEC JTC 1/SC 27 | 
| 
                     Information technology — Security techniques — Key management — Part 2: Mechanisms using symmetric techniques — Technical Corrigendum 1 
                     | 
                  95.99 | ISO/IEC JTC 1/SC 27 | 
| 
                     IT Security techniques — Key management — Part 2: Mechanisms using symmetric techniques 
                     | 
                  90.93 | ISO/IEC JTC 1/SC 27 | 
| 
                     Information technology — Security techniques — Key management — Part 3: Mechanisms using asymmetric techniques 
                     | 
                  95.99 | ISO/IEC JTC 1/SC 27 | 
| 
                     Information technology — Security techniques — Key management — Part 3: Mechanisms using asymmetric techniques 
                     | 
                  95.99 | ISO/IEC JTC 1/SC 27 | 
| 
                     Information technology — Security techniques — Key management — Part 3: Mechanisms using asymmetric techniques — Technical Corrigendum 1 
                     | 
                  95.99 | ISO/IEC JTC 1/SC 27 | 
| 
                     Information technology — Security techniques — Key management — Part 3: Mechanisms using asymmetric techniques 
                     | 
                  95.99 | ISO/IEC JTC 1/SC 27 | 
| 
                     Information technology — Security techniques — Key management — Part 3: Mechanisms using asymmetric techniques — Amendment 1: Blinded Diffie-Hellman key agreement 
                     | 
                  95.99 | ISO/IEC JTC 1/SC 27 | 
| 
                     Information technology — Security techniques — Key management — Part 3: Mechanisms using asymmetric techniques — Technical Corrigendum 1 
                     | 
                  95.99 | ISO/IEC JTC 1/SC 27 | 
| 
                     Information security — Key management — Part 3: Mechanisms using asymmetric techniques 
                     | 
                  60.60 | ISO/IEC JTC 1/SC 27 | 
| 
                     Information security — Key management — Part 3: Mechanisms using asymmetric techniques — Amendment 1: TFNS identity-based key agreement 
                     | 
                  60.60 | ISO/IEC JTC 1/SC 27 | 
| 
                     Information technology — Security techniques — Key management — Part 4: Mechanisms based on weak secrets 
                     | 
                  95.99 | ISO/IEC JTC 1/SC 27 | 
| 
                     Information technology — Security techniques — Key management — Part 4: Mechanisms based on weak secrets — Technical Corrigendum 1 
                     | 
                  95.99 | ISO/IEC JTC 1/SC 27 | 
| 
                     Information technology — Security techniques — Key management — Part 4: Mechanisms based on weak secrets 
                     | 
                  90.92 | ISO/IEC JTC 1/SC 27 | 
| 
                     Information technology — Security techniques — Key management — Part 4: Mechanisms based on weak secrets — Amendment 1: Unbalanced Password-Authenticated Key Agreement with Identity-Based Cryptosystems (UPAKA-IBC) 
                     | 
                  60.60 | ISO/IEC JTC 1/SC 27 | 
| 
                     Information technology — Security techniques — Key management — Part 4: Mechanisms based on weak secrets — Amendment 2: Leakage-resilient password-authenticated key agreement with additional stored secrets 
                     | 
                  60.60 | ISO/IEC JTC 1/SC 27 | 
| 
                     Information technology — Security techniques — Key management — Part 5: Group key management 
                     | 
                  95.99 | ISO/IEC JTC 1/SC 27 | 
| 
                     Information security — Key management — Part 5: Group key management 
                     | 
                  60.60 | ISO/IEC JTC 1/SC 27 | 
| 
                     Information technology — Security techniques — Key management — Part 6: Key derivation 
                     | 
                  90.93 | ISO/IEC JTC 1/SC 27 | 
| 
                     Information security — Key management — Part 7: Cross-domain password-based authenticated key exchange 
                     | 
                  60.60 | ISO/IEC JTC 1/SC 27 | 
| 
                     Information technology — Trusted Platform Module — Part 1: Overview 
                     | 
                  90.93 | ISO/IEC JTC 1 | 
| 
                     Information technology — Trusted platform module library — Part 1: Architecture 
                     | 
                  90.93 | ISO/IEC JTC 1 | 
| 
                     Information technology — Trusted Platform Module — Part 2: Design principles 
                     | 
                  90.93 | ISO/IEC JTC 1 | 
| 
                     Information technology — Trusted Platform Module Library — Part 2: Structures 
                     | 
                  90.93 | ISO/IEC JTC 1 | 
| 
                     Information technology — Trusted Platform Module — Part 3: Structures 
                     | 
                  90.93 | ISO/IEC JTC 1 | 
| 
                     Information technology — Trusted Platform Module Library — Part 3: Commands 
                     | 
                  90.93 | ISO/IEC JTC 1 | 
| 
                     Information technology — Trusted Platform Module — Part 4: Commands 
                     | 
                  90.93 | ISO/IEC JTC 1 | 
| 
                     Information technology — Trusted Platform Module Library — Part 4: Supporting Routines 
                     | 
                  90.93 | ISO/IEC JTC 1 | 
| 
                     Information technology — Security techniques — Management of information and communications technology security — Part 1: Concepts and models for information and communications technology security management 
                     | 
                  95.99 | ISO/IEC JTC 1/SC 27 | 
| 
                     Information technology — Guidelines for the management of IT Security — Part 1: Concepts and models for IT Security 
                     | 
                  95.99 | ISO/IEC JTC 1/SC 27 | 
| 
                     Information technology — Guidelines for the management of IT Security — Part 2: Managing and planning IT Security 
                     | 
                  95.99 | ISO/IEC JTC 1/SC 27 | 
| 
                     Information technology — Guidelines for the management of IT Security — Part 3: Techniques for the management of IT Security 
                     | 
                  95.99 | ISO/IEC JTC 1/SC 27 | 
| 
                     Information technology — Guidelines for the management of IT Security — Part 4: Selection of safeguards 
                     | 
                  95.99 | ISO/IEC JTC 1/SC 27 | 
| 
                     Information technology — Guidelines for the management of IT Security — Part 5: Management guidance on network security 
                     | 
                  95.99 | ISO/IEC JTC 1/SC 27 | 
| 
                     Information technology — Security techniques — Non-repudiation — Part 1: General 
                     | 
                  95.99 | ISO/IEC JTC 1/SC 27 | 
| 
                     IT security techniques — Non-repudiation — Part 1: General 
                     | 
                  95.99 | ISO/IEC JTC 1/SC 27 | 
| 
                     Information technology — Security techniques — Non-repudiation — Part 1: General 
                     | 
                  95.99 | ISO/IEC JTC 1/SC 27 | 
| 
                     Information security — Non-repudiation — Part 1: General 
                     | 
                  60.60 | ISO/IEC JTC 1/SC 27 | 
| 
                     Information technology — Security techniques — Non-repudiation — Part 2: Mechanisms using symmetric techniques 
                     | 
                  95.99 | ISO/IEC JTC 1/SC 27 | 
| 
                     Information technology — Security techniques — Non-repudiation — Part 2: Mechanisms using symmetric techniques 
                     | 
                  90.93 | ISO/IEC JTC 1/SC 27 | 
| 
                     Information technology — Security techniques — Non-repudiation — Part 2: Mechanisms using symmetric techniques — Technical Corrigendum 1 
                     | 
                  60.60 | ISO/IEC JTC 1/SC 27 | 
| 
                     Information technology — Security techniques — Non-repudiation — Part 3: Mechanisms using asymmetric techniques 
                     | 
                  95.99 | ISO/IEC JTC 1/SC 27 | 
| 
                     Information technology — Security techniques — Non-repudiation — Part 3: Mechanisms using asymmetric techniques 
                     | 
                  95.99 | ISO/IEC JTC 1/SC 27 | 
| 
                     Information security — Non-repudiation — Part 3: Mechanisms using asymmetric techniques 
                     | 
                  60.60 | ISO/IEC JTC 1/SC 27 | 
| 
                     Information technology — Security techniques — Guidelines for the use and management of Trusted Third Party services 
                     | 
                  90.93 | ISO/IEC JTC 1/SC 27 | 
| 
                     Information technology — Security techniques — Digital signatures with appendix — Part 1: General 
                     | 
                  95.99 | ISO/IEC JTC 1/SC 27 | 
| 
                     Information technology — Security techniques — Digital signatures with appendix — Part 1: General 
                     | 
                  90.93 | ISO/IEC JTC 1/SC 27 | 
| 
                     Information technology — Security techniques — Digital signatures with appendix — Part 2: Identity-based mechanisms 
                     | 
                  95.99 | ISO/IEC JTC 1/SC 27 | 
| 
                     Information technology — Security techniques — Digital signatures with appendix — Part 2: Integer factorization based mechanisms 
                     | 
                  90.93 | ISO/IEC JTC 1/SC 27 | 
| 
                     Information technology — Security techniques — Digital signatures with appendix — Part 2: Integer factorization based mechanisms — Amendment 1 
                     | 
                  10.99 | ISO/IEC JTC 1/SC 27 | 
| 
                     Information technology — Security techniques — Digital signatures with appendix — Part 2: Integer factorization based mechanisms — Technical Corrigendum 1: To ISO/IEC 14888-2:2008 
                     | 
                  60.60 | ISO/IEC JTC 1/SC 27 | 
| 
                     Information technology — Security techniques — Digital signatures with appendix — Part 2: Integer factorization based mechanisms — Amendment 2 
                     | 
                  10.99 | ISO/IEC JTC 1/SC 27 | 
| 
                     Information technology — Security techniques — Digital signatures with appendix — Part 3: Certificate-based mechanisms 
                     | 
                  95.99 | ISO/IEC JTC 1/SC 27 | 
| 
                     Information technology — Security techniques — Digital signatures with appendix — Part 3: Certificate-based mechanisms — Technical Corrigendum 1 
                     | 
                  95.99 | ISO/IEC JTC 1/SC 27 | 
| 
                     Information technology — Security techniques — Digital signatures with appendix — Part 3: Discrete logarithm based mechanisms 
                     | 
                  95.99 | ISO/IEC JTC 1/SC 27 | 
| 
                     Information technology — Security techniques — Digital signatures with appendix — Part 3: Discrete logarithm based mechanisms — Amendment 1: Elliptic Curve Russian Digital Signature Algorithm, Schnorr Digital Signature Algorithm, Elliptic Curve Schnorr Digital Signature Algorithm, and Elliptic Curve Full Schnorr Digital Signature Algorithm 
                     | 
                  95.99 | ISO/IEC JTC 1/SC 27 | 
| 
                     Information technology — Security techniques — Digital signatures with appendix — Part 3: Discrete logarithm based mechanisms — Technical Corrigendum 1 
                     | 
                  95.99 | ISO/IEC JTC 1/SC 27 | 
| 
                     Information technology — Security techniques — Digital signatures with appendix — Part 3: Discrete logarithm based mechanisms — Amendment 2: Optimizing hash inputs 
                     | 
                  95.99 | ISO/IEC JTC 1/SC 27 | 
| 
                     Information technology — Security techniques — Digital signatures with appendix — Part 3: Discrete logarithm based mechanisms — Technical Corrigendum 2 
                     | 
                  95.99 | ISO/IEC JTC 1/SC 27 | 
| 
                     Information technology — Security techniques — Digital signatures with appendix — Part 3: Discrete logarithm based mechanisms 
                     | 
                  95.99 | ISO/IEC JTC 1/SC 27 | 
| 
                     IT Security techniques — Digital signatures with appendix — Part 3: Discrete logarithm based mechanisms 
                     | 
