ISO/IEC 15408-2:2008
Superseded
A superseded Standard is one, which is fully replaced by another Standard, which is a new edition of the same Standard.
A superseded Standard is one, which is fully replaced by another Standard, which is a new edition of the same Standard.
Hardcopy , PDF , PDF 3 Users , PDF 5 Users , PDF 9 Users
08-09-2022
French, English
08-19-2008
ISO/IEC 15408-2:2008 defines the content and presentation of the security functional requirements to be assessed in a security evaluation using ISO/IEC 15408. It contains a comprehensive catalogue of predefined security functional components that will meet most common security needs of the marketplace. These are organized using a hierarchical structure of classes, families and components, and supported by comprehensive user notes.
ISO/IEC 15408-2:2008 also provides guidance on the specification of customized security requirements where no suitable predefined security functional components exist.
DocumentType |
Standard
|
Pages |
235
|
ProductNote |
THIS STANDARD HAVE CORRECTED VERSION FOR ENGLISH 2011
|
PublisherName |
International Organization for Standardization
|
Status |
Superseded
|
SupersededBy | |
Supersedes |
DIN EN 419251-3:2013-06 | SECURITY REQUIREMENTS FOR DEVICE FOR AUTHENTICATION - PART 3: ADDITIONAL FUNCTIONALITY FOR SECURITY TARGETS |
AAMI IEC TIR 80001-2-2 : 2012 | APPLICATION OF RISK MANAGEMENT FOR IT-NETWORKS INCORPORATING MEDICAL DEVICES - PART 2-2: GUIDANCE FOR THE DISCLOSURE AND COMMUNICATION OF MEDICAL DEVICE SECURITY NEEDS, RISKS AND CONTROLS |
ISO/IEC 29128:2011 | Information technology — Security techniques — Verification of cryptographic protocols |
PD ISO/IEC TR 19791:2006 | Information technology. Security techniques. Security assessment of operational systems |
BS EN 419251-2:2013 | Security requirements for device for authentication Protection profile for extension for trusted channel to certificate generation application |
DIN EN 419211-2 E : 2013 | PROTECTION PROFILES FOR SECURE SIGNATURE CREATION DEVICE - PART 2: DEVICE WITH KEY GENERATION |
DIN EN ISO 27789:2013-06 | Health informatics - Audit trails for electronic health records (ISO 27789:2013) |
ISO/IEC TR 15446:2017 | Information technology Security techniques Guidance for the production of protection profiles and security targets |
ISO/IEC TR 20004:2015 | Information technology Security techniques Refining software vulnerability analysis under ISO/IEC 15408 and ISO/IEC 18045 |
BS EN 50436-6:2015 | Alcohol interlocks. Test methods and performance requirements Data security |
BS EN 419211-6:2014 | Protection profiles for secure signature creation device Extension for device with key import and trusted channel to signature creation application |
CAN/CSA-IEC 62443-2-1:17 | Industrial communication networks — Network and system security — Part 2-1: Establishing an industrial automation and control system security program (Adopted IEC 62443-2-1:2010, first edition, 2010-11) | Réseaux industriels de communication — Sécurité dans les réseaux et les systèmes — Partie 2-1 : Établissement d’un programme de sécurité pour les systèmes d’automatisation et de commande industrielles (norme IEC 62443-2-1:2010 adoptée, première édition, 2010-11) |
05/30144069 DC : DRAFT DEC 2005 | ISO 13491-1 - BANKING - SECURE CRYPTOGRAPHIC DEVICES (RETAIL) - PART 1: CONCEPTS, REQUIREMENTS AND EVALUATION METHODS |
UNI CEN ISO/TS 25110 : 2013 | ELECTRONIC FEE COLLECTION - INTERFACE DEFINITION FOR ON-BOARD ACCOUNT USING INTEGRATED CIRCUIT CARD (ICC) |
PD CEN ISO/TS 14907-1:2015 | Electronic fee collection. Test procedures for user and fixed equipment Description of test procedures |
