ISO/IEC 27001:2013
Superseded
A superseded Standard is one, which is fully replaced by another Standard, which is a new edition of the same Standard.
View Superseded by
Information technology — Security techniques — Information security management systems — Requirements
Hardcopy , PDF , PDF 3 Users , PDF 5 Users , PDF 9 Users
25-10-2022
25-09-2013
ISO/IEC 27001:2013 specifies the requirements for establishing, implementing, maintaining and continually improving an information security management system within the context of the organization. It also includes requirements for the assessment and treatment of information security risks tailored to the needs of the organization. The requirements set out in ISO/IEC 27001:2013 are generic and are intended to be applicable to all organizations, regardless of type, size or nature.
DevelopmentNote |
Supersedes I.S. 17799-2. (05/2009)
|
DocumentType |
Standard
|
Pages |
23
|
ProductNote |
NEW COR 2 IS NOW ADDED NEW COR 1 IS NOW ADDED
|
PublisherName |
International Organization for Standardization
|
Status |
Superseded
|
SupersededBy | |
Supersedes |
12/30236518 DC : 0 | BS ISO/IEC 27000 - INFORMATION SECURITY - SECURITY TECHNIQUES - INFORMATION SECURITY MANAGEMENT SYSTEMS - OVERVIEW AND VOCABULARY |
UNE-ISO 37001:2017 | Anti-bribery management systems. Requirements with guidance for use. |
07/30117272 DC : 0 | BS ISO/IEC 27005 - INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - INFORMATION SECURITY RISK MANAGEMENT |
BS ISO/IEC 29134:2017 | Information technology. Security techniques. Guidelines for privacy impact assessment |
15/30322573 DC : 0 | BS ISO/IEC 33071 - INFORMATION TECHNOLOGY - PROCESS ASSESSMENT - AN INTEGRATED PROCESS CAPABILITY ASSESSMENT MODEL FOR ENTERPRISE PROCESSES |
PD CEN/TS 16850:2015 | Societal and Citizen Security. Guidance for managing security in healthcare facilities |
CEI EN 61587-6 : 1ED 2017 | MECHANICAL STRUCTURES FOR ELECTRICAL AND ELECTRONIC EQUIPMENT - TESTS FOR IEC 60917 AND IEC 60297 SERIES - PART 6: SECURITY ASPECTS FOR INDOOR CABINETS |
ISO/IEC 18598:2016 | Information technology Automated infrastructure management (AIM) systems Requirements, data exchange and applications |
05/30040757 DC : DRAFT JUN 2005 | ISO/IEC 18028 - INFORMATION TECHNOLOGY - IT NETWORK SECURITY - PART 1: NETWORK SECURITY MANAGEMENT |
18/30361485 DC : 0 | BS ISO/IEC 19896-3 - INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - COMPETENCE REQUIREMENTS FOR INFORMATION SECURITY TESTERS AND EVALUATORS - PART 3: KNOWLEDGE, SKILLS AND EFFECTIVENESS REQUIREMENTS FOR ISO/IEC 15408 EVALUATORS |
18/30346433 DC : 0 | BS ISO/IEC 19086-4 - INFORMATION TECHNOLOGY - CLOUD COMPUTING SERVICE LEVEL AGREEMENT (SLA) FRAMEWORK - PART 4: SECURITY AND PRIVACY |
DD ISO/TS 21547:2010 | Health informatics. Security requirements for archiving of electronic health records. Principles |
PD ISO/TR 12859:2009 | Intelligent transport systems. System architecture. Privacy aspects in ITS standards and systems |
12/30232747 DC : DRAFT JAN 2013 | BS ISO/IEC 29182-4 - INFORMATION TECHNOLOGY-SENSOR NETWORKS: SENSOR NETWORK REFERENCE ARCHITECTURE (SNRA) - PART 4: ENTITY MODELS |
15/30268877 DC : 0 | BS ISO/IEC 27035-2 - INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - INFORMATION SECURITY INCIDENT MANAGEMENT - PART 2: GUIDELINES TO PLAN AND PREPARE FOR INCIDENT RESPONSE |
15/30299331 DC : 0 | BS ISO/IEC 27011 - INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - CODE OF PRACTICE FOR INFORMATION SECURITY CONTROLS BASED ON ISO/IEC 27002 FOR TELECOMMUNICATIONS ORGANIZATIONS |
15/30285726 DC : 0 | BS ISO/IEC 27009 - INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - SECTOR-SPECIFIC APPLICATION OF ISO/IEC 27001 - REQUIREMENTS |
INCITS/ISO/IEC 30111 : 2014 | INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - VULNERABILITY HANDLING PROCESSES |
15/30319488 DC : 0 | BS ISO/IEC 27000 - INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - INFORMATION SECURITY MANAGEMENT SYSTEMS - OVERVIEW AND VOCABULARY |
BS ISO/IEC 19086-1:2016 | Information technology. Cloud computing. Service level agreement (SLA) framework Overview and concepts |
09/30140724 DC : 0 | BS ISO 26000 - GUIDANCE ON SOCIAL RESPONSIBILITY |
SWIFT 10:2012 | ADOPTING THE CLOUD - DECISION SUPPORT FOR CLOUD COMPUTING |
BS ISO/IEC 20000-2:2012 | Information technology. Service management Guidance on the application of service management systems |
ISO 15489-1:2016 | Information and documentation Records management Part 1: Concepts and principles |
PD ISO/IEC TR 20000-5:2013 | Information technology. Service management Exemplar implementation plan for ISO/IEC 20000-1 |
BS EN 50436-6:2015 | Alcohol interlocks. Test methods and performance requirements Data security |
CAN/CSA-IEC 62443-2-1:17 | Industrial communication networks — Network and system security — Part 2-1: Establishing an industrial automation and control system security program (Adopted IEC 62443-2-1:2010, first edition, 2010-11) | Réseaux industriels de communication — Sécurité dans les réseaux et les systèmes — Partie 2-1 : Établissement d’un programme de sécurité pour les systèmes d’automatisation et de commande industrielles (norme IEC 62443-2-1:2010 adoptée, première édition, 2010-11) |
BS TICKIT GUIDE : ISSUE 5.5 | A GUIDE TO SOFTWARE QUALITY MANAGEMENT SYSTEM CONSTRUCTION AND CERTIFICATION TO ISO 9001:2000 |
TR 119 001 : 1.2.1 | ELECTRONIC SIGNATURES AND INFRASTRUCTURES (ESI); THE FRAMEWORK FOR STANDARDIZATION OF SIGNATURES; DEFINITIONS AND ABBREVIATIONS |
10/30207796 DC : 0 | BS ISO/IEC 15289 - SOFTWARE AND SYSTEMS ENGINEERING - CONTENT OF LIFE-CYCLE INFORMATION PRODUCTS |
BS ISO/IEC 27033-4:2014 | Information technology. Security techniques. Network security Securing communications between networks using security gateways |
17/30351843 DC : 0 | BS 10754-1 - INFORMATION TECHNOLOGY - SOFTWARE TRUSTWORTHINESS - PART 1 - GOVERNANCE AND MANAGEMENT SPECIFICATION |
BIS IS/ISO 15189 : 2012 | MEDICAL LABORATORIES - REQUIREMENTS FOR QUALITY AND COMPETENCE |
PD ISO/IEC TR 20000-3:2009 | Information technology. Service management Guidance on scope definition and applicability of ISO/IEC 20000-1 |
BS ISO/IEC 33071:2016 | Information technology. Process assessment. An integrated process capability assessment model for Enterprise processes |
17/30354834 DC : 0 | BS EN ISO 19011 - GUIDELINES FOR AUDITING MANAGEMENT SYSTEMS |
14/30268906 DC : 0 | BS ISO/IEC 17789 - INFORMATION TECHNOLOGY - CLOUD COMPUTING - REFERENCE ARCHITECTURE |
DIN ISO 37500:2015-08 | GUIDANCE ON OUTSOURCING (ISO 37500:2014) |
BS ISO/IEC/IEEE 24748-4:2016 | Systems and software engineering. Life cycle management Systems engineering planning |
14/30271159 DC : 0 | BS ISO/IEC 24748-4 - SYSTEMS AND SOFTWARE ENGINEERING - LIFE CYCLE MANAGEMENT - PART 4: SYSTEMS ENGINEERING PLANNING |
BS ISO/IEC 27033-1:2015 | Information technology. Security techniques. Network security Overview and concepts |
12/30204847 DC : 0 | BS ISO/IEC 29147 - INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - VULNERABILITY DISCLOSURE |
DIN EN 15224:2016-04 (Draft) | QUALITY MANAGEMENT SYSTEMS - EN ISO 9001:2015 FOR HEALTHCARE |
PD ISO/IEC TR 90006:2013 | Information technology. Guidelines for the application of ISO 9001:2008 to IT service management and its integration with ISO/IEC 20000-1:2011 |
ISO/IEC TR 27008:2011 | Information technology Security techniques Guidelines for auditors on information security controls |
CAN/CSA-ISO/IEC 27034-1:12 (R2017) | Information technology - Security techniques - Application security - Part 1: Overview and concepts (Adopted ISO/IEC 27034-1:2011, first edition, 2011-11-15) |
15/30266416 DC : 0 | BS ISO/IEC 27006 - INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - REQUIREMENTS FOR BODIES PROVIDING AUDIT AND CERTIFICATION OF INFORMATION SECURITY MANAGEMENT SYSTEMS |
FD Z42 017 : 2009 FD | ELECTRONIC IMAGING - SCANNING OF OFFICE DOCUMENTS - SUBCONTRACTING OF SCANNING - GUIDE TO DETAILED TECHNICAL INSTRUCTIONS FOR SERVICES BUREAU |
I.S. EN 61587-6:2017 | MECHANICAL STRUCTURES FOR ELECTRICAL AND ELECTRONIC EQUIPMENT - TESTS FOR IEC 60917 AND IEC 60297 SERIES - PART 6: SECURITY ASPECTS FOR INDOOR CABINETS |
12/30204795 DC : 0 | BS ISO/IEC 19790 - INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - SECURITY REQUIREMENTS FOR CRYPTOGRAPHIC MODULES |
BS ISO/IEC 15408-1:2009 | Information technology. Security techniques. Evaluation criteria for IT Security Part 1: Introduction and general model |
BS EN ISO/IEC 27037:2016 | Information technology. Security techniques. Guidelines for identification, collection, acquisition and preservation of digital evidence |
INCITS/ISO/IEC 27040 : 2017 | INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - STORAGE SECURITY |
ISO/IEC/IEEE 15289:2017 | Systems and software engineering Content of life-cycle information items (documentation) |
17/30354844 DC : 0 | BS ISO 55002 - ASSET MANAGEMENT - MANAGEMENT SYSTEMS - GUIDELINES FOR THE APPLICATION OF ISO 55001 |
DD IEC/PAS 62443-3:2008 | Security for industrial process measurement and control Network and system security |
BS ISO/IEC 15026-4:2012 | Systems and software engineering. Systems and software assurance Assurance in the life cycle |
12/30249455 DC : 0 | BS ISO/IEC 27036-1 - INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - INFORMATION SECURITY FOR SUPPLIER RELATIONSHIPS - PART 1: OVERVIEW AND CONCEPTS |
INCITS/ISO/IEC 27011 : 2009(R2014) | INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - INFORMATION SECURITY MANAGEMENT GUIDELINES FOR TELECOMMUNICATIONS ORGANIZATIONS BASED ON ISO/IEC 27002 |
CAN/CSA-ISO/IEC 27033-1:16 | Information technology - Security techniques - Network security - Part 1: Overview and concepts (Adopted ISO/IEC 27033-1:2015, second edition, 2015-08-15) |
INCITS/ISO/IEC 29182-4 : 2014 | INFORMATION TECHNOLOGY - SENSOR NETWORKS: SENSOR NETWORK REFERENCE ARCHITECTURE (SNRA) - PART 4: ENTITY MODELS |
CSA TELECOM ORGANIZATIONS PACKAGE : 2018 | CONSISTS OF CAN/CSA-ISO/IEC 27000:18 - INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - INFORMATION SECURITY MANAGEMENT SYSTEMS - OVERVIEW AND VOCABULARY; CAN/CSA-ISO/IEC 27001:14, INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - INFORMATION SECURITY MANAGEMENT SYSTEMS - REQUIREMENTS; CAN/CSA-ISO/IEC 27002:15 - INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - CODE OF PRACTICE FOR |
CSA ISO/IEC 27034-1:2012 | INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - APPLICATION SECURITY - PART 1: OVERVIEW AND CONCEPTS |
PD ISO/TR 18638:2017 | Health informatics. Guidance on health information privacy education in healthcare organizations |
PD ISO/IEC TR 15443-1:2012 | Information technology. Security techniques. Security assurance framework Introduction and concepts |
ISO/IEC 27031:2011 | Information technology — Security techniques — Guidelines for information and communication technology readiness for business continuity |
CSA ISO/IEC 20000-1 :2013 | INFORMATION TECHNOLOGY - SERVICE MANAGEMENT - PART 1: SERVICE MANAGEMENT SYSTEM REQUIREMENTS |
BS EN ISO 19011:2011 | Guidelines for auditing management systems |
CSA ISO/IEC 27035 : 2013 | INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - INFORMATION SECURITY INCIDENT MANAGEMENT |
IEEE 20000-2-2013 | IEEE Standard -- Adoption of ISO/IEC 20000-2:2012, Information technology -- Service management -- Part 2: Guidance on the application of service management systems |
CSA ISO/IEC 27035 : 2013 : R2017 | INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - INFORMATION SECURITY INCIDENT MANAGEMENT |
S.R. CEN ISO/TS 14441:2013 | HEALTH INFORMATICS - SECURITY AND PRIVACY REQUIREMENTS OF EHR SYSTEMS FOR USE IN CONFORMITY ASSESSMENT (ISO/TS 14441:2013) |
CSA ISO/IEC 24762: 2008 | INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - GUIDELINES FOR INFORMATION AND COMMUNICATIONS TECHNOLOGY DISASTER RECOVERY SERVICES |
ISO/IEC 27004:2016 | Information technology — Security techniques — Information security management — Monitoring, measurement, analysis and evaluation |