                  90.93 | ISO/IEC JTC 1/SC 27 | 
| 
                     IT Security techniques — Digital signatures with appendix — Part 3: Discrete logarithm based mechanisms — Amendment 1 
                     | 
                  30.20 | ISO/IEC JTC 1/SC 27 | 
| 
                     Information security — Digital signatures with appendix — Part 4: Stateful hash-based mechanisms 
                     | 
                  60.60 | ISO/IEC JTC 1/SC 27 | 
| 
                     Information technology — Home Electronic System (HES) gateway — Part 3-1: Privacy, security, and safety — Introduction 
                     | 
                  60.60 | ISO/IEC JTC 1/SC 25 | 
| 
                     Information technology - Security techniques - Protection Profile registration procedures 
                     | 
                  95.99 | ISO/IEC JTC 1/SC 27 | 
| 
                     Information technology — Security techniques — Evaluation criteria for IT security — Part 1: Introduction and general model 
                     | 
                  95.99 | ISO/IEC JTC 1/SC 27 | 
| 
                     Information technology — Security techniques — Evaluation criteria for IT security — Part 1: Introduction and general model 
                     | 
                  95.99 | ISO/IEC JTC 1/SC 27 | 
| 
                     Information technology — Security techniques — Evaluation criteria for IT security — Part 1: Introduction and general model 
                     | 
                  95.99 | ISO/IEC JTC 1/SC 27 | 
| 
                     Information security, cybersecurity and privacy protection — Evaluation criteria for IT security — Part 1: Introduction and general model 
                     | 
                  90.92 | ISO/IEC JTC 1/SC 27 | 
| 
                     Information security, cybersecurity and privacy protection — Evaluation criteria for IT security — Part 1: Introduction and general model 
                     | 
                  40.60 | ISO/IEC JTC 1/SC 27 | 
| 
                     Information technology — Security techniques — Evaluation criteria for IT security — Part 2: Security functional requirements 
                     | 
                  95.99 | ISO/IEC JTC 1/SC 27 | 
| 
                     Information technology — Security techniques — Evaluation criteria for IT security — Part 2: Security functional requirements 
                     | 
                  95.99 | ISO/IEC JTC 1/SC 27 | 
| 
                     Information technology — Security techniques — Evaluation criteria for IT security — Part 2: Security functional components 
                     | 
                  95.99 | ISO/IEC JTC 1/SC 27 | 
| 
                     Information security, cybersecurity and privacy protection — Evaluation criteria for IT security — Part 2: Security functional components 
                     | 
                  90.92 | ISO/IEC JTC 1/SC 27 | 
| 
                     Information security, cybersecurity and privacy protection — Evaluation criteria for IT security — Part 2: Security functional components 
                     | 
                  40.60 | ISO/IEC JTC 1/SC 27 | 
| 
                     Information technology — Security techniques — Evaluation criteria for IT security — Part 3: Security assurance requirements 
                     | 
                  95.99 | ISO/IEC JTC 1/SC 27 | 
| 
                     Information technology — Security techniques — Evaluation criteria for IT security — Part 3: Security assurance requirements 
                     | 
                  95.99 | ISO/IEC JTC 1/SC 27 | 
| 
                     Information technology — Security techniques — Evaluation criteria for IT security — Part 3: Security assurance components 
                     | 
                  95.99 | ISO/IEC JTC 1/SC 27 | 
| 
                     Information security, cybersecurity and privacy protection — Evaluation criteria for IT security — Part 3: Security assurance components 
                     | 
                  90.92 | ISO/IEC JTC 1/SC 27 | 
| 
                     Information security, cybersecurity and privacy protection — Evaluation criteria for IT security — Part 3: Security assurance components 
                     | 
                  40.60 | ISO/IEC JTC 1/SC 27 | 
| 
                     Information security, cybersecurity and privacy protection — Evaluation criteria for IT security — Part 4: Framework for the specification of evaluation methods and activities 
                     | 
                  90.92 | ISO/IEC JTC 1/SC 27 | 
| 
                     Information security, cybersecurity and privacy protection — Evaluation criteria for IT security — Part 4: Framework for the specification of evaluation methods and activities 
                     | 
                  40.60 | ISO/IEC JTC 1/SC 27 | 
| 
                     Information security, cybersecurity and privacy protection — Evaluation criteria for IT security — Part 5: Pre-defined packages of security requirements 
                     | 
                  90.92 | ISO/IEC JTC 1/SC 27 | 
| 
                     Information security, cybersecurity and privacy protection — Evaluation criteria for IT security — Part 5: Pre-defined packages of security requirements 
                     | 
                  40.60 | ISO/IEC JTC 1/SC 27 | 
| 
                     Information technology — Security techniques — A framework for IT security assurance — Part 1: Overview and framework 
                     | 
                  95.99 | ISO/IEC JTC 1/SC 27 | 
| 
                     Information technology — Security techniques — Security assurance framework — Part 1: Introduction and concepts 
                     | 
                  90.93 | ISO/IEC JTC 1/SC 27 | 
| 
                     Information technology — Security techniques — A framework for IT security assurance — Part 2: Assurance methods 
                     | 
                  95.99 | ISO/IEC JTC 1/SC 27 | 
| 
                     Information technology — Security techniques — Security assurance framework — Part 2: Analysis 
                     | 
                  90.93 | ISO/IEC JTC 1/SC 27 | 
| 
                     Information technology — Security techniques — A framework for IT security assurance — Part 3: Analysis of assurance methods 
                     | 
                  95.99 | ISO/IEC JTC 1/SC 27 | 
| 
                     Information technology — Security techniques — Guide for the production of Protection Profiles and Security Targets 
                     | 
                  95.99 | ISO/IEC JTC 1/SC 27 | 
| 
                     Information technology — Security techniques — Guide for the production of Protection Profiles and Security Targets 
                     | 
                  95.99 | ISO/IEC JTC 1/SC 27 | 
| 
                     Information technology — Security techniques — Guidance for the production of protection profiles and security targets 
                     | 
                  60.60 | ISO/IEC JTC 1/SC 27 | 
| 
                     Information technology — Security techniques — Security information objects for access control 
                     | 
                  90.60 | ISO/IEC JTC 1/SC 27 | 
| 
                     Information technology — Security techniques — Specification of TTP services to support the application of digital signatures 
                     | 
                  90.60 | ISO/IEC JTC 1/SC 27 | 
| 
                     Information technology — Security techniques — Cryptographic techniques based on elliptic curves — Part 1: General 
                     | 
                  95.99 | ISO/IEC JTC 1/SC 27 | 
| 
                     Information technology — Security techniques — Cryptographic techniques based on elliptic curves — Part 1: General 
                     | 
                  95.99 | ISO/IEC JTC 1/SC 27 | 
| 
                     Information technology — Security techniques — Cryptographic techniques based on elliptic curves — Part 1: General — Technical Corrigendum 1 
                     | 
                  95.99 | ISO/IEC JTC 1/SC 27 | 
| 
                     Information technology — Security techniques — Cryptographic techniques based on elliptic curves — Part 1: General — Technical Corrigendum 2 
                     | 
                  95.99 | ISO/IEC JTC 1/SC 27 | 
| 
                     Information technology — Security techniques — Cryptographic techniques based on elliptic curves — Part 1: General 
                     | 
                  90.93 | ISO/IEC JTC 1/SC 27 | 
| 
                     Information technology — Security techniques — Cryptographic techniques based on elliptic curves — Part 2: Digital signatures 
                     | 
                  95.99 | ISO/IEC JTC 1/SC 27 | 
| 
                     Information technology — Security techniques — Cryptographic techniques based on elliptic curves — Part 3: Key establishment 
                     | 
                  95.99 | ISO/IEC JTC 1/SC 27 | 
| 
                     Information technology — Security techniques — Cryptographic techniques based on elliptic curves — Part 4: Digital signatures giving message recovery 
                     | 
                  95.99 | ISO/IEC JTC 1/SC 27 | 
| 
                     Information technology — Security techniques — Cryptographic techniques based on elliptic curves — Part 5: Elliptic curve generation 
                     | 
                  95.99 | ISO/IEC JTC 1/SC 27 | 
| 
                     Information technology — Security techniques — Cryptographic techniques based on elliptic curves — Part 5: Elliptic curve generation — Technical Corrigendum 1 
                     | 
                  95.99 | ISO/IEC JTC 1/SC 27 | 
| 
                     Information technology — Security techniques — Cryptographic techniques based on elliptic curves — Part 5: Elliptic curve generation 
                     | 
                  95.99 | ISO/IEC JTC 1/SC 27 | 
| 
                     Information security — Cryptographic techniques based on elliptic curves — Part 5: Elliptic curve generation 
                     | 
                  60.60 | ISO/IEC JTC 1/SC 27 | 
| 
                     Information technology — Security techniques — IT intrusion detection framework 
                     | 
                  95.99 | ISO/IEC JTC 1/SC 27 | 
| 
                     Information technology — Code of practice for information security management 
                     | 
                  95.99 | ISO/IEC JTC 1/SC 27 | 
| 
                     Information technology — Security techniques — Code of practice for information security management 
                     | 
                  95.99 | ISO/IEC JTC 1/SC 27 | 
| 
                     Information technology — Security techniques — Code of practice for information security management — Technical Corrigendum 1 
                     | 
                  95.99 | ISO/IEC JTC 1/SC 27 | 
| 
                     Information technology — Security techniques — Testing methods for the mitigation of non-invasive attack classes against cryptographic modules 
                     | 
                  95.99 | ISO/IEC JTC 1/SC 27 | 
| 
                     Information technology — Security techniques — Testing methods for the mitigation of non-invasive attack classes against cryptographic modules 
                     | 
                  60.60 | ISO/IEC JTC 1/SC 27 | 
| 
                     Information technology — Security techniques — Telebiometric authentication framework using biometric hardware security module 
                     | 
                  90.93 | ISO/IEC JTC 1/SC 27 | 
| 
                     Information technology — Security techniques — Time-stamping services — Part 1: Framework 
                     | 
                  95.99 | ISO/IEC JTC 1/SC 27 | 
| 
                     Information technology — Security techniques — Time-stamping services — Part 1: Framework 
                     | 
                  90.93 | ISO/IEC JTC 1/SC 27 | 
| 
                     Information technology — Security techniques — Time-stamping services — Part 1: Framework — Amendment 1 
                     | 
                  50.20 | ISO/IEC JTC 1/SC 27 | 
| 
                     Information technology — Security techniques — Time-stamping services — Part 2: Mechanisms producing independent tokens 
                     | 
                  95.99 | ISO/IEC JTC 1/SC 27 | 
| 
                     Information technology — Security techniques — Time-stamping services — Part 2: Mechanisms producing independent tokens 
                     | 
                  95.99 | ISO/IEC JTC 1/SC 27 | 
| 
                     Information security — Time-stamping services — Part 2: Mechanisms producing independent tokens 
                     | 
                  60.60 | ISO/IEC JTC 1/SC 27 | 
| 
                     Information security — Time-stamping services — Part 2: Mechanisms producing independent tokens — Technical Corrigendum 1 
