ISO/IEC 27000:2016
Withdrawn
A Withdrawn Standard is one, which is removed from sale, and its unique number can no longer be used. The Standard can be withdrawn and not replaced, or it can be withdrawn and replaced by a Standard with a different number.
View Superseded by
Information technology Security techniques Information security management systems Overview and vocabulary
Hardcopy , PDF , PDF 3 Users , PDF 5 Users , PDF 9 Users
11-30-2018
English, French
02-15-2016
ISO/IEC 27000:2016 the overview of information security management systems, and terms and definitions commonly used in the ISMS family of standards. This International Standard is applicable to all types and sizes of organization (e.g. commercial enterprises, government agencies, not-for-profit organizations).
DocumentType |
Standard
|
Pages |
34
|
PublisherName |
International Organization for Standardization
|
Status |
Withdrawn
|
SupersededBy | |
Supersedes |
Standards | Relationship |
UNE-EN ISO/IEC 27000:2019 | Identical |
BS EN ISO/IEC 27000:2017 | Identical |
OVE/ONORM EN ISO/IEC 27000 : NOV 2017 | Identical |
SAC GB/T 29246 : 2012 | Identical |
NF EN ISO/IEC 27000 : 2017 | Identical |
PN EN ISO/IEC 27000 : 2017 | Identical |
DIN EN ISO/IEC 27000:2017-10 | Identical |
NF ISO/IEC 27000 : 2016 | Identical |
UNE-ISO/IEC 27000:2014 | Identical |
NS EN ISO/IEC 27000 : 2017 | Identical |
I.S. EN ISO/IEC 27000:2017 | Identical |
DIN ISO/IEC 27000:2015-12 (Draft) | Identical |
UNI CEI EN ISO/IEC 27000 : 2017 | Identical |
SN EN ISO/IEC 27000 : 2017 | Identical |
NEN ISO/IEC 27000 : 2016 | Identical |
INCITS/ISO/IEC 27000 : 2014 | Identical |
SN ISO/IEC 27000 : 2016 | Identical |
EN ISO/IEC 27000:2017 | Identical |
NBN ISO/IEC 27000 : 2016 | Identical |
GOST R ISO/IEC 27000 : 2012 | Identical |
NEN EN ISO/IEC 27000 : 2017 | Identical |
CSA ISO/IEC 27000 : 2018 | Identical |
BIS IS/ISO/IEC 27000 : 2009 | Identical |
CEI UNI EN ISO/IEC 27000 : 2017 | Identical |
NS ISO/IEC 27000 : 2016 | Identical |
PN ISO/IEC 27000 : 2014 | Identical |
I.S. ISO/IEC 27001:2013 | INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - INFORMATION SECURITY MANAGEMENT SYSTEMS - REQUIREMENTS |
BS ISO/IEC 29134:2017 | Information technology. Security techniques. Guidelines for privacy impact assessment |
PD CEN/TS 16850:2015 | Societal and Citizen Security. Guidance for managing security in healthcare facilities |
BS EN ISO/IEC 27041:2016 | Information technology. Security techniques. Guidance on assuring suitability and adequacy of incident investigative method |
PD ISO/TR 12859:2009 | Intelligent transport systems. System architecture. Privacy aspects in ITS standards and systems |
18/30346433 DC : 0 | BS ISO/IEC 19086-4 - INFORMATION TECHNOLOGY - CLOUD COMPUTING SERVICE LEVEL AGREEMENT (SLA) FRAMEWORK - PART 4: SECURITY AND PRIVACY |
BS ISO/IEC 27037 : 2012 | INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - GUIDELINES FOR IDENTIFICATION, COLLECTION, ACQUISITION, AND PRESERVATION OF DIGITAL EVIDENCE |
15/30299331 DC : 0 | BS ISO/IEC 27011 - INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - CODE OF PRACTICE FOR INFORMATION SECURITY CONTROLS BASED ON ISO/IEC 27002 FOR TELECOMMUNICATIONS ORGANIZATIONS |
15/30285726 DC : 0 | BS ISO/IEC 27009 - INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - SECTOR-SPECIFIC APPLICATION OF ISO/IEC 27001 - REQUIREMENTS |
INCITS/ISO/IEC 30111 : 2014 | INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - VULNERABILITY HANDLING PROCESSES |
12/30269414 DC : 0 | BS EN 16495 - AIR TRAFFIC MANAGEMENT - INFORMATION SECURITY FOR ORGANISATIONS SUPPORTING CIVIL AVIATION OPERATIONS |
DIN EN ISO/IEC 27001:2017-06 | Information technology - Security techniques - Information security management systems - Requirements (ISO/IEC 27001:2013 including Cor 1:2014 and Cor 2:2015) |
PD CEN/TR 16742:2014 | Intelligent transport systems. Privacy aspects in ITS standards and systems in Europe |
CEI UNI EN ISO/IEC 27041 : 1ED 2017 | INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - GUIDANCE ON ASSURING SUITABILITY AND ADEQUACY OF INCIDENT INVESTIGATIVE METHOD |
ISO/IEC 38505-1:2017 | Information technology — Governance of IT — Governance of data — Part 1: Application of ISO/IEC 38500 to the governance of data |
CSA ISO/IEC 27050-1 : 2018 | INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - ELECTRONIC DISCOVERY - PART 1: OVERVIEW AND CONCEPTS |
ISO/IEC 20648:2016 | Information technology — TLS specification for storage systems |
17/30354834 DC : 0 | BS EN ISO 19011 - GUIDELINES FOR AUDITING MANAGEMENT SYSTEMS |
14/30268906 DC : 0 | BS ISO/IEC 17789 - INFORMATION TECHNOLOGY - CLOUD COMPUTING - REFERENCE ARCHITECTURE |
DIN EN 15224:2016-04 (Draft) | QUALITY MANAGEMENT SYSTEMS - EN ISO 9001:2015 FOR HEALTHCARE |
PD ISO/IEC TR 90006:2013 | Information technology. Guidelines for the application of ISO 9001:2008 to IT service management and its integration with ISO/IEC 20000-1:2011 |
CAN/CSA-ISO/IEC 27034-1:12 (R2017) | Information technology - Security techniques - Application security - Part 1: Overview and concepts (Adopted ISO/IEC 27034-1:2011, first edition, 2011-11-15) |
15/30266416 DC : 0 | BS ISO/IEC 27006 - INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - REQUIREMENTS FOR BODIES PROVIDING AUDIT AND CERTIFICATION OF INFORMATION SECURITY MANAGEMENT SYSTEMS |
BS EN ISO 27789:2013 | Health informatics. Audit trails for electronic health records |
BS EN ISO/IEC 27037:2016 | Information technology. Security techniques. Guidelines for identification, collection, acquisition and preservation of digital evidence |
PD CEN/TR 16968:2016 | Electronic Fee Collection. Assessment of security measures for applications using Dedicated Short-Range Communication |
12/30249455 DC : 0 | BS ISO/IEC 27036-1 - INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - INFORMATION SECURITY FOR SUPPLIER RELATIONSHIPS - PART 1: OVERVIEW AND CONCEPTS |
CAN/CSA-ISO/IEC 27031:13 (R2017) | Information technology - Security techniques - Guidelines for information and communication technology readiness for business continuity (Adopted ISO/IEC 27031:2011, first edition, 2011-03-01) |
CSA TELECOM ORGANIZATIONS PACKAGE : 2018 | CONSISTS OF CAN/CSA-ISO/IEC 27000:18 - INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - INFORMATION SECURITY MANAGEMENT SYSTEMS - OVERVIEW AND VOCABULARY; CAN/CSA-ISO/IEC 27001:14, INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - INFORMATION SECURITY MANAGEMENT SYSTEMS - REQUIREMENTS; CAN/CSA-ISO/IEC 27002:15 - INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - CODE OF PRACTICE FOR |
CSA ISO/IEC 27034-1:2012 | INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - APPLICATION SECURITY - PART 1: OVERVIEW AND CONCEPTS |
CSA ISO/IEC 20000-1 :2013 | INFORMATION TECHNOLOGY - SERVICE MANAGEMENT - PART 1: SERVICE MANAGEMENT SYSTEM REQUIREMENTS |
BS EN ISO 19011:2011 | Guidelines for auditing management systems |
CSA ISO/IEC 27035 : 2013 : R2017 | INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - INFORMATION SECURITY INCIDENT MANAGEMENT |
S.R. CEN ISO/TS 14441:2013 | HEALTH INFORMATICS - SECURITY AND PRIVACY REQUIREMENTS OF EHR SYSTEMS FOR USE IN CONFORMITY ASSESSMENT (ISO/TS 14441:2013) |
CSA ISO/IEC TR 27008 : 2013 : R2017 | INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - GUIDELINES FOR AUDITORS ON INFORMATION SECURITY CONTROLS |