CSA ISO/IEC TR 27008 : 2013 : R2017 | INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - GUIDELINES FOR AUDITORS ON INFORMATION SECURITY CONTROLS |
ISO/IEC 27009:2016 | Information technology Security techniques Sector-specific application of ISO/IEC 27001 Requirements |
UNE-ISO/IEC 20000-1:2011 | Information technology. Service management. Part 1: Service Management System requirements |
ISO/IEC 24762:2008 | Information technology Security techniques Guidelines for information and communications technology disaster recovery services |
ISO/IEC TR 15443-3:2007 | Information technology Security techniques A framework for IT security assurance Part 3: Analysis of assurance methods |
AAMI/IEC TIR80001-2-8:2016 | APPLICATION OF RISK MANAGEMENT FOR IT NETWORKS INCORPORATING MEDICAL DEVICES - PART 2-8: APPLICATION GUIDANCE - GUIDANCE ON STANDARDS FOR ESTABLISHING THE SECURITY CAPABILITIES IDENTIFIED IN IEC 80001-2-2 |
ISO/IEC 27018:2014 | Information technology Security techniques Code of practice for protection of personally identifiable information (PII) in public clouds acting as PII processors |
S.R. CEN/TR 16742:2014 | INTELLIGENT TRANSPORT SYSTEMS - PRIVACY ASPECTS IN ITS STANDARDS AND SYSTEMS IN EUROPE |
PD ISO/IEC/TR 15026-1:2010 | Systems and software engineering. Systems and software assurance Concepts and vocabulary |
I.S. EN 50436-6:2015 | ALCOHOL INTERLOCKS - TEST METHODS AND PERFORMANCE REQUIREMENTS - PART 6: DATA SECURITY |
INCITS/ISO/IEC 27006 : 2012 | INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - REQUIREMENTS FOR BODIES PROVIDING AUDIT AND CERTIFICATION OF INFORMATION SECURITY MANAGEMENT SYSTEMS |
I.S. EN ISO 18295-1:2017 | CUSTOMER CONTACT CENTRES - PART 1: REQUIREMENTS FOR CUSTOMER CONTACT CENTRES (ISO 18295-1:2017) |
ISO/IEC TR 27023:2015 | Information technology — Security techniques — Mapping the revised editions of ISO/IEC 27001 and ISO/IEC 27002 |
AAMI/IEC TIR80001-2-3:2012 | APPLICATION OF RISK MANAGEMENT FOR IT-NETWORKS INCORPORATING MEDICAL DEVICES - PART 2-3: GUIDANCE FOR WIRELESS NETWORKS |
DIN EN ISO/IEC 27040:2016-04 (Draft) | INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - STORAGE SECURITY (ISO/IEC 27040:2015) |
UNE-EN ISO 18295-1:2018 | Customer contact centres - Part 1: Requirements for customer contact centres (ISO 18295-1:2017) |
ISO 9241-960:2017 | Ergonomics of human-system interaction — Part 960: Framework and guidance for gesture interactions |
ISO 10789:2011 | Space systems — Programme management — Information and documentation management |
UNE-EN 15224:2017 | Quality management systems - EN ISO 9001:2015 for healthcare |
EN IEC 62443-4-1:2018 | Security for industrial automation and control systems - Part 4-1: Secure product development lifecycle requirements |
I.S. EN ISO 27799:2016 | HEALTH INFORMATICS - INFORMATION SECURITY MANAGEMENT IN HEALTH USING ISO/IEC 27002 |
CEN/TS 17159:2018 | Societal and citizen security - Guidance for the security of hazardous materials (CBRNE) in healthcare facilities |
ISO/IEC TS 33072:2016 | Information technology — Process assessment — Process capability assessment model for information security management |
UNE-ISO 14641-1:2015 | Electronic archiving. Part 1: Specifications concerning the design and the operation of an information system for electronic information preservation. |
TR 102 764 : 1.1.1 | EHEALTH; ARCHITECTURE; ANALYSIS OF USER SERVICE MODELS, TECHNOLOGIES AND APPLICATIONS SUPPORTING EHEALTH |
ISO/IEC 27000:2018 | Information technology — Security techniques — Information security management systems — Overview and vocabulary |
14/30249803 DC : 0 | BS ISO/IEC 27040 - INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - STORAGE SECURITY |
ISO/IEC 27002:2013 | Information technology Security techniques Code of practice for information security controls |
UNE-ISO 37500:2016 | Guidance on outsourcing |
IEC 61069-5:2016 | Industrial-process measurement, control and automation - Evaluation of system properties for the purpose of system assessment - Part 5: Assessment of system dependability |
UNE-ISO 22301:2013 | Societal security. Business continuity management systems. Requirements |
I.S. EN ISO 15189:2012 | MEDICAL LABORATORIES - REQUIREMENTS FOR QUALITY AND COMPETENCE (ISO 15189:2012, CORRECTED VERSION 2014-08-15) |
CEN/TS 15480-4:2012 | Identification card systems - European Citizen Card - Part 4: Recommendations for European Citizen Card issuance, operation and use |
CEN ISO/TS 19299:2015 | Electronic fee collection - Security framework (ISO/TS 19299:2015) |
EN 15224:2016 | Quality management systems - EN ISO 9001:2015 for healthcare |
CEN/TS 16850:2015 | Societal and Citizen Security - Guidance for managing security in healthcare facilities |
EN 50436-6:2015 | Alcohol interlocks - Test methods and performance requirements - Part 6: Data security |
DIN ISO/IEC 17789:2017-07 | INFORMATION TECHNOLOGY - CLOUD COMPUTING - REFERENCE ARCHITECTURE (ISO/IEC 17789:2014) |
EN 50136-1-5:2008 | Alarm systems - Alarm transmission systems and equipment - Part 1-5: Requirements for Packet Switched Network PSN |
TR 102 780 : 1.1.1 | METHODS FOR TESTING AND SPECIFICATION (MTS); SECURITY; GUIDE TO THE USE OF METHODS IN DEVELOPMENT OF ETSI SECURITY STANDARDS |
PD ISO/IEC TR 27019:2013 | Information technology. Security techniques. Information security management guidelines based on ISO/IEC 27002 for process control systems specific to the energy utility industry |
15/30299325 DC : 0 | BS ISO/IEC 27013 - INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - GUIDANCE ON THE INTEGRATED IMPLEMENTATION OF ISO/IEC 27001 AND ISO/IEC 20000-1 |
TS 102 640-6-1 : 1.1.1 | ELECTRONIC SIGNATURES AND INFRASTRUCTURES (ESI); REGISTERED ELECTRONIC MAIL (REM); PART 6: INTEROPERABILITY PROFILES; SUB-PART 1: REM-MD UPU PREM INTEROPERABILITY PROFILE |
TR 101 564 : 1.1.1 | ELECTRONIC SIGNATURES AND INFRASTRUCTURES (ESI); GUIDANCE ON ETSI TS 102 042 FOR ISSUING EXTENDED VALIDATION CERTIFICATES FOR AUDITORS AND CSPS |
INCITS/ISO/IEC 27037 : 2014 | INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - GUIDELINES FOR IDENTIFICATION, COLLECTION, ACQUISITION AND PRESERVATION OF DIGITAL EVIDENCE |
BS EN 15224:2016 | Quality management systems. EN ISO 9001:2015 for healthcare |
CSA ISO/IEC 27018 : 2015 | INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - CODE OF PRACTICE FOR PROTECTION OF PERSONALLY IDENTIFIABLE INFORMATION (PII) IN PUBLIC CLOUDS ACTING AS PII PROCESSORS |
BS ISO/IEC 27034-2:2015 | Information technology. Security techniques. Application security Organization normative framework |
10/30184538 DC : 0 | BS ISO/IEC 20000-2 - INFORMATION TECHNOLOGY - SERVICE MANAGEMENT - PART 2: GUIDANCE ON THE APPLICATION OF SERVICE MANAGEMENT SYSTEMS |
BS ISO/IEC 27035:2011 | Information technology. Security techniques. Information security incident management |
BS ISO 19153:2014 | Geospatial Digital Rights Management Reference Model (GeoDRM RM) |
UNE-ISO 15489-1:2016 | Information and documentation. Records management . Part 1: General. |
ISO/IEC TR 27103:2018 | Information technology — Security techniques — Cybersecurity and ISO and IEC Standards |
INCITS/ISO/IEC 29115 : 2014 | INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - ENTITY AUTHENTICATION ASSURANCE FRAMEWORK |
15/30279952 DC : 0 | BS ISO/IEC 30124 - CODE OF PRACTICE FOR THE IMPLEMENTATION OF A BIOMETRIC SYSTEM |
16/30286013 DC : 0 | BS ISO/IEC 27003 - INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - INFORMATION SECURITY MANAGEMENT SYSTEM - GUIDANCE |
BS ISO 14641-1:2012 | Electronic archiving Specifications concerning the design and the operation of an information system for electronic information preservation |
ISO/IEC 15026-1:2013 | Systems and software engineering Systems and software assurance Part 1: Concepts and vocabulary |
ISO/IEC TR 20000-11:2015 | Information technology Service management Part 11: Guidance on the relationship between ISO/IEC 20000-1:2011 and service management frameworks: ITIL |
BS EN ISO 21091:2013 | Health informatics. Directory services for healthcare providers, subjects of care and other entities |
DIN ISO 26000:2011-01 | Guidance on social responsibility (ISO 26000:2010) |
TS 102 573 : 2.1.1 | ELECTRONIC SIGNATURES AND INFRASTRUCTURES (ESI); POLICY REQUIREMENTS FOR TRUST SERVICE PROVIDERS SIGNING AND/OR STORING DATA OBJECTS |
PD ISO/TR 27809:2007 | Health informatics. Measures for ensuring patient safety of health software |
PD ISO/IEC TR 27008:2011 | Information technology. Security techniques. Guidelines for auditors on information security controls |
BIS IS/ISO/IEC 27005 : 2008 | INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - INFORMATION SECURITY RISK MANAGEMENT |
TS 102 640-2 : 2.2.1 | ELECTRONIC SIGNATURES AND INFRASTRUCTURES (ESI); REGISTERED ELECTRONIC MAIL (REM); PART 2: DATA REQUIREMENTS, FORMATS AND SIGNATURES FOR REM |
BS ISO/IEC 27043 : 2015 | INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - INCIDENT INVESTIGATION PRINCIPLES AND PROCESSES |
BS ISO 15489-1:2016 | Information and documentation. Records management Concepts and principles |
BIP 0106 : 2008 | IMPLEMENTING INFORMATION SECURITY BASED ON ISO 27001/ISO 17799: A MANAGEMENT GUIDE |
11/30189374 DC : 0 | BS ISO 19153 - GEOSPATIAL DIGITAL RIGHTS MANAGEMENT REFERENCE MODEL (GEODRM RM) |
11/30204593 DC : DRAFT MAY 2011 | BS ISO/IEC 27010 - INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - INFORMATION SECURITY MANAGEMENT FOR INTER-SECTOR AND INTER-ORGANIZATIONAL COMMUNICATIONS |
11/30168516 DC : 0 | BS ISO/IEC 27032 - INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - GUIDELINES FOR CYBERSECURITY |
BS ISO 22301 : 2012 | SOCIETAL SECURITY - BUSINESS CONTINUITY MANAGEMENT SYSTEMS - REQUIREMENTS |
BS ISO/IEC 29115:2013 | Information technology. Security techniques. Entity authentication assurance framework |
PD IEC/TR 62351-10:2012 | Power systems management and associated information exchange. Data and communications security Security architecture guidelines |
BS ISO/IEC 24762:2008 | Information technology. Security techniques. Guidelines for information and communications technology disaster recovery services |
DIN ISO/IEC 27000:2015-12 (Draft) | INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - INFORMATION SECURITY MANAGEMENT SYSTEMS - OVERVIEW AND VOCABULARY |
BS ISO/IEC 27036-1:2014 | Information technology. Security techniques. Information security for supplier relationships Overview and concepts |
I.S. EN 50667:2016 | INFORMATION TECHNOLOGY - AUTOMATED INFRASTRUCTURE MANAGEMENT (AIM) SYSTEMS - REQUIREMENTS, DATA EXCHANGE AND APPLICATIONS |
CSA ISO/IEC 27002 : 2015 | INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - CODE OF PRACTICE FOR INFORMATION SECURITY CONTROLS |
PD ISO/IEC TR 27023:2015 | Information technology. Security techniques. Mapping the revised editions of ISO/IEC 27001 and ISO/IEC 27002 |
BS ISO/IEC 17789:2014 | Information technology. Cloud computing. Reference architecture |
BS EN 50667:2016 | Information technology. Automated infrastructure management (AIM) systems. Requirements, data exchange and applications |
BS ISO/IEC/IEEE 15289:2011 | Systems and software engineering. Content of life-cycle information products (documentation) |
BS ISO/IEC/IEEE 23026:2015 | Systems and software engineering. Engineering and management of websites for systems, software, and services information |
08/30133461 DC : 0 | ISO/IEC 27003 - INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - INFORMATION SECURITY MANAGEMENT SYSTEM IMPLEMENTATION GUIDANCE |
CAN/CSA-ISO/IEC 27013:16 | Information technology - Security techniques - Guidance on the integrated implementation of ISO/IEC 27001 and ISO/IEC 20000-1 (Adopted ISO/IEC 27013:2015, second edition, 2015-12-01) |
BS ISO/IEC 27003:2017 | Information technology. Security techniques. Information security management systems. Guidance |
CAN/CSA-ISO/IEC 27034-2:16 | Information technology Security techniques Application security Part 2: Organization normative framework (Adopted ISO/IEC 27034-2:2015, first edition, 2015-08-15) |
