ISO/IEC 15408-2:2008
Superseded
A superseded Standard is one, which is fully replaced by another Standard, which is a new edition of the same Standard.
View Superseded by
Information technology — Security techniques — Evaluation criteria for IT security — Part 2: Security functional components
Hardcopy , PDF 1 User , PDF 3 Users , PDF 5 Users , PDF 9 Users
09-08-2022
French, English
19-08-2008
ISO/IEC 15408-2:2008 defines the content and presentation of the security functional requirements to be assessed in a security evaluation using ISO/IEC 15408. It contains a comprehensive catalogue of predefined security functional components that will meet most common security needs of the marketplace. These are organized using a hierarchical structure of classes, families and components, and supported by comprehensive user notes.
ISO/IEC 15408-2:2008 also provides guidance on the specification of customized security requirements where no suitable predefined security functional components exist.
DocumentType |
Standard
|
Pages |
235
|
ProductNote |
THIS STANDARD HAVE CORRECTED VERSION FOR ENGLISH 2011
|
PublisherName |
International Organization for Standardization
|
Status |
Superseded
|
SupersededBy | |
Supersedes |
Standards | Relationship |
NEN ISO/IEC 15408-2 : 2011 | Identical |
BS ISO/IEC 15408-2:2005 | Identical |
PN ISO/IEC 15408-2 : 2016 | Identical |
DIN EN ISO/IEC 15408-2:2020-12 | Identical |
ÖVE/ÖNORM EN ISO/IEC 15408-2:2020 12 15 | Identical |
UNI CEI EN ISO/IEC 15408-2:2020 | Identical |
CEI UNI EN ISO/IEC 15408-2:2020 | Identical |
PN-EN ISO/IEC 15408-2:2020-09 | Identical |
BS EN ISO/IEC 15408-2:2020 | Identical |
EN ISO/IEC 15408-2:2020 | Identical |
I.S. EN ISO/IEC 15408-2:2020 | Identical |
NEN-EN-ISO/IEC 15408-2:2020 | Identical |
SS-EN ISO/IEC 15408-2:2020 | Identical |
GOST R ISO/IEC 15408-2 : 2013 | Identical |
DS/EN ISO/IEC 15408-2:2020 | Identical |
DS ISO/IEC 15408-2 : 2008 | Identical |
UNE-EN ISO/IEC 15408-2:2020 | Identical |
DIN ISO/IEC 15408-2:2007-11 | Identical |
CSA ISO/IEC 15408-2 : 2009 | Identical |
BIS IS 14990-2 : 2006 | Identical |
CSA ISO/IEC 15408-2 : 2009 : R2014 | Identical |
CSA ISO/IEC 15408-2:09 (R2019) | Identical |
INCITS/ISO/IEC 15408-2 : 2013 | Identical |
BS ISO/IEC 15408-2:2008 | Identical |
SAC GB/T 18336-2 : 2001 | Identical |
DIN EN 419251-3:2013-06 | SECURITY REQUIREMENTS FOR DEVICE FOR AUTHENTICATION - PART 3: ADDITIONAL FUNCTIONALITY FOR SECURITY TARGETS |
AAMI IEC TIR 80001-2-2 : 2012 | APPLICATION OF RISK MANAGEMENT FOR IT-NETWORKS INCORPORATING MEDICAL DEVICES - PART 2-2: GUIDANCE FOR THE DISCLOSURE AND COMMUNICATION OF MEDICAL DEVICE SECURITY NEEDS, RISKS AND CONTROLS |
ISO/IEC 29128:2011 | Information technology — Security techniques — Verification of cryptographic protocols |
PD ISO/IEC TR 19791:2006 | Information technology. Security techniques. Security assessment of operational systems |
BS EN 419251-2:2013 | Security requirements for device for authentication Protection profile for extension for trusted channel to certificate generation application |
DIN EN ISO 27789:2013-06 | Health informatics - Audit trails for electronic health records (ISO 27789:2013) |
ISO/IEC TR 15446:2017 | Information technology Security techniques Guidance for the production of protection profiles and security targets |
ISO/IEC TR 20004:2015 | Information technology Security techniques Refining software vulnerability analysis under ISO/IEC 15408 and ISO/IEC 18045 |
BS EN 50436-6:2015 | Alcohol interlocks. Test methods and performance requirements Data security |
BS EN 419211-6:2014 | Protection profiles for secure signature creation device Extension for device with key import and trusted channel to signature creation application |
CAN/CSA-IEC 62443-2-1:17 | Industrial communication networks — Network and system security — Part 2-1: Establishing an industrial automation and control system security program (Adopted IEC 62443-2-1:2010, first edition, 2010-11) | Réseaux industriels de communication — Sécurité dans les réseaux et les systèmes — Partie 2-1 : Établissement d’un programme de sécurité pour les systèmes d’automatisation et de commande industrielles (norme IEC 62443-2-1:2010 adoptée, première édition, 2010-11) |
05/30144069 DC : DRAFT DEC 2005 | ISO 13491-1 - BANKING - SECURE CRYPTOGRAPHIC DEVICES (RETAIL) - PART 1: CONCEPTS, REQUIREMENTS AND EVALUATION METHODS |
UNI CEN ISO/TS 25110 : 2013 | ELECTRONIC FEE COLLECTION - INTERFACE DEFINITION FOR ON-BOARD ACCOUNT USING INTEGRATED CIRCUIT CARD (ICC) |
PD CEN ISO/TS 14907-1:2015 | Electronic fee collection. Test procedures for user and fixed equipment Description of test procedures |
ISO/IEC TS 19249:2017 | Information technology — Security techniques — Catalogue of architectural and design principles for secure products, systems and applications |
BS ISO/IEC 30107-3:2017 | Information technology. Biometric presentation attack detection Testing and reporting |
PREN 419221-5 : DRAFT 2016 | PROTECTION PROFILES FOR TRUST SERVICE PROVIDER CRYPTOGRAPHIC MODULES - PART 5: CRYPTOGRAPHIC MODULE FOR TRUST SERVICES |
BS EN ISO 27789:2013 | Health informatics. Audit trails for electronic health records |
13/30293476 DC : 0 | BS EN 62601 - INDUSTRIAL COMMUNICATION NETWORKS - WIRELESS COMMUNICATION NETWORK AND COMMUNICATION PROFILES - WIA-PA |
10/30156465 DC : DRAFT DEC 2010 | BS EN ISO 27789 - HEALTH INFORMATICS - AUDIT TRAILS FOR ELECTRONIC HEALTH RECORDS |