ISO/IEC 27004:2016 | Information technology — Security techniques — Information security management — Monitoring, measurement, analysis and evaluation |
ISO/IEC 27009:2016 | Information technology Security techniques Sector-specific application of ISO/IEC 27001 Requirements |
ISO/TR 12859:2009 | Intelligent transport systems System architecture Privacy aspects in ITS standards and systems |
BS ISO/IEC 20000-1:2011 | Information technology. Service management Service management system requirements |
UNE-ISO/IEC 20000-1:2011 | Information technology. Service management. Part 1: Service Management System requirements |
BS EN ISO 12813 : 2015 | ELECTRONIC FEE COLLECTION - COMPLIANCE CHECK COMMUNICATION FOR AUTONOMOUS SYSTEMS |
PD ISO/IEC/TR 15026-1:2010 | Systems and software engineering. Systems and software assurance Concepts and vocabulary |
I.S. EN 62734:2015 | INDUSTRIAL NETWORKS - WIRELESS COMMUNICATION NETWORK AND COMMUNICATION PROFILES - ISA 100.11A |
ISO/IEC TR 27023:2015 | Information technology — Security techniques — Mapping the revised editions of ISO/IEC 27001 and ISO/IEC 27002 |
ISO/IEC 30111:2013 | Information technology Security techniques Vulnerability handling processes |
ISO/IEC 27033-2:2012 | Information technology — Security techniques — Network security — Part 2: Guidelines for the design and implementation of network security |
I.S. EN ISO 12813:2015 | ELECTRONIC FEE COLLECTION - COMPLIANCE CHECK COMMUNICATION FOR AUTONOMOUS SYSTEMS (ISO 12813:2015) |
UNI EN ISO 19011 : 2012 | GUIDELINES FOR AUDITING MANAGEMENT SYSTEMS |
UNE-EN 15224:2017 | Quality management systems - EN ISO 9001:2015 for healthcare |
IEC TR 62351-13:2016 | Power systems management and associated information exchange - Data and communications security - Part 13: Guidelines on security topics to be covered in standards and specifications |
CEN/TS 16702-2:2015 | Electronic fee collection - Secure monitoring for autonomous toll systems - Part 2: Trusted recorder |
14/30249803 DC : 0 | BS ISO/IEC 27040 - INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - STORAGE SECURITY |
ISO/IEC 27002:2013 | Information technology Security techniques Code of practice for information security controls |
CEN ISO/TS 19299:2015 | Electronic fee collection - Security framework (ISO/TS 19299:2015) |
EN 15224:2016 | Quality management systems - EN ISO 9001:2015 for healthcare |
EN 62734:2015 | Industrial networks - Wireless communication network and communication profiles - ISA 100.11a |
CEN/TS 16850:2015 | Societal and Citizen Security - Guidance for managing security in healthcare facilities |
DIN ISO/IEC 17789:2017-07 | INFORMATION TECHNOLOGY - CLOUD COMPUTING - REFERENCE ARCHITECTURE (ISO/IEC 17789:2014) |
NBR ISO/IEC 27002 : 2013 | INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - CODE OF PRACTICE FOR INFORMATION SECURITY CONTROLS |
NBR ISO/IEC 27031 : 2015 | INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - GUIDELINES FOR INFORMATION AND COMMUNICATION TECHNOLOGY READINESS FOR BUSINESS CONTINUITY |
INCITS/ISO/IEC 27013 : 2014 | INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - GUIDANCE ON THE INTEGRATED IMPLEMENTATION OF ISO/IEC 27001 AND ISO/IEC 20000-1 |
15/30299325 DC : 0 | BS ISO/IEC 27013 - INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - GUIDANCE ON THE INTEGRATED IMPLEMENTATION OF ISO/IEC 27001 AND ISO/IEC 20000-1 |
TS 103 337 : 1.1.1 | SATELLITE EARTH STATIONS AND SYSTEMS (SES); SATELLITE EMERGENCY COMMUNICATIONS; MULTIPLE ALERT MESSAGE ENCAPSULATION OVER SATELLITE (MAMES) |
DIN ISO/IEC 27001 : 2017 | INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - INFORMATION SECURITY MANAGEMENT SYSTEMS - REQUIREMENTS (ISO/IEC 27001:2013 + COR. 1:2014) |
INCITS/ISO/IEC 27037 : 2014 | INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - GUIDELINES FOR IDENTIFICATION, COLLECTION, ACQUISITION AND PRESERVATION OF DIGITAL EVIDENCE |
DIN EN ISO/IEC 27001 E : 2017 | INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - INFORMATION SECURITY MANAGEMENT SYSTEMS - REQUIREMENTS (ISO/IEC 27001:2013 INCLUDING COR 1:2014 AND COR 2:2015) |
CSA ISO/IEC 27018 : 2015 | INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - CODE OF PRACTICE FOR PROTECTION OF PERSONALLY IDENTIFIABLE INFORMATION (PII) IN PUBLIC CLOUDS ACTING AS PII PROCESSORS |
BS ISO/IEC 27034-2:2015 | Information technology. Security techniques. Application security Organization normative framework |
BS ISO/IEC 27041 : 2015 | INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - GUIDANCE ON ASSURING SUITABILITY AND ADEQUACY OF INCIDENT INVESTIGATIVE METHOD |
IEEE 1062-1998 | IEEE Recommended Practice for Software Acquisition, 1998 Edition |
14/30260166 DC : 0 | BS ISO/IEC 27041 - INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - GUIDANCE ON ASSURING SUITABILITY AND ADEQUACY OF INCIDENT INVESTIGATIVE METHODS |
16/30286013 DC : 0 | BS ISO/IEC 27003 - INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - INFORMATION SECURITY MANAGEMENT SYSTEM - GUIDANCE |
ISO/IEC 15026-1:2013 | Systems and software engineering Systems and software assurance Part 1: Concepts and vocabulary |
BS EN ISO 21091:2013 | Health informatics. Directory services for healthcare providers, subjects of care and other entities |
EN 50657:2017 | Railways Applications - Rolling stock applications - Software on Board Rolling Stock |
BS EN ISO 9004:2018 | Quality management. Quality of an organization. Guidance to achieve sustained success |
S.R. CEN/TS 16702-2:2015 | ELECTRONIC FEE COLLECTION - SECURE MONITORING FOR AUTONOMOUS TOLL SYSTEMS - PART 2: TRUSTED RECORDER |
PD ISO/IEC TR 27008:2011 | Information technology. Security techniques. Guidelines for auditors on information security controls |
15/30268877 DC : 0 | BS ISO/IEC 27035-2 - INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - INFORMATION SECURITY INCIDENT MANAGEMENT - PART 2: GUIDELINES TO PLAN AND PREPARE FOR INCIDENT RESPONSE |
11/30204593 DC : DRAFT MAY 2011 | BS ISO/IEC 27010 - INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - INFORMATION SECURITY MANAGEMENT FOR INTER-SECTOR AND INTER-ORGANIZATIONAL COMMUNICATIONS |
11/30168516 DC : 0 | BS ISO/IEC 27032 - INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - GUIDELINES FOR CYBERSECURITY |
PD IEC/TR 62351-10:2012 | Power systems management and associated information exchange. Data and communications security Security architecture guidelines |
S.R. CWA 16649:2013 | MANAGING EMERGING TECHNOLOGY-RELATED RISKS |
BS ISO/IEC 27036-1:2014 | Information technology. Security techniques. Information security for supplier relationships Overview and concepts |
CSA ISO/IEC 27002 : 2015 | INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - CODE OF PRACTICE FOR INFORMATION SECURITY CONTROLS |
PD ISO/IEC TR 27023:2015 | Information technology. Security techniques. Mapping the revised editions of ISO/IEC 27001 and ISO/IEC 27002 |
BS ISO/IEC 17789:2014 | Information technology. Cloud computing. Reference architecture |
09/30168526 DC : 0 | BS ISO/IEC 27033-1 - INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - NETWORK SECURITY - PART 1: GUIDELINES FOR NETWORK SECURITY |
UNI CEI ISO/IEC 27001 : 2014 | INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - INFORMATION SECURITY MANAGEMENT SYSTEMS - REQUIREMENTS |
CAN/CSA-ISO/IEC 27013:16 | Information technology - Security techniques - Guidance on the integrated implementation of ISO/IEC 27001 and ISO/IEC 20000-1 (Adopted ISO/IEC 27013:2015, second edition, 2015-12-01) |
