ISO/IEC 29115:2013
Current
The latest, up-to-date edition.
Hardcopy , PDF 1 User , PDF 3 Users , PDF 5 Users , PDF 9 Users
English
27-03-2013
ISO/IEC 29115:2013 provides a framework for managing entity authentication assurance in a given context. In particular, it:
- specifies four levels of entity authentication assurance;
- specifies criteria and guidelines for achieving each of the four levels of entity authentication assurance;
- provides guidance for mapping other authentication assurance schemes to the four LoAs;
- provides guidance for exchanging the results of authentication that are based on the four LoAs; and
- provides guidance concerning controls that should be used to mitigate authentication threats.
DocumentType |
Standard
|
Pages |
36
|
PublisherName |
International Organization for Standardization
|
Status |
Current
|
Standards | Relationship |
NEN ISO/IEC 29115 : 2013 | Identical |
CEI UNI ISO/IEC 29115 : 2015 | Identical |
UNI CEI ISO/IEC 29115 : 2015 | Identical |
BS ISO/IEC 29115:2013 | Identical |
INCITS/ISO/IEC 29115 : 2014 | Identical |
PN ISO/IEC 29115 : 2017 | Identical |
17/30318701 DC : 0 | BS ISO/IEC 19286 - IDENTIFICATION CARDS - INTEGRATED CIRCUIT CARDS - PRIVACY-ENHANCING PROTOCOLS AND SERVICES |
17/30277512 DC : 0 | BS ISO/IEC 29003 - INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - IDENTITY PROOFING |
CAN/CSA-ISO/IEC TR 30125:18 | Information technology ? Biometrics used with mobile devices (Adopted ISO/IEC TR 30125:2016 first edition, 2016-05-01) |
ISO/IEC TR 30125:2016 | Information technology Biometrics used with mobile devices |
PD ISO/IEC TR 29156:2015 | Information technology. Guidance for specifying performance requirements to meet security and usability needs in applications using biometrics |
ISO/IEC TR 30117:2014 | Information technology Guide to on-card biometric comparison standards and applications |
ISO/IEC TS 29003:2018 | Information technology Security techniques Identity proofing |
17/30349181 DC : 0 | BS ISO/IEC 24760-1 AMENDMENT 1 - INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - A FRAMEWORK FOR IDENTITY MANAGEMENT - PART 1: TERMINOLOGY AND CONCEPTS |
BS ISO/IEC 29146:2016 | Information technology. Security techniques. A framework for access management |
10/30143797 DC : 0 | BS ISO/IEC 24760-1 - INFROMATION TECHNOLOGY - SECURITY TECHNIQUES - A FRAMEWORK FOR IDENTITY MANAGEMENT - PART 1: TERMINOLOGY AND CONCEPTS |
BS ISO/IEC 24760-1:2011 | Information technology. Security techniques. A framework for identity management Terminology and concepts |
15/30192160 DC : 0 | BS ISO/IEC 29146 - INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - A FRAMEWORK FOR ACCESS MANAGEMENT |
TR 103 304 : 1.1.1 | CYBER; PERSONALLY IDENTIFIABLE INFORMATION (PII) PROTECTION IN MOBILE AND CLOUD SERVICES |
ISO/IEC 19286:2018 | Identification cards — Integrated circuit cards — Privacy-enhancing protocols and services |
ISO/IEC 29146:2016 | Information technology — Security techniques — A framework for access management |
ISO/IEC 27036-4:2016 | Information technology Security techniques Information security for supplier relationships Part 4: Guidelines for security of cloud services |
TR 118 508 : 1.0.0 | ANALYSIS OF SECURITY SOLUTIONS FOR THE ONEM2M SYSTEM |
S.R. CEN/TR 419010:2017 | FRAMEWORK FOR STANDARDIZATION OF SIGNATURES - EXTENDED STRUCTURE INCLUDING ELECTRONIC IDENTIFICATION AND AUTHENTICATION |
BS ISO/IEC 27036-4:2016 | Information technology. Security techniques. Information security for supplier relationships Guidelines for security of cloud services |
PD CEN/TR 419010:2017 | Framework for standardization of signatures. Extended structure including electronic identification and authentication |