ISO/IEC TS 19249:2017 | Information technology Security techniques Catalogue of architectural and design principles for secure products, systems and applications |
BS ISO/IEC 30107-3:2017 | Information technology. Biometric presentation attack detection Testing and reporting |
PREN 419221-5 : DRAFT 2016 | PROTECTION PROFILES FOR TRUST SERVICE PROVIDER CRYPTOGRAPHIC MODULES - PART 5: CRYPTOGRAPHIC MODULE FOR TRUST SERVICES |
BS EN ISO 27789:2013 | Health informatics. Audit trails for electronic health records |
13/30293476 DC : 0 | BS EN 62601 - INDUSTRIAL COMMUNICATION NETWORKS - WIRELESS COMMUNICATION NETWORK AND COMMUNICATION PROFILES - WIA-PA |
10/30156465 DC : DRAFT DEC 2010 | BS EN ISO 27789 - HEALTH INFORMATICS - AUDIT TRAILS FOR ELECTRONIC HEALTH RECORDS |
EN ISO/TS 17574 : 2004 | ROAD TRANSPORT AND TRAFFIC TELEMATICS - ELECTRONIC FEE COLLECTION (EFC) - GUIDELINES FOR EFC SECURITY PROTECTION PROFILES |
DIN EN 419251-1 E : 2013 | SECURITY REQUIREMENTS FOR DEVICE FOR AUTHENTICATION - PART 1: PROTECTION PROFILE FOR CORE FUNCTIONALITY |
S.R. CEN ISO/TS 14907-1:2015 | ELECTRONIC FEE COLLECTION - TEST PROCEDURES FOR USER AND FIXED EQUIPMENT - PART 1: DESCRIPTION OF TEST PROCEDURES (ISO/TS 14907-1:2015) |
07/30162803 DC : 0 | BS ISO/IEC 18045 - INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - METHODOLOGY FOR IT SECURITY EVALUATION |
14/30275438 DC : 0 | BS ISO/IEC 29167-12 - INFORMATION TECHNOLOGY - AUTOMATIC IDENTIFICATION AND DATA CAPTURE TECHNIQUES - PART 12: CRYPTO SUITE ECC-DH SECURITY SERVICES FOR AIR INTERFACE COMMUNICATION |
CSA ISO/IEC TR 14516 : 2004 | INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - GUIDELINES FOR THE USE AND MANAGEMENT OF TRUSTED THIRD PARTY SERVICES |
DD IEC PAS 62601 : DRAFT MAR 2009 | INDUSTRIAL COMMUNICATION NETWORKS - FIELDBUS SPECIFICATIONS - WIA-PA COMMUNICATION NETWORK AND COMMUNICATION PROFILE |
CSA TELECOM ORGANIZATIONS PACKAGE : 2018 | CONSISTS OF CAN/CSA-ISO/IEC 27000:18 - INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - INFORMATION SECURITY MANAGEMENT SYSTEMS - OVERVIEW AND VOCABULARY; CAN/CSA-ISO/IEC 27001:14, INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - INFORMATION SECURITY MANAGEMENT SYSTEMS - REQUIREMENTS; CAN/CSA-ISO/IEC 27002:15 - INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - CODE OF PRACTICE FOR |
I.S. EN 419212-4:2018 | APPLICATION INTERFACE FOR SECURE ELEMENTS FOR ELECTRONIC IDENTIFICATION, AUTHENTICATION AND TRUSTED SERVICES - PART 4: PRIVACY SPECIFIC PROTOCOLS |
CSA ISO/IEC TR 14516 : 2004 : R2012 | INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - GUIDELINES FOR THE USE AND MANAGEMENT OF TRUSTED THIRD PARTY SERVICES |
INCITS/ISO/IEC 15945 : 2002 | INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - SPECIFICATION OF TTP SERVICES TO SUPPORT THE APPLICATION OF DIGITAL SIGNATURES |
S.R. CEN ISO/TS 14441:2013 | HEALTH INFORMATICS - SECURITY AND PRIVACY REQUIREMENTS OF EHR SYSTEMS FOR USE IN CONFORMITY ASSESSMENT (ISO/TS 14441:2013) |
ANSI X9.117 : 2012 | SECURE REMOTE ACCESS - MUTUAL AUTHENTICATION |
ISO/IEC TR 15443-3:2007 | Information technology Security techniques A framework for IT security assurance Part 3: Analysis of assurance methods |
S.R. CEN/TS 419221-2:2016 | PROTECTION PROFILES FOR TSP CRYPTOGRAPHIC MODULES - PART 2: CRYPTOGRAPHIC MODULE FOR CSP SIGNING OPERATIONS WITH BACKUP |
INCITS/ISO/IEC 15408-3 : 2013(R2018) | INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - EVALUATION CRITERIA FOR IT SECURITY - PART 3: SECURITY ASSURANCE REQUIREMENTS |
I.S. EN 50436-6:2015 | ALCOHOL INTERLOCKS - TEST METHODS AND PERFORMANCE REQUIREMENTS - PART 6: DATA SECURITY |