BS ISO/IEC 27003:2017 | Information technology. Security techniques. Information security management systems. Guidance |
CAN/CSA-ISO/IEC 27034-2:16 | Information technology Security techniques Application security Part 2: Organization normative framework (Adopted ISO/IEC 27034-2:2015, first edition, 2015-08-15) |
16/30327034 DC : 0 | BS ISO/IEC 27034-7 - INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - APPLICATION SECURITY - PART 7: APPLICATION SECURITY ASSURANCE PREDICTION MODEL |
TR 103 118 : 1.1.1 | MACHINE-TO-MACHINE COMMUNICATIONS (M2M); SMART ENERGY INFRASTRUCTURES SECURITY; REVIEW OF EXISTING SECURITY MEASURES AND CONVERGENCE INVESTIGATIONS |
17/30355373 DC : 0 | BS ISO/IEC 27019 - INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - INFORMATION SECURITY CONTROLS FOR THE ENERGY UTILITY INDUSTRY |
ISO/IEC TR 27008:2011 | Information technology Security techniques Guidelines for auditors on information security controls |
BS ISO/IEC 29151:2017 | Information technology. Security techniques. Code of practice for personally identifiable information protection |
18/30331887 DC : 0 | BS ISO/IEC 20889 - INFORMATION TECHNOLOGY- SECURITY TECHNIQUES - PRIVACY ENHANCING DATA DE-IDENTIFICATION TECHNIQUES |
BS ISO/IEC 27035-2:2016 | Information technology. Security techniques. Information security incident management Guidelines to plan and prepare for incident response |
UNE-ISO/IEC 27002:2015 | Information technology -- Security techniques -- Code of practice for information security controls |
BS ISO/IEC 27035-1:2016 | Information technology. Security techniques. Information security incident management Principles of incident management |
CSA ISO/IEC TR 27008: 2013 | INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - GUIDELINES FOR AUDITORS ON INFORMATION SECURITY CONTROLS |
CSA ISO/IEC 27035 : 2013 | INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - INFORMATION SECURITY INCIDENT MANAGEMENT |
CEI UNI EN ISO/IEC 27001 : 1ED 2017 | INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - INFORMATION SECURITY MANAGEMENT SYSTEMS - REQUIREMENTS |
CEI UNI EN ISO/IEC 27040 : 1ED 2017 | INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - STORAGE SECURITY |
CSA ISO/IEC 20000-1 : 2013 : R2017 | INFORMATION TECHNOLOGY - SERVICE MANAGEMENT - PART 1: SERVICE MANAGEMENT SYSTEM REQUIREMENTS |
CEI UNI ISO/IEC 27001 : 2014 | INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - INFORMATION SECURITY MANAGEMENT SYSTEMS - REQUIREMENTS |
I.S. EN ISO 21091:2013 | HEALTH INFORMATICS - DIRECTORY SERVICES FOR HEALTHCARE PROVIDERS, SUBJECTS OF CARE AND OTHER ENTITIES (ISO 21091:2013) |
ISO/IEC 27034-7:2018 | Information technology — Application security — Part 7: Assurance prediction framework |
ISO 19011:2011 | Guidelines for auditing management systems |
CSA ISO/IEC 27005 : 2011 : R2016 | INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - INFORMATION SECURITY RISK MANAGEMENT |
BS ISO/IEC 27002 : 2013 | INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - CODE OF PRACTICE FOR INFORMATION SECURITY CONTROLS |
S.R. CEN/TR 16742:2014 | INTELLIGENT TRANSPORT SYSTEMS - PRIVACY ASPECTS IN ITS STANDARDS AND SYSTEMS IN EUROPE |
I.S. EN ISO/IEC 27043:2016 | INFORMATION TECHNOLOGY - SECURITY TECHNIQUES INCIDENT INVESTIGATION PRINCIPLES AND PROCESSES (ISO/IEC 27043:2015) |
EN ISO 19011:2011 COR 2011 | GUIDELINES FOR AUDITING MANAGEMENT SYSTEMS (ISO 19011:2011) |
ABS 0252 : 2016 | DATA INTEGRITY FOR MARINE AND OFFSHORE OPERATIONS - CYBERSAFETY[TM] VOLUME 3 |
UNE-EN ISO/IEC 27002:2017 | Information technology - Security techniques - Code of practice for information security controls (ISO/IEC 27002:2013 including Cor 1:2014 and Cor 2:2015) |
ISO/IEC 27050-3:2017 | Information technology Security techniques Electronic discovery Part 3: Code of practice for electronic discovery |
DIN EN ISO/IEC 27040:2016-04 (Draft) | INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - STORAGE SECURITY (ISO/IEC 27040:2015) |
ISO/IEC TR 27016:2014 | Information technology — Security techniques — Information security management — Organizational economics |
UNI CEN ISO/TS 14441 : 2014 | HEALTH INFORMATICS - SECURITY AND PRIVACY REQUIREMENTS OF HER SYSTEMS FOR USE IN CONFORMITY ASSESSMENT |
ISO/IEC TS 24748-1:2016 | Systems and software engineering Life cycle management Part 1: Guidelines for life cycle management |
CSA ISO/IEC 27005 : 2011 | INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - INFORMATION SECURITY RISK MANAGEMENT |
BS ISO/IEC 29147:2014 | Information technology. Security techniques. Vulnerability disclosure |
CSA ISO/IEC TR 15026-1 : 2013 | SYSTEMS AND SOFTWARE ENGINEERING - SYSTEMS AND SOFTWARE ASSURANCE - PART 1: CONCEPTS AND VOCABULARY |
TR 187 020 : 1.1.1 | RADIO FREQUENCY IDENTIFICATION (RFID); COORDINATED ESO RESPONSE TO PHASE 1 OF EU MANDATE M436 |
CSA ISO/IEC 15026-1 : 2015 | SYSTEMS AND SOFTWARE ENGINEERING - SYSTEMS AND SOFTWARE ASSURANCE - PART 1: CONCEPTS AND VOCABULARY |
ISO/IEC 27005:2011 | Information technology Security techniques Information security risk management |
ISO/IEC 27013:2015 | Information technology Security techniques Guidance on the integrated implementation of ISO/IEC 27001 and ISO/IEC 20000-1 |
ISO/IEC 27043:2015 | Information technology Security techniques Incident investigation principles and processes |
NBR ISO/IEC 27001 : 2013 | INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - INFORMATION SECURITY MANAGEMENT SYSTEMS - REQUIREMENTS |
ISO/IEC 19941:2017 | Information technology — Cloud computing — Interoperability and portability |
CSA ISO/IEC 27007 : 2013 : R2017 | INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - GUIDELINES FOR INFORMATION SECURITY MANAGEMENT SYSTEMS AUDITING |
BS ISO/IEC 20243:2015 | Information Technology. Open Trusted Technology ProviderTM Standard (O-TTPS). Mitigating maliciously tainted and counterfeit products |
ISO/IEC TR 20000-11:2015 | Information technology Service management Part 11: Guidance on the relationship between ISO/IEC 20000-1:2011 and service management frameworks: ITIL |
16/30278511 DC : 0 | BS ISO/IEC 29134 - INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - PRIVACY IMPACT ASSESSMENT - GUIDELINES |
PD ISO/IEC TR 20000-12:2016 | Information technology. Service management Guidance on the relationship between ISO/IEC 20000-1:2011 and service management frameworks: CMMI-SVC® |
BS PAS 7000(2014) : 2014 | SUPPLY CHAIN RISK MANAGEMENT - SUPPLIER PREQUALIFICATION |
BS ISO/IEC 27035:2011 | Information technology. Security techniques. Information security incident management |
BS ISO 18788:2015 | Management system for private security operations. Requirements with guidance for use |
DIN EN ISO/IEC 27002 E : 2017 | INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - CODE OF PRACTICE FOR INFORMATION SECURITY CONTROLS (ISO/IEC 27002:2013 INCLUDING COR 1:2014 AND COR 2:2015) |
14/30266434 DC : 0 | BS ISO/IEC 17788 - INFORMATION TECHNOLOGY - CLOUD COMPUTING - OVERVIEW AND VOCABULARY |
PD CEN/TS 16702-2:2015 | Electronic fee collection. Secure monitoring for autonomous toll systems Trusted recorder |
S.R. CEN/TR 419010:2017 | FRAMEWORK FOR STANDARDIZATION OF SIGNATURES - EXTENDED STRUCTURE INCLUDING ELECTRONIC IDENTIFICATION AND AUTHENTICATION |
GS NFV-SEC 014 : 3.1.1 | NETWORK FUNCTIONS VIRTUALISATION (NFV) RELEASE 3; NFV SECURITY; SECURITY SPECIFICATION FOR MANO COMPONENTS AND REFERENCE POINTS |