BS ISO/IEC 19286:2018 | Identification cards. Integrated circuit cards. Privacy-enhancing protocols and services |
S.R. CEN/TS 419241:2014 | SECURITY REQUIREMENTS FOR TRUSTWORTHY SYSTEMS SUPPORTING SERVER SIGNING |
CEN/TS 419241:2014 | Security Requirements for Trustworthy Systems Supporting Server Signing |
CEN/TR 419010:2017 | Framework for standardization of signatures - Extended structure including electronic identification and authentication |
UNI CEN/TS 419241 : 2014 | SECURITY REQUIREMENTS FOR TRUSTWORTHY SYSTEMS SUPPORTING SERVER SIGNING |
16/30275200 DC : 0 | BS ISO/IEC 27036-4 - INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - INFORMATION SECURITY FOR SUPPLIER RELATIONSHIPS - PART 4: GUIDELINES FOR SECURITY OF CLOUD SERVICES |
ISO/IEC 24760-3:2016 | Information technology — Security techniques — A framework for identity management — Part 3: Practice |
ISO/IEC TR 29156:2015 | Information technology Guidance for specifying performance requirements to meet security and usability needs in applications using biometrics |
ISO/IEC 24760-2:2015 | Information technology — Security techniques — A framework for identity management — Part 2: Reference architecture and requirements |
PD CEN/TS 419241:2014 | Security Requirements for Trustworthy Systems Supporting Server Signing |
SR 003 391 : 2.1.1 | CLOUD STANDARDS COORDINATION PHASE 2; INTEROPERABILITY AND SECURITY IN CLOUD COMPUTING |
CAN/CSA-ISO/IEC 27036-4:18 | Information technology — Security techniques — Information security for supplier relationships — Part 4: Guidelines for security of cloud services (Adopted ISO/IEC 27036-4:2016, first edition, 2016-10-01) |
BS ISO/IEC 29190:2015 | Information technology. Security techniques. Privacy capability assessment model |
ISO/IEC 24760-1:2011 | Information technology Security techniques A framework for identity management Part 1: Terminology and concepts |
PD ISO/IEC TR 30125:2016 | Information technology. Biometrics used with mobile devices |
14/30216195 DC : 0 | BS ISO/IEC 29190 - INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - PRIVACY CAPABILITY ASSESSMENT MODEL |
ISO/IEC 29190:2015 | Information technology Security techniques Privacy capability assessment model |
CAN/CSA-ISO/IEC 24760-3:18 | Information technology — Security techniques — A framework for identity management — Part 3: Practice (Adopted ISO/IEC 24760-3:2016, first edition, 2016-08-01) |
ISO/IEC 27001:2013 | Information technology — Security techniques — Information security management systems — Requirements |
ISO/IEC 19792:2009 | Information technology Security techniques Security evaluation of biometrics |
ISO/IEC 19790:2012 | Information technology — Security techniques — Security requirements for cryptographic modules |
ISO/IEC 24760-1:2011 | Information technology Security techniques A framework for identity management Part 1: Terminology and concepts |
ISO/IEC 29101:2013 | Information technology Security techniques Privacy architecture framework |
ISO/IEC 29100:2011 | Information technology — Security techniques — Privacy framework |
Please Login or Create an Account so you can add users to your Multi user PDF Later.
Important note : All end users must be registered with an Account prior to user licenses being assigned.
Users cannot be edited or removed once added to your Multi user PDF.
Access your standards online with a subscription
Features
-
Simple online access to standards, technical information and regulations.
-
Critical updates of standards and customisable alerts and notifications.
-
Multi-user online standards collection: secure, flexible and cost effective.