                     | 
                  60.60 | ISO/IEC JTC 1/SC 27 | 
| 
                     Information technology — Security techniques — Time-stamping services — Part 3: Mechanisms producing linked tokens 
                     | 
                  95.99 | ISO/IEC JTC 1/SC 27 | 
| 
                     Information technology — Security techniques — Time-stamping services — Part 3: Mechanisms producing linked tokens 
                     | 
                  90.93 | ISO/IEC JTC 1/SC 27 | 
| 
                     Information technology — Security techniques — Time-stamping services — Part 4: Traceability of time sources 
                     | 
                  90.93 | ISO/IEC JTC 1/SC 27 | 
| 
                     Information technology — Security techniques — IT network security — Part 1: Network security management 
                     | 
                  95.99 | ISO/IEC JTC 1/SC 27 | 
| 
                     Information technology — Security techniques — IT network security — Part 2: Network security architecture 
                     | 
                  95.99 | ISO/IEC JTC 1/SC 27 | 
| 
                     Information technology — Security techniques — IT network security — Part 3: Securing communications between networks using security gateways 
                     | 
                  95.99 | ISO/IEC JTC 1/SC 27 | 
| 
                     Information technology — Security techniques — IT network security — Part 4: Securing remote access 
                     | 
                  95.99 | ISO/IEC JTC 1/SC 27 | 
| 
                     Information technology — Security techniques — IT network security — Part 5: Securing communications across networks using virtual private networks 
                     | 
                  95.99 | ISO/IEC JTC 1/SC 27 | 
| 
                     Information technology — Security techniques — Random bit generation 
                     | 
                  95.99 | ISO/IEC JTC 1/SC 27 | 
| 
                     Information technology — Security techniques — Random bit generation — Technical Corrigendum 1 
                     | 
                  95.99 | ISO/IEC JTC 1/SC 27 | 
| 
                     Information technology — Security techniques — Random bit generation 
                     | 
                  95.99 | ISO/IEC JTC 1/SC 27 | 
| 
                     Information technology — Security techniques — Random bit generation — Amendment 1: Deterministic random bit generation 
                     | 
                  95.99 | ISO/IEC JTC 1/SC 27 | 
| 
                     Information technology — Security techniques — Random bit generation — Technical Corrigendum 1 
                     | 
                  95.99 | ISO/IEC JTC 1/SC 27 | 
| 
                     Information technology — Security techniques — Random bit generation 
                     | 
                  60.60 | ISO/IEC JTC 1/SC 27 | 
| 
                     Information technology — Security techniques — Prime number generation 
                     | 
                  95.99 | ISO/IEC JTC 1/SC 27 | 
| 
                     Information security — Prime number generation 
                     | 
                  60.60 | ISO/IEC JTC 1/SC 27 | 
| 
                     Information technology — Security techniques — Encryption algorithms — Part 1: General 
                     | 
                  95.99 | ISO/IEC JTC 1/SC 27 | 
| 
                     Information technology — Security techniques — Encryption algorithms — Part 1: General — Amendment 1 
                     | 
                  95.99 | ISO/IEC JTC 1/SC 27 | 
| 
                     Information technology — Security techniques — Encryption algorithms — Part 1: General 
                     | 
                  95.99 | ISO/IEC JTC 1/SC 27 | 
| 
                     Information security — Encryption algorithms — Part 1: General 
                     | 
                  60.60 | ISO/IEC JTC 1/SC 27 | 
| 
                     Information technology — Security techniques — Encryption algorithms — Part 2: Asymmetric ciphers 
                     | 
                  90.93 | ISO/IEC JTC 1/SC 27 | 
| 
                     Information technology — Security techniques — Encryption algorithms — Part 2: Asymmetric ciphers — Amendment 1: FACE 
                     | 
                  60.60 | ISO/IEC JTC 1/SC 27 | 
| 
                     Information technology — Security techniques — Encryption algorithms — Part 2: Asymmetric ciphers — Amendment 2 
                     | 
                  40.20 | ISO/IEC JTC 1/SC 27 | 
| 
                     Information technology — Security techniques — Encryption algorithms — Part 3: Block ciphers 
                     | 
                  95.99 | ISO/IEC JTC 1/SC 27 | 
| 
                     Information technology — Security techniques — Encryption algorithms — Part 3: Block ciphers — Technical Corrigendum 1 
                     | 
                  95.99 | ISO/IEC JTC 1/SC 27 | 
| 
                     Information technology — Security techniques — Encryption algorithms — Part 3: Block ciphers — Technical Corrigendum 2 
                     | 
                  95.99 | ISO/IEC JTC 1/SC 27 | 
| 
                     Information technology — Security techniques — Encryption algorithms — Part 3: Block ciphers — Technical Corrigendum 3: . 
                     | 
                  95.99 | ISO/IEC JTC 1/SC 27 | 
| 
                     Information technology — Security techniques — Encryption algorithms — Part 3: Block ciphers 
                     | 
                  90.20 | ISO/IEC JTC 1/SC 27 | 
| 
                     Information technology — Security techniques — Encryption algorithms — Part 3: Block ciphers — Amendment 1: SM4 
                     | 
                  60.60 | ISO/IEC JTC 1/SC 27 | 
| 
                     Information technology — Security techniques — Encryption algorithms — Part 4: Stream ciphers 
                     | 
                  95.99 | ISO/IEC JTC 1/SC 27 | 
| 
                     Information technology — Security techniques — Encryption algorithms — Part 4: Stream ciphers — Amendment 1: Rabbit and Decim 
                     | 
                  95.99 | ISO/IEC JTC 1/SC 27 | 
| 
                     Information technology — Security techniques — Encryption algorithms — Part 4: Stream ciphers 
                     | 
                  90.93 | ISO/IEC JTC 1/SC 27 | 
| 
                     Information technology — Security techniques — Encryption algorithms — Part 4: Stream ciphers — Amendment 1: ZUC 
                     | 
                  60.60 | ISO/IEC JTC 1/SC 27 | 
| 
                     Information technology — Security techniques — Encryption algorithms — Part 5: Identity-based ciphers 
                     | 
                  90.93 | ISO/IEC JTC 1/SC 27 | 
| 
                     Information technology — Security techniques — Encryption algorithms — Part 5: Identity-based ciphers — Amendment 1: SM9 mechanism 
                     | 
                  60.60 | ISO/IEC JTC 1/SC 27 | 
| 
                     IT Security techniques — Encryption algorithms — Part 6: Homomorphic encryption 
                     | 
                  90.93 | ISO/IEC JTC 1/SC 27 | 
| 
                     Information security — Encryption algorithms — Part 7: Tweakable block ciphers 
                     | 
                  60.60 | ISO/IEC JTC 1/SC 27 | 
| 
                     Information security — Encryption algorithms — Part 7: Tweakable block ciphers — Amendment 1 
                     | 
                  10.99 | ISO/IEC JTC 1/SC 27 | 
| 
                     Information technology — Security techniques — Selection, deployment and operations of intrusion detection systems 
                     | 
                  95.99 | ISO/IEC JTC 1/SC 27 | 
| 
                     Information technology — Security techniques — Information security incident management 
                     | 
                  95.99 | ISO/IEC JTC 1/SC 27 | 
| 
                     Information technology — Security techniques — Methodology for IT security evaluation 
                     | 
                  95.99 | ISO/IEC JTC 1/SC 27 | 
| 
                     Information technology — Security techniques — Methodology for IT security evaluation 
                     | 
                  95.99 | ISO/IEC JTC 1/SC 27 | 
| 
                     Information security, cybersecurity and privacy protection — Evaluation criteria for IT security — Methodology for IT security evaluation 
                     | 
                  90.92 | ISO/IEC JTC 1/SC 27 | 
| 
                     Information security, cybersecurity and privacy protection — Evaluation criteria for IT security — Requirements and methodology for IT security evaluation 
                     | 
                  40.60 | ISO/IEC JTC 1/SC 27 | 
| 
                     Information technology — Specification for the Extensible Configuration Checklist Description Format (XCCDF) Version 1.2 
                     | 
                  90.93 | ISO/IEC JTC 1 | 
| 
                     Information technology — Security techniques — Cryptographic algorithms and security mechanisms conformance testing 
                     | 
                  90.92 | ISO/IEC JTC 1/SC 27 | 
| 
                     Information technology — Security techniques — Blind digital signatures — Part 1: General 
                     | 
                  90.93 | ISO/IEC JTC 1/SC 27 | 
| 
                     Information technology — Security techniques — Blind digital signatures — Part 2: Discrete logarithm based mechanisms 
                     | 
                  90.93 | ISO/IEC JTC 1/SC 27 | 
| 
                     Information technology — Security techniques — Catalogue of architectural and design principles for secure products, systems and applications 
                     | 
                  90.93 | ISO/IEC JTC 1/SC 27 | 
| 
                     Information technology — Security techniques — Secret sharing — Part 1: General 
                     | 
                  90.93 | ISO/IEC JTC 1/SC 27 | 
| 
                     Information technology — Security techniques — Secret sharing — Part 2: Fundamental mechanisms 
                     | 
                  90.93 | ISO/IEC JTC 1/SC 27 | 
| 
                     Guidance for developing security and privacy functional requirements based on ISO/IEC 15408 
                     | 
                  90.20 | ISO/IEC JTC 1/SC 27 | 
| 
                     Information technology — Security techniques — Authenticated encryption 
                     | 
                  95.99 | ISO/IEC JTC 1/SC 27 | 
| 
                     Information technology — Security techniques — Authenticated encryption — Technical Corrigendum 1 
                     | 
                  95.99 | ISO/IEC JTC 1/SC 27 | 
| 
                     Information security — Authenticated encryption 
                     | 
                  60.60 | ISO/IEC JTC 1/SC 27 | 
| 
                     Information technology — Security techniques — Security requirements for cryptographic modules 
                     | 
                  95.99 | ISO/IEC JTC 1/SC 27 | 
| 
                     Information technology — Security techniques — Security requirements for cryptographic modules — Technical Corrigendum 1 
                     | 
                  95.99 | ISO/IEC JTC 1/SC 27 | 
| 
                     Information technology — Security techniques — Security requirements for cryptographic modules 
                     | 
                  95.99 | ISO/IEC JTC 1/SC 27 | 
| 
                     Information technology — Security techniques — Security requirements for cryptographic modules — Technical Corrigendum 1 
                     | 
                  95.99 | ISO/IEC JTC 1/SC 27 | 
| 
                     Information security, cybersecurity and privacy protection — Security requirements for cryptographic modules 
                     | 
                  60.60 | ISO/IEC JTC 1/SC 27 | 
| 
                     Information technology — Security techniques — Security assessment of operational systems 
                     | 
                  95.99 | ISO/IEC JTC 1/SC 27 | 
| 
                     Information technology — Security techniques — Security assessment of operational systems 
                     | 
                  90.93 | ISO/IEC JTC 1/SC 27 | 
| 
                     Information technology — Security techniques — Security evaluation of biometrics 
                     | 
                  90.92 | ISO/IEC JTC 1/SC 27 | 
| 
                     Information security, cybersecurity and privacy protection — General principles, requirements and guidance for security evaluation of biometric systems 
                     | 
                  60.00 | ISO/IEC JTC 1/SC 27 | 
| 