EN ISO/TS 17574 : 2004 | ROAD TRANSPORT AND TRAFFIC TELEMATICS - ELECTRONIC FEE COLLECTION (EFC) - GUIDELINES FOR EFC SECURITY PROTECTION PROFILES |
S.R. CEN ISO/TS 14907-1:2015 | ELECTRONIC FEE COLLECTION - TEST PROCEDURES FOR USER AND FIXED EQUIPMENT - PART 1: DESCRIPTION OF TEST PROCEDURES (ISO/TS 14907-1:2015) |
07/30162803 DC : 0 | BS ISO/IEC 18045 - INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - METHODOLOGY FOR IT SECURITY EVALUATION |
CSA ISO/IEC TR 14516 : 2004 | INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - GUIDELINES FOR THE USE AND MANAGEMENT OF TRUSTED THIRD PARTY SERVICES |
DD IEC PAS 62601 : DRAFT MAR 2009 | INDUSTRIAL COMMUNICATION NETWORKS - FIELDBUS SPECIFICATIONS - WIA-PA COMMUNICATION NETWORK AND COMMUNICATION PROFILE |
CSA TELECOM ORGANIZATIONS PACKAGE : 2018 | CONSISTS OF CAN/CSA-ISO/IEC 27000:18 - INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - INFORMATION SECURITY MANAGEMENT SYSTEMS - OVERVIEW AND VOCABULARY; CAN/CSA-ISO/IEC 27001:14, INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - INFORMATION SECURITY MANAGEMENT SYSTEMS - REQUIREMENTS; CAN/CSA-ISO/IEC 27002:15 - INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - CODE OF PRACTICE FOR |
I.S. EN 419212-4:2018 | APPLICATION INTERFACE FOR SECURE ELEMENTS FOR ELECTRONIC IDENTIFICATION, AUTHENTICATION AND TRUSTED SERVICES - PART 4: PRIVACY SPECIFIC PROTOCOLS |
CSA ISO/IEC TR 14516 : 2004 : R2012 | INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - GUIDELINES FOR THE USE AND MANAGEMENT OF TRUSTED THIRD PARTY SERVICES |
INCITS/ISO/IEC 15945 : 2002 | INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - SPECIFICATION OF TTP SERVICES TO SUPPORT THE APPLICATION OF DIGITAL SIGNATURES |
S.R. CEN ISO/TS 14441:2013 | HEALTH INFORMATICS - SECURITY AND PRIVACY REQUIREMENTS OF EHR SYSTEMS FOR USE IN CONFORMITY ASSESSMENT (ISO/TS 14441:2013) |
ANSI X9.117 : 2012 | SECURE REMOTE ACCESS - MUTUAL AUTHENTICATION |
ISO/IEC TR 15443-3:2007 | Information technology Security techniques A framework for IT security assurance Part 3: Analysis of assurance methods |
S.R. CEN/TS 419221-2:2016 | PROTECTION PROFILES FOR TSP CRYPTOGRAPHIC MODULES - PART 2: CRYPTOGRAPHIC MODULE FOR CSP SIGNING OPERATIONS WITH BACKUP |
INCITS/ISO/IEC 15408-3 : 2013(R2018) | INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - EVALUATION CRITERIA FOR IT SECURITY - PART 3: SECURITY ASSURANCE REQUIREMENTS |
I.S. EN 50436-6:2015 | ALCOHOL INTERLOCKS - TEST METHODS AND PERFORMANCE REQUIREMENTS - PART 6: DATA SECURITY |
AAMI/IEC TIR80001-2-3:2012 | APPLICATION OF RISK MANAGEMENT FOR IT-NETWORKS INCORPORATING MEDICAL DEVICES - PART 2-3: GUIDANCE FOR WIRELESS NETWORKS |
PD CEN ISO/TS 25110:2013 | Electronic fee collection. Interface definition for on-board account using integrated circuit card (ICC) |
EN IEC 62443-4-1:2018 | Security for industrial automation and control systems - Part 4-1: Secure product development lifecycle requirements |
I.S. EN ISO 27799:2016 | HEALTH INFORMATICS - INFORMATION SECURITY MANAGEMENT IN HEALTH USING ISO/IEC 27002 |
16/30345816 DC : 0 | BS EN 419212-4 - APPLICATION INTERFACE FOR SECURE ELEMENTS FOR ELECTRONIC IDENTIFICATION, AUTHENTICATION AND TRUSTED SERVICES - PART 4: PRIVACY SPECIFIC PROTOCOLS |
I.S. CWA 14172-7:2004 | EESSI CONFORMITY ASSESSMENT GUIDANCE - PART 7: CRYPTOGRAPHIC MODULES USED BY CERTIFICATION SERVICE PROVIDERS FOR SIGNING OPERATIONS AND KEY GENERATION SERVICES |
EN ISO 25110:2017 | Electronic fee collection - Interface definition for on-board account using integrated circuit card (ICC) (ISO 25110:2017) |
ISO/IEC 15945:2002 | Information technology — Security techniques — Specification of TTP services to support the application of digital signatures |
CEN ISO/TS 17574:2017 | Electronic fee collection - Guidelines for security protection profiles (ISO/TS 17574:2017) |
CEN ISO/TS 25110:2013 | Electronic fee collection - Interface definition for on-board account using integrated circuit card (ICC) (ISO/TS 25110:2013) |
EN 50436-6:2015 | Alcohol interlocks - Test methods and performance requirements - Part 6: Data security |
EN 62601:2016 | Industrial networks - Wireless communication network and communication profiles - WIA-PA |
EN 319 421 : 1.1.1 | ELECTRONIC SIGNATURES AND INFRASTRUCTURES (ESI); POLICY AND SECURITY REQUIREMENTS FOR TRUST SERVICE PROVIDERS ISSUING TIME-STAMPS |
UNE-EN 419211-2:2016 | Protection profiles for secure signature creation device - Part 2: Device with key generation |
TR 102 780 : 1.1.1 | METHODS FOR TESTING AND SPECIFICATION (MTS); SECURITY; GUIDE TO THE USE OF METHODS IN DEVELOPMENT OF ETSI SECURITY STANDARDS |
S.R. CEN/TS 419221-3:2016 | PROTECTION PROFILES FOR TSP CRYPTOGRAPHIC MODULES - PART 3: CRYPTOGRAPHIC MODULE FOR CSP KEY GENERATION SERVICES |
04/30091046 DC : DRAFT DEC 2004 | ISO/IEC 19790 - INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - SECURITY REQUIREMENTS FOR CRYPTOGRAPHIC MODULES |
16/30329605 DC : 0 | BS ISO/IEC 30107-3 - INFORMATION TECHNOLOGY - BIOMETRIC PRESENTATION ATTACK DETECTION - PART 3: TESTING AND REPORTING |
INCITS/ISO/IEC 15292 : 2001 : R2007 | INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - PROTECTION PROFILE REGISTRATION PROCEDURES |
ISO 13491-2:2017 | Financial services — Secure cryptographic devices (retail) — Part 2: Security compliance checklists for devices used in financial transactions |