17/30342692 DC : 0 | BS ISO/IEC 27007 - INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - GUIDELINES FOR INFORMATION SECURITY MANAGEMENT SYSTEMS AUDITING |
14/30304350 DC : 0 | BS EN ISO 27799 - HEALTH INFORMATICS - INFORMATION SECURITY MANAGEMENT IN HEALTH USING ISO/IEC 27002 |
BIP 0139 : 2013 | AN INTRODUCTION TO ISO/IEC 27001:2013 |
BS ISO/IEC 27043 : 2015 | INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - INCIDENT INVESTIGATION PRINCIPLES AND PROCESSES |
BS EN ISO/IEC 27002:2017 | Information technology. Security techniques. Code of practice for information security controls |
BS ISO/IEC 24745:2011 | Information technology. Security techniques. Biometric information protection |
BS EN 50657:2017 | Railways Applications. Rolling stock applications. Software on Board Rolling Stock |
BS ISO/IEC 27009:2016 | Information technology. Security techniques. Sector-specific application of ISO/IEC 27001. Requirements |
TR 101 582 : 1.1.1 | METHODS FOR TESTING AND SPECIFICATION (MTS); SECURITY TESTING; CASE STUDY EXPERIENCES |
BS TICKITPLUS - KICK START GUIDE : 2011 | KICK START GUIDE, TICKITPLUS - SOFTWARE AND IT QUALITY MANAGEMENT AND CERTIFICATION |
DIN ISO/IEC 17788:2016-04 | INFORMATION TECHNOLOGY - CLOUD COMPUTING - OVERVIEW AND VOCABULARY (ISO/IEC 17788:2014) |
17/30333753 DC : 0 | BS EN ISO 19650-1 - ORGANIZATION OF INFORMATION ABOUT CONSTRUCTION WORKS - INFORMATION MANAGEMENT USING BUILDING INFORMATION MODELLING - PART 1: CONCEPTS AND PRINCIPLES |
10/30184432 DC : 0 | BS ISO/IEC 27035 - INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - INFORMATION SECURITY INCIDENT MANAGEMENT |
UNE-EN ISO/IEC 27001:2017 | Information technology - Security techniques - Information security management systems - Requirements (ISO/IEC 27001:2013 including Cor 1:2014 and Cor 2:2015) |
CEI UNI EN ISO/IEC 27043 : 1ED 2017 | INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - INCIDENT INVESTIGATION PRINCIPLES AND PROCESSES |
TS 187 001 : 3.9.1 | NETWORK TECHNOLOGIES (NTECH); NGN SECURITY (SEC); REQUIREMENTS |
ISO/IEC TR 27015:2012 | Information technology Security techniques Information security management guidelines for financial services |
I.S. EN ISO/IEC 27041:2016 | INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - GUIDANCE ON ASSURING SUITABILITY AND ADEQUACY OF INCIDENT INVESTIGATIVE METHOD (ISO/IEC 27041:2015) |
BS ISO/IEC 27006:2015 | Information technology. Security techniques. Requirements for bodies providing audit and certification of information security management systems |
12/30186137 DC : 0 | BS ISO/IEC 27002 - INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - CODE OF PRACTICE FOR INFORMATION SECURITY CONTROLS |
16/30286027 DC : 0 | BS ISO/IEC 27004 - INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - INFORMATION SECURITY MANAGEMENT - MONITORING, MEASUREMENT, ANALYSIS AND EVALUATION |
17/30342673 DC : 0 | BS ISO/IEC 27021 - INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - COMPETENCE REQUIREMENTS FOR INFORMATION SECURITY MANAGEMENT SYSTEMS PROFESSIONALS |
16/30337310 DC : 0 | BS ISO/IEC 27050-3 - INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - ELECTRONIC DISCOVERY - PART 3: CODE OF PRACTICE FOR ELECTRONIC DISCOVERY |
ISO/IEC 27031:2011 | Information technology — Security techniques — Guidelines for information and communication technology readiness for business continuity |
BS ISO/IEC 38505-1:2017 | Information technology. Governance of IT. Governance of data Application of ISO/IEC 38500 to the governance of data |
BS ISO/IEC 20648:2016 | Information technology. TLS specification for storage systems |
BS ISO/IEC 27005:2011 | Information technology. Security techniques. Information security risk management |
PD CEN/TR 419010:2017 | Framework for standardization of signatures. Extended structure including electronic identification and authentication |
BS ISO/IEC 27032:2012 | Information technology. Security techniques. Guidelines for cybersecurity |
DIN EN ISO/IEC 27002:2017-06 | Information technology - Security techniques - Code of practice for information security controls (ISO/IEC 27002:2013 including Cor 1:2014 and Cor 2:2015) |
14/30213618 DC : 0 | BS ISO/IEC 27034-2 - INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - APPLICATION SECURITY - PART 2: ORGANIZATION NORMATIVE FRAMEWORK |
CEI UNI EN ISO/IEC 27002 : 1ED 2017 | INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - CODE OF PRACTICE FOR INFORMATION SECURITY CONTROLS |
ISO/IEC 27021:2017 | Information technology — Security techniques — Competence requirements for information security management systems professionals |
BIS IS/ISO/IEC 27003 : 2010 | INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - INFORMATION SECURITY MANAGEMENT SYSTEM IMPLEMENTATION GUIDANCE |
BS EN 62734:2015 | Industrial networks. Wireless communication network and communication profiles. ISA 100.11a |
CSA ISO/IEC 27031 : 2013 | INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - GUIDELINES FOR INFORMATION AND COMMUNICATION TECHNOLOGY READINESS FOR BUSINESS CONTINUITY |
CSA ISO 19011 : 2012 | GUIDELINES FOR AUDITING MANAGEMENT SYSTEMS |
CAN/CSA-ISO/IEC 17788:16 | Information technology Cloud computing Overview and vocabulary (Adopted ISO/IEC 17788:2014, first edition, 2014-10-15) |
ISO/IEC 27018:2014 | Information technology Security techniques Code of practice for protection of personally identifiable information (PII) in public clouds acting as PII processors |
CEI UNI EN ISO/IEC 27037 : 1ED 2017 | INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - GUIDELINES FOR IDENTIFICATION, COLLECTION, ACQUISITION AND PRESERVATION OF DIGITAL EVIDENCE |
TR 119 000 : 1.2.1 | ELECTRONIC SIGNATURES AND INFRASTRUCTURES (ESI); THE FRAMEWORK FOR STANDARDIZATION OF SIGNATURES: OVERVIEW |
ARINC 842 : 2013 | GUIDANCE FOR USAGE OF DIGITAL CERTIFICATES |
ISO/IEC TR 29110-5-3:2018 | Systems and software engineering — Lifecycle profiles for Very Small Entities (VSEs) — Part 5-3: Service delivery guidelines |
IEC TR 62351-10:2012 | Power systems management and associated information exchange - Data and communications security - Part 10: Security architecture guidelines |
ISO/IEC 27034-3:2018 | Information technology — Application security — Part 3: Application security management process |
UNI ISO 30300 : 2013 | INFORMATION AND DOCUMENTATION - MANAGEMENT SYSTEMS FOR RECORDS - FUNDAMENTALS AND VOCABULARY |
I.S. EN 15224:2016 | QUALITY MANAGEMENT SYSTEMS - EN ISO 9001:2015 FOR HEALTHCARE |
CEN/TR 16968:2016 | Electronic Fee Collection - Assessment of security measures for applications using Dedicated Short-Range Communication |
ISO/IEC TR 90006:2013 | Information technology Guidelines for the application of ISO 9001:2008 to IT service management and its integration with ISO/IEC 20000-1:2011 |
S.R. CEN ISO/TS 19299:2015 | ELECTRONIC FEE COLLECTION - SECURITY FRAMEWORK (ISO/TS 19299:2015) |
CSA ISO 19011 : 2012 : R2017 | GUIDELINES FOR AUDITING MANAGEMENT SYSTEMS |
ISO/IEC TR 20000-10:2015 | Information technology Service management Part 10: Concepts and terminology |
CAN/CSA-ISO/IEC 27017:16 | Information technology Security techniques Code of practice for information security controls based on ISO/IEC 27002 for cloud services (Adopted ISO/IEC 27017:2015, first edition, 2015-12-15) |
BS EN 16495:2014 | Air Traffic Management. Information security for organisations supporting civil aviation operations |