                     Information technology — Conformance test methods for security service crypto suites — Part 10: Crypto suite AES-128 
                     | 
                  95.99 | ISO/IEC JTC 1/SC 31 | 
| 
                     Information technology — Conformance test methods for security service crypto suites — Part 10: Crypto suite AES-128 
                     | 
                  90.92 | ISO/IEC JTC 1/SC 31 | 
| 
                     Information technology — Conformance test methods for security service crypto suites — Part 10: Crypto suite AES-128 
                     | 
                  40.60 | ISO/IEC JTC 1/SC 31 | 
| 
                     Information technology — Conformance test methods for security service crypto suites — Part 11: Crypto suite PRESENT-80 
                     | 
                  90.92 | ISO/IEC JTC 1/SC 31 | 
| 
                     Information technology — Conformance test methods for security service crypto suites — Part 11: Crypto suite PRESENT-80 
                     | 
                  50.00 | ISO/IEC JTC 1/SC 31 | 
| 
                     Information technology — Conformance test methods for security service crypto suites — Part 13: Cryptographic Suite Grain-128A 
                     | 
                  90.92 | ISO/IEC JTC 1/SC 31 | 
| 
                     Information technology — Conformance test methods for security service crypto suites — Part 13: Cryptographic Suite Grain-128A 
                     | 
                  40.60 | ISO/IEC JTC 1/SC 31 | 
| 
                     Information technology — Conformance test methods for security service crypto suites — Part 16: Crypto suite ECDSA-ECDH security services for air interface communications 
                     | 
                  90.92 | ISO/IEC JTC 1/SC 31 | 
| 
                     Information technology — Conformance test methods for security service crypto suites — Part 16: Crypto suite ECDSA-ECDH 
                     | 
                  40.60 | ISO/IEC JTC 1/SC 31 | 
| 
                     Information technology — Conformance test methods for security service crypto suites — Part 19: Crypto suite RAMON 
                     | 
                  90.93 | ISO/IEC JTC 1/SC 31 | 
| 
                     Information technology — Conformance test methods for security service crypto suites — Part 21: Crypto suite SIMON 
                     | 
                  90.92 | ISO/IEC JTC 1/SC 31 | 
| 
                     Information technology — Conformance test methods for security service crypto suites — Part 21: Crypto suite SIMON 
                     | 
                  40.60 | ISO/IEC JTC 1/SC 31 | 
| 
                     Information technology — Conformance test methods for security service crypto suites — Part 22: Crypto suite SPECK 
                     | 
                  90.92 | ISO/IEC JTC 1/SC 31 | 
| 
                     Information technology — Conformance test methods for security service crypto suites — Part 22: Crypto suite SPECK 
                     | 
                  40.60 | ISO/IEC JTC 1/SC 31 | 
| 
                     IT security techniques — Competence requirements for information security testers and evaluators — Part 1: Introduction, concepts and general requirements 
                     | 
                  90.92 | ISO/IEC JTC 1/SC 27 | 
| 
                     Information security, cybersecurity and privacy protection — Requirements for the competence of IT security conformance assessment body personnel — Part 1: Overview and concepts 
                     | 
                  40.60 | ISO/IEC JTC 1/SC 27 | 
| 
                     IT security techniques — Competence requirements for information security testers and evaluators — Part 2: Knowledge, skills and effectiveness requirements for ISO/IEC 19790 testers 
                     | 
                  90.92 | ISO/IEC JTC 1/SC 27 | 
| 
                     Information security, cybersecurity and privacy protection — Requirements for the competence of IT security conformance assessment body personnel — Part 2: Knowledge and skills requirements for ISO/IEC 19790 testers and validators 
                     | 
                  40.60 | ISO/IEC JTC 1/SC 27 | 
| 
                     IT security techniques — Competence requirements for information security testers and evaluators — Part 3: Knowledge, skills and effectiveness requirements for ISO/IEC 15408 evaluators 
                     | 
                  90.92 | ISO/IEC JTC 1/SC 27 | 
| 
                     Information security, cybersecurity and privacy protection — Requirements for the competence of IT security conformance assessment body personnel — Part 3: Knowledge and skills requirements for ISO/IEC 15408 evaluators and certifiers 
                     | 
                  40.60 | ISO/IEC JTC 1/SC 27 | 
| 
                     Information security — Criteria and methodology for security evaluation of biometric systems — Part 1: Framework 
                     | 
                  90.92 | ISO/IEC JTC 1/SC 27 | 
| 
                     Information security — Criteria and methodology for security evaluation of biometric systems — Part 2: Biometric recognition performance 
                     | 
                  60.60 | ISO/IEC JTC 1/SC 27 | 
| 
                     Information security — Criteria and methodology for security evaluation of biometric systems — Part 3: Presentation attack detection 
                     | 
                  60.60 | ISO/IEC JTC 1/SC 27 | 
| 
                     Information technology — Security techniques — Refining software vulnerability analysis under ISO/IEC 15408 and ISO/IEC 18045 
                     | 
                  95.99 | ISO/IEC JTC 1/SC 27 | 
| 
                     Information technology — Security techniques — Refining software vulnerability analysis under ISO/IEC 15408 and ISO/IEC 18045 
                     | 
                  60.60 | ISO/IEC JTC 1/SC 27 | 
| 
                     Information technology — Security techniques — Anonymous digital signatures — Part 1: General 
                     | 
                  90.93 | ISO/IEC JTC 1/SC 27 | 
| 
                     Information technology — Security techniques — Anonymous digital signatures — Part 2: Mechanisms using a group public key 
                     | 
                  90.93 | ISO/IEC JTC 1/SC 27 | 
| 
                     Information technology — Security techniques — Anonymous digital signatures — Part 2: Mechanisms using a group public key — Amendment 1 
                     | 
                  60.60 | ISO/IEC JTC 1/SC 27 | 
| 
                     Information technology — Security techniques — Anonymous digital signatures — Part 2: Mechanisms using a group public key — Amendment 2 
                     | 
                  60.60 | ISO/IEC JTC 1/SC 27 | 
| 
                     Information security — Anonymous digital signatures — Part 3: Mechanisms using multiple public keys 
                     | 
                  60.60 | ISO/IEC JTC 1/SC 27 | 
| 
                     Information technology — Security techniques — Anonymous entity authentication — Part 1: General 
                     | 
                  90.93 | ISO/IEC JTC 1/SC 27 | 
| 
                     Information technology — Security techniques — Anonymous entity authentication — Part 2: Mechanisms based on signatures using a group public key 
                     | 
                  90.93 | ISO/IEC JTC 1/SC 27 | 
| 
                     Information security — Anonymous entity authentication — Part 3: Mechanisms based on blind signatures 
                     | 
                  60.60 | ISO/IEC JTC 1/SC 27 | 
| 
                     Information technology — Security techniques — Anonymous entity authentication — Part 4: Mechanisms based on weak secrets 
                     | 
                  90.93 | ISO/IEC JTC 1/SC 27 | 
| 
                     Information technology — Security techniques — Anonymous entity authentication — Part 4: Mechanisms based on weak secrets — Amendment 1 
                     | 
                  30.20 | ISO/IEC JTC 1/SC 27 | 
| 
                     Information technology — Methodologies to evaluate the resistance of biometric systems to morphing attacks 
                     | 
                  50.00 | ISO/IEC JTC 1/SC 37 | 
| 
                     IT Security techniques — Test tool requirements and test tool calibration methods for use in testing non-invasive attack mitigation techniques in cryptographic modules — Part 1: Test tools and techniques 
                     | 
                  90.93 | ISO/IEC JTC 1/SC 27 | 
| 
                     IT Security techniques — Test tool requirements and test tool calibration methods for use in testing non-invasive attack mitigation techniques in cryptographic modules — Part 2: Test calibration methods and apparatus 
                     | 
                  90.20 | ISO/IEC JTC 1/SC 27 | 
| 
                     Information technology — OASIS Common Security Advisory Framework (CSAF) v2.0 Specification 
                     | 
                  60.60 | ISO/IEC JTC 1 | 
| 
                     Information technology — Open Trusted Technology ProviderTM Standard (O-TTPS) — Mitigating maliciously tainted and counterfeit products — Part 1: Requirements and recommendations 
                     | 
                  95.99 | ISO/IEC JTC 1 | 
| 
                     Information technology — Open Trusted Technology ProviderTM Standard (O-TTPS) — Part 1: Requirements and recommendations for mitigating maliciously tainted and counterfeit products 
                     | 
                  60.60 | ISO/IEC JTC 1 | 
| 
                     Information technology — Open Trusted Technology ProviderTM Standard (O-TTPS) — Mitigating maliciously tainted and counterfeit products — Part 2: Assessment procedures for the O-TTPS and ISO/IEC 20243-1:2018 
                     | 
                  95.99 | ISO/IEC JTC 1 | 
| 
                     Information technology — Open Trusted Technology ProviderTM Standard (O-TTPS) — Part 2: Assessment procedures for the O-TTPS 
                     | 
                  60.60 | ISO/IEC JTC 1 | 
| 
                     Information Technology — Open Trusted Technology ProviderTM Standard (O-TTPS) — Mitigating maliciously tainted and counterfeit products 
                     | 
                  95.99 | ISO/IEC JTC 1 | 
| 
                     Information technology — Security techniques — Testing cryptographic modules in their operational environment 
                     | 
                  90.92 | ISO/IEC JTC 1/SC 27 | 
| 
                     Information security, cybersecurity and privacy protection — Testing cryptographic modules in their field 
                     | 
                  60.00 | ISO/IEC JTC 1/SC 27 | 
| 
                     Information technology — Security techniques — Test and analysis methods for random bit generators within ISO/IEC 19790 and ISO/IEC 15408 
                     | 
                  90.93 | ISO/IEC JTC 1/SC 27 | 
| 
                     Information technology — TLS specification for storage systems 
                     | 
                  95.99 | ISO/IEC JTC 1 | 
| 
                     Information technology — TLS specification for storage systems 
                     | 
                  60.60 | ISO/IEC JTC 1 | 
| 
                     Privacy enhancing data de-identification terminology and classification of techniques 
                     | 
                  90.93 | ISO/IEC JTC 1/SC 27 | 
| 
                     Information security, cybersecurity and privacy protection — Physically unclonable functions — Part 1: Security requirements 
                     | 
                  60.60 | ISO/IEC JTC 1/SC 27 | 
| 
                     Information security, cybersecurity and privacy protection — Physically unclonable functions — Part 2: Test and evaluation methods 
                     | 
                  60.60 | ISO/IEC JTC 1/SC 27 | 
| 
                     Intelligent transport systems — ITS station security services for secure session establishment and authentication between trusted devices 
                     | 
                  95.99 | ISO/TC 204 | 
| 
                     Intelligent transport systems — ITS station security services for secure session establishment and authentication between trusted devices 
                     | 
                  95.99 | ISO/TC 204 | 
| 
                     Intelligent transport systems — ITS station security services for secure session establishment and authentication between trusted devices 
                     | 
                  60.60 | ISO/TC 204 | 
| 
                     Information technology — Systems Security Engineering — Capability Maturity Model (SSE-CMM®) 
                     | 
                  95.99 | ISO/IEC JTC 1/SC 27 | 
| 
                     Information technology — Security techniques — Systems Security Engineering — Capability Maturity Model® (SSE-CMM®) 