BS ISO/IEC 15408-1:2009 | Information technology. Security techniques. Evaluation criteria for IT Security Part 1: Introduction and general model |
ISO/IEC 30107-3:2017 | Information technology — Biometric presentation attack detection — Part 3: Testing and reporting |
08/30091038 DC : DRAFT JUNE 2008 | ISO/IEC 19792 - INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - SECURITY EVALUATION OF BIOMETRICS |
ISO/IEC 15026-1:2013 | Systems and software engineering Systems and software assurance Part 1: Concepts and vocabulary |
TS 102 573 : 2.1.1 | ELECTRONIC SIGNATURES AND INFRASTRUCTURES (ESI); POLICY REQUIREMENTS FOR TRUST SERVICE PROVIDERS SIGNING AND/OR STORING DATA OBJECTS |
17/30351770 DC : 0 | BS EN ISO 25110 - ELECTRONIC FEE COLLECTION - INTERFACE DEFINITION FOR ON-BOARD ACCOUNT USING INTEGRATED CIRCUIT CARD (ICC) |
DIN EN 419211-2:2013-12 | Protection profiles for secure signature creation device - Part 2: Device with key generation |
BS ISO/IEC 19792:2009 | Information technology. Security techniques. Security evaluation of biometrics |
PD IEC/TR 80001-2-9:2017 | Application of risk management for it-networks incorporating medical devices Application guidance. Guidance for use of security assurance cases to demonstrate confidence in IEC TR 80001-2-2 security capabilities |
BS EN 419251-1:2013 | Security requirements for device for authentication Protection profile for core functionality |
ISO/IEC 15408-3:2008 | Information technology — Security techniques — Evaluation criteria for IT security — Part 3: Security assurance components |
EG 202 549 : 1.1.1 | TELECOMMUNICATIONS AND INTERNET CONVERGED SERVICES AND PROTOCOLS FOR ADVANCED NETWORKING (TISPAN); DESIGN GUIDE; APPLICATION OF SECURITY COUNTERMEASURES TO SERVICE CAPABILITIES |
ISO/IEC 29167-14:2015 | Information technology Automatic identification and data capture techniques Part 14: Crypto suite AES OFB security services for air interface communications |
08/30133461 DC : 0 | ISO/IEC 27003 - INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - INFORMATION SECURITY MANAGEMENT SYSTEM IMPLEMENTATION GUIDANCE |
EN 319 411-2 : 2.2.2 | ELECTRONIC SIGNATURES AND INFRASTRUCTURES (ESI); POLICY AND SECURITY REQUIREMENTS FOR TRUST SERVICE PROVIDERS ISSUING CERTIFICATES; PART 2: REQUIREMENTS FOR TRUST SERVICE PROVIDERS ISSUING EU QUALIFIED CERTIFICATES |
TR 187 013 : 3.1.1 | TELECOMMUNICATIONS AND INTERNET CONVERGED SERVICES AND PROTOCOLS FOR ADVANCED NETWORKING (TISPAN); FEASIBILITY STUDY ON IPTV SECURITY ARCHITECTURE |
ISO/IEC 29167-12:2015 | Information technology Automatic identification and data capture techniques Part 12: Crypto suite ECC-DH security services for air interface communications |
13/30277648 DC : 0 | BS EN 50436-6 - ALCOHOL INTERLOCKS - TEST METHODS AND PERFORMANCE REQUIREMENTS - PART 6: DATA SECURITY |
07/30169475 DC : 0 | BS ISO 15782-1 - CERTIFICATE MANAGEMENT FOR FINANCIAL SERVICES - PART 1: PUBLIC KEY CERTIFICATES |
CSA ISO/IEC 15292 : 2004 | INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - PROTECTION PROFILE REGISTRATION PROCEDURES |
DD ISO/TS 25237:2008 | Health informatics. Pseudonymization |
BS ISO/IEC 15945:2002 | Information technology. Security techniques. Specification of TTP services to support the application of digital signatures |
BS ISO 13491-2:2017 | Financial services. Secure cryptographic devices (retail) Security compliance checklists for devices used in financial transactions |
CSA ISO/IEC 15408-1 : 2010 | INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - EVALUATION CRITERIA FOR IT SECURITY - PART 1: INTRODUCTION AND GENERAL MODEL |
CAN/CSA-ISO/IEC 15945-04 (R2017) | Information Technology - Security Techniques - Specification of TTP Services to Support the Application of Digital Signatures (Adopted ISO/IEC 15945:2002, first edition, 2002-02-01) |
CSA ISO/IEC TR 15446 : 2010 | INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - GUIDE FOR THE PRODUCTION OF PROTECTION PROFILES AND SECURITY TARGETS |
IEEE DRAFT 1074 : 0 | DEVELOPING SOFTWARE LIFE CYCLE PROCESSES |
INCITS/ISO/IEC 15408-1 : 2012 | INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - EVALUATION CRITERIA FOR IT SECURITY - PART 1: INTRODUCTION AND GENERAL MODEL |
TR 185 012 : 3.1.1 | TELECOMMUNICATIONS AND INTERNET CONVERGED SERVICES AND PROTOCOLS FOR ADVANCED NETWORKING (TISPAN); FEASIBILITY STUDY OF SECURITY MECHANISMS FOR CUSTOMER PREMISES NETWORKS CONNECTED TO TISPAN NGN |
IEC 62443-2-1:2010 | Industrial communication networks - Network and system security - Part 2-1: Establishing an industrial automation and control system security program |
UNE-ISO/IEC TR 19791:2013 IN | Information technology. Security techniques. Security assessment of operational systems |
UNE 71512:2011 | Applications with the Spanish DNIe. Electronic signature creation and verification. Type 2 for personal computers, and with a Evaluation Assurance Level «EAL1» |
BIS IS 14990-1 : 2012 | INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - EVALUATION CRITERIA FOR IT SECURITY - PART 1: INTRODUCTION AND GENERAL MODEL |
I.S. CWA 14365-1:2004 | GUIDE ON THE USE OF ELECTRONIC SIGNATURES - PART 1: LEGAL AND TECHNICAL ASPECTS |
EG 202 387 : 1.1.1 | TELECOMMUNICATIONS AND INTERNET CONVERGED SERVICES AND PROTOCOLS FOR ADVANCED NETWORKING (TISPAN); SECURITY DESIGN GUIDE; METHOD FOR APPLICATION OF COMMON CRITERIA TO ETSI DELIVERABLES |