CSA ISO 26000 : 2016 | GUIDANCE ON SOCIAL RESPONSIBILITY |
TR 101 533-2 : 1.3.1 | ELECTRONIC SIGNATURES AND INFRASTRUCTURES (ESI); DATA PRESERVATION SYSTEMS SECURITY; PART 2: GUIDELINES FOR ASSESSORS |
17/30331337 DC : 0 | BS ISO 19475-1 - DOCUMENT MANAGEMENT APPLICATIONS - MINIMUM REQUIREMENTS FOR THE STORAGE OF DOCUMENTS - PART 1: CAPTURE |
PD ISO/TR 21548:2010 | Health informatics. Security requirements for archiving of electronic health records. Guidelines |
17/30355373 DC : 0 | BS ISO/IEC 27019 - INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - INFORMATION SECURITY CONTROLS FOR THE ENERGY UTILITY INDUSTRY |
13/30277648 DC : 0 | BS EN 50436-6 - ALCOHOL INTERLOCKS - TEST METHODS AND PERFORMANCE REQUIREMENTS - PART 6: DATA SECURITY |
BS ISO/IEC 27000 : 2016 | INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - INFORMATION SECURITY MANAGEMENT SYSTEMS - OVERVIEW AND VOCABULARY |
DIN EN ISO 22301:2014-12 | SOCIETAL SECURITY - BUSINESS CONTINUITY MANAGEMENT SYSTEMS - REQUIREMENTS (ISO 22301:2012) |
BS EN 61069-5:2016 | Industrial-process measurement, control and automation. Evaluation of system properties for the purpose of system assessment Assessment of system dependability |
BS ISO/IEC 19790:2012 | Information technology. Security techniques. Security requirements for cryptographic modules |
BS ISO/IEC 29151:2017 | Information technology. Security techniques. Code of practice for personally identifiable information protection |
12/30192106 DC : 0 | BS ISO/IEC 27033-4 - INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - IT NETWORK SECURITY - PART 4: SECURING COMMUNICATIONS BETWEEN NETWORKS USING SECURITY GATEWAYS |
BS ISO/IEC 27035-2:2016 | Information technology. Security techniques. Information security incident management Guidelines to plan and prepare for incident response |
ISO/TR 27809:2007 | Health informatics Measures for ensuring patient safety of health software |
TS 102 844 : 1.2.1 | USER GROUP; QUALITY OF TELECOM SERVICES; CONFORMITY ASSESSMENT; REQUIREMENTS FOR BODIES PROVIDING QOS ASSESSMENTS AND SURVEYS |
TS 102 640-4 : 2.1.2 | ELECTRONIC SIGNATURES AND INFRASTRUCTURES (ESI); REGISTERED ELECTRONIC MAIL (REM) PART 4: REM-MD CONFORMANCE PROFILES |
BS ISO/IEC 20000-6:2017 | Information technology. Service management Requirements for bodies providing audit and certification of service management systems |
UNE-ISO/IEC 27002:2015 | Information technology -- Security techniques -- Code of practice for information security controls |
BS EN 50136-1-5:2008 | Alarm systems. Alarm transmission systems and equipment Requirements for packet switched network PSN |
I.S. EN ISO 22301:2014 | SOCIETAL SECURITY - BUSINESS CONTINUITY MANAGEMENT SYSTEMS - REQUIREMENTS |
BS ISO/IEC 27035-1:2016 | Information technology. Security techniques. Information security incident management Principles of incident management |
CSA ISO/IEC 15408-1 : 2010 | INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - EVALUATION CRITERIA FOR IT SECURITY - PART 1: INTRODUCTION AND GENERAL MODEL |
ISO/TR 11633-2:2009 | Health informatics Information security management for remote maintenance of medical devices and medical information systems Part 2: Implementation of an information security management system (ISMS) |
ISO/IEC 27021:2017 | Information technology — Security techniques — Competence requirements for information security management systems professionals |
TS 119 101 : 1.1.1 | ELECTRONIC SIGNATURES AND INFRASTRUCTURES (ESI); POLICY AND SECURITY REQUIREMENTS FOR APPLICATIONS FOR SIGNATURE CREATION AND SIGNATURE VALIDATION |
CSA ISO/IEC TR 27008: 2013 | INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - GUIDELINES FOR AUDITORS ON INFORMATION SECURITY CONTROLS |
INCITS/ISO/IEC 15408-1 : 2012 | INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - EVALUATION CRITERIA FOR IT SECURITY - PART 1: INTRODUCTION AND GENERAL MODEL |
CEI UNI EN ISO/IEC 27040 : 1ED 2017 | INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - STORAGE SECURITY |
CSA ISO/IEC 20000-1 : 2013 : R2017 | INFORMATION TECHNOLOGY - SERVICE MANAGEMENT - PART 1: SERVICE MANAGEMENT SYSTEM REQUIREMENTS |
I.S. EN 61511-1:2017 | FUNCTIONAL SAFETY - SAFETY INSTRUMENTED SYSTEMS FOR THE PROCESS INDUSTRY SECTOR - NORMATIVE (UON) - PART 1: FRAMEWORK, DEFINITIONS, SYSTEM, HARDWARE AND SOFTWARE REQUIREMENTS |
I.S. EN 16844:2017+A2:2019 | Aesthetic medicine services - Non-surgical medical treatments |
CAN/CSA-C22.2 NO. 61511-1:17 | Functional safety — Safety instrumented systems for the process industry sector — Part 1: Framework, definitions, system, hardware and application programming requirements (Adopted IEC 61511-1:2016, second edition, 2016-02, with Canadian deviations) | Sécurité fonctionnelle — Systèmes instrumentes de sécurité pour le secteur des industries de transformation — Partie 1 : Cadre, définitions, exigences pour le système, le matériel et la programmation d’application (norme IEC 61511-1:2016 adoptée, deuxième édition, 2016-02, avec exigences propres au Canada) |
TS 119 403 : 2.2.1 | ELECTRONIC SIGNATURES AND INFRASTRUCTURES (ESI); TRUST SERVICE PROVIDER CONFORMITY ASSESSMENT - REQUIREMENTS FOR CONFORMITY ASSESSMENT BODIES ASSESSING TRUST SERVICE PROVIDERS |
TR 102 538 : 1.1.1 | USER GROUP; LIST OF DEFINITIONS AND ABBREVIATIONS |
ISO/IEC TR 27015:2012 | Information technology Security techniques Information security management guidelines for financial services |
CSA N286.0.1 : 2014 | COMMENTARY ON N286-12, MANAGEMENT SYSTEM REQUIREMENTS FOR NUCLEAR FACILITIES |
TR 103 123 : 1.1.1 | ELECTRONIC SIGNATURES AND INFRASTRUCTURES (ESI); GUIDANCE FOR AUDITORS AND CSPS ON ETSI TS 102 042 FOR ISSUING PUBLICLY-TRUSTED TLS/SSL CERTIFICATES |
CSA ISO/IEC 27005 : 2011 : R2016 | INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - INFORMATION SECURITY RISK MANAGEMENT |
VDMA 66418 : DRAFT 2017 | INDUSTRIAL SECURITY - GENERAL REQUIREMENTS FOR SECURITY OF MACHINES, SYSTEMS AND RELATED COMPONENTS |
ISO/TR 11633-1:2009 | Health informatics Information security management for remote maintenance of medical devices and medical information systems Part 1: Requirements and risk analysis |
BS ISO/IEC 27002 : 2013 | INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - CODE OF PRACTICE FOR INFORMATION SECURITY CONTROLS |
ISO/TR 12859:2009 | Intelligent transport systems System architecture Privacy aspects in ITS standards and systems |
I.S. EN ISO/IEC 27043:2016 | INFORMATION TECHNOLOGY - SECURITY TECHNIQUES INCIDENT INVESTIGATION PRINCIPLES AND PROCESSES (ISO/IEC 27043:2015) |
I.S. ISO 26000:2010 | GUIDANCE ON SOCIAL RESPONSIBILITY |
ABS 0252 : 2016 | DATA INTEGRITY FOR MARINE AND OFFSHORE OPERATIONS - CYBERSAFETY[TM] VOLUME 3 |
UNE-EN ISO/IEC 27002:2017 | Information technology - Security techniques - Code of practice for information security controls (ISO/IEC 27002:2013 including Cor 1:2014 and Cor 2:2015) |
ISO 37001:2016 | Anti-bribery management systems — Requirements with guidance for use |
EN ISO 9241-960:2017 | Ergonomics of human-system interaction - Part 960: Framework and guidance for gesture interactions (ISO 9241-960:2017) |
CSA ISO/IEC 18028-3 : 2006 | INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - IT NETWORK SECURITY - PART 3: SECURING COMMUNICATIONS BETWEEN NETWORKS USING SECURITY GATEWAYS |
ISO/IEC TR 27016:2014 | Information technology — Security techniques — Information security management — Organizational economics |
ISO/TR 15801:2017 | Document management — Electronically stored information — Recommendations for trustworthiness and reliability |
UNI CEN ISO/TS 14441 : 2014 | HEALTH INFORMATICS - SECURITY AND PRIVACY REQUIREMENTS OF HER SYSTEMS FOR USE IN CONFORMITY ASSESSMENT |
CSA ISO/IEC 27005 : 2011 | INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - INFORMATION SECURITY RISK MANAGEMENT |
TR 103 331 : 1.1.1 | CYBER; STRUCTURED THREAT INFORMATION SHARING |
BS ISO/IEC 29147:2014 | Information technology. Security techniques. Vulnerability disclosure |
BS ISO/IEC/IEEE 15289:2019 | Systems and software engineering. Content of life-cycle information items (documentation) |
CSA ISO/IEC TR 15026-1 : 2013 | SYSTEMS AND SOFTWARE ENGINEERING - SYSTEMS AND SOFTWARE ASSURANCE - PART 1: CONCEPTS AND VOCABULARY |
UNE-ISO 30301:2011 | Information and documentation. Management system for records. Requirements. |
BS EN ISO 22301:2014 | Societal security. Business continuity management systems. Requirements |
UNI CEN/TS 15480-4 : 2012 | IDENTIFICATION CARD SYSTEMS - EUROPEAN CITIZEN CARD - PART 4: RECOMMENDATIONS FOR EUROPEAN CITIZEN CARD ISSUANCE, OPERATION AND USE |
TR 187 020 : 1.1.1 | RADIO FREQUENCY IDENTIFICATION (RFID); COORDINATED ESO RESPONSE TO PHASE 1 OF EU MANDATE M436 |
UNI EN ISO 19011 : 2012 | GUIDELINES FOR AUDITING MANAGEMENT SYSTEMS |
CSA ISO/IEC 15026-1 : 2015 | SYSTEMS AND SOFTWARE ENGINEERING - SYSTEMS AND SOFTWARE ASSURANCE - PART 1: CONCEPTS AND VOCABULARY |
TS 102 640-1 : 2.2.1 | ELECTRONIC SIGNATURES AND INFRASTRUCTURES (ESI); REGISTERED ELECTRONIC MAIL (REM); PART 1: ARCHITECTURE |
I.S. EN 50136-1-5:2008 | ALARM SYSTEMS - ALARM TRANSMISSION SYSTEMS AND EQUIPMENT - PART 1-5: REQUIREMENTS FOR PACKET SWITCHED NETWORK PSN |
ISO/IEC 27005:2011 | Information technology Security techniques Information security risk management |
IEC TR 80001-2-1:2012 | Application of risk management for IT-networks incorporating medical devices - Part 2-1: Step by step risk management of medical IT-networks - Practical applications and examples |
EN ISO 9000:2015 | Quality management systems - Fundamentals and vocabulary (ISO 9000:2015) |
ISO/IEC 27013:2015 | Information technology Security techniques Guidance on the integrated implementation of ISO/IEC 27001 and ISO/IEC 20000-1 |
ISO 9000:2015 | Quality management systems — Fundamentals and vocabulary |
UNE-EN ISO 15189:2013 | Medical laboratories - Requirements for quality and competence (ISO 15189:2012, Corrected version 2014-08-15) |
ISO/IEC 27043:2015 | Information technology Security techniques Incident investigation principles and processes |
UNE-EN ISO 9000:2015 | Quality management systems - Fundamentals and vocabulary (ISO 9000:2015) |
IEC 61511-1:2016 RLV | Functional safety - Safety instrumented systems for the process industry sector - Part 1: Framework, definitions, system, hardware and application programming requirements |
VDI/VDE 2657 Blatt 1:2013-01 | Middleware in industrial automation - Fundamentals |
NEMA CPSP 1 : 2015 | SUPPLY CHAIN BEST PRACTICES |
VDI/VDE 2182 Blatt 1:2011-01 | IT-security for industrial automation - General model |
UNE-ISO/IEC 20000-2:2015 | Information technology. Service management. Part 2: Guidance on the application of service management systems |
CSA ISO/IEC 27007 : 2013 : R2017 | INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - GUIDELINES FOR INFORMATION SECURITY MANAGEMENT SYSTEMS AUDITING |
ISO/IEC 27003:2017 | Information technology — Security techniques — Information security management systems — Guidance |
INCITS/ISO/IEC 24762 : 2009(R2014) | INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - GUIDELINES FOR INFORMATION AND COMMUNICATIONS TECHNOLOGY DISASTER RECOVERY SERVICES |
GS NFV-SEC 006 : 1.1.1 | NETWORK FUNCTIONS VIRTUALISATION (NFV); SECURITY GUIDE; REPORT ON SECURITY ASPECTS AND REGULATORY CONCERNS |
PD ISO/IEC TR 15443-3:2007 | Information technology. Security techniques. A framework for IT security assurance Analysis of assurance methods |
CEI EN 61069-5 : 1996 | INDUSTRIAL-PROCESS MEASUREMENT, CONTROL AND AUTOMATION - EVALUATION OF SYSTEM PROPERTIES FOR THE PURPOSE OF SYSTEM ASSESSMENT - PART 5: ASSESSMENT OF SYSTEM DEPENDABILITY |
BS ISO 30301:2011 | Information and documentation. Management systems for records. Requirements |
PD ISO/IEC TR 20000-12:2016 | Information technology. Service management Guidance on the relationship between ISO/IEC 20000-1:2011 and service management frameworks: CMMI-SVC® |