                     | 
                  90.93 | ISO/IEC JTC 1/SC 27 | 
| 
                     Information technology — Security techniques — Security guidelines for design and implementation of virtualized servers 
                     | 
                  90.60 | ISO/IEC JTC 1/SC 27 | 
| 
                     Information technology — Destruction of data carriers — Part 1: Principles and definitions 
                     | 
                  90.60 | ISO/IEC JTC 1 | 
| 
                     Information technology — Destruction of data carriers — Part 2: Requirements for equipment for destruction of data carriers 
                     | 
                  90.60 | ISO/IEC JTC 1 | 
| 
                     Information technology — Destruction of data carriers — Part 3: Process of destruction of data carriers 
                     | 
                  90.60 | ISO/IEC JTC 1 | 
| 
                     Information security, cybersecurity and privacy protection — New concepts and changes in ISO/IEC 15408:2022 and ISO/IEC 18045:2022 
                     | 
                  90.92 | ISO/IEC JTC 1/SC 27 | 
| 
                     Blockchain and distributed ledger technologies — Vocabulary 
                     | 
                  95.99 | ISO/TC 307 | 
| 
                     Blockchain and distributed ledger technologies — Vocabulary 
                     | 
                  60.60 | ISO/TC 307 | 
| 
                     Blockchain and distributed ledger technologies — Privacy and personally identifiable information protection considerations 
                     | 
                  60.60 | ISO/TC 307 | 
| 
                     Blockchain and distributed ledger technologies – Overview of existing DLT systems for identity management 
                     | 
                  60.60 | ISO/TC 307 | 
| 
                     Blockchain and distributed ledger technologies — Reference architecture 
                     | 
                  60.60 | ISO/TC 307 | 
| 
                     Blockchain and distributed ledger technologies — Taxonomy and Ontology 
                     | 
                  90.60 | ISO/TC 307 | 
| 
                     Information security — Redaction of authentic data — Part 1: General 
                     | 
                  60.60 | ISO/IEC JTC 1/SC 27 | 
| 
                     Information security — Redaction of authentic data — Part 2: Redactable signature schemes based on asymmetric mechanisms 
                     | 
                  60.60 | ISO/IEC JTC 1/SC 27 | 
| 
                     Blockchain and distributed ledger technologies — Overview of and interactions between smart contracts in blockchain and distributed ledger technology systems 
                     | 
                  60.60 | ISO/TC 307 | 
| 
                     Information security, cybersecurity and privacy protection — Requirements for the competence of IT security testing and evaluation laboratories — Part 1: Evaluation for ISO/IEC 15408 
                     | 
                  90.93 | ISO/IEC JTC 1/SC 27 | 
| 
                     Information security, cybersecurity and privacy protection — Requirements for the competence of IT security testing and evaluation laboratories — Part 2: Testing for ISO/IEC 19790 
                     | 
                  90.93 | ISO/IEC JTC 1/SC 27 | 
| 
                     Blockchain and distributed ledger technologies — Security management of digital asset custodians 
                     | 
                  60.60 | ISO/TC 307 | 
| 
                     Blockchain and distributed ledger technologies — Guidelines for governance 
                     | 
                  90.20 | ISO/TC 307 | 
| 
                     Blockchain and distributed ledger technologies (DLTs) — Overview of trust anchors for DLT-based identity management 
                     | 
                  60.60 | ISO/TC 307 | 
| 
                     Information security — Security requirements, test and evaluation methods for quantum key distribution — Part 1: Requirements 
                     | 
                  60.60 | ISO/IEC JTC 1/SC 27 | 
| 
                     Information security — Security requirements, test and evaluation methods for quantum key distribution — Part 2: Evaluation and testing methods 
                     | 
                  60.60 | ISO/IEC JTC 1/SC 27 | 
| 
                     Financial services — Security information for PKI in blockchain and DLT implementations 
                     | 
                  60.60 | ISO/TC 68/SC 2 | 
| 
                     Cybersecurity — Security reference model for industrial internet platform (SRM- IIP) 
                     | 
                  60.60 | ISO/IEC JTC 1/SC 27 | 
| 
                     Information security, cybersecurity and privacy protection — Ontology building blocks for security and risk assessment 
                     | 
                  60.60 | ISO/IEC JTC 1/SC 27 | 
| 
                     Information security, cybersecurity and privacy protection — Security techniques — Security properties and best practices for test and evaluation of white box cryptography 
                     | 
                  60.60 | ISO/IEC JTC 1/SC 27 | 
| 
                     Document management applications — Specification for a digital safe 
                     | 
                  50.20 | ISO/TC 171/SC 1 | 
| 
                     Information technology — Security techniques — Biometric information protection 
                     | 
                  95.99 | ISO/IEC JTC 1/SC 27 | 
| 
                     Information security, cybersecurity and privacy protection — Biometric information protection 
                     | 
                  60.60 | ISO/IEC JTC 1/SC 27 | 
| 
                     Information technology — Security techniques — Test requirements for cryptographic modules 
                     | 
                  95.99 | ISO/IEC JTC 1/SC 27 | 
| 
                     Information technology — Security techniques — Test requirements for cryptographic modules 
                     | 
                  95.99 | ISO/IEC JTC 1/SC 27 | 
| 
                     Information technology — Security techniques — Test requirements for cryptographic modules — Technical Corrigendum 1 
                     | 
                  95.99 | ISO/IEC JTC 1/SC 27 | 
| 
                     Information technology — Security techniques — Test requirements for cryptographic modules 
                     | 
                  95.99 | ISO/IEC JTC 1/SC 27 | 
| 
                     Information security, cybersecurity and privacy protection — Test requirements for cryptographic modules 
                     | 
                  60.60 | ISO/IEC JTC 1/SC 27 | 
| 
                     Information technology — Security techniques — A framework for identity management — Part 1: Terminology and concepts 
                     | 
                  95.99 | ISO/IEC JTC 1/SC 27 | 
| 
                     IT Security and Privacy — A framework for identity management — Part 1: Terminology and concepts 
                     | 
                  90.92 | ISO/IEC JTC 1/SC 27 | 
| 
                     IT Security and Privacy — A framework for identity management — Part 1: Terminology and concepts — Amendment 1 
                     | 
                  60.60 | ISO/IEC JTC 1/SC 27 | 
| 
                     Information security, cybersecurity and privacy protection — A framework for identity management — Part 1: Core concepts and terminology 
                     | 
                  60.00 | ISO/IEC JTC 1/SC 27 | 
| 
                     Information technology — Security techniques — A framework for identity management — Part 2: Reference architecture and requirements 
                     | 
                  90.92 | ISO/IEC JTC 1/SC 27 | 
| 
                     Information security, cybersecurity and privacy protection — A framework for identity management — Part 2: Reference architecture and requirements 
                     | 
                  60.00 | ISO/IEC JTC 1/SC 27 | 
| 
                     Information technology — Security techniques — A framework for identity management — Part 3: Practice 
                     | 
                  90.92 | ISO/IEC JTC 1/SC 27 | 
| 
                     Information technology — Security techniques — A framework for identity management — Part 3: Practice — Amendment 1: Identity Information Lifecycle processes 
                     | 
                  60.60 | ISO/IEC JTC 1/SC 27 | 
| 
                     Information security, cybersecurity and privacy protection — A framework for identity management — Part 3: Practice 
                     | 
                  60.00 | ISO/IEC JTC 1/SC 27 | 
| 
                     Information technology — Security techniques — Authentication context for biometrics 
                     | 
                  95.99 | ISO/IEC JTC 1/SC 27 | 
| 
                     Information technology — Security techniques — Authentication context for biometrics — Technical Corrigendum 1 
                     | 
                  95.99 | ISO/IEC JTC 1/SC 27 | 
| 
                     Information technology — Security techniques — Authentication context for biometrics 
                     | 
                  90.60 | ISO/IEC JTC 1/SC 27 | 
| 
                     Information technology — Security techniques — Guidelines for information and communications technology disaster recovery services 
                     | 
                  95.99 | ISO/IEC JTC 1/SC 27 | 
| 
                     Information technology — The safe framework 
                     | 
                  50.20 | ISO/IEC JTC 1 | 
| 
                     Information technology — Security protocol and data model (SPDM) collection 
                     | 
                  40.20 | ISO/IEC JTC 1 | 
| 
                     Information technology — OpenID Connect FAPI Security Profile 1.0 — Part 1: Baseline 
                     | 
                  40.00 | ISO/IEC JTC 1 | 
| 
                     Information technology — OpenID Connect FAPI Security Profile 1.0 — Part 2: Advanced 
                     | 
                  40.00 | ISO/IEC JTC 1 | 
| 
                     Information technology — OpenID connect — Identity assurance 1.0 — Part 1: General 
                     | 
                  40.00 | ISO/IEC JTC 1 | 
| 
                     Information technology — OpenID connect — Identity assurance 1.0 — Part 2: Schema definition 
                     | 
                  40.00 | ISO/IEC JTC 1 | 
| 
                     Information technology — OpenID connect — OpenID connect core 1.0 incorporating errata set 2 
                     | 
                  60.60 | ISO/IEC JTC 1 | 
| 
                     Information technology — OpenID connect — OpenID connect discovery 1.0 incorporating errata set 2 
                     | 
                  60.60 | ISO/IEC JTC 1 | 
| 
                     Information technology — OpenID connect — OpenID connect dynamic client registration 1.0 incorporating errata set 2 
                     | 
                  60.60 | ISO/IEC JTC 1 | 
| 
                     Information technology — OpenID connect — OpenID connect RP-initiated logout 1.0 
                     | 
                  60.60 | ISO/IEC JTC 1 | 
| 
                     Information technology — OpenID connect — OpenID connect session management 1.0 
                     | 
                  60.60 | ISO/IEC JTC 1 | 
| 
                     Information technology — OpenID connect — OpenID connect front-channel logout 1.0 
                     | 
                  60.60 | ISO/IEC JTC 1 | 
| 
                     Information technology — OpenID connect — OpenID connect back-channel logout 1.0 incorporating errata set 1 
                     | 
                  60.60 | ISO/IEC JTC 1 | 
| 
                     Information technology — OpenID connect — OAuth 2.0 multiple response type encoding practices 
                     | 
                  60.60 | ISO/IEC JTC 1 | 
| 
                     Information technology — OpenID connect — OAuth 2.0 form post response mode 
                     | 
                  60.60 | ISO/IEC JTC 1 | 
| 
                     Information technology — Security techniques — Information security management systems — Overview and vocabulary 
                     | 
                  95.99 | ISO/IEC JTC 1/SC 27 | 
| 
                     Information technology — Security techniques — Information security management systems — Overview and vocabulary 
                     | 
                  95.99 | ISO/IEC JTC 1/SC 27 | 
| 
                     Information technology — Security techniques — Information security management systems — Overview and vocabulary 
                     | 
                  95.99 | ISO/IEC JTC 1/SC 27 | 
| 
                     Information technology — Security techniques — Information security management systems — Overview and vocabulary 