CEN/TR 419010:2017 | Framework for standardization of signatures - Extended structure including electronic identification and authentication |
UNI EN 16495 : 2014 | AIR TRAFFIC MANAGEMENT - INFORMATION SECURITY FOR ORGANIZATIONS SUPPORTING CIVIL AVIATION OPERATIONS |
ISO/IEC TS 33072:2016 | Information technology — Process assessment — Process capability assessment model for information security management |
UNI EN ISO 27789 : 2013 | HEALTH INFORMATICS - AUDIT TRAILS FOR ELECTRONIC HEALTH RECORDS |
ISO/IEC 27035:2011 | Information technology Security techniques Information security incident management |
ISO/IEC 27032:2012 | Information technology — Security techniques — Guidelines for cybersecurity |
ISO/IEC 27036-1:2014 | Information technology Security techniques Information security for supplier relationships Part 1: Overview and concepts |
ISO/IEC 27034-2:2015 | Information technology Security techniques Application security Part 2: Organization normative framework |
ISO 18788:2015 | Management system for private security operations Requirements with guidance for use |
ISO 5127:2017 | Information and documentation Foundation and vocabulary |
ISO/IEC 27037:2012 | Information technology — Security techniques — Guidelines for identification, collection, acquisition and preservation of digital evidence |
ISO/TS 19299:2015 | Electronic fee collection Security framework |
IEC 62734:2014 | Industrial networks - Wireless communication network and communication profiles - ISA 100.11a |
EN ISO/IEC 27042:2016 | Information technology - Security techniques - Guidelines for the analysis and interpretation of digital evidence (ISO/IEC 27042:2015) |
EN ISO 21091:2013 | Health informatics - Directory services for healthcare providers, subjects of care and other entities (ISO 21091:2013) |
EN ISO/IEC 27043:2016 | Information technology - Security techniques - Incident investigation principles and processes (ISO/IEC 27043:2015) |
UNI/TS 11465-1 : 2012 | ELECTRONIC SIGNATURES AND INFRASTRUCTURES (ESI) - DATA PRESERVATION SYSTEMS SECURITY - PART 1: REQUIREMENTS FOR IMPLEMENTATION AND MANAGEMENT |
ISO/IEC 27034-1:2011 | Information technology — Security techniques — Application security — Part 1: Overview and concepts |
CSA ISO/IEC 27009 : 2018 | INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - SECTOR-SPECIFIC APPLICATION OF ISO/IEC 27001 - REQUIREMENTS |
ISO/IEC 27003:2017 | Information technology — Security techniques — Information security management systems — Guidance |
ISO/IEC 27033-6:2016 | Information technology Security techniques Network security Part 6: Securing wireless IP network access |
PD ISO/TR 37152:2016 | Smart community infrastructures. Common framework for development and operation |
16/30287629 DC : 0 | BS ISO/IEC 27050-1 - INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - ELECTRONIC DISCOVERY - PART 1 OVERVIEW AND CONCEPTS |
BS ISO/IEC 27018:2014 | Information technology. Security techniques. Code of practice for protection of personally identifiable information (PII) in public clouds acting as PII processors |
BS ISO/IEC 27033-3:2010 | Information technology. Security techniques. Network security Reference networking scenarios. Threats, design techniques and control issues |
10/30162769 DC : DRAFT NOV 2010 | BS ISO/IEC 27007 - INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - GUIDELINES FOR INFORMATION SECURITY MANAGEMENT SYSTEMS AUDITING |
CAN/CSA-ISO/IEC 27010:16 | Information technology - Security techniques - Information security management for inter-sector and inter-organizational communications (Adopted ISO/IEC 27010:2015, second edition, 2015-11-15) |
BS ISO/IEC 27017:2015 | Information technology. Security techniques. Code of practice for information security controls based on ISO/IEC 27002 for cloud services |
INCITS/ISO/IEC 27010 : 2017 | INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - INFORMATION SECURITY MANAGEMENT FOR INTER-SECTOR AND INTER-ORGANIZATIONAL COMMUNICATIONS |
ISO/IEC TR 38505-2:2018 | Information technology — Governance of IT — Governance of data — Part 2: Implications of ISO/IEC 38505-1 for data management |
12/30250175 DC : 0 | BS ISO/IEC 27036-2 - INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - INFORMATION SECURITY FOR SUPPLIER RELATIONSHIPS - PART 2: COMMON REQUIREMENTS |
11/30207799 DC : 0 | BS ISO/IEC 27037 - INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - GUIDELINES FOR IDENTIFICATION, COLLECTION, ACQUISITION AND PRESERVATION OF DIGITAL EVIDENCE |
CSA INFORMATION SECURITY PACKAGE : 2018 | CONSISTS OF CAN/CSA-ISO/IEC 27000:18 - INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - INFORMATION SECURITY MANAGEMENT SYSTEMS - OVERVIEW AND VOCABULARY; CAN/CSA-ISO/IEC 27001:14, INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - INFORMATION SECURITY MANAGEMENT SYSTEMS - REQUIREMENTS; CAN/CSA-ISO/IEC 27002:15 - INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - CODE OF PRACTICE FOR INFORMATION |
CAN/CSA-ISO/IEC 20243:16 | Information Technology Open Trusted Technology Provider TM Standard (O-TTPS) Mitigating maliciously tainted and counterfeit products (Adopted ISO/IEC 20243:2015, first edition, 2015-09-15) |
UNE-ISO 30300:2011 | Information and documentation. Management system for records. Fundamentals and vocabulary . |
DIN EN ISO 27789:2013-06 | Health informatics - Audit trails for electronic health records (ISO 27789:2013) |
10/30136309 DC : 0 | BS ISO/IEC 24745 - INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - BIOMETRIC INFORMATION PROTECTION |
BS ISO/IEC 15026-1:2013 | Systems and software engineering. Systems and software assurance Concepts and vocabulary |
14/30255584 DC : 0 | BS ISO 5127 - INFORMATION AND DOCUMENTATION - FOUNDATION AND VOCABULARY |
INCITS/ISO/IEC 27002 : 2014 | INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - CODE OF PRACTICE FOR INFORMATION SECURITY CONTROLS |
BIP 0071 : 2014 | GUIDELINES ON REQUIREMENTS AND PREPARATION FOR ISMS CERTIFICATION BASED ON ISO/IEC 27001 |
BS ISO/IEC 27007:2017 | Information technology. Security techniques. Guidelines for information security management systems auditing |
BS ISO/IEC 27010:2015 | Information technology. Security techniques. Information security management for inter-sector and inter-organizational communications |
12/30192064 DC : 0 | BS ISO/IEC 27001 - INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - INFORMATION SECURITY MANAGEMENT SYSTEM - REQUIREMENTS |
BS ISO 5127:2017 | Information and documentation. Foundation and vocabulary |
BS ISO/IEC 17788:2014 | Information technology. Cloud computing. Overview and vocabulary |
13/30268559 DC : 0 | BS ISO/IEC 15026-1 - SYSTEMS AND SOFTWARE ENGINEERING - SYSTEMS AND SOFTWARE ASSURANCE - PART 1: CONCEPTS AND VOCABULARY |
BS EN ISO/IEC 27001:2017 | Information technology. Security techniques. Information security management systems. Requirements |
17/30349211 DC : 0 | BS ISO/IEC 29147 - INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - VULNERABILITY DISCLOSURE |
ISO/IEC 27036-3:2013 | Information technology — Security techniques — Information security for supplier relationships — Part 3: Guidelines for information and communication technology supply chain security |
DIN ISO/IEC 17789:2016-10 (Draft) | INFORMATION TECHNOLOGY - CLOUD COMPUTING - REFERENCE ARCHITECTURE (ISO/IEC 17789:2014) |
BS ISO/IEC 19941:2017 | Information technology. Cloud computing. Interoperability and portability |
DIN CEN ISO/TS 19299;DIN SPEC 74125:2016-02 | ELECTRONIC FEE COLLECTION - SECURITY FRAMEWORK (ISO/TS 19299:2015) |