BS PAS 7000(2014) : 2014 | SUPPLY CHAIN RISK MANAGEMENT - SUPPLIER PREQUALIFICATION |
BS ISO 18788:2015 | Management system for private security operations. Requirements with guidance for use |
16/30331802 DC : 0 | BS EN 62887 ED 1.0 - NUCLEAR POWER PLANTS - INSTRUMENTATION SYSTEMS IMPORTANT TO SAFETY - PRESSURE TRANSMITTERS: CHARACTERISTICS AND TEST METHODS |
DIN EN ISO/IEC 27002 E : 2017 | INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - CODE OF PRACTICE FOR INFORMATION SECURITY CONTROLS (ISO/IEC 27002:2013 INCLUDING COR 1:2014 AND COR 2:2015) |
PREN 15341 : DRAFT 2017 | MAINTENANCE - MAINTENANCE KEY PERFORMANCE INDICATORS |
BS EN 61587-6:2017 | Mechanical structures for electrical and electronic equipment. Tests for IEC 60917 and IEC 60297 series Security aspects for indoor cabinets |
S.R. CEN/TR 419010:2017 | FRAMEWORK FOR STANDARDIZATION OF SIGNATURES - EXTENDED STRUCTURE INCLUDING ELECTRONIC IDENTIFICATION AND AUTHENTICATION |
14/30296554 DC : 0 | BS EN 61587-6 - MECHANICAL STRUCTURES FOR ELECTRONIC EQUIPMENT - PART 6: SECURITY AND PERFORMANCE FOR DOOR LOCKING HANDLES FOR INDOOR CABINETS |
17/30342692 DC : 0 | BS ISO/IEC 27007 - INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - GUIDELINES FOR INFORMATION SECURITY MANAGEMENT SYSTEMS AUDITING |
ISO/IEC 27017:2015 | Information technology — Security techniques — Code of practice for information security controls based on ISO/IEC 27002 for cloud services |
BS ISO 30302:2015 | Information and documentation. Management systems for records. Guidelines for implementation |
BIP 0076 : 2010 | INFORMATION SECURITY RISK MANAGEMENT - HANDBOOK FOR ISO/IEC 27001 |
BIP 0139 : 2013 | AN INTRODUCTION TO ISO/IEC 27001:2013 |
BS EN ISO 9004:2018 | Quality management. Quality of an organization. Guidance to achieve sustained success |
14/30278505 DC : 0 | BS ISO/IEC 27033-1 - INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - NETWORK SECURITY PART 1: OVERVIEW AND CONCEPTS |
BS EN ISO/IEC 27002:2017 | Information technology. Security techniques. Code of practice for information security controls |
UNE-ISO/IEC 20000-3:2015 | Information technology. Service management. Part 3: Guidance on scope definition and applicability of ISO/IEC 20000-1 |
PD CEN/TS 15480-4:2012 | Identification card systems. European Citizen Card Recommendations for European Citizen Card issuance, operation and use |
BS ISO/IEC 27009:2016 | Information technology. Security techniques. Sector-specific application of ISO/IEC 27001. Requirements |
BS ISO/IEC 18028-1:2006 | Information technology. Security techniques. IT network security Network security management |
UNI ISO 20252 : 2012 | MARKET, OPINION AND SOCIAL RESEARCH - VOCABULARY AND SERVICE REQUIREMENTS |
15/30299657 DC : 0 | BS 7958 - CLOSED CIRCUIT TELEVISION (CCTV) - MANAGEMENT AND OPERATION - CODE OF PRACTICE |
ISO/IEC 21277:2018 | Information technology — Radio frequency identification device performance test methods — Crypto suite |
BS TICKITPLUS - KICK START GUIDE : 2011 | KICK START GUIDE, TICKITPLUS - SOFTWARE AND IT QUALITY MANAGEMENT AND CERTIFICATION |
BIP 0140 : 2014 | UNDERSTANDING THE NEW ISO MANAGEMENT SYSTEM REQUIREMENTS |
10/30184432 DC : 0 | BS ISO/IEC 27035 - INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - INFORMATION SECURITY INCIDENT MANAGEMENT |
12/30257208 DC : DRAFT FEB 2012 | BS ISO/IEC 20000-3 - INFORMATION TECHNOLOGY - SERVICE MANAGEMENT - PART 3: GUIDANCE ON SCOPE DEFINITION AND APPLICABILITY OF ISO/IEC 20000-1 |
16/30320028 DC : 0 | BS ISO 26262-2 - ROAD VEHICLES - FUNCTIONAL SAFETY - PART 2: MANAGEMENT OF FUNCTIONAL SAFETY |
18/30348902 DC : 0 | BS ISO/IEC 21878 - INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - SECURITY GUIDELINES FOR DESIGN AND IMPLEMENTATION OF VIRTUALIZED SERVERS |
ISO/IEC 29182-4:2013 | Information technology Sensor networks: Sensor Network Reference Architecture (SNRA) Part 4: Entity models |
TS 118 111 : 2.4.1 | ONEM2M; COMMON TERMINOLOGY (ONEM2M TS-0011 VERSION 2.4.1 RELEASE 2) |
TS 102 640-6-3 : 1.1.1 | ELECTRONIC SIGNATURES AND INFRASTRUCTURES (ESI); REGISTERED ELECTRONIC MAIL (REM); PART 6: INTEROPERABILITY PROFILES; SUB-PART 3: REM-MD SOAP BINDING PROFILE |
BS ISO 37500:2014 | Guidance on outsourcing |
BS IEC 62443-2-1 : 2010 | INDUSTRIAL COMMUNICATION NETWORKS - NETWORK AND SYSTEM SECURITY - PART 2-1: ESTABLISHING AN INDUSTRIAL AUTOMATION AND CONTROL SYSTEM SECURITY PROGRAM |
OLF 112-2 : 2013 | DEPLOYMENT OF RADIO FREQUENCY IDENTIFICATION (RFID) IN THE OIL AND GAS INDUSTRY - PART 2: ARCHITECTURE AND INTEGRATION |
BS ISO/IEC 27033-5:2013 | Information technology. Security techniques. Network security Securing communications across networks using Virtual Private Networks (VPNs) |
ISO 28002:2011 | Security management systems for the supply chain — Development of resilience in the supply chain — Requirements with guidance for use |
BS ISO/IEC 18028-3:2005 | Information technology. Security techniques. IT network security Securing communications between networks using security gateways |
INCITS/ISO 19153 : 2014 | GEOGRAPHIC INFORMATION - GEOSPATIAL DIGITAL RIGHTS MANAGEMENT REFERENCE MODEL (GEODRM RM) |
BS ISO/IEC 27006:2015 | Information technology. Security techniques. Requirements for bodies providing audit and certification of information security management systems |
16/30286027 DC : 0 | BS ISO/IEC 27004 - INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - INFORMATION SECURITY MANAGEMENT - MONITORING, MEASUREMENT, ANALYSIS AND EVALUATION |
17/30342673 DC : 0 | BS ISO/IEC 27021 - INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - COMPETENCE REQUIREMENTS FOR INFORMATION SECURITY MANAGEMENT SYSTEMS PROFESSIONALS |
PD ISO/TR 11633-2:2009 | Health informatics. Information security management for remote maintenance of medical devices and medical information systems Implementation of an information security management system (ISMS) |
ISA 99.02.01 : 2009 | SECURITY FOR INDUSTRIAL AUTOMATION AND CONTROL SYSTEMS: ESTABLISHING AN INDUSTRIAL AUTOMATION AND CONTROL SYSTEMS SECURITY PROGRAM |
BS TICKITPLUS - ASSESSORS & PRACTITIONER : 2011 | REQUIREMENTS FOR ASSESSORS AND PRACTITIONERS - THE TICKITPLUS SCHEME |
BS ISO/IEC 27005:2011 | Information technology. Security techniques. Information security risk management |
PD CEN/TR 419010:2017 | Framework for standardization of signatures. Extended structure including electronic identification and authentication |
BS EN ISO 18295-1:2017 | Customer contact centres Requirements for customer contact centres |
15/30298890 DC : 0 | BS ISO 15489-1 - INFORMATION AND DOCUMENTATION - RECORDS MANAGEMENT - PART 1: CONCEPTS AND PRINCIPLES |
BS ISO/IEC 27032:2012 | Information technology. Security techniques. Guidelines for cybersecurity |
DIN EN ISO/IEC 27002:2017-06 | Information technology - Security techniques - Code of practice for information security controls (ISO/IEC 27002:2013 including Cor 1:2014 and Cor 2:2015) |
09/30184534 DC : DRAFT JAN 2009 | BS ISO/IEC 20000-1 - INFORMATION TECHNOLOGY - SERVICE MANAGEMENT - PART 1: SERVICE MANAGEMENT SYSTEM REQUIREMENTS |
14/30213618 DC : 0 | BS ISO/IEC 27034-2 - INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - APPLICATION SECURITY - PART 2: ORGANIZATION NORMATIVE FRAMEWORK |
I.S. EN ISO 21091:2013 | HEALTH INFORMATICS - DIRECTORY SERVICES FOR HEALTHCARE PROVIDERS, SUBJECTS OF CARE AND OTHER ENTITIES (ISO 21091:2013) |
ISO/IEC TR 20000-9:2015 | Information technology Service management Part 9: Guidance on the application of ISO/IEC 20000-1 to cloud services |
BIS IS/ISO/IEC 27003 : 2010 | INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - INFORMATION SECURITY MANAGEMENT SYSTEM IMPLEMENTATION GUIDANCE |
CSA ISO/IEC 20000-2 : 2013 : R2017 | INFORMATION TECHNOLOGY - SERVICE MANAGEMENT - PART 2: GUIDANCE ON THE APPLICATION OF SERVICE MANAGEMENT SYSTEMS |
06/30144361 DC : 0 | ISO 27799 - HEALTH INFORMATICS - SECURITY MANAGEMENT IN HEALTH USING ISO/IEC 17799 |
CSA ISO/IEC 27031 : 2013 | INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - GUIDELINES FOR INFORMATION AND COMMUNICATION TECHNOLOGY READINESS FOR BUSINESS CONTINUITY |
CSA ISO 19011 : 2012 | GUIDELINES FOR AUDITING MANAGEMENT SYSTEMS |
UNI ISO 30301 : 2013 | INFORMATION AND DOCUMENTATION - MANAGEMENT SYSTEMS FOR RECORDS - REQUIREMENTS |
UNE-ISO 30302:2015 | Information and documentation. Management systems for records. Guidelines for implementation |
ISO/IEC/IEEE 26531:2015 | Systems and software engineering — Content management for product life-cycle, user and service management documentation |
IEC PAS 62443-3:2008 | Security for industrial process measurement and control - Network and system security |
IEC 62443-2-1:2010 | Industrial communication networks - Network and system security - Part 2-1: Establishing an industrial automation and control system security program |
IEC TR 62351-10:2012 | Power systems management and associated information exchange - Data and communications security - Part 10: Security architecture guidelines |
SAE J 3061 : 2016 | CYBERSECURITY GUIDEBOOK FOR CYBER-PHYSICAL VEHICLE SYSTEMS |
ISO/IEC 27034-3:2018 | Information technology — Application security — Part 3: Application security management process |
ISO/IEC TR 29110-5-3:2018 | Systems and software engineering — Lifecycle profiles for Very Small Entities (VSEs) — Part 5-3: Service delivery guidelines |
S.R. CWA 16460:2012 | GOOD PRACTICE: E-INVOICING COMPLIANCE GUIDELINES - THE COMMENTARY |
I.S. EN ISO/IEC 27000:2017 | INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - INFORMATION SECURITY MANAGEMENT SYSTEMS - OVERVIEW AND VOCABULARY (ISO/IEC 27000:2016) |
EN 61587-6:2017 | Mechanical structures for electrical and electronic equipment - Tests for IEC 60917 and IEC 60297 series - Part 6: Security aspects for indoor cabinets |
I.S. EN 15224:2016 | QUALITY MANAGEMENT SYSTEMS - EN ISO 9001:2015 FOR HEALTHCARE |
S.R. CEN ISO/TS 19299:2015 | ELECTRONIC FEE COLLECTION - SECURITY FRAMEWORK (ISO/TS 19299:2015) |
UNE-ISO 20252:2012 | Market, opinion and social research. Vocabulary and service requirements. |
ISO/IEC 30111:2013 | Information technology Security techniques Vulnerability handling processes |
BS EN ISO/IEC 27000:2017 | Information technology. Security techniques. Information security management systems. Overview and vocabulary |
CSA ISO 19011 : 2012 : R2017 | GUIDELINES FOR AUDITING MANAGEMENT SYSTEMS |
ISO/IEC TR 20000-10:2015 | Information technology Service management Part 10: Concepts and terminology |
TR 102 572 : 1.1.1 | BEST PRACTICES FOR HANDLING ELECTRONIC SIGNATURES AND SIGNED DATA FOR DIGITAL ACCOUNTING |
ISO/IEC TR 90006:2013 | Information technology Guidelines for the application of ISO 9001:2008 to IT service management and its integration with ISO/IEC 20000-1:2011 |
ISO/IEC 18028-3:2005 | Information technology Security techniques IT network security Part 3: Securing communications between networks using security gateways |
CAN/CSA-ISO/IEC 27017:16 | Information technology Security techniques Code of practice for information security controls based on ISO/IEC 27002 for cloud services (Adopted ISO/IEC 27017:2015, first edition, 2015-12-15) |
IEC TR 80001-2-8:2016 | Application of risk management for IT-networks incorporating medical devices - Part 2-8: Application guidance - Guidance on standards for establishing the security capabilities identified in IEC TR 80001-2-2 |
CEN/TR 15640:2007 | Health informatics - Measures for ensuring the patient safety of health software |
BS EN 16495:2014 | Air Traffic Management. Information security for organisations supporting civil aviation operations |
CEN/TR 419010:2017 | Framework for standardization of signatures - Extended structure including electronic identification and authentication |
UNI EN 16495 : 2014 | AIR TRAFFIC MANAGEMENT - INFORMATION SECURITY FOR ORGANIZATIONS SUPPORTING CIVIL AVIATION OPERATIONS |
TS 102 165-1 : 4.2.3 | CYBER; METHODS AND PROTOCOLS; PART 1: METHOD AND PRO FORMA FOR THREAT, VULNERABILITY, RISK ANALYSIS (TVRA) |