                     | 
                  95.99 | ISO/IEC JTC 1/SC 27 | 
| 
                     Information technology — Security techniques — Information security management systems — Overview and vocabulary 
                     | 
                  90.92 | ISO/IEC JTC 1/SC 27 | 
| 
                     Information technology — Security techniques — Information security management systems — Overview and vocabulary 
                     | 
                  30.99 | ISO/IEC JTC 1/SC 27 | 
| 
                     Information technology — Security techniques — Information security management systems — Requirements 
                     | 
                  95.99 | ISO/IEC JTC 1/SC 27 | 
| 
                     Information technology — Security techniques — Information security management systems — Requirements 
                     | 
                  95.99 | ISO/IEC JTC 1/SC 27 | 
| 
                     Information technology — Security techniques — Information security management systems — Requirements — Technical Corrigendum 1 
                     | 
                  95.99 | ISO/IEC JTC 1/SC 27 | 
| 
                     Information technology — Security techniques — Information security management systems — Requirements — Technical Corrigendum 2 
                     | 
                  95.99 | ISO/IEC JTC 1/SC 27 | 
| 
                     Information security, cybersecurity and privacy protection — Information security management systems — Requirements 
                     | 
                  60.60 | ISO/IEC JTC 1/SC 27 | 
| 
                     Information security, cybersecurity and privacy protection — Information security management systems — Requirements — Amendment 1: Climate action changes 
                     | 
                  60.60 | ISO/IEC JTC 1/SC 27 | 
| 
                     Information technology — Security techniques — Code of practice for information security management 
                     | 
                  95.99 | ISO/IEC JTC 1/SC 27 | 
| 
                     Information technology — Security techniques — Code of practice for information security controls 
                     | 
                  95.99 | ISO/IEC JTC 1/SC 27 | 
| 
                     Information technology — Security techniques — Code of practice for information security controls — Technical Corrigendum 1 
                     | 
                  95.99 | ISO/IEC JTC 1/SC 27 | 
| 
                     Information technology — Security techniques — Code of practice for information security controls — Technical Corrigendum 2 
                     | 
                  95.99 | ISO/IEC JTC 1/SC 27 | 
| 
                     Information security, cybersecurity and privacy protection — Information security controls 
                     | 
                  60.60 | ISO/IEC JTC 1/SC 27 | 
| 
                     Information technology — Security techniques — Information security management system implementation guidance 
                     | 
                  95.99 | ISO/IEC JTC 1/SC 27 | 
| 
                     Information technology — Security techniques — Information security management systems — Guidance 
                     | 
                  90.92 | ISO/IEC JTC 1/SC 27 | 
| 
                     Information technology — Security techniques — Information security management — Measurement 
                     | 
                  95.99 | ISO/IEC JTC 1/SC 27 | 
| 
                     Information technology — Security techniques — Information security management — Monitoring, measurement, analysis and evaluation 
                     | 
                  90.60 | ISO/IEC JTC 1/SC 27 | 
| 
                     Information technology — Security techniques — Information security risk management 
                     | 
                  95.99 | ISO/IEC JTC 1/SC 27 | 
| 
                     Information technology — Security techniques — Information security risk management 
                     | 
                  95.99 | ISO/IEC JTC 1/SC 27 | 
| 
                     Information technology — Security techniques — Information security risk management 
                     | 
                  95.99 | ISO/IEC JTC 1/SC 27 | 
| 
                     Information security, cybersecurity and privacy protection — Guidance on managing information security risks 
                     | 
                  60.60 | ISO/IEC JTC 1/SC 27 | 
| 
                     Information security, cybersecurity and privacy protection — Requirements for bodies providing audit and certification of information security management systems — Part 1: General 
                     | 
                  60.60 | ISO/IEC JTC 1/SC 27 | 
| 
                     Requirements for bodies providing audit and certification of information security management systems — Part 2: Privacy information management systems 
                     | 
                  90.92 | ISO/IEC JTC 1/SC 27 | 
| 
                     Information technology — Security techniques — Requirements for bodies providing audit and certification of information security management systems 
                     | 
                  95.99 | ISO/IEC JTC 1/SC 27 | 
| 
                     Information technology — Security techniques — Requirements for bodies providing audit and certification of information security management systems 
                     | 
                  95.99 | ISO/IEC JTC 1/SC 27 | 
| 
                     Information technology — Security techniques — Requirements for bodies providing audit and certification of information security management systems 
                     | 
                  95.99 | ISO/IEC JTC 1/SC 27 | 
| 
                     Information technology — Security techniques — Requirements for bodies providing audit and certification of information security management systems — Amendment 1 
                     | 
                  95.99 | ISO/IEC JTC 1/SC 27 | 
| 
                     Information technology — Security techniques — Guidelines for information security management systems auditing 
                     | 
                  95.99 | ISO/IEC JTC 1/SC 27 | 
| 
                     Information technology — Security techniques — Guidelines for information security management systems auditing 
                     | 
                  95.99 | ISO/IEC JTC 1/SC 27 | 
| 
                     Information security, cybersecurity and privacy protection — Guidelines for information security management systems auditing 
                     | 
                  90.92 | ISO/IEC JTC 1/SC 27 | 
| 
                     Information technology — Security techniques — Guidelines for auditors on information security controls 
                     | 
                  95.99 | ISO/IEC JTC 1/SC 27 | 
| 
                     Information technology — Security techniques — Guidelines for the assessment of information security controls 
                     | 
                  90.92 | ISO/IEC JTC 1/SC 27 | 
| 
                     Information technology — Security techniques — Sector-specific application of ISO/IEC 27001 — Requirements 
                     | 
                  95.99 | ISO/IEC JTC 1/SC 27 | 
| 
                     Information security, cybersecurity and privacy protection — Sector-specific application of ISO/IEC 27001 — Requirements 
                     | 
                  95.99 | ISO/IEC JTC 1/SC 27 | 
| 
                     Information technology — Security techniques — Information security management for inter-sector and inter-organizational communications 
                     | 
                  95.99 | ISO/IEC JTC 1/SC 27 | 
| 
                     Information technology — Security techniques — Information security management for inter-sector and inter-organizational communications 
                     | 
                  90.93 | ISO/IEC JTC 1/SC 27 | 
| 
                     Information technology — Security techniques — Information security management guidelines for telecommunications organizations based on ISO/IEC 27002 
                     | 
                  95.99 | ISO/IEC JTC 1/SC 27 | 
| 
                     Information technology — Security techniques — Code of practice for Information security controls based on ISO/IEC 27002 for telecommunications organizations 
                     | 
                  95.99 | ISO/IEC JTC 1/SC 27 | 
| 
                     Information technology — Security techniques — Code of practice for Information security controls based on ISO/IEC 27002 for telecommunications organizations — Technical Corrigendum 1 
                     | 
                  95.99 | ISO/IEC JTC 1/SC 27 | 
| 
                     Information security, cybersecurity and privacy protection — Information security controls based on ISO/IEC 27002 for telecommunications organizations 
                     | 
                  60.60 | ISO/IEC JTC 1/SC 27 | 
| 
                     Information technology — Security techniques — Guidance on the integrated implementation of ISO/IEC 27001 and ISO/IEC 20000-1 
                     | 
                  95.99 | ISO/IEC JTC 1/SC 27 | 
| 
                     Information technology — Security techniques — Guidance on the integrated implementation of ISO/IEC 27001 and ISO/IEC 20000-1 
                     | 
                  95.99 | ISO/IEC JTC 1/SC 27 | 
| 
                     Information security, cybersecurity and privacy protection — Guidance on the integrated implementation of ISO/IEC 27001 and ISO/IEC 20000-1 
                     | 
                  60.60 | ISO/IEC JTC 1/SC 27 | 
| 
                     Information security, cybersecurity and privacy protection — Guidance on the integrated implementation of ISO/IEC 27001 and ISO/IEC 20000-1 — Amendment 1 
                     | 
                  60.60 | ISO/IEC JTC 1/SC 27 | 
| 
                     Information technology — Security techniques — Governance of information security 
                     | 
                  95.99 | ISO/IEC JTC 1/SC 27 | 
| 
                     Information security, cybersecurity and privacy protection — Governance of information security 
                     | 
                  60.60 | ISO/IEC JTC 1/SC 27 | 
| 
                     Information technology — Security techniques — Information security management guidelines for financial services 
                     | 
                  95.99 | ISO/IEC JTC 1/SC 27 | 
| 
                     Information technology — Security techniques — Information security management — Organizational economics 
                     | 
                  60.60 | ISO/IEC JTC 1/SC 27 | 
| 
                     Information technology — Security techniques — Code of practice for information security controls based on ISO/IEC 27002 for cloud services 
                     | 
                  90.93 | ISO/IEC JTC 1/SC 27 | 
| 
                     Information security, cybersecurity and privacy protection — Information security controls based on ISO/IEC 27002 for cloud services 
                     | 
                  40.60 | ISO/IEC JTC 1/SC 27 | 
| 
                     Information technology — Security techniques — Code of practice for protection of personally identifiable information (PII) in public clouds acting as PII processors 
                     | 
                  95.99 | ISO/IEC JTC 1/SC 27 | 
| 
                     Information technology — Security techniques — Code of practice for protection of personally identifiable information (PII) in public clouds acting as PII processors 
                     | 
                  90.92 | ISO/IEC JTC 1/SC 27 | 
| 
                     Information security, cybersecurity and privacy protection – Guidelines for protection of personally identifiable information (PII) in public clouds acting as PII processors 
                     | 
                  50.00 | ISO/IEC JTC 1/SC 27 | 
| 
                     Information technology — Security techniques — Information security controls for the energy utility industry 
                     | 
                  95.99 | ISO/IEC JTC 1/SC 27 | 
| 
                     Information technology — Security techniques — Information security management guidelines based on ISO/IEC 27002 for process control systems specific to the energy utility industry 
                     | 
                  95.99 | ISO/IEC JTC 1/SC 27 | 
| 
                     Information security, cybersecurity and privacy protection — Information security controls for the energy utility industry 
                     | 
                  60.60 | ISO/IEC JTC 1/SC 27 | 
| 
                     Information technology — Security techniques — Competence requirements for information security management systems professionals 
                     | 
                  90.60 | ISO/IEC JTC 1/SC 27 | 
| 