AAMI/IEC TIR80001-2-3:2012 | APPLICATION OF RISK MANAGEMENT FOR IT-NETWORKS INCORPORATING MEDICAL DEVICES - PART 2-3: GUIDANCE FOR WIRELESS NETWORKS |
PD CEN ISO/TS 25110:2013 | Electronic fee collection. Interface definition for on-board account using integrated circuit card (ICC) |
EN IEC 62443-4-1:2018 | Security for industrial automation and control systems - Part 4-1: Secure product development lifecycle requirements |
I.S. EN ISO 27799:2016 | HEALTH INFORMATICS - INFORMATION SECURITY MANAGEMENT IN HEALTH USING ISO/IEC 27002 |
16/30345816 DC : 0 | BS EN 419212-4 - APPLICATION INTERFACE FOR SECURE ELEMENTS FOR ELECTRONIC IDENTIFICATION, AUTHENTICATION AND TRUSTED SERVICES - PART 4: PRIVACY SPECIFIC PROTOCOLS |
I.S. CWA 14172-7:2004 | EESSI CONFORMITY ASSESSMENT GUIDANCE - PART 7: CRYPTOGRAPHIC MODULES USED BY CERTIFICATION SERVICE PROVIDERS FOR SIGNING OPERATIONS AND KEY GENERATION SERVICES |
EN ISO 25110:2017 | Electronic fee collection - Interface definition for on-board account using integrated circuit card (ICC) (ISO 25110:2017) |
ISO/IEC 15945:2002 | Information technology — Security techniques — Specification of TTP services to support the application of digital signatures |
CEN ISO/TS 17574:2017 | Electronic fee collection - Guidelines for security protection profiles (ISO/TS 17574:2017) |
CEN ISO/TS 25110:2013 | Electronic fee collection - Interface definition for on-board account using integrated circuit card (ICC) (ISO/TS 25110:2013) |
EN 50436-6:2015 | Alcohol interlocks - Test methods and performance requirements - Part 6: Data security |
EN 62601:2016 | Industrial networks - Wireless communication network and communication profiles - WIA-PA |
EN 319 421 : 1.1.1 | ELECTRONIC SIGNATURES AND INFRASTRUCTURES (ESI); POLICY AND SECURITY REQUIREMENTS FOR TRUST SERVICE PROVIDERS ISSUING TIME-STAMPS |
UNE-EN 419211-2:2016 | Protection profiles for secure signature creation device - Part 2: Device with key generation |
TR 102 780 : 1.1.1 | METHODS FOR TESTING AND SPECIFICATION (MTS); SECURITY; GUIDE TO THE USE OF METHODS IN DEVELOPMENT OF ETSI SECURITY STANDARDS |
S.R. CEN/TS 419221-3:2016 | PROTECTION PROFILES FOR TSP CRYPTOGRAPHIC MODULES - PART 3: CRYPTOGRAPHIC MODULE FOR CSP KEY GENERATION SERVICES |
04/30091046 DC : DRAFT DEC 2004 | ISO/IEC 19790 - INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - SECURITY REQUIREMENTS FOR CRYPTOGRAPHIC MODULES |
16/30329605 DC : 0 | BS ISO/IEC 30107-3 - INFORMATION TECHNOLOGY - BIOMETRIC PRESENTATION ATTACK DETECTION - PART 3: TESTING AND REPORTING |
INCITS/ISO/IEC 15292 : 2001 : R2007 | INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - PROTECTION PROFILE REGISTRATION PROCEDURES |
ISO 13491-2:2017 | Financial services — Secure cryptographic devices (retail) — Part 2: Security compliance checklists for devices used in financial transactions |
BS ISO/IEC 15408-1:2009 | Information technology. Security techniques. Evaluation criteria for IT security Introduction and general model |
ISO/IEC 30107-3:2017 | Information technology — Biometric presentation attack detection — Part 3: Testing and reporting |
08/30091038 DC : DRAFT JUNE 2008 | ISO/IEC 19792 - INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - SECURITY EVALUATION OF BIOMETRICS |
ISO/IEC 15026-1:2013 | Systems and software engineering Systems and software assurance Part 1: Concepts and vocabulary |
TS 102 573 : 2.1.1 | ELECTRONIC SIGNATURES AND INFRASTRUCTURES (ESI); POLICY REQUIREMENTS FOR TRUST SERVICE PROVIDERS SIGNING AND/OR STORING DATA OBJECTS |
17/30351770 DC : 0 | BS EN ISO 25110 - ELECTRONIC FEE COLLECTION - INTERFACE DEFINITION FOR ON-BOARD ACCOUNT USING INTEGRATED CIRCUIT CARD (ICC) |