ISO/IEC 27033-2:2012 | Information technology — Security techniques — Network security — Part 2: Guidelines for the design and implementation of network security |
ISO/IEC 27035:2011 | Information technology Security techniques Information security incident management |
ISO/IEC 27033-4:2014 | Information technology — Security techniques — Network security — Part 4: Securing communications between networks using security gateways |
ISO/IEC 27032:2012 | Information technology — Security techniques — Guidelines for cybersecurity |
ISO/TS 21547:2010 | Health informatics Security requirements for archiving of electronic health records Principles |
ISO/IEC 27039:2015 | Information technology Security techniques Selection, deployment and operations of intrusion detection and prevention systems (IDPS) |
EN 16844:2017 | Aesthetic medicine services - Non-surgical medical treatments |
ISO/IEC 27036-1:2014 | Information technology Security techniques Information security for supplier relationships Part 1: Overview and concepts |
ISO/IEC/IEEE 24748-4:2016 | Systems and software engineering — Life cycle management — Part 4: Systems engineering planning |
ISO/IEC 27034-2:2015 | Information technology Security techniques Application security Part 2: Organization normative framework |
ISO/IEC 15026-4:2012 | Systems and software engineering Systems and software assurance Part 4: Assurance in the life cycle |
ISO 37500:2014 | Guidance on outsourcing |
ISO/TR 17522:2015 | Health informatics Provisions for health applications on mobile/smart devices |
ISO 18788:2015 | Management system for private security operations Requirements with guidance for use |
IEC TR 62653:2012 | Guideline for safe operation of medical equipment used for haemodialysis treatments |
ISO 14641-1:2012 | Electronic archiving Part 1: Specifications concerning the design and the operation of an information system for electronic information preservation |
DIN EN ISO 15189:2014-11 | Medical laboratories - Requirements for quality and competence (ISO 15189:2012, Corrected version 2014-08-15) |
ISO/IEC 27037:2012 | Information technology — Security techniques — Guidelines for identification, collection, acquisition and preservation of digital evidence |
ISO/TS 19299:2015 | Electronic fee collection Security framework |
ISO/IEC TS 15504-8:2012 | Information technology Process assessment Part 8: An exemplar process assessment model for IT service management |
I.S. EN ISO 9000:2015 | QUALITY MANAGEMENT SYSTEMS - FUNDAMENTALS AND VOCABULARY (ISO 9000:2015) |
EN ISO 21091:2013 | Health informatics - Directory services for healthcare providers, subjects of care and other entities (ISO 21091:2013) |
EN ISO/IEC 27043:2016 | Information technology - Security techniques - Incident investigation principles and processes (ISO/IEC 27043:2015) |
UNI/TS 11465-1 : 2012 | ELECTRONIC SIGNATURES AND INFRASTRUCTURES (ESI) - DATA PRESERVATION SYSTEMS SECURITY - PART 1: REQUIREMENTS FOR IMPLEMENTATION AND MANAGEMENT |
UNI EN ISO 15189 : 2013 | MEDICAL LABORATORIES - REQUIREMENTS FOR QUALITY AND COMPETENCE |
CSA ISO/IEC 27009 : 2018 | INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - SECTOR-SPECIFIC APPLICATION OF ISO/IEC 27001 - REQUIREMENTS |
BS ISO/IEC 27018:2014 | Information technology. Security techniques. Code of practice for protection of personally identifiable information (PII) in public clouds acting as PII processors |
UNI CEI ISO/IEC TR 20000-3 : 2010 | INFORMATION TECHNOLOGY - SERVICE MANAGEMENT - PART 3: GUIDANCE ON SCOPE DEFINITION AND APPLICABILITY OF ISO/IEC 20000-1 |
PD IEC/TR 80001-2-3:2012 | Application of risk management for IT-networks incorporating medical devices Guidance for wireless networks |
12/30250178 DC : 0 | BS ISO/IEC 27036-3 - INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - INFORMATION SECURITY FOR SUPPLIER RELATIONSHIPS - PART 3: GUIDELINES FOR ICT SUPPLY CHAIN SECURITY |
12/30249606 DC : 0 | BS EN 62645 ED 1.0 - NUCLEAR POWER PLANTS - INSTRUMENTATION AND CONTROL SYSTEMS - REQUIREMENT S FOR SECURITY PROGRAMMES FOR COMPUTER-BASED SYSTEMS |
10/30162769 DC : DRAFT NOV 2010 | BS ISO/IEC 27007 - INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - GUIDELINES FOR INFORMATION SECURITY MANAGEMENT SYSTEMS AUDITING |
ISO/TR 21548:2010 | Health informatics Security requirements for archiving of electronic health records Guidelines |
PD IEC/TR 80001-2-8:2016 | Application of risk management for IT-networks incorporating medical devices Application guidance. Guidance on standards for establishing the security capabilities identified in IEC TR 80001-2-2 |
CAN/CSA-ISO/IEC 27010:16 | Information technology - Security techniques - Information security management for inter-sector and inter-organizational communications (Adopted ISO/IEC 27010:2015, second edition, 2015-11-15) |
BS ISO/IEC/IEEE 26531:2015 | Systems and software engineering. Content management for product lifecycle, user and service management documentation |
BS IEC 62855:2016 | Nuclear power plants. Electrical power systems. Electrical power systems analysis |
BS ISO/IEC 27017:2015 | Information technology. Security techniques. Code of practice for information security controls based on ISO/IEC 27002 for cloud services |
TS 102 640-5 : 2.1.2 | ELECTRONIC SIGNATURES AND INFRASTRUCTURES (ESI); REGISTERED ELECTRONIC MAIL (REM); PART 5: REM-MD INTEROPERABILITY PROFILES |
INCITS/ISO/IEC 27010 : 2017 | INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - INFORMATION SECURITY MANAGEMENT FOR INTER-SECTOR AND INTER-ORGANIZATIONAL COMMUNICATIONS |
I.S. EN 16844:2017 | AESTHETIC MEDICINE SERVICES - NON-SURGICAL MEDICAL PROCEDURES |
12/30250175 DC : 0 | BS ISO/IEC 27036-2 - INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - INFORMATION SECURITY FOR SUPPLIER RELATIONSHIPS - PART 2: COMMON REQUIREMENTS |
11/30207799 DC : 0 | BS ISO/IEC 27037 - INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - GUIDELINES FOR IDENTIFICATION, COLLECTION, ACQUISITION AND PRESERVATION OF DIGITAL EVIDENCE |
CSA INFORMATION SECURITY PACKAGE : 2018 | CONSISTS OF CAN/CSA-ISO/IEC 27000:18 - INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - INFORMATION SECURITY MANAGEMENT SYSTEMS - OVERVIEW AND VOCABULARY; CAN/CSA-ISO/IEC 27001:14, INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - INFORMATION SECURITY MANAGEMENT SYSTEMS - REQUIREMENTS; CAN/CSA-ISO/IEC 27002:15 - INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - CODE OF PRACTICE FOR INFORMATION |
GS NFV-REL 005 : 1.1.1 | NETWORK FUNCTIONS VIRTUALISATION (NFV); ACCOUNTABILITY; REPORT ON QUALITY ACCOUNTABILITY FRAMEWORK |
14/30304350 DC : 0 | BS EN ISO 27799 - HEALTH INFORMATICS - INFORMATION SECURITY MANAGEMENT IN HEALTH USING ISO/IEC 27002 |
BS ISO/IEC 27039:2015 | Information technology. Security techniques. Selection, deployment and operations of intrusion detection and prevention systems (IDPS) |
PD IEC/TR 80001-2-2:2012 | Application of risk management for IT-networks incorporating medical devices Guidance for the disclosure and communication of medical device security needs, risks and controls |
14/30296542 DC : 0 | BS ISO/IEC/IEEE 23026 - SYSTEMS AND SOFTWARE ENGINEERING - ENGINEERING AND MANAGEMENT OF WEBSITES FOR SYSTEMS, SOFTWARE, AND SERVICES INFORMATION |
PD CEN/TR 15640:2007 | Health informatics. Measures for ensuring the patient safety of health software |
ISO/IEC 27035-1:2016 | Information technology — Security techniques — Information security incident management — Part 1: Principles of incident management |
IEC 61587-6:2017 | Mechanical structures for electrical and electronic equipment - Tests for IEC 60917 and IEC 60297 series - Part 6: Security aspects for indoor cabinets |
BS ISO/IEC 15026-1:2013 | Systems and software engineering. Systems and software assurance Concepts and vocabulary |
ISO 19153:2014 | Geospatial Digital Rights Management Reference Model (GeoDRM RM) |
16/30338037 DC : 0 | BS ISO/IEC 30754 - INFORMATION TECHNOLOGY - SOFTWARE TRUSTWORTHINESS - GOVERNANCE AND MANAGEMENT - SPECIFICATION |
BIP 0071 : 2014 | GUIDELINES ON REQUIREMENTS AND PREPARATION FOR ISMS CERTIFICATION BASED ON ISO/IEC 27001 |
BS ISO/IEC 27010:2015 | Information technology. Security techniques. Information security management for inter-sector and inter-organizational communications |
13/30268559 DC : 0 | BS ISO/IEC 15026-1 - SYSTEMS AND SOFTWARE ENGINEERING - SYSTEMS AND SOFTWARE ASSURANCE - PART 1: CONCEPTS AND VOCABULARY |
PD IEC/TR 63084:2017 | Nuclear power plants. Instrumentation and control important to safety. Platform qualification for systems important to safety |
BS ISO/IEC 27007:2017 | Information technology. Security techniques. Guidelines for information security management systems auditing |
PD ISO/TR 11633-1:2009 | Health informatics. Information security management for remote maintenance of medical devices and medical information systems Requirements and risk analysis |
BS ISO 10008:2013 | Quality management. Customer satisfaction. Guidelines for business-to-consumer electronic commerce transactions |
PD CEN/TR 16742:2014 | Intelligent transport systems. Privacy aspects in ITS standards and systems in Europe |
12/30168696 DC : 0 | BS ISO/IEC 29115 - INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - ENTITY AUTHENTICATION ASSURANCE FRAMEWORK |
ISO 20488:2018 | Online consumer reviews — Principles and requirements for their collection, moderation and publication |
ANSI/AAMI/IEC TIR80001-2-1:2012 | APPLICATION OF RISK MANAGEMENT FOR IT-NETWORKS INCORPORATING MEDICAL DEVICES - PART 2-1: STEP BY STEP RISK MANAGEMENT OF MEDICAL IT-NETWORKS - PRACTICAL APPLICATIONS AND EXAMPLES |
14/30285107 DC : 0 | BS ISO/IEC/IEEE 26531 - SYSTEMS AND SOFTWARE ENGINEERING - CONTENT MANAGEMENT FOR PRODUCT LIFE-CYCLE, USER AND SERVICE MANAGEMENT DOCUMENTATION |
PD ISO/TR 15801:2017 | Document management. Electronically stored information. Recommendations for trustworthiness and reliability |
CSA ISO/IEC 27000 : 2018 | INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - INFORMATION SECURITY MANAGEMENT SYSTEMS - OVERVIEW AND VOCABULARY |
UNE-ISO 26000:2012 | Guidance on social responsibility |
CEI UNI ISO/IEC TR 20000-3 : 2011 | INFORMATION TECHNOLOGY - SERVICE MANAGEMENT - PART 3: GUIDANCE ON SCOPE DEFINITION AND APPLICABILITY OF ISO/IEC 20000-1 |
DIN ISO/IEC 17789:2016-10 (Draft) | INFORMATION TECHNOLOGY - CLOUD COMPUTING - REFERENCE ARCHITECTURE (ISO/IEC 17789:2014) |
BS ISO/IEC 19941:2017 | Information technology. Cloud computing. Interoperability and portability |
SR 003 091 : 1.1.2 | ELECTRONIC SIGNATURES AND INFRASTRUCTURES (ESI); RECOMMENDATIONS ON GOVERNANCE AND AUDIT REGIME FOR CAB FORUM EXTENDED VALIDATION AND BASELINE CERTIFICATES |
DIN CEN ISO/TS 19299;DIN SPEC 74125:2016-02 | ELECTRONIC FEE COLLECTION - SECURITY FRAMEWORK (ISO/TS 19299:2015) |
ISO/IEC 27036-3:2013 | Information technology — Security techniques — Information security for supplier relationships — Part 3: Guidelines for information and communication technology supply chain security |
11/30246891 DC : 0 | BS ISO/IEC 27006 - INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - REQUIREMENTS FOR BODIES PROVIDING AUDIT AND CERTIFICATION OF INFORMATION SECURITY MANAGEMENT SYSTEMS |
PD IEC/TR 80001-2-1:2012 | Application of risk management for IT-networks incorporating medical devices Step-by-step risk management of medical IT-networks. Practical applications and examples |
12/30269414 DC : 0 | BS EN 16495 - AIR TRAFFIC MANAGEMENT - INFORMATION SECURITY FOR ORGANISATIONS SUPPORTING CIVIL AVIATION OPERATIONS |
BS EN ISO/IEC 27043:2016 | Information technology. Security techniques. Incident investigation principles and processes |
BIP 0105 : 2008 | INFORMATION SECURITY BASED ON ISO 27001/ISO 17799: A MANAGEMENT GUIDE |
07/30166242 DC : 0 | BS ISO/IEC 27011 - INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - INFORMATION SECURITY MANAGEMENT GUIDELINES FOR TELECOMMUNICATIONS |
PD CEN ISO/TS 19299:2015 | Electronic fee collection. Security framework |