ISO/IEC 27017:2015 | Information technology — Security techniques — Code of practice for information security controls based on ISO/IEC 27002 for cloud services |
ISO/IEC 20243:2015 | Information Technology Open Trusted Technology ProviderTM Standard (O-TTPS) Mitigating maliciously tainted and counterfeit products |
BS EN ISO/IEC 27043:2016 | Information technology. Security techniques. Incident investigation principles and processes |
15/30321754 DC : 0 | BS ISO/IEC 20648 - INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - TLS SPECIFICATION FOR STORAGE SYSTEMS |
PD CEN ISO/TS 19299:2015 | Electronic fee collection. Security framework |
BS ISO/IEC 27031:2011 | Information technology. Security techniques. Guidelines for information and communication technology readiness for business continuity |
PD ISO/IEC TS 24748-6:2016 | Systems and software engineering. Life cycle management System integration engineering |
BS ISO/IEC 27042 : 2015 | INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - GUIDELINES FOR THE ANALYSIS AND INTERPRETATION OF DIGITAL EVIDENCE |
15/30320354 DC : 0 | BS ISO/IEC 27010 - INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - INFORMATION SECURITY MANAGEMENT FOR INTER-SECTOR AND INTER-ORGANIZATIONAL COMMUNICATIONS |
13/30266767 DC : 0 | BS ISO/IEC 27018 - INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - CODE OF PRACTICE FOR P2 PROTECTION IN PUBLIC CLOUD ACTING AS P2 PROCESSORS |
ISO/IEC TR 20547-2:2018 | Information technology Big data reference architecture Part 2: Use cases and derived requirements |
BS EN ISO 27799:2008 | Health informatics. Information security management in health using ISO/IEC 27002 |
17/30329617 DC : 0 | BS ISO/IEC 29110-4-3 - SYSTEMS AND SOFTWARE ENGINEERING - LIFECYCLE PROFILES FOR VERY SMALL ENTITIES (VSES) - PART 4-3: SERVICE DELIVERY - PROFILE SPECIFICATION |
BIS IS/ISO 19011 : 2011(R2016) | GUIDELINES FOR AUDITING MANAGEMENT SYSTEMS |
08/30134763 DC : DRAFT JUNE 2008 | BS ISO/IEC 27004 - INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - INFORMATION SECURITY MANAGEMENT - MEASUREMENT |
12/30209825 DC : 0 | BS ISO/IEC 27014 - INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - GOVERNANCE OF INFORMATION SECURITY |
BIS IS/ISO/IEC 27004 : 2009 | INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - INFORMATION SECURITY MANAGEMENT - MEASUREMENT |
SR 001 604 : 1.1.1 | RATIONALISED FRAMEWORK FOR ELECTRONIC SIGNATURE STANDARDISATION |
INCITS/ISO/IEC 27033-2 : 2014 | INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - NETWORK SECURITY - PART 2: GUIDELINES FOR THE DESIGN AND IMPLEMENTATION OF NETWORK SECURITY |
UNI CEN/TS 16439 : 2013 | ELECTRONIC FEE COLLECTION - SECURITY FRAMEWORK |
ISO/IEC TS 24748-6:2016 | Systems and software engineering — Life cycle management — Part 6: System integration engineering |
INCITS/ISO/IEC 27041 : 2017 | INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - GUIDANCE ON ASSURING SUITABILITY AND ADEQUACY OF INCIDENT INVESTIGATIVE METHOD |
ISO/IEC 29134:2017 | Information technology — Security techniques — Guidelines for privacy impact assessment |
CSA ISO 9004 : 2009 : R2015 | MANAGING FOR THE SUSTAINED SUCCESS OF AN ORGANIZATION - A QUALITY MANAGEMENT APPROACH |
16/30334735 DC : 0 | BS EN 15224 - HEALTH CARE SERVICES - QUALITY MANAGEMENT SYSTEMS - REQUIREMENTS BASED ON EN ISO 9001:2015 |
15/30267674 DC : 0 | BS ISO/IEC 27035-1 - INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - INFORMATION SECURITY INCIDENT MANAGEMENT - PART 1: PRINCIPLES OF INCIDENT MANAGEMENT |
ISO/IEC 27035-2:2016 | Information technology — Security techniques — Information security incident management — Part 2: Guidelines to plan and prepare for incident response |
I.S. EN ISO/IEC 27001:2017 | INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - INFORMATION SECURITY MANAGEMENT SYSTEMS - REQUIREMENTS (ISO/IEC 27001:2013 INCLUDING COR 1:2014 AND COR 2:2015) |
SR 003 391 : 2.1.1 | CLOUD STANDARDS COORDINATION PHASE 2; INTEROPERABILITY AND SECURITY IN CLOUD COMPUTING |
S.R. CEN/TR 16968:2016 | ELECTRONIC FEE COLLECTION - ASSESSMENT OF SECURITY MEASURES FOR APPLICATIONS USING DEDICATED SHORT-RANGE COMMUNICATION |
GS ISI 001-2 : 1.1.2 | INFORMATION SECURITY INDICATORS (ISI); INDICATORS (INC); PART 2: GUIDE TO SELECT OPERATIONAL INDICATORS BASED ON THE FULL SET GIVEN IN PART 1 |
I.S. EN ISO/IEC 27037:2016 | INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - GUIDELINES FOR IDENTIFICATION, COLLECTION, ACQUISITION AND PRESERVATION OF DIGITAL EVIDENCE (ISO/IEC 27037:2012) |
I.S. EN ISO/IEC 27042:2016 | INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - GUIDELINES FOR THE ANALYSIS AND INTERPRETATION OF DIGITAL EVIDENCE (ISO/IEC 27042:2015) |
PREN 15224 : DRAFT 2016 | HEALTH CARE SERVICES - QUALITY MANAGEMENT SYSTEMS - REQUIREMENTS BASED ON EN ISO 9001:2015 |
I.S. EN ISO/IEC 27002:2017 | INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - CODE OF PRACTICE FOR INFORMATION SECURITY CONTROLS (ISO/IEC 27002:2013 INCLUDING COR 1:2014 AND COR 2:2015) |
ISO/IEC 30100-2:2016 | Information technology Home network resource management Part 2: Architecture |
I.S. ISO/IEC 27002:2013 | INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - CODE OF PRACTICE FOR INFORMATION SECURITY CONTROLS |
ISO 30300:2011 | Information and documentation Management systems for records Fundamentals and vocabulary |
ISO/IEC 27050-1:2016 | Information technology Security techniques Electronic discovery Part 1: Overview and concepts |
CEI UNI ISO/IEC 27002 : 2014 | INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - CODE OF PRACTICE FOR INFORMATION SECURITY CONTROLS |
CEI UNI EN ISO/IEC 27042 : 1ED 2017 | INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - GUIDELINES FOR THE ANALYSIS AND INTERPRETATION OF DIGITAL EVIDENCE |
EN ISO 9004:2018 | Quality management - Quality of an organization - Guidance to achieve sustained success (ISO 9004:2018) |
ISO/IEC TR 15026-1:2010 | Systems and software engineering Systems and software assurance Part 1: Concepts and vocabulary |
ISO/IEC 27010:2015 | Information technology Security techniques Information security management for inter-sector and inter-organizational communications |
ISO/IEC 29147:2014 | Information technology Security techniques Vulnerability disclosure |
ISO/IEC 27033-3:2010 | Information technology — Security techniques — Network security — Part 3: Reference networking scenarios — Threats, design techniques and control issues |
ISO/IEC 27011:2016 | Information technology — Security techniques — Code of practice for Information security controls based on ISO/IEC 27002 for telecommunications organizations |
ISO/IEC 27041:2015 | Information technology Security techniques Guidance on assuring suitability and adequacy of incident investigative method |
ISO 12813:2015 | Electronic fee collection Compliance check communication for autonomous systems |
ISO 21091:2013 | Health informatics — Directory services for healthcare providers, subjects of care and other entities |
BS ISO/IEC 27040 : 2015 | INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - STORAGE SECURITY |
BS EN ISO/IEC 27040:2016 | Information technology. Security techniques. Storage security |
ISO/IEC 27040:2015 | Information technology — Security techniques — Storage security |
ISO/IEC 27042:2015 | Information technology Security techniques Guidelines for the analysis and interpretation of digital evidence |