                     Information technology — Security techniques — Competence requirements for information security management systems professionals — Amendment 1: Addition of ISO/IEC 27001:2013 clauses or subclauses to competence requirements 
                     | 
                  60.60 | ISO/IEC JTC 1/SC 27 | 
| 
                     Information technology — Guidance on information security management system processes 
                     | 
                  90.20 | ISO/IEC JTC 1/SC 27 | 
| 
                     Information technology — Security techniques — Mapping the revised editions of ISO/IEC 27001 and ISO/IEC 27002 
                     | 
                  95.99 | ISO/IEC JTC 1/SC 27 | 
| 
                     Information security, cyber security and privacy protection — Guidance on ISO/IEC 27002 attributes 
                     | 
                  40.60 | ISO/IEC JTC 1/SC 27 | 
| 
                     Information technology — Security techniques — Guidelines for information and communication technology readiness for business continuity 
                     | 
                  90.92 | ISO/IEC JTC 1/SC 27 | 
| 
                     Cybersecurity — Information and communication technology readiness for business continuity 
                     | 
                  60.00 | ISO/IEC JTC 1/SC 27 | 
| 
                     Information technology — Security techniques — Guidelines for cybersecurity 
                     | 
                  95.99 | ISO/IEC JTC 1/SC 27 | 
| 
                     Cybersecurity — Guidelines for Internet security 
                     | 
                  60.60 | ISO/IEC JTC 1/SC 27 | 
| 
                     Information technology — Security techniques — Network security — Part 1: Overview and concepts 
                     | 
                  95.99 | ISO/IEC JTC 1/SC 27 | 
| 
                     Information technology — Security techniques — Network security — Part 1: Overview and concepts 
                     | 
                  90.93 | ISO/IEC JTC 1/SC 27 | 
| 
                     Information technology — Security techniques — Network security — Part 2: Guidelines for the design and implementation of network security 
                     | 
                  90.60 | ISO/IEC JTC 1/SC 27 | 
| 
                     Information technology — Security techniques — Network security — Part 3: Reference networking scenarios — Threats, design techniques and control issues 
                     | 
                  90.60 | ISO/IEC JTC 1/SC 27 | 
| 
                     Information technology — Security techniques — Network security — Part 4: Securing communications between networks using security gateways 
                     | 
                  90.93 | ISO/IEC JTC 1/SC 27 | 
| 
                     Information technology — Security techniques — Network security — Part 5: Securing communications across networks using Virtual Private Networks (VPNs) 
                     | 
                  90.93 | ISO/IEC JTC 1/SC 27 | 
| 
                     Information technology — Security techniques — Network security — Part 6: Securing wireless IP network access 
                     | 
                  90.93 | ISO/IEC JTC 1/SC 27 | 
| 
                     Information technology – Network security — Part 7: Guidelines for network virtualization security 
                     | 
                  60.60 | ISO/IEC JTC 1/SC 27 | 
| 
                     Information technology — Security techniques — Application security — Part 1: Overview and concepts 
                     | 
                  90.93 | ISO/IEC JTC 1/SC 27 | 
| 
                     Information technology — Security techniques — Application security — Part 1: Overview and concepts — Technical Corrigendum 1 
                     | 
                  60.60 | ISO/IEC JTC 1/SC 27 | 
| 
                     Information technology — Security techniques — Application security — Part 2: Organization normative framework 
                     | 
                  90.93 | ISO/IEC JTC 1/SC 27 | 
| 
                     Information technology — Application security — Part 3: Application security management process 
                     | 
                  90.93 | ISO/IEC JTC 1/SC 27 | 
| 
                     Information technology — Security techniques — Application security — Part 5: Protocols and application security controls data structure 
                     | 
                  90.93 | ISO/IEC JTC 1/SC 27 | 
| 
                     Information technology — Security techniques — Application security — Part 6: Case studies 
                     | 
                  90.93 | ISO/IEC JTC 1/SC 27 | 
| 
                     Information technology — Application security — Part 7: Assurance prediction framework 
                     | 
                  90.93 | ISO/IEC JTC 1/SC 27 | 
| 
                     Information technology — Application security — Part 5-1: Protocols and application security controls data structure, XML schemas 
                     | 
                  90.60 | ISO/IEC JTC 1/SC 27 | 
| 
                     Information technology  — Security techniques — Information security incident management — Part 1: Principles of incident management 
                     | 
                  95.99 | ISO/IEC JTC 1/SC 27 | 
| 
                     Information technology — Information security incident management — Part 1: Principles and process 
                     | 
                  60.60 | ISO/IEC JTC 1/SC 27 | 
| 
                     Information technology  — Security techniques — Information security incident management — Part 2: Guidelines to plan and prepare for incident response 
                     | 
                  95.99 | ISO/IEC JTC 1/SC 27 | 
| 
                     Information technology — Information security incident management — Part 2: Guidelines to plan and prepare for incident response 
                     | 
                  60.60 | ISO/IEC JTC 1/SC 27 | 
| 
                     Information technology — Information security incident management — Part 3: Guidelines for ICT incident response operations 
                     | 
                  60.60 | ISO/IEC JTC 1/SC 27 | 
| 
                     Information technology — Information security incident management — Part 4: Coordination 
                     | 
                  60.60 | ISO/IEC JTC 1/SC 27 | 
| 
                     Information technology  — Security techniques — Information security incident management 
                     | 
                  95.99 | ISO/IEC JTC 1/SC 27 | 
| 
                     Information technology — Security techniques — Information security for supplier relationships — Part 1: Overview and concepts 
                     | 
                  95.99 | ISO/IEC JTC 1/SC 27 | 
| 
                     Cybersecurity — Supplier relationships — Part 1: Overview and concepts 
                     | 
                  60.60 | ISO/IEC JTC 1/SC 27 | 
| 
                     Information technology — Security techniques — Information security for supplier relationships — Part 2: Requirements 
                     | 
                  95.99 | ISO/IEC JTC 1/SC 27 | 
| 
                     Cybersecurity — Supplier relationships — Part 2: Requirements 
                     | 
                  60.60 | ISO/IEC JTC 1/SC 27 | 
| 
                     Information technology — Security techniques — Information security for supplier relationships — Part 3: Guidelines for information and communication technology supply chain security 
                     | 
                  95.99 | ISO/IEC JTC 1/SC 27 | 
| 
                     Cybersecurity — Supplier relationships — Part 3: Guidelines for hardware, software, and services supply chain security 
                     | 
                  60.60 | ISO/IEC JTC 1/SC 27 | 
| 
                     Information technology — Security techniques — Information security for supplier relationships — Part 4: Guidelines for security of cloud services 
                     | 
                  90.93 | ISO/IEC JTC 1/SC 27 | 
| 
                     Information technology — Security techniques — Guidelines for identification, collection, acquisition and preservation of digital evidence 
                     | 
                  90.60 | ISO/IEC JTC 1/SC 27 | 
| 
                     Information technology — Security techniques — Specification for digital redaction 
                     | 
                  90.93 | ISO/IEC JTC 1/SC 27 | 
| 
                     Information technology — Security techniques — Selection, deployment and operations of intrusion detection and prevention systems (IDPS) 
                     | 
                  90.93 | ISO/IEC JTC 1/SC 27 | 
| 
                     Information technology — Security techniques — Storage security 
                     | 
                  95.99 | ISO/IEC JTC 1/SC 27 | 
| 
                     Information technology — Security techniques — Storage security 
                     | 
                  60.60 | ISO/IEC JTC 1/SC 27 | 
| 
                     Information technology — Security techniques — Guidance on assuring suitability and adequacy of incident investigative method 
                     | 
                  90.93 | ISO/IEC JTC 1/SC 27 | 
| 
                     Information technology — Security techniques — Guidelines for the analysis and interpretation of digital evidence 
                     | 
                  90.93 | ISO/IEC JTC 1/SC 27 | 
| 
                     Information technology — Security techniques — Incident investigation principles and processes 
                     | 
                  90.93 | ISO/IEC JTC 1/SC 27 | 
| 
                     Information technology — Security techniques — Electronic discovery — Part 1: Overview and concepts 
                     | 
                  95.99 | ISO/IEC JTC 1/SC 27 | 
| 
                     Information technology — Electronic discovery — Part 1: Overview and concepts 
                     | 
                  90.93 | ISO/IEC JTC 1/SC 27 | 
| 
                     Information technology — Electronic discovery — Part 2: Guidance for governance and management of electronic discovery 
                     | 
                  90.60 | ISO/IEC JTC 1/SC 27 | 
| 
                     Information technology — Security techniques — Electronic discovery — Part 3: Code of practice for electronic discovery 
                     | 
                  95.99 | ISO/IEC JTC 1/SC 27 | 
| 
                     Information technology — Electronic discovery — Part 3: Code of practice for electronic discovery 
                     | 
                  90.20 | ISO/IEC JTC 1/SC 27 | 
| 
                     Information technology — Electronic discovery — Part 4: Technical readiness 
                     | 
                  60.60 | ISO/IEC JTC 1/SC 27 | 
| 
                     Information technology — Security techniques — Requirements for establishing virtualized roots of trust 
                     | 
                  60.60 | ISO/IEC JTC 1/SC 27 | 
| 
                     Cybersecurity — Security recommendations for establishing trusted connections between devices and services 
                     | 
                  60.60 | ISO/IEC JTC 1/SC 27 | 
| 
                     Cybersecurity — Artificial Intelligence — Guidance for addressing security threats to artificial intelligence systems 
                     | 
                  40.20 | ISO/IEC JTC 1/SC 27 | 
| 
                     Information technology — Public key infrastructure — Practices and policy framework 
                     | 
                  60.60 | ISO/IEC JTC 1/SC 27 | 
| 
                     Information technology — Cybersecurity — Overview and concepts 
                     | 
                  90.93 | ISO/IEC JTC 1/SC 27 | 
| 
                     Information security management — Guidelines for cyber-insurance 
                     | 
                  90.60 | ISO/IEC JTC 1/SC 27 | 
| 
                     Information technology — Security techniques — Cybersecurity and ISO and IEC Standards 
                     | 
                  90.92 | ISO/IEC JTC 1/SC 27 | 
| 
                     Cybersecurity — Guidance on using ISO and IEC standards in a Cybersecurity Framework 
                     | 
                  50.00 | ISO/IEC JTC 1/SC 27 | 
| 
                     Information technology, cybersecurity and privacy protection — Cybersecurity framework development guidelines 
                     | 
                  90.93 | ISO/IEC JTC 1/SC 27 | 
| 
                     Cybersecurity — IoT security and privacy — Guidelines 
                     | 
                  60.60 | ISO/IEC JTC 1/SC 27 | 
| 
                     Cybersecurity — IoT security and privacy — Device baseline requirements 
                     | 
                  60.60 | ISO/IEC JTC 1/SC 27 | 
| 
                     Cybersecurity – IoT security and privacy – Guidelines for IoT-domotics 