BS ISO/IEC 27031:2011 | Information technology. Security techniques. Guidelines for information and communication technology readiness for business continuity |
15/30320354 DC : 0 | BS ISO/IEC 27010 - INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - INFORMATION SECURITY MANAGEMENT FOR INTER-SECTOR AND INTER-ORGANIZATIONAL COMMUNICATIONS |
BS ISO/IEC 29182-4:2013 | Information technology. Sensor networks: Sensor Network Reference Architecture (SNRA) Entity models |
13/30266767 DC : 0 | BS ISO/IEC 27018 - INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - CODE OF PRACTICE FOR P2 PROTECTION IN PUBLIC CLOUD ACTING AS P2 PROCESSORS |
BS ISO 10789:2011 | Space systems. Programme management. Information and documentation management |
BS EN ISO 27799:2008 | Health informatics. Information security management in health using ISO/IEC 27002 |
17/30329617 DC : 0 | BS ISO/IEC 29110-4-3 - SYSTEMS AND SOFTWARE ENGINEERING - LIFECYCLE PROFILES FOR VERY SMALL ENTITIES (VSES) - PART 4-3: SERVICE DELIVERY - PROFILE SPECIFICATION |
BIP 3093 : 2013 | THE RISK MANAGEMENT STANDARDS AND GUIDANCE COLLECTION |
BIS IS/ISO 19011 : 2011(R2016) | GUIDELINES FOR AUDITING MANAGEMENT SYSTEMS |
12/30209825 DC : 0 | BS ISO/IEC 27014 - INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - GOVERNANCE OF INFORMATION SECURITY |
BIS IS/ISO/IEC 27004 : 2009 | INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - INFORMATION SECURITY MANAGEMENT - MEASUREMENT |
08/30134763 DC : DRAFT JUNE 2008 | BS ISO/IEC 27004 - INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - INFORMATION SECURITY MANAGEMENT - MEASUREMENT |
CSA ISO 9004 : 2009 | MANAGING FOR THE SUSTAINED SUCCESS OF AN ORGANIZATION - A QUALITY MANAGEMENT APPROACH |
CSA ISO/IEC 15408-1 : 2010 : R2015 | INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - EVALUATION CRITERIA FOR IT SECURITY - PART 1: INTRODUCTION AND GENERAL MODEL |
INCITS/ISO/IEC 27033-2 : 2014 | INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - NETWORK SECURITY - PART 2: GUIDELINES FOR THE DESIGN AND IMPLEMENTATION OF NETWORK SECURITY |
UNI CEN/TS 16439 : 2013 | ELECTRONIC FEE COLLECTION - SECURITY FRAMEWORK |
TS 119 401 : 2.0.1 | ELECTRONIC SIGNATURES AND INFRASTRUCTURES (ESI); GENERAL POLICY REQUIREMENTS FOR TRUST SERVICE PROVIDERS |
16/30326000 DC : 0 | BS ISO/IEC 19770-1 - INFORMATION TECHNOLOGY - IT ASSET MANAGEMENT - PART 1: IT ASSET MANAGEMENT SYSTEMS - REQUIREMENTS |
TS 102 640-6-2 : 1.1.1 | ELECTRONIC SIGNATURES AND INFRASTRUCTURES (ESI); REGISTERED ELECTRONIC MAIL (REM); PART 6: INTEROPERABILITY PROFILES; SUB-PART 2: REM-MD BUSDOX INTEROPERABILITY PROFILE |
TR 102 605 : 1.1.1 | ELECTRONIC SIGNATURES AND INFRASTRUCTURES (ESI); REGISTERED E-MAIL |
ISO/IEC 29134:2017 | Information technology — Security techniques — Guidelines for privacy impact assessment |
CSA ISO/IEC 20000-2:2013 | INFORMATION TECHNOLOGY - SERVICE MANAGEMENT - PART 2: GUIDANCE ON THE APPLICATION OF SERVICE MANAGEMENT SYSTEMS |
INCITS/ISO/IEC 27039 : 2017 | INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - SELECTION, DEPLOYMENT AND OPERATIONS OF INTRUSION DETECTION AND PREVENTION SYSTEMS (IDPS) |
INCITS/ISO/IEC 18028-1 : 2008 | INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - IT NETWORK SECURITY - PART 1: NETWORK SECURITY MANAGEMENT |
CSA ISO 9004 : 2009 : R2015 | MANAGING FOR THE SUSTAINED SUCCESS OF AN ORGANIZATION - A QUALITY MANAGEMENT APPROACH |
16/30334735 DC : 0 | BS EN 15224 - HEALTH CARE SERVICES - QUALITY MANAGEMENT SYSTEMS - REQUIREMENTS BASED ON EN ISO 9001:2015 |
ISO 19011:2011 | Guidelines for auditing management systems |
BIS IS/ISO 9000 : 2015 | QUALITY MANAGEMENT SYSTEMS - FUNDAMENTALS AND VOCABULARY |
15/30267674 DC : 0 | BS ISO/IEC 27035-1 - INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - INFORMATION SECURITY INCIDENT MANAGEMENT - PART 1: PRINCIPLES OF INCIDENT MANAGEMENT |
ISO/IEC 27035-2:2016 | Information technology — Security techniques — Information security incident management — Part 2: Guidelines to plan and prepare for incident response |
CSA ISO/IEC TR 20000-5 : 2015 | INFORMATION TECHNOLOGY - SERVICE MANAGEMENT - PART 5: EXEMPLAR IMPLEMENTATION PLAN FOR ISO/IEC 20000-1 |
ISO/IEC 19770-1:2017 | Information technology — IT asset management — Part 1: IT asset management systems — Requirements |
TS 119 172-1 : 1.1.1 | ELECTRONIC SIGNATURES AND INFRASTRUCTURES (ESI); SIGNATURE POLICIES; PART 1: BUILDING BLOCKS AND TABLE OF CONTENTS FOR HUMAN READABLE SIGNATURE POLICY DOCUMENTS |
UNE-ISO/IEC 27000:2014 | Information technology -- Security techniques -- Information security management systems -- Overview and vocabulary |
SR 003 391 : 2.1.1 | CLOUD STANDARDS COORDINATION PHASE 2; INTEROPERABILITY AND SECURITY IN CLOUD COMPUTING |
I.S. EN IEC 62443-4-1:2018 | SECURITY FOR INDUSTRIAL AUTOMATION AND CONTROL SYSTEMS - PART 4-1: SECURE PRODUCT DEVELOPMENT LIFECYCLE REQUIREMENTS |
GS ISI 001-2 : 1.1.2 | INFORMATION SECURITY INDICATORS (ISI); INDICATORS (INC); PART 2: GUIDE TO SELECT OPERATIONAL INDICATORS BASED ON THE FULL SET GIVEN IN PART 1 |
I.S. EN ISO/IEC 27037:2016 | INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - GUIDELINES FOR IDENTIFICATION, COLLECTION, ACQUISITION AND PRESERVATION OF DIGITAL EVIDENCE (ISO/IEC 27037:2012) |
I.S. EN 61069-5:2016 | INDUSTRIAL-PROCESS MEASUREMENT, CONTROL AND AUTOMATION - EVALUATION OF SYSTEM PROPERTIES FOR THE PURPOSE OF SYSTEM ASSESSMENT - PART 5: ASSESSMENT OF SYSTEM DEPENDABILITY |
CSA ISO/IEC TR 15443-1 : 2015 | INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - SECURITY ASSURANCE FRAMEWORK - PART 1: INTRODUCTION AND CONCEPTS |
ISO/IEC 19790:2012 | Information technology — Security techniques — Security requirements for cryptographic modules |
PREN 15224 : DRAFT 2016 | HEALTH CARE SERVICES - QUALITY MANAGEMENT SYSTEMS - REQUIREMENTS BASED ON EN ISO 9001:2015 |
ISO/TR 18128:2014 | Information and documentation — Risk assessment for records processes and systems |
ISO 13485 - PRACTICAL GUIDE : 2016 | ISO 13485:2016 - MEDICAL DEVICES - A PRACTICAL GUIDE |
UNE ISO 20252 : 2012 | MARKET, OPINION AND SOCIAL RESEARCH - VOCABULARY AND SERVICE REQUIREMENTS |
IWA 26:2017 | Using ISO 26000:2010 in management systems |
S.R. CWA 16036:2009 | CYBER-IDENTITY - UNIQUE IDENTIFICATION SYSTEMS FOR ORGANIZATIONS AND PARTS THEREOF |
ISO/IEC 27033-5:2013 | Information technology — Security techniques — Network security — Part 5: Securing communications across networks using Virtual Private Networks (VPNs) |
I.S. EN ISO/IEC 27002:2017 | INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - CODE OF PRACTICE FOR INFORMATION SECURITY CONTROLS (ISO/IEC 27002:2013 INCLUDING COR 1:2014 AND COR 2:2015) |
ISO/IEC 30100-2:2016 | Information technology Home network resource management Part 2: Architecture |
I.S. ISO/IEC 27002:2013 | INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - CODE OF PRACTICE FOR INFORMATION SECURITY CONTROLS |
AEP-67 : 2010 | ENGINEERING FOR SYSTEM ASSURANCE IN NATO PROGRAMMES |
ISO/IEC/IEEE 23026:2015 | Systems and software engineering — Engineering and management of websites for systems, software, and services information |
17/30358105 DC : 0 | BS EN 15341 - MAINTENANCE - MAINTENANCE KEY PERFORMANCE INDICATORS |
IEEE 2410-2015 | IEEE Standard for Biometric Open Protocol |
BS ISO 26000:2010 | Guidance on social responsibility |
CEI UNI ISO/IEC 27002 : 2014 | INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - CODE OF PRACTICE FOR INFORMATION SECURITY CONTROLS |
ISO/IEC 33071:2016 | Information technology — Process assessment — An integrated process capability assessment model for Enterprise processes |
UNE-ISO/IEC TR 20000-3:2011 IN | Information technology. Service management. Part 3: Guidance on scope definition and applicability of ISO/IEC 20000-1 |
EN ISO 9004:2018 | Quality management - Quality of an organization - Guidance to achieve sustained success (ISO 9004:2018) |
ISO/IEC 27034-1:2011 | Information technology — Security techniques — Application security — Part 1: Overview and concepts |
ISO/IEC TR 15026-1:2010 | Systems and software engineering Systems and software assurance Part 1: Concepts and vocabulary |
ISO/IEC 27010:2015 | Information technology Security techniques Information security management for inter-sector and inter-organizational communications |
UNI EN ISO 22301 : 2014 | SOCIETAL SECURITY - BUSINESS CONTINUITY MANAGEMENT SYSTEMS - REQUIREMENTS |
ISO/IEC TR 15443-1:2012 | Information technology Security techniques Security assurance framework Part 1: Introduction and concepts |
ISO/IEC 29147:2014 | Information technology Security techniques Vulnerability disclosure |
ISO 10008:2013 | Quality management — Customer satisfaction — Guidelines for business-to-consumer electronic commerce transactions |
ISO/IEC 29115:2013 | Information technology — Security techniques — Entity authentication assurance framework |
ISO 30302:2015 | Information and documentation Management systems for records Guidelines for implementation |
ISO/IEC 18028-1:2006 | Information technology Security techniques IT network security Part 1: Network security management |
S.R. CWA 15929:2009 | BEST PRACTICES FOR THE DESIGN AND DEVELOPMENT OF CRITICAL INFORMATION SYSTEMS |
ISO/IEC 27033-1:2015 | Information technology Security techniques Network security Part 1: Overview and concepts |
IEC 62855:2016 | Nuclear power plants - Electrical power systems - Electrical power systems analysis |
IEC TR 80001-2-2:2012 | Application of risk management for IT-networks incorporating medical devices - Part 2-2: Guidance for the disclosure and communication of medical device security needs, risks and controls |
ISO/IEC 27011:2016 | Information technology — Security techniques — Code of practice for Information security controls based on ISO/IEC 27002 for telecommunications organizations |
DIN EN ISO 9000:2015-11 | QUALITY MANAGEMENT SYSTEMS - FUNDAMENTALS AND VOCABULARY (ISO 9000:2015) |
IEEE 45.3-2015 | IEEE Recommended Practice for Shipboard Electrical Installations -- Systems Engineering |
ISO 26000:2010 | Guidance on social responsibility |
ISO 22301:2012 | Societal security Business continuity management systems Requirements |
ISO 21091:2013 | Health informatics — Directory services for healthcare providers, subjects of care and other entities |
BS ISO/IEC 27040 : 2015 | INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - STORAGE SECURITY |
BS EN ISO/IEC 27040:2016 | Information technology. Security techniques. Storage security |
UNE-EN ISO 22301:2015 | Societal security - Business continuity management systems - Requirements (ISO 22301:2012) |
ISO/IEC 27040:2015 | Information technology — Security techniques — Storage security |
ISO/IEC 20000-3:2012 | Information technology Service management Part 3: Guidance on scope definition and applicability of ISO/IEC 20000-1 |
ISO/TS 14441:2013 | Health informatics — Security and privacy requirements of EHR systems for use in conformity assessment |
ISO 15189:2012 | Medical laboratories — Requirements for quality and competence |
ISO/IEC 20000-2:2012 | Information technology Service management Part 2: Guidance on the application of service management systems |
IEC TR 63084:2017 | Nuclear power plants - Instrumentation and control important to safety - Platform qualification for systems important to safety |
ISO/IEC TR 20000-5:2013 | Information technology Service management Part 5: Exemplar implementation plan for ISO/IEC 20000-1 |
BS EN ISO 15189:2012 | Medical laboratories. Requirements for quality and competence |
EN ISO/IEC 27000:2017 | Information technology - Security techniques - Information security management systems - Overview and vocabulary (ISO/IEC 27000:2016) |
ISO 18295-1:2017 | Customer contact centres — Part 1: Requirements for customer contact centres |
EN 61511-1:2017/A1:2017 | FUNCTIONAL SAFETY - SAFETY INSTRUMENTED SYSTEMS FOR THE PROCESS INDUSTRY SECTOR - PART 1: FRAMEWORK, DEFINITIONS, SYSTEM, HARDWARE AND APPLICATION PROGRAMMING REQUIREMENTS |