ISO/TS 14441:2013 | Health informatics — Security and privacy requirements of EHR systems for use in conformity assessment |
ISO/IEC 27001:2013 | Information technology — Security techniques — Information security management systems — Requirements |
EN ISO/IEC 27002:2017 | Information technology - Security techniques - Code of practice for information security controls (ISO/IEC 27002:2013 including Cor 1:2014 and Cor 2:2015) |
EN ISO/IEC 27040:2016 | Information technology - Security techniques - Storage security (ISO/IEC 27040:2015) |
EN ISO 27799:2016 | Health informatics - Information security management in health using ISO/IEC 27002 (ISO 27799:2016) |
EN ISO/IEC 27001:2017 | Information technology - Security techniques - Information security management systems - Requirements (ISO/IEC 27001:2013 including Cor 1:2014 and Cor 2:2015) |
EN ISO/IEC 27041:2016 | Information technology - Security techniques - Guidance on assuring suitability and adequacy of incident investigative method (ISO/IEC 27041:2015) |
EN ISO/IEC 27037:2016 | Information technology - Security techniques - Guidelines for identification, collection, acquisition and preservation of digital evidence (ISO/IEC 27037:2012) |
EN 16495:2014 | Air Traffic Management - Information security for organisations supporting civil aviation operations |
I.S. EN ISO 19011:2011 | GUIDELINES FOR AUDITING MANAGEMENT SYSTEMS (ISO 19011:2011) |
17/30355188 DC : 0 | BS ISO/IEC 24748-1 - SYSTEMS AND SOFTWARE ENGINEERING - LIFE CYCLE MANAGEMENT - PART 1: GUIDELINES FOR LIFE CYCLE MANAGEMENT |
BS ISO/IEC 27014:2013 | Information technology. Security techniques. Governance of information security |
BS EN 15224:2016 | Quality management systems. EN ISO 9001:2015 for healthcare |
BS ISO/IEC 27036-2:2014 | Information technology. Security techniques. Information security for supplier relationships Requirements |
12/30249606 DC : 0 | BS EN 62645 ED 1.0 - NUCLEAR POWER PLANTS - INSTRUMENTATION AND CONTROL SYSTEMS - REQUIREMENT S FOR SECURITY PROGRAMMES FOR COMPUTER-BASED SYSTEMS |
BS ISO/IEC 27036-3:2013 | Information technology. Security techniques. Information security for supplier relationships Guidelines for information and communication technology supply chain security |
UNI EN ISO 21091 : 2013 | HEALTH INFORMATICS - DIRECTORY SERVICES FOR HEALTHCARE PROVIDERS, SUBJECTS OF CARE AND OTHER ENTITIES |
14/30315737 DC : 0 | PD ISO/IEC/PAS 20243 - OPEN TRUSTED TECHNOLOGY PROVIDER STANDARD (O-TTPS) - MITIGATING MALICIOUSLY TAINTED AND COUNTERFEIT PRODUCTS |
BS EN ISO/IEC 27042:2016 | Information technology. Security techniques. Guidelines for the analysis and interpretation of digital evidence |
INCITS/ISO/IEC 24745 : 2012(R2017) | INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - BIOMETRIC INFORMATION PROTECTION |
18/30358588 DC : 0 | BS EN ISO 29001 - PETROLEUM, PETROCHEMICAL AND NATURAL GAS INDUSTRIES - SECTOR-SPECIFIC QUALITY MANAGEMENT SYSTEMS - REQUIREMENTS FOR PRODUCT AND SERVICE SUPPLY ORGANIZATIONS |
BS ISO/IEC 27050-3:2017 | Information technology. Security techniques. Electronic discovery Code of practice for electronic discovery |
I.S. EN ISO 27789:2013 | HEALTH INFORMATICS - AUDIT TRAILS FOR ELECTRONIC HEALTH RECORDS (ISO 27789:2013) |
I.S. EN 50657:2017 | RAILWAYS APPLICATIONS - ROLLING STOCK APPLICATIONS - SOFTWARE ON BOARD ROLLING STOCK |
PD ISO/IEC TR 20000-11:2015 | Information technology. Service management Guidance on the relationship between ISO/IEC 20000-1:2011 and service management frameworks: ITIL® |
BS ISO/IEC 20243-1:2018 | Information technology. Open Trusted Technology Provider<sup>TM</sup> Standard (O-TTPS). Mitigating maliciously tainted and counterfeit products Requirements and recommendations |
CAN/CSA-ISO/IEC 17789:16 | Information technology Cloud computing Reference architecture (Adopted ISO/IEC 17789:2014, first edition, 2014-10-15) |
16/30338037 DC : 0 | BS ISO/IEC 30754 - INFORMATION TECHNOLOGY - SOFTWARE TRUSTWORTHINESS - GOVERNANCE AND MANAGEMENT - SPECIFICATION |
BS ISO 30300:2011 | Information and documentation. Management systems for records. Fundamentals and vocabulary |
ISO/IEC/IEEE 12207:2017 | Systems and software engineering — Software life cycle processes |
ISO/IEC 27035-1:2016 | Information technology — Security techniques — Information security incident management — Part 1: Principles of incident management |
BS ISO/IEC 27033-6:2016 | Information technology. Security techniques. Network security Securing wireless IP network access |
CSA ISO/IEC 27007 : 2013 | INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - GUIDELINES FOR INFORMATION SECURITY MANAGEMENT SYSTEMS AUDITING |
CEI UNI ISO/IEC 20000-1 : 2012 | INFORMATION TECHNOLOGY - SERVICE MANAGEMENT - PART 1: SERVICE MANAGEMENT SYSTEM REQUIREMENTS |
PD ISO/IEC TS 24748-1:2016 | Systems and software engineering. Life cycle management Guidelines for life cycle management |
BS ISO/IEC 27033-2:2012 | Information technology. Security techniques. Network security Guidelines for the design and implementation of network security |
15/30259619 DC : 0 | BS ISO/IEC 27017 - INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - CODE OF PRACTICE FOR INFORMATION SECURITY CONTROLS BASED ON ISO/IEC 27002 FOR CLOUD SERVICES |
BS ISO/IEC 27001 : 2013 | INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - INFORMATION SECURITY MANAGEMENT SYSTEMS - REQUIREMENTS |
PD ISO/IEC TS 33072:2016 | Information technology. Process assessment. Process capability assessment model for information security management |
ISO/IEC 17788:2014 | Information technology — Cloud computing — Overview and vocabulary |
ISO/IEC TR 20000-12:2016 | Information technology Service management Part 12: Guidance on the relationship between ISO/IEC 20000-1:2011 and service management frameworks: CMMI-SVC |
ISO/IEC 20243-1:2018 | Information technology — Open Trusted Technology ProviderTM Standard (O-TTPS) — Mitigating maliciously tainted and counterfeit products — Part 1: Requirements and recommendations |
DIN ISO/IEC 27018:2017-08 | INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - CODE OF PRACTICE FOR PROTECTION OF PERSONALLY IDENTIFIABLE INFORMATION (PII) IN PUBLIC CLOUDS ACTING AS PII PROCESSORS (ISO/IEC 27018:2014) |
PD ISO/IEC TR 20000-10:2015 | Information technology. Service management Concepts and terminology |
16/30333228 DC : 0 | BS ISO/IEC 38505-1 - INFORMATION TECHNOLOGY - GOVERNANCE OF IT - PART 1: THE APPLICATION OF ISO/IEC 38500 TO THE GOVERNANCE OF DATA |
UNI CEI ISO/IEC 20000-1 : 2012 | INFORMATION TECHNOLOGY - SERVICE MANAGEMENT - PART 1: SERVICE MANAGEMENT SYSTEM REQUIREMENTS |
PD CEN ISO/TS 14441:2013 | Health informatics. Security and privacy requirements of EHR systems for use in conformity assessment |
13/30260172 DC : 0 | BS ISO/IEC 27043 - INVESTIGATION TECHNOLOGY - SECURITY TECHNIQUES - INCIDENT INVESTIGATION PRINCIPLES AND PROCESSES |
INCITS/ISO/IEC 27043 : 2017 | INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - INCIDENT INVESTIGATION PRINCIPLES AND PROCESSES |
11/30207802 DC : 0 | BS ISO/IEC 27013 - INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - GUIDELINES ON THE INTEGRATED IMPLEMENTATION OF ISO/IEC 27001 AND ISO/IEC 20000-1 |
BS ISO/IEC 27034-1:2011 | Information technology. Security techniques. Application security Overview and concepts |
BS ISO/IEC 27021:2017 | Information technology. Security techniques. Competence requirements for information security management systems professionals |