TR 102 420 : 1.1.1 | TELECOMMUNICATIONS AND INTERNET CONVERGED SERVICES AND PROTOCOLS FOR ADVANCED NETWORKING (TISPAN); REVIEW OF ACTIVITY ON SECURITY |
I.S. EN 62601:2016 | INDUSTRIAL NETWORKS - WIRELESS COMMUNICATION NETWORK AND COMMUNICATION PROFILES - WIA-PA |
PREN 419241-2 : DRAFT 2017 | TRUSTWORTHY SYSTEMS SUPPORTING SERVER SIGNING - PART 2: PROTECTION PROFILE FOR QSCD FOR SERVER SIGNING |
UNI CEN ISO/TS 14441 : 2014 | HEALTH INFORMATICS - SECURITY AND PRIVACY REQUIREMENTS OF HER SYSTEMS FOR USE IN CONFORMITY ASSESSMENT |
UNE 71511:2011 | Applications with the Spanish DNIe. Electronic signature creation and verification. Type 1 for IT platforms that allow an exclusive control of signer’s interfaces, and with a Evaluation Assurance Level «EAL3» |
I.S. CWA 14172-3:2004 | EESSI CONFORMITY ASSESSMENT GUIDANCE - PART 3: TRUSTWORTHY SYSTEMS MANAGING CERTIFICATES FOR ELECTRONIC SIGNATURES |
UNE 71513:2011 | Applications with the Spanish DNIe. Electronic signature creation and verification. Type 2 for personal computers, and with a Evaluation Assurance Level «EAL3» |
UNE-ISO/IEC TR 15446:2013 IN | Information technology. Security techniques. Guide for the production of Protection Profiles and Security Targets |
TR 187 020 : 1.1.1 | RADIO FREQUENCY IDENTIFICATION (RFID); COORDINATED ESO RESPONSE TO PHASE 1 OF EU MANDATE M436 |
CSA ISO/IEC 15026-1 : 2015 | SYSTEMS AND SOFTWARE ENGINEERING - SYSTEMS AND SOFTWARE ASSURANCE - PART 1: CONCEPTS AND VOCABULARY |
I.S. CWA 14355:2004 | GUIDELINES FOR THE IMPLEMENTATION OF SECURE SIGNATURE-CREATION DEVICES |
DIN EN 419251-2:2013-06 | SECURITY REQUIREMENTS FOR DEVICE FOR AUTHENTICATION - PART 2: PROTECTION PROFILE FOR EXTENSION FOR TRUSTED CHANNEL TO CERTIFICATE GENERATION APPLICATION |
GS NFV-SEC 006 : 1.1.1 | NETWORK FUNCTIONS VIRTUALISATION (NFV); SECURITY GUIDE; REPORT ON SECURITY ASPECTS AND REGULATORY CONCERNS |
ISO/IEC 29167-11:2014 | Information technology — Automatic identification and data capture techniques — Part 11: Crypto suite PRESENT-80 security services for air interface communications |
04/30040790 DC : DRAFT MARCH 2004 | ISO/IEC DTR 15443-2 - INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - A FRAMEWORK FOR IT SECURITY ASSURANCE - PART 2 - ASSURANCE METHODS |
BS EN 419211-2:2013 | Protection profiles for secure signature creation device Device with key generation |
GS NFV-SEC 014 : 3.1.1 | NETWORK FUNCTIONS VIRTUALISATION (NFV) RELEASE 3; NFV SECURITY; SECURITY SPECIFICATION FOR MANO COMPONENTS AND REFERENCE POINTS |
DIN CEN ISO/TS 14907-1;DIN SPEC 91192:2015-12 | ELECTRONIC FEE COLLECTION - TEST PROCEDURES FOR USER AND FIXED EQUIPMENT - PART 1: DESCRIPTION OF TEST PROCEDURES (ISO/TS 14907-1:2015) |
INCITS/ISO 19153 : 2014 | GEOGRAPHIC INFORMATION - GEOSPATIAL DIGITAL RIGHTS MANAGEMENT REFERENCE MODEL (GEODRM RM) |
DIN EN 62601:2016-10 | Industrial networks - Wireless communication network and communication profiles - WIA-PA (IEC 62601:2015); English version EN 62601:2016 |
15/30285708 DC : 0 | BS EN ISO 25237 - HEALTH INFORMATICS - PSEUDONYMISATION |
DIN EN 419251-1:2013-05 | SECURITY REQUIREMENTS FOR DEVICE FOR AUTHENTICATION - PART 1: PROTECTION PROFILE FOR CORE FUNCTIONALITY |
BS ISO/IEC TR 15942:2000 | Information technology. Programming languages. Guide for the use of the Ada programming language in high integrity systems |
BS ISO/IEC 15408-3:2008 | Information technolgy. Security techniques. Evaluation criteria for IT security Security assurance components |
ES 202 382 : 1.1.1 | TELECOMMUNICATIONS AND INTERNET CONVERGED SERVICES AND PROTOCOLS FOR ADVANCED NETWORKING (TISPAN); SECURITY DESIGN GUIDE; METHOD AND PROFORMA FOR DEFINING PROTECTION PROFILES |
ISO/IEC TR 19791:2010 | Information technology Security techniques Security assessment of operational systems |
TS 187 001 : 3.9.1 | NETWORK TECHNOLOGIES (NTECH); NGN SECURITY (SEC); REQUIREMENTS |
SR 002 564 : 2.0.0 | APPLICABILITY OF EXISTING ETSI AND ETSI/3GPP DELIVERABLES TO EHEALTH |
BS IEC 62443-2-1 : 2010 | INDUSTRIAL COMMUNICATION NETWORKS - NETWORK AND SYSTEM SECURITY - PART 2-1: ESTABLISHING AN INDUSTRIAL AUTOMATION AND CONTROL SYSTEM SECURITY PROGRAM |
CSA ISO/IEC TR 15942 : 2004 : R2014 | INFORMATION TECHNOLOGY - PROGRAMMING LANGUAGES - GUIDE FOR THE USE OF THE ADA PROGRAMMING LANGUAGE IN HIGH INTEGRITY SYSTEMS |
PD ISO/IEC TR 20004:2015 | Information technology. Security techniques. Refining software vulnerability analysis under ISO/IEC 15408 and ISO/IEC 18045 |
BS EN 419251-3:2013 | Security requirements for device for authentication Additional functionality for security targets |
07/30162799 DC : 0 | BS ISO/IEC 15408-3 - INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - EVALUATION CRITERIA FOR IT SECURITY - PART 3: SECURITY ASSURANCE REQUIREMENTS |
07/30161079 DC : 0 | BS EN 14890-1 - APPLICATION INTERFACE FOR SMART CARDS USED AS SECURE SIGNATURE CREATION DEVICES - PART 1: BASIC SERVICES |
ISA 99.02.01 : 2009 | SECURITY FOR INDUSTRIAL AUTOMATION AND CONTROL SYSTEMS: ESTABLISHING AN INDUSTRIAL AUTOMATION AND CONTROL SYSTEMS SECURITY PROGRAM |
07/30143790 DC : 0 | BS ISO/IEC 24759 - INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - TEST REQUIREMENTS FOR CRYPTOGRAPHIC MODULES |
10/30192143 DC : 0 | BS ISO/IEC 29128 - INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - VERIFICATION OF CRYPTOGRAPHIC PROTOCOLS |