EN ISO/IEC 27002:2017 | Information technology - Security techniques - Code of practice for information security controls (ISO/IEC 27002:2013 including Cor 1:2014 and Cor 2:2015) |
EN ISO/IEC 27040:2016 | Information technology - Security techniques - Storage security (ISO/IEC 27040:2015) |
EN ISO 22301:2014 | Societal security - Business continuity management systems - Requirements (ISO 22301:2012) |
EN ISO 18295-1:2017 | Customer contact centres - Part 1: Requirements for customer contact centres (ISO 18295-1:2017) |
EN ISO 27799:2016 | Health informatics - Information security management in health using ISO/IEC 27002 (ISO 27799:2016) |
EN ISO/IEC 27037:2016 | Information technology - Security techniques - Guidelines for identification, collection, acquisition and preservation of digital evidence (ISO/IEC 27037:2012) |
EN 16495:2014 | Air Traffic Management - Information security for organisations supporting civil aviation operations |
I.S. EN ISO 19011:2011 | GUIDELINES FOR AUDITING MANAGEMENT SYSTEMS (ISO 19011:2011) |
INCITS/ISO/IEC 27013 : 2014 | INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - GUIDANCE ON THE INTEGRATED IMPLEMENTATION OF ISO/IEC 27001 AND ISO/IEC 20000-1 |
NASA CCSDS 350.8-G : ISSUE 1 | INFORMATION SECURITY GLOSSARY OF TERMS |
PREN 50436-6 : DRAFT 2013 | ALCOHOL INTERLOCKS - TEST METHODS AND PERFORMANCE REQUIREMENTS - PART 6: DATA SECURITY |
BS ISO/IEC 27014:2013 | Information technology. Security techniques. Governance of information security |
AAMI IEC TIR 80001-2-2 : 2012 | APPLICATION OF RISK MANAGEMENT FOR IT-NETWORKS INCORPORATING MEDICAL DEVICES - PART 2-2: GUIDANCE FOR THE DISCLOSURE AND COMMUNICATION OF MEDICAL DEVICE SECURITY NEEDS, RISKS AND CONTROLS |
CSA ISO 10008 : 2015 | QUALITY MANAGEMENT - CUSTOMER SATISFACTION - GUIDELINES FOR BUSINESS-TO-CONSUMER ELECTRONIC COMMERCE TRANSACTIONS |
12/30209299 DC : 0 | BS ISO 10008 - QUALITY MANAGEMENT - CUSTOMER SATISFACTION - GUIDELINES FOR BUSINESS-TO-CONSUMER ELECTRONIC COMMERCE TRANSACTIONS |
BS ISO/IEC 27036-2:2014 | Information technology. Security techniques. Information security for supplier relationships Requirements |
16/30300696 DC : 0 | BS EN ISO 18295-1 - CUSTOMER CONTACT CENTRES - PART 1: REQUIREMENTS FOR CUSTOMER CONTACT CENTRES |
BS ISO/IEC 27036-3:2013 | Information technology. Security techniques. Information security for supplier relationships Guidelines for information and communication technology supply chain security |
IWA 17:2014 | Information and operations security and integrity requirements for lottery and gaming organizations |
UNI EN ISO 21091 : 2013 | HEALTH INFORMATICS - DIRECTORY SERVICES FOR HEALTHCARE PROVIDERS, SUBJECTS OF CARE AND OTHER ENTITIES |
BS ISO 20252:2012 | Market, opinion and social research. Vocabulary and service requirements |
BS ISO/IEC 27037 : 2012 | INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - GUIDELINES FOR IDENTIFICATION, COLLECTION, ACQUISITION, AND PRESERVATION OF DIGITAL EVIDENCE |
18/30358588 DC : 0 | BS EN ISO 29001 - PETROLEUM, PETROCHEMICAL AND NATURAL GAS INDUSTRIES - SECTOR-SPECIFIC QUALITY MANAGEMENT SYSTEMS - REQUIREMENTS FOR PRODUCT AND SERVICE SUPPLY ORGANIZATIONS |
S.R. CEN TR 15640:2007 | HEALTH INFORMATICS - MEASURES FOR ENSURING THE PATIENT SAFETY OF HEALTH SOFTWARE |
PD ISO/IEC TR 20000-11:2015 | Information technology. Service management Guidance on the relationship between ISO/IEC 20000-1:2011 and service management frameworks: ITIL® |
ISO/IEC 19941:2017 | Information technology — Cloud computing — Interoperability and portability |
CAN/CSA-ISO/IEC 17789:16 | Information technology Cloud computing Reference architecture (Adopted ISO/IEC 17789:2014, first edition, 2014-10-15) |
CSA ISO/IEC 24762 : 2008 : R2013 | INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - GUIDELINES FOR INFORMATION AND COMMUNICATIONS TECHNOLOGY DISASTER RECOVERY SERVICES |
S.R. CEN/TS 15480-4:2012 | IDENTIFICATION CARD SYSTEMS - EUROPEAN CITIZEN CARD - PART 4: RECOMMENDATIONS FOR EUROPEAN CITIZEN CARD ISSUANCE, OPERATION AND USE |
PD ISO/IEC TS 33052:2016 | Information technology. Process reference model (PRM) for information security management |
UNE-CWA 16393:2014 | Laboratory biorisk management - Guidelines for the implementation of CWA 15793:2008 |
14/30298663 DC : 0 | BS ISO 30302 - INFORMATION AND DOCUMENTATION - MANAGEMENT SYSTEMS FOR RECORDS - GUIDELINES FOR IMPLEMENTATION |
PD ISO/IEC TR 20000-9:2015 | Information technology. Service management Guidance on the application of ISO/IEC 20000-1 to cloud services |
BS ISO/IEC 19770-1:2017 | Information technology. IT asset management IT asset management systems. Requirements |
CSA ISO/IEC 27007 : 2013 | INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - GUIDELINES FOR INFORMATION SECURITY MANAGEMENT SYSTEMS AUDITING |
CEI UNI ISO/IEC 20000-1 : 2012 | INFORMATION TECHNOLOGY - SERVICE MANAGEMENT - PART 1: SERVICE MANAGEMENT SYSTEM REQUIREMENTS |
GS ISI 001-1 : 1.1.2 | INFORMATION SECURITY INDICATORS (ISI); INDICATORS (INC); PART 1: A FULL SET OF OPERATIONAL INDICATORS FOR ORGANIZATIONS TO USE TO BENCHMARK THEIR SECURITY POSTURE |
EN 319 401 : 2.2.1 | ELECTRONIC SIGNATURES AND INFRASTRUCTURES (ESI); GENERAL POLICY REQUIREMENTS FOR TRUST SERVICE PROVIDERS |
ISO/IEC TR 20000-3:2009 | Information technology — Service management — Part 3: Guidance on scope definition and applicability of ISO/IEC 20000-1 |
PD ISO/TR 18128:2014 | Information and documentation. Risk assessment for records processes and systems |
BS ISO/IEC 27033-2:2012 | Information technology. Security techniques. Network security Guidelines for the design and implementation of network security |
15/30259619 DC : 0 | BS ISO/IEC 27017 - INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - CODE OF PRACTICE FOR INFORMATION SECURITY CONTROLS BASED ON ISO/IEC 27002 FOR CLOUD SERVICES |
09/30168526 DC : 0 | BS ISO/IEC 27033-1 - INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - NETWORK SECURITY - PART 1: GUIDELINES FOR NETWORK SECURITY |
BS ISO 28002:2011 | Security management systems for the supply chain. Development of resilience in the supply chain. Requirements with guidance for use |
ISO/IEC 20000-6:2017 | Information technology — Service management — Part 6: Requirements for bodies providing audit and certification of service management systems |
PD ISO/IEC TS 33072:2016 | Information technology. Process assessment. Process capability assessment model for information security management |
08/30146238 DC : DRAFT JUNE 2008 | BS ISO/IEC 27000 - INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - INFORMATION SECURITY MANAGEMENT SYSTEM - OVERVIEW AND VOCABULARY |
DIN ISO/IEC 27018:2017-08 | INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - CODE OF PRACTICE FOR PROTECTION OF PERSONALLY IDENTIFIABLE INFORMATION (PII) IN PUBLIC CLOUDS ACTING AS PII PROCESSORS (ISO/IEC 27018:2014) |
PD ISO/IEC TR 20000-10:2015 | Information technology. Service management Concepts and terminology |
10/30168519 DC : DRAFT JUNE 2010 | BS ISO/IEC 27034-1 - INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - APPLICATION SECURITY - PART 1: OVERVIEW AND CONCEPTS |
UNI CEI ISO/IEC 20000-1 : 2012 | INFORMATION TECHNOLOGY - SERVICE MANAGEMENT - PART 1: SERVICE MANAGEMENT SYSTEM REQUIREMENTS |
DIN EN ISO 18295-1:2016-07 (Draft) | CUSTOMER CONTACT CENTRES - PART 1: REQUIREMENTS FOR CUSTOMER CONTACT CENTRES (ISO 18295-1:2017) |
BS EN 61511-1 : 2017 | FUNCTIONAL SAFETY - SAFETY INSTRUMENTED SYSTEMS FOR THE PROCESS INDUSTRY SECTOR - PART 1: FRAMEWORK, DEFINITIONS, SYSTEM, HARDWARE AND APPLICATION PROGRAMMING REQUIREMENTS (IEC 61511-1:2016 + COR1:2016) |
PD CEN ISO/TS 14441:2013 | Health informatics. Security and privacy requirements of EHR systems for use in conformity assessment |
ISO/IEC TR 20000-12:2016 | Information technology Service management Part 12: Guidance on the relationship between ISO/IEC 20000-1:2011 and service management frameworks: CMMI-SVC |
14/30298031 DC : 0 | BS EN 61069-5 ED 2.0 - INDUSTRIAL-PROCESS MEASUREMENT AND CONTROL - EVALUATION OF SYSTEM PROPERTIES FOR THE PURPOSE OF SYSTEM ASSESSMENT - PART 5: ASSESSMENT OF SYSTEM DEPENDABILITY |
05/30125021 DC : DRAFT JULY 2005 | BS 7799-3 - INFORMATION SECURITY MANAGEMENT SYSTEMS - PART 3: GUIDELINES FOR INFORMATION SECURITY RISK MANAGEMENT |
IEEE 15026-4-2013 | IEEE Standard Adoption of ISO/IEC 15026-4--Systems and Software Engineering--Systems and Software Assurance--Part 4: Assurance in the Life Cycle |
INCITS/ISO/IEC 27043 : 2017 | INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - INCIDENT INVESTIGATION PRINCIPLES AND PROCESSES |
11/30207802 DC : 0 | BS ISO/IEC 27013 - INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - GUIDELINES ON THE INTEGRATED IMPLEMENTATION OF ISO/IEC 27001 AND ISO/IEC 20000-1 |
13/30277600 DC : 0 | BS ISO 37500 - GUIDANCE ON OUTSOURCING |
BS ISO/IEC 27034-1:2011 | Information technology. Security techniques. Application security Overview and concepts |
10/30217464 DC : 0 | BS ISO 28002 - SECURITY MANAGEMENT SYSTEMS FOR THE SUPPLY CHAIN - DEVELOPMENT OF RESILIENCY IN THE SUPPLY CHAIN - REQUIREMENTS WITH GUIDANCE FOR USE |
BS ISO/IEC 27021:2017 | Information technology. Security techniques. Competence requirements for information security management systems professionals |
BS ISO/IEC 27013:2015 | Information technology. Security techniques. Guidance on the integrated implementation of ISO/IEC 27001 and ISO/IEC 20000-1 |
PD CEN/TS 16439:2013 | Electronic fee collection. Security framework |
PD ISO/IEC TR 27016:2014 | Information technology. Security techniques. Information security management. Organizational economics |
INCITS/ISO/IEC 27002 : 2014 | INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - CODE OF PRACTICE FOR INFORMATION SECURITY CONTROLS |
17/30213621 DC : 0 | BS ISO/IEC 27034-3 - INFORMATION TECHNOLOGY - APPLICATION SECURITY - PART 3: APPLICATION SECURITY MANAGEMENT PROCESS |
13/30250756 DC : 0 | BS ISO/IEC 27039 - INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - SELECTION, DEPLOYMENT AND OPERATIONS OF INTRUSION DETECTION SYSTEMS |
PD ISO/TR 17522:2015 | Health informatics. Provisions for health applications on mobile/smart devices |
17/30339128 DC : 0 | BS ISO/IEC 21277 - INFORMATION TECHNOLOGY - RADIO FREQUENCY IDENTIFICATION DEVICE PERFORMANCE TEST METHODS - CRYPTO SUITE |
BS ISO 37001:2016 | Anti-bribery management systems. Requirements with guidance for use |
ISO/IEC 15408-1:2009 | Information technology — Security techniques — Evaluation criteria for IT security — Part 1: Introduction and general model |
BS ISO/IEC 27004:2016 | Information technology. Security techniques. Information security management. Monitoring, measurement, analysis and evaluation |
CAN/CSA-ISO/IEC 27031:13 (R2017) | Information technology - Security techniques - Guidelines for information and communication technology readiness for business continuity (Adopted ISO/IEC 27031:2011, first edition, 2011-03-01) |
BS ISO/IEC 30111:2013 | Information technology. Security techniques. Vulnerability handling processes |
INCITS/ISO/IEC 18028-3 : 2008 | INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - IT NETWORK SECURITY - PART 3: SECURING COMMUNICATIONS BETWEEN NETWORKS USING SECURITY GATEWAYS |
06/30148917 DC : DRAFT MAY 2006 | |
BIP 2151 : 2012 | AUDITING BUSINESS CONTINUITY MANAGEMENT PLANS - ASSESS AND IMPROVE YOUR PERFORMANCE AGAINST ISO 22301 |
UNI/TR 11465-2 : 2012 | ELECTRONIC SIGNATURES AND INFRASTRUCTURES (ESI) - DATA PRESERVATION SYSTEMS SECURITY - PART 2: GUIDELINES FOR ASSESSORS |
ISO/IEC 27007:2017 | Information technology Security techniques Guidelines for information security management systems auditing |
BS ISO/IEC 20000-1:2011 | Information technology. Service management Service management system requirements |
PREN 9115 : 200P1 | QUALITY MANAGEMENT SYSTEMS - REQUIREMENTS FOR AVIATION, SPACE AND DEFENSE ORGANIZATIONS - DELIVERABLE SOFTWARE (SUPPLEMENT TO EN 9100) |
INCITS/ISO/IEC 27033-5 : 2014 | INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - NETWORK SECURITY - PART 5: SECURING COMMUNICATIONS ACROSSS NETWORKS USING VIRTUAL PRIVATE NETWORKS (VPNS) |