                     | 
                  60.60 | ISO/IEC JTC 1/SC 27 | 
| 
                     Cybersecurity — IoT security and privacy — Cybersecurity labelling framework for consumer IoT 
                     | 
                  40.60 | ISO/IEC JTC 1/SC 27 | 
| 
                     Information technology — Security techniques — Privacy engineering for system life cycle processes 
                     | 
                  60.60 | ISO/IEC JTC 1/SC 27 | 
| 
                     Information security, cybersecurity and privacy protection — Requirements for attribute-based unlinkable entity authentication 
                     | 
                  60.60 | ISO/IEC JTC 1/SC 27 | 
| 
                     Information security, cybersecurity and privacy protection — Security and privacy requirements for authentication using biometrics on mobile devices — Part 1: Local modes 
                     | 
                  60.60 | ISO/IEC JTC 1/SC 27 | 
| 
                     Information security, cybersecurity and privacy protection — Security and privacy requirements for authentication using biometrics on mobile devices — Part 2: Remote modes 
                     | 
                  50.20 | ISO/IEC JTC 1/SC 27 | 
| 
                     Information security, cybersecurity and privacy protection — Application of ISO 31000 for assessment of identity-related risk 
                     | 
                  60.60 | ISO/IEC JTC 1/SC 27 | 
| 
                     Information security, cybersecurity and privacy protection — Guidelines on personally identifiable information deletion 
                     | 
                  60.60 | ISO/IEC JTC 1/SC 27 | 
| 
                     Information security, cybersecurity and privacy protection — User-centric privacy preferences management framework 
                     | 
                  60.60 | ISO/IEC JTC 1/SC 27 | 
| 
                     Information security, cybersecurity and privacy protection — Application of ISO 31000:2018 for organizational privacy risk management 
                     | 
                  60.60 | ISO/IEC JTC 1/SC 27 | 
| 
                     Information security, cybersecurity and privacy protection – Privacy enhancing data de-identification framework 
                     | 
                  60.60 | ISO/IEC JTC 1/SC 27 | 
| 
                     Privacy technologies — Consent record information structure 
                     | 
                  90.92 | ISO/IEC JTC 1/SC 27 | 
| 
                     Information security, cybersecurity and privacy protection — Privacy operationalisation model and method for engineering (POMME) 
                     | 
                  60.60 | ISO/IEC JTC 1/SC 27 | 
| 
                     Information technology — Security techniques — Privacy guidelines for fintech services 
                     | 
                  60.60 | ISO/IEC JTC 1/SC 27 | 
| 
                     Privacy protection — Guidance on the use of models for privacy engineering 
                     | 
                  30.99 | ISO/IEC JTC 1/SC 27 | 
| 
                     Information security, cybersecurity and privacy protection — Guidelines on privacy preservation based on zero-knowledge proofs 
                     | 
                  40.20 | ISO/IEC JTC 1/SC 27 | 
| 
                     Information security, cybersecurity and privacy protection — Age assurance systems — Part 1: Framework 
                     | 
                  40.60 | ISO/IEC JTC 1/SC 27 | 
| 
                     Privacy protection — Privacy guidelines for smart cities 
                     | 
                  90.93 | ISO/IEC JTC 1/SC 27 | 
| 
                     Security techniques — Extension to ISO/IEC 27001 and ISO/IEC 27002 for privacy information management — Requirements and guidelines 
                     | 
                  90.92 | ISO/IEC JTC 1/SC 27 | 
| 
                     Information security, cybersecurity and privacy protection — Privacy information management systems — Requirements and guidance 
                     | 
                  50.00 | ISO/IEC JTC 1/SC 27 | 
| 
                     Information security, cybersecurity and privacy protection — Requirements for bodies providing audit and certification of privacy information management systems 
                     | 
                  60.00 | ISO/IEC JTC 1/SC 27 | 
| 
                     Health informatics — Information security management in health using ISO/IEC 27002 
                     | 
                  40.60 | ISO/TC 215 | 
| 
                     Information Security - Fully homomorphic encryption — Part 4: Mechanisms for arithmetic based on look-up table evaluation 
                     | 
                  40.00 | ISO/IEC JTC 1/SC 27 | 
| 
                     Information technology — Security techniques — Identity proofing 
                     | 
                  90.93 | ISO/IEC JTC 1/SC 27 | 
| 
                     Information technology — Security techniques — Privacy framework 
                     | 
                  95.99 | ISO/IEC JTC 1/SC 27 | 
| 
                     Information technology — Security techniques — Privacy framework — Amendment 1: Clarifications 
                     | 
                  95.99 | ISO/IEC JTC 1/SC 27 | 
| 
                     Information technology — Security techniques — Privacy framework 
                     | 
                  60.60 | ISO/IEC JTC 1/SC 27 | 
| 
                     Information technology — Security techniques — Privacy architecture framework 
                     | 
                  95.99 | ISO/IEC JTC 1/SC 27 | 
| 
                     Information technology — Security techniques — Privacy architecture framework 
                     | 
                  90.93 | ISO/IEC JTC 1/SC 27 | 
| 
                     Information technology — Security techniques — Entity authentication assurance framework 
                     | 
                  90.92 | ISO/IEC JTC 1/SC 27 | 
| 
                     Information security, cybersecurity and privacy protection — Verification of cryptographic protocols — Part 1: Framework 
                     | 
                  60.60 | ISO/IEC JTC 1/SC 27 | 
| 
                     Information technology — Security techniques — Verification of cryptographic protocols 
                     | 
                  95.99 | ISO/IEC JTC 1/SC 27 | 
| 
                     Information technology — Security techniques — Guidelines for privacy impact assessment 
                     | 
                  95.99 | ISO/IEC JTC 1/SC 27 | 
| 
                     Information technology — Security techniques — Guidelines for privacy impact assessment 
                     | 
                  60.60 | ISO/IEC JTC 1/SC 27 | 
| 
                     Information technology — Security techniques — A framework for access management 
                     | 
                  95.99 | ISO/IEC JTC 1/SC 27 | 
| 
                     Information technology — Security techniques — A framework for access management — Amendment 1 
                     | 
                  95.99 | ISO/IEC JTC 1/SC 27 | 
| 
                     Information technology — Security techniques — A framework for access management 
                     | 
                  60.60 | ISO/IEC JTC 1/SC 27 | 
| 
                     Information technology — Security techniques — Vulnerability disclosure 
                     | 
                  95.99 | ISO/IEC JTC 1/SC 27 | 
| 
                     Information technology — Security techniques — Vulnerability disclosure 
                     | 
                  90.93 | ISO/IEC JTC 1/SC 27 | 
| 
                     Information technology — Security techniques — Best practices for the provision and use of time-stamping services 
                     | 
                  90.93 | ISO/IEC JTC 1/SC 27 | 
| 
                     Information technology — Security techniques — Signcryption 
                     | 
                  90.93 | ISO/IEC JTC 1/SC 27 | 
| 
                     Information technology — Security techniques — Signcryption — Technical Corrigendum 1 
                     | 
                  60.60 | ISO/IEC JTC 1/SC 27 | 
| 
                     Information technology — Security techniques — Code of practice for personally identifiable information protection 
                     | 
                  90.92 | ISO/IEC JTC 1/SC 27 | 
| 
                     Information security, cybersecurity and privacy protection – Controls and guidance for personally identifiable information protection 
                     | 
                  40.20 | ISO/IEC JTC 1/SC 27 | 
| 
                     Information technology — Online privacy notices and consent 
                     | 
                  90.20 | ISO/IEC JTC 1/SC 27 | 
| 
                     Information technology — Security techniques — Privacy capability assessment model 
                     | 
                  90.93 | ISO/IEC JTC 1/SC 27 | 
| 
                     Information technology — Security techniques — Requirements for partially anonymous, partially unlinkable authentication. 
                     | 
                  90.93 | ISO/IEC JTC 1/SC 27 | 
| 
                     Information technology — Security techniques — Lightweight cryptography — Part 1: General 
                     | 
                  90.93 | ISO/IEC JTC 1/SC 27 | 
| 
                     Information technology — Security techniques — Lightweight cryptography — Part 1: General — Amendment 1 
                     | 
                  40.60 | ISO/IEC JTC 1/SC 27 | 
| 
                     Information technology — Security techniques — Lightweight cryptography — Part 2: Block ciphers 
                     | 
                  95.99 | ISO/IEC JTC 1/SC 27 | 
| 
                     Information security — Lightweight cryptography — Part 2: Block ciphers 
                     | 
                  90.93 | ISO/IEC JTC 1/SC 27 | 
| 
                     Information technology — Security techniques — Lightweight cryptography — Part 3: Stream ciphers 
                     | 
                  90.93 | ISO/IEC JTC 1/SC 27 | 
| 
                     Information technology — Security techniques — Lightweight cryptography — Part 4: Mechanisms using asymmetric techniques 
                     | 
                  90.93 | ISO/IEC JTC 1/SC 27 | 
| 
                     Information technology — Security techniques — Lightweight cryptography — Part 4: Mechanisms using asymmetric techniques — Amendment 1 
                     | 
                  60.60 | ISO/IEC JTC 1/SC 27 | 
| 
                     Information technology — Security techniques — Lightweight cryptography — Part 4: Mechanisms using asymmetric techniques — Amendment 2 
                     | 
                  20.60 | ISO/IEC JTC 1/SC 27 | 
| 
                     Information technology — Security techniques — Lightweight cryptography — Part 5: Hash-functions 
                     | 
                  90.93 | ISO/IEC JTC 1/SC 27 | 
| 
                     Information technology — Lightweight cryptography — Part 6: Message authentication codes (MACs) 
                     | 
                  90.93 | ISO/IEC JTC 1/SC 27 | 
| 
                     Information security — Lightweight cryptography — Part 7: Broadcast authentication protocols 
                     | 
                  90.93 | ISO/IEC JTC 1/SC 27 | 
| 
                     Information security — Lightweight cryptography — Part 8: Authenticated encryption 
                     | 
                  60.60 | ISO/IEC JTC 1/SC 27 | 
| 
                     Information security — Lightweight cryptography — Part 8: Authenticated encryption — Amendment 1 
                     | 
                  20.60 | ISO/IEC JTC 1/SC 27 | 
| 
                     Information Technology — Security Techniques — Physical Security Attacks, Mitigation Techniques and Security Requirements 
                     | 
                  90.20 | ISO/IEC JTC 1/SC 27 | 
| 
                     Information technology — Security techniques — Vulnerability handling processes 
                     | 
                  95.99 | ISO/IEC JTC 1/SC 27 | 
| 
                     Information technology — Security techniques — Vulnerability handling processes 
                     | 
                  90.93 | ISO/IEC JTC 1/SC 27 | 
| 
                     Information technology — Internet of things — Methodology for trustworthiness of IoT system/service 
                     | 
                  60.60 | ISO/IEC JTC 1/SC 41 | 
| 
                     Health software and health IT systems safety, effectiveness and security — Part 2-2: Guidance for the implementation, disclosure and communication of security needs, risks and controls 
                     | 
                  30.60 | ISO/TC 215 | 
По запросу ничего не найдено. Пожалуйста, попробуйте изменить настройки фильтра.