07/30107763 DC : 0 | BS ISO/IEC 24713-2 - INFORMATION TECHNOLOGY - BIOMETRIC PROFILES FOR INTEROPERABILITY AND DATA INTERCHANGE - PART 2: PHYSICAL ACCESS CONTROL FOR EMPLOYEES AT AIRPORTS |
I.S. EN 419251-2:2013 | SECURITY REQUIREMENTS FOR DEVICE FOR AUTHENTICATION - PART 2: PROTECTION PROFILE FOR EXTENSION FOR TRUSTED CHANNEL TO CERTIFICATE GENERATION APPLICATION |
IEC PAS 62601:2009 | Industrial communication networks - Fieldbus specifications - WIA-PA communication network and communication profile |
CSA ISO/IEC 15408-3 : 2009 | INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - EVALUATION CRITERIA FOR IT SECURITY - PART 3: SECURITY ASSURANCE COMPONENTS |
CAN/CSA-ISO/IEC 29167-12:16 | Information technology Automatic identification and data capture techniques Part 12: Crypto suite ECC-DH security services for air interface communication (Adopted ISO/IEC 29167-12:2015, first edition, 2015-05-15) |
SAE J 3061 : 2016 | CYBERSECURITY GUIDEBOOK FOR CYBER-PHYSICAL VEHICLE SYSTEMS |
I.S. EN ISO 25237:2017 | HEALTH INFORMATICS - PSEUDONYMIZATION (ISO 25237:2017) |
AAMI/IEC TIR80001-2-8:2016 | APPLICATION OF RISK MANAGEMENT FOR IT NETWORKS INCORPORATING MEDICAL DEVICES - PART 2-8: APPLICATION GUIDANCE - GUIDANCE ON STANDARDS FOR ESTABLISHING THE SECURITY CAPABILITIES IDENTIFIED IN IEC 80001-2-2 |
TR 187 011 : 2.1.1 | TELECOMMUNICATIONS AND INTERNET CONVERGED SERVICES AND PROTOCOLS FOR ADVANCED NETWORKING (TISPAN); NGN SECURITY; APPLICATION OF ISO-15408-2 REQUIREMENTS TO ETSI STANDARDS - GUIDE, METHOD AND APPLICATION WITH EXAMPLES |
PD CEN/TS 419221-2:2016 | Protection Profiles for TSP cryptographic modules Cryptographic module for CSP signing operations with backup |
ISO/IEC 19792:2009 | Information technology Security techniques Security evaluation of biometrics |
I.S. CWA 14169:2004 | SECURE SIGNATURE-CREATION DEVICES 'EAL 4+' |
TR 102 572 : 1.1.1 | BEST PRACTICES FOR HANDLING ELECTRONIC SIGNATURES AND SIGNED DATA FOR DIGITAL ACCOUNTING |
UNE 71510:2011 | Applications with the Spanish DNIe. Electronic signature creation and verification. Type 1 for IT platforms that allow an exclusive control of signer’s interfaces, and with a Evaluation Assurance Level «EAL1». |
IEC TR 80001-2-8:2016 | Application of risk management for IT-networks incorporating medical devices - Part 2-8: Application guidance - Guidance on standards for establishing the security capabilities identified in IEC TR 80001-2-2 |
TS 102 165-1 : 4.2.3 | CYBER; METHODS AND PROTOCOLS; PART 1: METHOD AND PRO FORMA FOR THREAT, VULNERABILITY, RISK ANALYSIS (TVRA) |
UNE EN 419211-2 : 2016 | PROTECTION PROFILES FOR SECURE SIGNATURE CREATION DEVICE - PART 2: DEVICE WITH KEY GENERATION |
UNI EN ISO 27789 : 2013 | HEALTH INFORMATICS - AUDIT TRAILS FOR ELECTRONIC HEALTH RECORDS |
UNI EN 419211-6 : 2014 | PROTECTION PROFILES FOR SECURE SIGNATURE CREATION DEVICE - PART 6: EXTENSION FOR DEVICE WITH KEY IMPORT AND TRUSTED CHANNEL TO SIGNATURE CREATION APPLICATION |
ISO/TS 25110:2013 | Electronic fee collection Interface definition for on-board account using integrated circuit card (ICC) |
UNI EN 419212-1 : 2015 | APPLICATION INTERFACE FOR SMART CARDS USED AS SECURE SIGNATURE CREATION DEVICES - PART 1: BASIC SERVICES |
I.S. EN 419211-6:2014 | PROTECTION PROFILES FOR SECURE SIGNATURE CREATION DEVICE - PART 6: EXTENSION FOR DEVICE WITH KEY IMPORT AND TRUSTED CHANNEL TO SIGNATURE CREATION APPLICATION |
PD IEC/TR 80001-2-3:2012 | Application of risk management for IT-networks incorporating medical devices Guidance for wireless networks |
PD ISO/IEC TR 15446:2009 | Information technology. Security techniques. Guide for the production of protection profiles and security targets |
PD IEC/TR 80001-2-8:2016 | Application of risk management for IT-networks incorporating medical devices Application guidance. Guidance on standards for establishing the security capabilities identified in IEC TR 80001-2-2 |
TS 102 158 : 1.1.1 | ELECTRONIC SIGNATURES AND INFRASTRUCTURES (ESI); POLICY REQUIREMENTS FOR CERTIFICATION SERVICE PROVIDERS ISSUING ATTRIBUTE CERTIFICATES USABLE WITH QUALIFIED CERTIFICATES |
BS IEC 62601:2011 | Industrial communication networks. Fieldbus specifications. WIA-PA communication network and communication profile |
08/30182164 DC : DRAFT MAY 2008 | BS ISO 31000 - RISK MANAGEMENT - PRINCIPLES AND GUIDELINES ON IMPLEMENTATION |
I.S. EN ISO 25110:2017 | ELECTRONIC FEE COLLECTION - INTERFACE DEFINITION FOR ON-BOARD ACCOUNT USING INTEGRATED CIRCUIT CARD (ICC) (ISO 25110:2017) |
CSA INFORMATION SECURITY PACKAGE : 2018 | CONSISTS OF CAN/CSA-ISO/IEC 27000:18 - INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - INFORMATION SECURITY MANAGEMENT SYSTEMS - OVERVIEW AND VOCABULARY; CAN/CSA-ISO/IEC 27001:14, INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - INFORMATION SECURITY MANAGEMENT SYSTEMS - REQUIREMENTS; CAN/CSA-ISO/IEC 27002:15 - INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - CODE OF PRACTICE FOR INFORMATION |
TS 102 181 : 1.2.1 | EMERGENCY COMMUNICATIONS (EMTEL); REQUIREMENTS FOR COMMUNICATION BETWEEN AUTHORITIES/ORGANIZATIONS DURING EMERGENCIES |
BS ISO/IEC 29128:2011 | Information technology. Security techniques. Verification of cryptographic protocols |
BIS IS/ISO 21188 : 2006 | PUBLIC KEY INFRASTRUCTURE FOR FINANCIAL SERVICES - PRACTICES AND POLICY FRAMEWORK |
PD IEC/TR 80001-2-2:2012 | Application of risk management for IT-networks incorporating medical devices Guidance for the disclosure and communication of medical device security needs, risks and controls |