BS ISO/IEC 20000-3:2012 | Information technology. Service management Guidance on scope definition and applicability of ISO/IEC 20000-1 |
I.S. EN 16495:2014 | AIR TRAFFIC MANAGEMENT - INFORMATION SECURITY FOR ORGANISATIONS SUPPORTING CIVIL AVIATION OPERATIONS |
IEEE/ISO/IEC 15026-1-2014 | IEEE Standard Adoption of ISO/IEC 15026-1--Systems and Software Engineering--Systems and Software Assurance--Part 1: Concepts and Vocabulary |
I.S. EN ISO 9004:2009 | QUALITY MANAGEMENT - QUALITY OF AN ORGANIZATION - GUIDANCE TO ACHIEVE SUSTAINED SUCCESS (ISO 9004:2018) |
S.R. CWA 16047:2009 | E-INVOICING COMPLIANCE GUIDELINES - COMMENTARY TO THE COMPLIANCE MATRIX |
I.S. EN ISO 9241-960:2017 | ERGONOMICS OF HUMAN-SYSTEM INTERACTION - PART 960: FRAMEWORK AND GUIDANCE FOR GESTURE INTERACTIONS (ISO 9241-960:2017) |
ISO/IEC 29151:2017 | Information technology — Security techniques — Code of practice for personally identifiable information protection |
ISO 9004:2018 | Quality management — Quality of an organization — Guidance to achieve sustained success |
S.R. CEN/TS 16850:2015 | SOCIETAL AND CITIZEN SECURITY - GUIDANCE FOR MANAGING SECURITY IN HEALTHCARE FACILITIES |
S.R. CEN/TS 16439:2013 | ELECTRONIC FEE COLLECTION - SECURITY FRAMEWORK |
I.S. EN ISO/IEC 27040:2016 | INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - STORAGE SECURITY (ISO/IEC 27040:2015) |
S.R. CEN/TS 17159:2018 | SOCIETAL AND CITIZEN SECURITY - GUIDANCE FOR THE SECURITY OF HAZARDOUS MATERIALS (CBRNE) IN HEALTHCARE FACILITIES |
S.R. CWA 16393:2012 | LABORATORY BIORISK MANAGEMENT - GUIDELINES FOR THE IMPLEMENTATION OF CWA 15793:2008 |
ISO/IEC 27014:2013 | Information technology Security techniques Governance of information security |
SR 003 381 : 2.1.1 | CLOUD STANDARDS COORDINATION PHASE 2; IDENTIFICATION OF CLOUD USER NEEDS |
ISO/TR 18638:2017 | Health informatics Guidance on health information privacy education in healthcare organizations |
ISO 30301:2011 | Information and documentation Management systems for records Requirements |
ISO/PAS 28002:2010 | Security management systems for the supply chain - Development of resilience in the supply chain - Requirements with guidance for use |
ISO/IEC 27036-2:2014 | Information technology Security techniques Information security for supplier relationships Part 2: Requirements |
BS EN ISO 9241-960:2017 | Ergonomics of human-system interaction Framework and guidance for gesture interactions |
CSA ISO/IEC 18028-1 : 2006 | INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - IT NETWORK SECURITY - PART 1: NETWORK SECURITY MANAGEMENT |
UNI ISO 26000 : 2010 | GUIDANCE ON SOCIAL RESPONSIBILITY |
UNI CEI ISO/IEC 27002 : 2014 | INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - CODE OF PRACTICE FOR INFORMATION SECURITY CONTROLS |
CAN/CSA-ISO/IEC 27006:16 | Information technology - Security techniques - Requirements for bodies providing audit and certification of information security management systems (Adopted ISO/IEC 27006:2015, third edition, 2015-10-01) |
ISO/IEC TS 33052:2016 | Information technology — Process reference model (PRM) for information security management |
ECMA/TR 100 : 1ED 2009 | NEXT GENERATION CORPORATE NETWORKS (NGCN) - SECURITY OF SESSION-BASED COMMUNICATIONS |
ABS 0251 : 2016 | CYBERSECURITY IMPLEMENTATION FOR THE MARINE AND OFFSHORE INDUSTRIES - CYBERSAFETY[TM] VOLUME 2 |
UNE-EN ISO 19011:2012 | Guidelines for auditing management systems (ISO 19011:2011) |
ISO/IEC 19086-1:2016 | Information technology Cloud computing Service level agreement (SLA) framework Part 1: Overview and concepts |
BS EN 16844 : 2017 | AESTHETIC MEDICINE SERVICES - NON-SURGICAL MEDICAL TREATMENTS |
ISO/IEC 27006:2015 | Information technology — Security techniques — Requirements for bodies providing audit and certification of information security management systems |
ISO/IEC 17789:2014 | Information technology — Cloud computing — Reference architecture |
ISO/IEC TR 16166:2010 | Information technology — Telecommunications and information exchange between systems — Next Generation Corporate Networks (NGCN) — Security of session-based communications |
IEC TR 80001-2-3:2012 | Application of risk management for IT-networks incorporating medical devices - Part 2-3: Guidance for wireless networks |
IEC 61511-1:2016+AMD1:2017 CSV | Functional safety - Safety instrumented systems for the process industry sector - Part 1: Framework, definitions, system, hardware and application programming requirements |
ISO/IEC TR 27019:2013 | Information technology Security techniques Information security management guidelines based on ISO/IEC 27002 for process control systems specific to the energy utility industry |
EN ISO 19011:2011 COR 2011 | GUIDELINES FOR AUDITING MANAGEMENT SYSTEMS (ISO 19011:2011) |
BS EN ISO 9000:2015 | Quality management systems. Fundamentals and vocabulary |
ISO 20252:2012 | Market, opinion and social research Vocabulary and service requirements |
ISO/IEC 20000-1:2011 | Information technology Service management Part 1: Service management system requirements |
DIN EN 15224:2017-05 | QUALITY MANAGEMENT SYSTEMS - EN ISO 9001:2015 FOR HEALTHCARE |
EN 61069-5:2016 | Industrial-process measurement, control and automation - Evaluation of system properties for the purpose of system assessment - Part 5: Assessment of system dependability |
CEN/TS 16439:2013 | Electronic fee collection - Security framework |
CEN/TR 16742:2014 | Intelligent transport systems - Privacy aspects in ITS standards and systems in Europe |
EN 50667:2016 | Information technology - Automated infrastructure management (AIM) systems - Requirements, data exchange and applications |
CAN/CSA-ISO/IEC 27011:18 | Information technology ? Security techniques ? Code of practice for information security controls based on ISO/IEC 27002 for telecommunications organizations (Adopted ISO/IEC 27011:2016, second edition, 2016-12-01) |
CSA ISO 9000 : 2016 | QUALITY MANAGEMENT SYSTEMS - FUNDAMENTALS AND VOCABULARY |
CAN/CSA-ISO/IEC 27004:18 | Information technology ? Security techniques ? Information security management ? Monitoring, measurement, analysis and evaluation (Adopted ISO/IEC 27004:2016, second edition, 2016-12-15) |
ANSI X9.84 : 2010(R2017) | BIOMETRIC INFORMATION MANAGEMENT AND SECURITY FOR THE FINANCIAL SERVICES INDUSTRY |
CAN/CSA-ISO/IEC 27035-2:18 | Information technology — Security techniques — Information security incident management — Part 2: Guidelines to plan and prepare for incident response (Adopted ISO/IEC 27035-2:2016, first edition, 2016-11-01) |
CAN/CSA-ISO/IEC/IEEE 24748-4:18 | Systems and software engineering — Life cycle management — Part 4: Systems engineering planning (Adopted ISO/IEC/IEEE 24748-4:2016, first edition, 2016-05-15) |
CAN/CSA-ISO/IEC 19086-1:18 | Information technology — Cloud computing — Service level agreement (SLA) framework — Part 1: Overview and concepts (Adopted ISO/IEC 19086-1:2016, first edition, 2016-09-15) |
CAN/CSA-ISO/IEC 18598:18 | Information technology — Automated infrastructure management (AIM) systems — Requirements, data exchange and applications (Adopted ISO/IEC 18598:2016, first edition, 2016-09) |
CSA ISO/IEC 27003 : 2010 : R2015 | INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - INFORMATION SECURITY MANAGEMENT SYSTEM IMPLEMENTATION GUIDANCE |
CAN/CSA-ISO/IEC TS 33072:18 | Information technology ? Process assessment ? Process capability assessment model for information security management (Adopted ISO/IEC TS 33072:2016, first edition, 2016-07-15, corrected version 2016-09-01) |
INCITS/ISO/IEC 27034-2:2015(R2023) | Information technology - Security techniques - Application security - Part 2: Organization normative framework |
INCITS/ISO/IEC 27033-4:2014(R2023) | Information technology — Security techniques — Network security — Part 4: Securing communications between networks using security gateways |
CAN/CSA-ISO/IEC TS 33052:18 | Information technology ? Process reference model (PRM) for information security management (Adopted ISO/IEC TS 33052:2016, first edition, 2016-06-15) |
CAN/CSA-ISO/IEC TR 20000-12:18 | Information technology — Service management — Part 12: Guidance on the relationship between ISO/IEC 20000-1:2011 and service management frameworks: CMMI-SVC (Adopted ISO/IEC TR 20000-12:2016, first edition, 2016-10-01) |
CEI EN IEC 62061:2023 | Safety of machinery - Functional safety of safety-related control systems |
CSA ISO/IEC 27003 : 2010 | INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - INFORMATION SECURITY MANAGEMENT SYSTEM IMPLEMENTATION GUIDANCE |
INCITS/ISO/IEC 27036-1:2014(2019) | Information technology -- Security techniques -- Information security for supplier relationships -- Part 1: Overview and concepts |
INCITS/ISO/IEC 27035-1:2016(2019) | Information technology — Security techniques — Information security incident management — Part 1: Principles of incident management |
INCITS/ISO/IEC 30111:2013(R2019) | Information technology - Security techniques - Vulnerability handling processes |
INCITS/ISO/IEC 27035-2:2016(2019) | Information technology -- Security techniques -- Information security incident management -- Part 2: Guidelines to plan and prepare for incident response<br> |
CSA ISO/IEC 19770-1 :2013 | INFORMATION TECHNOLOGY - SOFTWARE ASSET MANAGEMENT - PART 1: PROCESSES AND TIERED ASSESSMENT OF CONFORMANCE |
CAN/CSA-ISO/IEC 30100-2:18 | Information technology — Home network resource management — Part 2: Architecture (Adopted ISO/IEC 30100-2:2016, first edition, 2016-04) |
CAN/CSA-ISO/IEC 27035-1:18 | Information technology — Security techniques — Information security incident management — Part 1: Principles of incident management (Adopted ISO/IEC 27035-1:2016, first edition, 2016-11-01) |
CSA ISO/IEC 19770-1 : 2013 : R2017 | INFORMATION TECHNOLOGY - SOFTWARE ASSET MANAGEMENT - PART 1: PROCESSES AND TIERED ASSESSMENT OF CONFORMANCE |
AS/NZS ISO/IEC 20000.6:2019 | Information technology - Service management Requirements for bodies providing audit and certification of service management systems |
ISO/IEC 27003:2017 | Information technology — Security techniques — Information security management systems — Guidance |
ISO/IEC 27004:2016 | Information technology — Security techniques — Information security management — Monitoring, measurement, analysis and evaluation |
AS/NZS ISO/IEC 20000.3:2020 | Information technology - Service management Guidance on scope definition and applicability of AS/NZS ISO/IEC 20000.1 |
ISO 31000:2009 | Risk management Principles and guidelines |
AS ISO 37001:2019 | Anti-bribery management systems - Requirements with guidance for use |
AS/NZS ISO/IEC 20000.1:2019 | Information technology - Service management Service management system requirements |
AS ISO 22301:2020 | Security and resilience - Business continuity management systems - Requirements |
ISO/IEC 27002:2013 | Information technology Security techniques Code of practice for information security controls |
AS/NZS ISO/IEC 20000.10:2019 | Information technology - Service management Concepts and vocabulary |
AS ISO 55002:2019 | Asset management - Management systems - Guidelines for the application of ISO 55001 |
ISO/IEC 27005:2011 | Information technology Security techniques Information security risk management |
AS ISO/IEC 17789:2020 | Information technology - Cloud computing - Reference architecture |
AS/NZS ISO/IEC 20000.2:2020 | Information technology - Service management Guidance on the application of service management systems |
SA HB 13485:2020 | AS ISO 13485:2017 - Medical devices - A practical guide |
ISO/IEC 27000:2016 | Information technology Security techniques Information security management systems Overview and vocabulary |
Access your standards online with a subscription
Features
-
Simple online access to standards, technical information and regulations.
-
Critical updates of standards and customisable alerts and notifications.
-
Multi-user online standards collection: secure, flexible and cost effective.