BS ISO/IEC 27013:2015 | Information technology. Security techniques. Guidance on the integrated implementation of ISO/IEC 27001 and ISO/IEC 20000-1 |
UNE-ISO/IEC 27001:2014 | Information technology -- Security techniques -- Information security management systems -- Requirements |
PD CEN/TS 16439:2013 | Electronic fee collection. Security framework |
PD ISO/IEC TR 27016:2014 | Information technology. Security techniques. Information security management. Organizational economics |
14/30260169 DC : 0 | BS ISO/IEC 27042 - INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - GUIDELINES FOR THE ANALYSIS AND INTERPRETATION OF DIGITAL EVIDENCE |
BS ISO/IEC 27004:2016 | Information technology. Security techniques. Information security management. Monitoring, measurement, analysis and evaluation |
BS ISO/IEC 30111:2013 | Information technology. Security techniques. Vulnerability handling processes |
CSA ISO 9004 : 2009 | MANAGING FOR THE SUSTAINED SUCCESS OF AN ORGANIZATION - A QUALITY MANAGEMENT APPROACH |
GS ISI 002 : 1.2.1 | INFORMATION SECURITY INDICATORS (ISI); EVENT MODEL A SECURITY EVENT CLASSIFICATION MODEL AND TAXONOMY |
ISO/IEC 27007:2017 | Information technology Security techniques Guidelines for information security management systems auditing |
I.S. EN 16495:2014 | AIR TRAFFIC MANAGEMENT - INFORMATION SECURITY FOR ORGANISATIONS SUPPORTING CIVIL AVIATION OPERATIONS |
IEEE/ISO/IEC 15026-1-2014 | IEEE Standard Adoption of ISO/IEC 15026-1--Systems and Software Engineering--Systems and Software Assurance--Part 1: Concepts and Vocabulary |
I.S. EN ISO 9004:2009 | QUALITY MANAGEMENT - QUALITY OF AN ORGANIZATION - GUIDANCE TO ACHIEVE SUSTAINED SUCCESS (ISO 9004:2018) |
ISO/IEC 29151:2017 | Information technology — Security techniques — Code of practice for personally identifiable information protection |
ISO 9004:2018 | Quality management — Quality of an organization — Guidance to achieve sustained success |
S.R. CEN/TS 16850:2015 | SOCIETAL AND CITIZEN SECURITY - GUIDANCE FOR MANAGING SECURITY IN HEALTHCARE FACILITIES |
I.S. EN ISO/IEC 27040:2016 | INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - STORAGE SECURITY (ISO/IEC 27040:2015) |
S.R. CEN/TS 16439:2013 | ELECTRONIC FEE COLLECTION - SECURITY FRAMEWORK |
INCITS/ISO/IEC 27001 : 2014 | INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - INFORMATION SECURITY MANAGEMENT SYSTEMS - REQUIREMENTS |
ISO/TS 17582:2014 | Quality management systems Particular requirements for the application of ISO 9001:2008 for electoral organizations at all levels of government |
ISO/IEC 27014:2013 | Information technology Security techniques Governance of information security |
ISO/IEC 27036-2:2014 | Information technology Security techniques Information security for supplier relationships Part 2: Requirements |
CSA ISO/IEC TS 24748-1 : 2018 | SYSTEMS AND SOFTWARE ENGINEERING - LIFE CYCLE MANAGEMENT - PART 1: GUIDELINES FOR LIFE CYCLE MANAGEMENT |
UNI CEI ISO/IEC 27002 : 2014 | INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - CODE OF PRACTICE FOR INFORMATION SECURITY CONTROLS |
CAN/CSA-ISO/IEC 27006:16 | Information technology - Security techniques - Requirements for bodies providing audit and certification of information security management systems (Adopted ISO/IEC 27006:2015, third edition, 2015-10-01) |
UNE-EN ISO 19011:2012 | Guidelines for auditing management systems (ISO 19011:2011) |
ISO/IEC 27006:2015 | Information technology — Security techniques — Requirements for bodies providing audit and certification of information security management systems |
ISO/IEC 17789:2014 | Information technology — Cloud computing — Reference architecture |
ISO/IEC 24745:2011 | Information technology Security techniques Biometric information protection |
ISO/TS 13131:2014 | Health informatics Telehealth services Quality planning guidelines |
ISO 27789:2013 | Health informatics Audit trails for electronic health records |
ISO/IEC 20000-1:2011 | Information technology Service management Part 1: Service management system requirements |
DIN EN 15224:2017-05 | QUALITY MANAGEMENT SYSTEMS - EN ISO 9001:2015 FOR HEALTHCARE |
EN ISO 27789:2013 | Health informatics - Audit trails for electronic health records (ISO 27789:2013) |
CEN/TS 16439:2013 | Electronic fee collection - Security framework |
CEN/TR 16742:2014 | Intelligent transport systems - Privacy aspects in ITS standards and systems in Europe |
CAN/CSA-ISO/IEC 27011:18 | Information technology ? Security techniques ? Code of practice for information security controls based on ISO/IEC 27002 for telecommunications organizations (Adopted ISO/IEC 27011:2016, second edition, 2016-12-01) |
CAN/CSA-ISO/IEC 27004:18 | Information technology ? Security techniques ? Information security management ? Monitoring, measurement, analysis and evaluation (Adopted ISO/IEC 27004:2016, second edition, 2016-12-15) |
CAN/CSA-ISO/IEC 27033-6:18 | Information technology — Security techniques — Network security — Part 6: Securing wireless IP network access (Adopted ISO/IEC 27033-6:2016, first edition, 2016-06-01) |
CAN/CSA-ISO/IEC 27035-2:18 | Information technology — Security techniques — Information security incident management — Part 2: Guidelines to plan and prepare for incident response (Adopted ISO/IEC 27035-2:2016, first edition, 2016-11-01) |
CSA ISO/IEC 27003 : 2010 : R2015 | INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - INFORMATION SECURITY MANAGEMENT SYSTEM IMPLEMENTATION GUIDANCE |
CAN/CSA-ISO/IEC TS 33072:18 | Information technology ? Process assessment ? Process capability assessment model for information security management (Adopted ISO/IEC TS 33072:2016, first edition, 2016-07-15, corrected version 2016-09-01) |
CAN/CSA-ISO/IEC TR 20000-12:18 | Information technology — Service management — Part 12: Guidance on the relationship between ISO/IEC 20000-1:2011 and service management frameworks: CMMI-SVC (Adopted ISO/IEC TR 20000-12:2016, first edition, 2016-10-01) |
CAN/CSA-ISO/CEI 27001:14 | INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - INFORMATION SECURITY MANAGEMENT SYSTEMS - REQUIREMENTS |
CAN/CSA-ISO/IEC 20648:18 | Information technology ? TLS specification for storage systems (Adopted ISO/IEC 20648:2016, first edition, 2016-03-01) |
NBR ISO/IEC 27032 : 2015 | INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - GUIDELINES FOR CYBERSECURITY |
CSA ISO/IEC 27003 : 2010 | INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - INFORMATION SECURITY MANAGEMENT SYSTEM IMPLEMENTATION GUIDANCE |
CAN/CSA-ISO/IEC 30100-2:18 | Information technology — Home network resource management — Part 2: Architecture (Adopted ISO/IEC 30100-2:2016, first edition, 2016-04) |
CAN/CSA-ISO/IEC 27035-1:18 | Information technology — Security techniques — Information security incident management — Part 1: Principles of incident management (Adopted ISO/IEC 27035-1:2016, first edition, 2016-11-01) |
SA/SNZ TR ISO 21965:2020 | Information and documentation - Records management in enterprise architecture |
AS ISO/IEC/IEEE 12207:2019 | Systems and software engineering - Software life cycle processes |
Access your standards online with a subscription
Features
-
Simple online access to standards, technical information and regulations.
-
Critical updates of standards and customisable alerts and notifications.
-
Multi-user online standards collection: secure, flexible and cost effective.