S.R. CEN/TS 419221-4:2016 | PROTECTION PROFILES FOR TSP CRYPTOGRAPHIC MODULES - PART 4: CRYPTOGRAPHIC MODULE FOR CSP SIGNING OPERATIONS WITHOUT BACKUP |
BS ISO/IEC 15026-1:2013 | Systems and software engineering. Systems and software assurance Concepts and vocabulary |
BS ISO/IEC TR 14516:2002 | Information technology. Security techniques. Guidelines for the use and management of trusted third party services |
UNI EN 419211-2 : 2014 | PROTECTION PROFILES FOR SECURE SIGNATURE CREATION DEVICE - PART 2: DEVICE WITH KEY GENERATION |
UNI EN 419251-3 : 2013 | SECURITY REQUIREMENTS FOR DEVICE FOR AUTHENTICATION - PART 3: ADDITIONAL FUNCTIONALITY FOR SECURITY TARGETS |
UNI EN 419251-1 : 2013 | SECURITY REQUIREMENTS FOR DEVICE FOR AUTHENTICATION - PART 1: PROTECTION PROFILE FOR CORE FUNCTIONALITY |
PD ISO/IEC/TR 19249:2017 | Information technology. Security techniques Catalogue of architectural and design principles for secure products, systems and applications |
DIN EN ISO 25237:2015-10 (Draft) | HEALTH INFORMATICS - PSEUDONYMIZATION (ISO 25237:2017) |
17/30346588 DC : 0 | BS EN 419221-5 - PROTECTION PROFILES FOR TRUST SERVICE PROVIDER CRYPTOGRAPHIC MODULES - PART 5: CRYPTOGRAPHIC MODULE FOR TRUST SERVICES |
TR 187 002 : 3.1.1 | TELECOMMUNICATIONS AND INTERNET CONVERGED SERVICES AND PROTOCOLS FOR ADVANCED NETWORKING (TISPAN); TISPAN NGN SECURITY (NGN SEC); THREAT, VULNERABILITY AND RISK ANALYSIS |
09/30207165 DC : 0 | BS EN 62601 - INDUSTRIAL COMMUNICATION NETWORKS - FIELDBUS SPECIFICATIONS - WIA-PA COMMUNICATION NETWORK AND COMMUNICATION PROFILE |
DD CEN ISO/TS 25110:2008 | Electronic fee collection. Interface definition for on-board account using integrated circuit card (ICC) |
CSA ISO/IEC 15408-1 : 2010 : R2015 | INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - EVALUATION CRITERIA FOR IT SECURITY - PART 1: INTRODUCTION AND GENERAL MODEL |
03/652682 DC : DRAFT NOV 2003 | BS ISO/IEC TR 15446 - INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - GUIDE FOR THE PRODUCTION OF PROTECTION PROFILES AND SECURITY TARGETS |
CSA ISO/IEC TR 15446 : 2010 : R2015 | INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - GUIDE FOR THE PRODUCTION OF PROTECTION PROFILES AND SECURITY TARGETS |
07/30161082 DC : 0 | BS EN 14890-2 - APPLICATION INTERFACE FOR SMART CARDS USED AS SECURE SIGNATURE CREATION DEVICES - PART 2: ADDITIONAL SERVICES |
SR 019 020 : 1.1.2 | THE FRAMEWORK FOR STANDARDIZATION OF SIGNATURES; STANDARDS FOR ADES DIGITAL SIGNATURES IN MOBILE AND DISTRIBUTED ENVIRONMENTS |
TS 187 016 : 3.1.1 | TELECOMMUNICATIONS AND INTERNET CONVERGED SERVICES AND PROTOCOLS FOR ADVANCED NETWORKING (TISPAN); NGN SECURITY; IDENTITY PROTECTION (PROTECTION PROFILE) |
CR 14301:2002 | Health informatics - Framework for security protection of healthcare communication |
CAN/CSA-ISO/IEC 29167-14:16 | Information technology Automatic identification and data capture techniques Part 14: Crypto suite AES OFB security services for air interface communications (Adopted ISO/IEC 29167-14:2015, first edition, 2015-10-15) |
CSA ISO/IEC 15945 : 2004 | INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - SPECIFICATION OF TTP SERVICES TO SUPPORT THE APPLICATION OF DIGITAL SIGNATURES |
CSA ISO/IEC 15408-3 : 2009 : R2014 | INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - EVALUATION CRITERIA FOR IT SECURITY - PART 3: SECURITY ASSURANCE COMPONENTS |
16/30315782 DC : 0 | BS ISO 16461 - INTELLIGENT TRANSPORT SYSTEMS - CRITERIA FOR PRIVACY AND INTEGRITY PROTECTION |
ES 202 383 : 1.1.1 | TELECOMMUNICATIONS AND INTERNET CONVERGED SERVICES AND PROTOCOLS FOR ADVANCED NETWORKING (TISPAN); SECURITY DESIGN GUIDE; METHOD AND PROFORMA FOR DEFINING SECURITY TARGETS |
S.R. CEN ISO/TS 17574:2017 | ELECTRONIC FEE COLLECTION - GUIDELINES FOR SECURITY PROTECTION PROFILES (ISO/TS 17574:2017) |
I.S. EN IEC 62443-4-1:2018 | SECURITY FOR INDUSTRIAL AUTOMATION AND CONTROL SYSTEMS - PART 4-1: SECURE PRODUCT DEVELOPMENT LIFECYCLE REQUIREMENTS |
GS ISI 001-2 : 1.1.2 | INFORMATION SECURITY INDICATORS (ISI); INDICATORS (INC); PART 2: GUIDE TO SELECT OPERATIONAL INDICATORS BASED ON THE FULL SET GIVEN IN PART 1 |
I.S. CWA 14838-2:2003 | FACILITATING SMART CARD TECHNOLOGY FOR ELECTRONIC TICKETING AND SEAMLESS TRAVEL - PART 2: DEVELOPMENT OF SMART CARD BASED INTEROPERABLE TICKETING SYSTEMS |
I.S. CWA 14172-1:2004 | EESSI CONFORMITY ASSESSMENT GUIDANCE - PART 1: GENERAL INTRODUCTION |
TR 187 009 : 2.1.1 | TELECOMMUNICATIONS AND INTERNET CONVERGED SERVICES AND PROTOCOLS FOR ADVANCED NETWORKING (TISPAN); FEASIBILITY STUDY OF PREVENTION OF UNSOLICITED COMMUNICATION IN THE NGN |
TR 102 512 : 1.1.1 | TERRESTRIAL TRUNKED RADIO (TETRA); SECURITY; SECURITY REQUIREMENTS ANALYSIS FOR MODULATION ENHANCEMENTS TO TETRA |
I.S. CWA 14890-2:2004 | APPLICATION INTERFACE FOR SMART CARDS USED AS SECURE SIGNATURE CREATION DEVICES - PART 2: ADDITIONAL SERVICES |
TS 102 747 : 1.1.1 | HUMAN FACTORS (HF); PERSONALIZATION AND USER PROFILE MANAGEMENT; ARCHITECTURAL FRAMEWORK |
I.S. CWA 14365:2003 | GUIDE ON THE USE OF ELECTRONIC SIGNATURES |
ISO/TS 25237:2008 | Health informatics Pseudonymization |
I.S. EN 419221-5:2018 | PROTECTION PROFILES FOR TSP CRYPTOGRAPHIC MODULES - PART 5: CRYPTOGRAPHIC MODULE FOR TRUST SERVICES |
CEN/TS 419221-2:2016 | Protection Profiles for TSP cryptographic modules - Part 2: Cryptographic module for CSP signing operations with backup |
IEC TR 80001-2-3:2012 | Application of risk management for IT-networks incorporating medical devices - Part 2-3: Guidance for wireless networks |
I.S. CWA 14365-2:2004 | GUIDE ON THE USE OF ELECTRONIC SIGNATURES - PART 2: PROTECTION PROFILE FOR SOFTWARE SIGNATURE CREATION DEVICES |
PREN 419212-4 : DRAFT 2016 | APPLICATION INTERFACE FOR SECURE ELEMENTS FOR ELECTRONIC IDENTIFICATION, AUTHENTICATION AND TRUSTED SERVICES - PART 4: PRIVACY SPECIFIC PROTOCOLS |
I.S. CWA 14172-6:2004 | EESSI CONFORMITY ASSESSMENT GUIDANCE - PART 6: SIGNATURE-CREATION DEVICE SUPPORTING SIGNATURES OTHER THAN QUALIFIED |
S.R. CWA 15929:2009 | BEST PRACTICES FOR THE DESIGN AND DEVELOPMENT OF CRITICAL INFORMATION SYSTEMS |
IEC TR 80001-2-2:2012 | Application of risk management for IT-networks incorporating medical devices - Part 2-2: Guidance for the disclosure and communication of medical device security needs, risks and controls |
I.S. CEN ISO TS 17574:2005 | ROAD TRANSPORT AND TRAFFIC TELEMATICS - ELECTRONIC FEE COLLECTION (EFC) - GUIDELINES FOR EFC SECURITY PROTECTION PROFILES |
ANSI X9.97-1 : 2009 | FINANCIAL SERVICES - SECURE CRYPTOGRAPHIC DEVICES (RETAIL) - PART 1: CONCEPTS, REQUIREMENTS AND EVALUATION METHODS |
IEC 62601:2015 | Industrial networks - Wireless communication network and communication profiles - WIA-PA |
ISO/TS 14907-1:2015 | Electronic fee collection Test procedures for user and fixed equipment Part 1: Description of test procedures |
ISO 25237:2017 | Health informatics — Pseudonymization |
ISO/TS 14441:2013 | Health informatics — Security and privacy requirements of EHR systems for use in conformity assessment |
ISO/TS 17574:2017 | Electronic fee collection — Guidelines for security protection profiles |
EN 419221-5:2018 | Protection Profiles for TSP Cryptographic Modules - Part 5: Cryptographic Module for Trust Services |
EN 419251-2:2013 | Security requirements for device for authentication - Part 2: Protection profile for extension for trusted channel to certificate generation application |
EN 419251-3:2013 | Security requirements for device for authentication - Part 3: Additional functionality for security targets |
EN 419212-4:2018 | Application Interface for Secure Elements for Electronic Identification, Authentication and Trusted Services - Part 4: Privacy specific Protocols |
EN ISO 25237:2017 | Health informatics - Pseudonymization (ISO 25237:2017) |
EN 419251-1:2013 | Security requirements for device for authentication - Part 1: Protection profile for core functionality |
EN 419211-6:2014 | Protection profiles for secure signature creation device - Part 6: Extension for device with key import and trusted channel to signature creation application |
EN 419211-2:2013 | Protection profiles for secure signature creation device - Part 2: Device with key generation |
PREN 50436-6 : DRAFT 2013 | ALCOHOL INTERLOCKS - TEST METHODS AND PERFORMANCE REQUIREMENTS - PART 6: DATA SECURITY |
PD ISO/IEC TR 15443-3:2007 | Information technology. Security techniques. A framework for IT security assurance Analysis of assurance methods |
TS 102 941 : 1.1.1 | INTELLIGENT TRANSPORT SYSTEMS (ITS); SECURITY; TRUST AND PRIVACY MANAGEMENT |
08/30193508 DC : DRAFT NOV 2008 | BS EN 61508-1 - FUNCTIONAL SAFETY OF ELECTRICAL/ELECTRONIC/PROGRAMMABLE ELECTRONIC SAFETY-RELATED SYSTEMS - PART 1: GENERAL REQUIREMENTS |
17/30351732 DC : 0 | BS ISO/IEC 19896-1 - INFORMATION TECHNOLOGY - IT SECURITY TECHNIQUES - COMPETENCE REQUIREMENTS FOR INFORMATION SECURITY TESTERS AND EVALUATORS - PART 1: INTRODUCTION, CONCEPTS AND GENERAL REQUIREMENTS |
ISO/IEC TR 14516:2002 | Information technology Security techniques Guidelines for the use and management of Trusted Third Party services |
DIN EN 419211-6:2014-12 | PROTECTION PROFILES FOR SECURE SIGNATURE CREATION DEVICE - PART 6: EXTENSION FOR DEVICE WITH KEY IMPORT AND TRUSTED CHANNEL TO SIGNATURE CREATION APPLICATION |
I.S. EN ISO 27789:2013 | HEALTH INFORMATICS - AUDIT TRAILS FOR ELECTRONIC HEALTH RECORDS (ISO 27789:2013) |
PD CEN/TS 419221-3:2016 | Protection Profiles for TSP Cryptographic modules Cryptographic module for CSP key generation services |
BS EN ISO 25237:2017 | Health informatics. Pseudonymization |
05/30107724 DC : DRAFT JAN 2005 | ISO/IEC 19794-1 - BIOMETRIC DATA INTERCHANGE - PART 1: FRAMEWORK |
PD IEC TR 62210:2003 | Power system control and associated communications. Data and communication security |
CSA ISO/IEC TR 15942:2004 | INFORMATION TECHNOLOGY - PROGRAMMING LANGUAGES - GUIDE FOR THE USE OF THE ADA PROGRAMMING LANGUAGE IN HIGH INTEGRITY SYSTEMS |
EN 319 411-1 : 1.2.2 | ELECTRONIC SIGNATURES AND INFRASTRUCTURES (ESI); POLICY AND SECURITY REQUIREMENTS FOR TRUST SERVICE PROVIDERS ISSUING CERTIFICATES; PART 1: GENERAL REQUIREMENTS |
DD CEN ISO/TS 17574:2009 | Electronic fee collection. Guidelines for security protection profiles |
TS 102 731 : 1.1.1 | INTELLIGENT TRANSPORT SYSTEMS (ITS); SECURITY; SECURITY SERVICES AND ARCHITECTURE |
PD CEN ISO/TS 14441:2013 | Health informatics. Security and privacy requirements of EHR systems for use in conformity assessment |
CSA ISO/IEC 15945 : 2004 : R2012 | INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - SPECIFICATION OF TTP SERVICES TO SUPPORT THE APPLICATION OF DIGITAL SIGNATURES |
UNE-EN 419211-6:2016 | Protection profiles for secure signature creation device - Part 6: Extension for device with key import and trusted channel to signature creation application |
PD CEN/TS 419221-4:2016 | Protection Profiles for TSP cryptographic modules Cryptographic module for CSP signing operations without backup |
ISO/IEC 15408-1:2009 | Information technology — Security techniques — Evaluation criteria for IT security — Part 1: Introduction and general model |
PD CEN ISO/TS 17574:2017 | Electronic fee collection. Guidelines for security protection profiles |
CAN/CSA-ISO/IEC TR 14516-04 (R2017) | Information Technology - Security Techniques - Guidelines for the use and Management of Trusted Third Party Services (Adopted ISO/IEC TR 14516:2002, first edition, 2002-06-15) |
UNI EN 419251-2 : 2013 | SECURITY REQUIREMENTS FOR DEVICE FOR AUTHENTICATION - PART 2: PROTECTION PROFILE FOR EXTENSION FOR TRUSTED CHANNEL TO CERTIFICATE GENERATION APPLICATION |
IEC TR 62210:2003 | Power system control and associated communications - Data and communication security |
INCITS/ISO/IEC 15292 : 2001 | INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - PROTECTION PROFILE REGISTRATION PROCEDURES |
ARINC 664-5 : 2005 | AIRCRAFT DATA NETWORK - PART 5: NETWORK DOMAIN CHARACTERISTICS AND INTERCONNECTION |
INCITS/ISO/IEC 19792 : 2012 | INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - SECURITY EVALUATION OF BIOMETRICS |
INCITS/ISO/IEC 15945 : 2002 : R2007 | INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - SPECIFICATION OF TTP SERVICES TO SUPPORT THE APPLICATION OF DIGITAL SIGNATURES |
TR 187 014 : 2.1.1 | TELECOMMUNICATIONS AND INTERNET CONVERGED SERVICES AND PROTOCOLS FOR ADVANCED NETWORKING (TISPAN); ESECURITY; USER GUIDE TO ETVRA WEB-DATABASE |
IEEE/ISO/IEC 15026-1-2014 | IEEE Standard Adoption of ISO/IEC 15026-1--Systems and Software Engineering--Systems and Software Assurance--Part 1: Concepts and Vocabulary |
S.R. CEN ISO/TS 25110:2013 | ELECTRONIC FEE COLLECTION - INTERFACE DEFINITION FOR ON-BOARD ACCOUNT USING INTEGRATED CIRCUIT CARD (ICC) (ISO/TS 25110:2013) |
I.S. EN 419211-2:2013 | PROTECTION PROFILES FOR SECURE SIGNATURE CREATION DEVICE - PART 2: DEVICE WITH KEY GENERATION |
ISO/IEC 15292:2001 | Information technology - Security techniques - Protection Profile registration procedures |
IEEE 1074-2006 | IEEE Standard for Developing a Software Project Life Cycle Process |
I.S. EN 419251-3:2013 | SECURITY REQUIREMENTS FOR DEVICE FOR AUTHENTICATION - PART 3: ADDITIONAL FUNCTIONALITY FOR SECURITY TARGETS |
I.S. EN CWA 14172-5:2004 | EESSI CONFORMITY ASSESSMENT GUIDANCE - PART 5: SECURE SIGNATURE CREATION DEVICES |
I.S. EN 419251-1:2013 | SECURITY REQUIREMENTS FOR DEVICE FOR AUTHENTICATION - PART 1: PROTECTION PROFILE FOR CORE FUNCTIONALITY |
17/30357420 DC : 0 | BS EN 419241-2 - TRUSTWORTHY SYSTEMS SUPPORTING SERVER SIGNING - PART 2: PROTECTION PROFILE FOR QSCD FOR SERVER SIGNING |
TS 102 556 : 1.1.1 | TELECOMMUNICATIONS AND INTERNET CONVERGED SERVICES AND PROTOCOLS FOR ADVANCED NETWORKING (TISPAN); PROTECTION PROFILE |
CSA ISO/IEC TR 15942:04 (R2019) | Information Technology - Programming Languages - Guide for the Use of the Ada Programming Language in High Integrity Systems (Adopted ISO/IEC TR 15942:2000, first edition, 2000-03-01) |
BS EN ISO 25110:2017 | Electronic fee collection. Interface definition for on-board account using integrated circuit card (ICC) |
ISO 25110:2017 | Electronic fee collection — Interface definition for on-board account using integrated circuit card (ICC) |
I.S. CR 14301:2002 | HEALTH INFORMATICS - FRAMEWORK FOR SECURITY PROTECTION OF HEALTHCARE COMMUNICATION |
I.S. CWA 14172-4:2004 | EESSI CONFORMITY ASSESSMENT GUIDANCE - PART 4: SIGNATURE CREATION APPLICATIONS AND GENERAL GUIDELINES FOR ELECTRONIC SIGNATURE VERIFICATION |
ISO 27789:2013 | Health informatics Audit trails for electronic health records |
EN ISO 27789:2013 | Health informatics - Audit trails for electronic health records (ISO 27789:2013) |
CEN/TS 419221-4:2016 | Protection Profiles for TSP cryptographic modules - Part 4: Cryptographic module for CSP signing operations without backup |
CEN/TS 419221-3:2016 | Protection Profiles for TSP Cryptographic modules - Part 3: Cryptographic module for CSP key generation services |
CEN ISO/TS 14907-1:2015 | Electronic fee collection - Test procedures for user and fixed equipment - Part 1: Description of test procedures (ISO/TS 14907-1:2015) |
CSA ISO/IEC 27003 : 2010 : R2015 | INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - INFORMATION SECURITY MANAGEMENT SYSTEM IMPLEMENTATION GUIDANCE |
CSA ISO/IEC 27003 : 2010 | INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - INFORMATION SECURITY MANAGEMENT SYSTEM IMPLEMENTATION GUIDANCE |
AS ISO 13491.1:2019 | Financial services - Secure cryptographic devices (retail) Concepts, requirements and evaluation methods |
AS ISO 13491.2:2019 | Financial services - Secure cryptographic devices (retail) Security compliance checklists for devices used in financial transactions |
ISO/IEC 15408-1:2009 | Information technology — Security techniques — Evaluation criteria for IT security — Part 1: Introduction and general model |
Access your standards online with a subscription
Features
-
Simple online access to standards, technical information and regulations.
-
Critical updates of standards and customisable alerts and notifications.
-
Multi-user online standards collection: secure, flexible and cost effective.