DIN EN 419211-2:2013-12 | Protection profiles for secure signature creation device - Part 2: Device with key generation |
BS ISO/IEC 19792:2009 | Information technology. Security techniques. Security evaluation of biometrics |
PD IEC/TR 80001-2-9:2017 | Application of risk management for it-networks incorporating medical devices Application guidance. Guidance for use of security assurance cases to demonstrate confidence in IEC TR 80001-2-2 security capabilities |
BS EN 419251-1:2013 | Security requirements for device for authentication Protection profile for core functionality |
ISO/IEC 15408-3:2008 | Information technology — Security techniques — Evaluation criteria for IT security — Part 3: Security assurance components |
EG 202 549 : 1.1.1 | TELECOMMUNICATIONS AND INTERNET CONVERGED SERVICES AND PROTOCOLS FOR ADVANCED NETWORKING (TISPAN); DESIGN GUIDE; APPLICATION OF SECURITY COUNTERMEASURES TO SERVICE CAPABILITIES |
ISO/IEC 29167-14:2015 | Information technology Automatic identification and data capture techniques Part 14: Crypto suite AES OFB security services for air interface communications |
08/30133461 DC : 0 | ISO/IEC 27003 - INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - INFORMATION SECURITY MANAGEMENT SYSTEM IMPLEMENTATION GUIDANCE |
EN 319 411-2 : 2.2.2 | ELECTRONIC SIGNATURES AND INFRASTRUCTURES (ESI); POLICY AND SECURITY REQUIREMENTS FOR TRUST SERVICE PROVIDERS ISSUING CERTIFICATES; PART 2: REQUIREMENTS FOR TRUST SERVICE PROVIDERS ISSUING EU QUALIFIED CERTIFICATES |
TR 187 013 : 3.1.1 | TELECOMMUNICATIONS AND INTERNET CONVERGED SERVICES AND PROTOCOLS FOR ADVANCED NETWORKING (TISPAN); FEASIBILITY STUDY ON IPTV SECURITY ARCHITECTURE |
ISO/IEC 29167-12:2015 | Information technology Automatic identification and data capture techniques Part 12: Crypto suite ECC-DH security services for air interface communications |
13/30277648 DC : 0 | BS EN 50436-6 - ALCOHOL INTERLOCKS - TEST METHODS AND PERFORMANCE REQUIREMENTS - PART 6: DATA SECURITY |
07/30169475 DC : 0 | BS ISO 15782-1 - CERTIFICATE MANAGEMENT FOR FINANCIAL SERVICES - PART 1: PUBLIC KEY CERTIFICATES |
CSA ISO/IEC 15292 : 2004 | INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - PROTECTION PROFILE REGISTRATION PROCEDURES |
DD ISO/TS 25237:2008 | Health informatics. Pseudonymization |
BS ISO/IEC 15945:2002 | Information technology. Security techniques. Specification of TTP services to support the application of digital signatures |
BS ISO 13491-2:2017 | Financial services. Secure cryptographic devices (retail) Security compliance checklists for devices used in financial transactions |
CSA ISO/IEC 15408-1 : 2010 | INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - EVALUATION CRITERIA FOR IT SECURITY - PART 1: INTRODUCTION AND GENERAL MODEL |
CAN/CSA-ISO/IEC 15945-04 (R2017) | Information Technology - Security Techniques - Specification of TTP Services to Support the Application of Digital Signatures (Adopted ISO/IEC 15945:2002, first edition, 2002-02-01) |
CSA ISO/IEC TR 15446 : 2010 | INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - GUIDE FOR THE PRODUCTION OF PROTECTION PROFILES AND SECURITY TARGETS |
IEEE DRAFT 1074 : 0 | DEVELOPING SOFTWARE LIFE CYCLE PROCESSES |
INCITS/ISO/IEC 15408-1 : 2012 | INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - EVALUATION CRITERIA FOR IT SECURITY - PART 1: INTRODUCTION AND GENERAL MODEL |
TR 185 012 : 3.1.1 | TELECOMMUNICATIONS AND INTERNET CONVERGED SERVICES AND PROTOCOLS FOR ADVANCED NETWORKING (TISPAN); FEASIBILITY STUDY OF SECURITY MECHANISMS FOR CUSTOMER PREMISES NETWORKS CONNECTED TO TISPAN NGN |
IEC 62443-2-1:2010 | Industrial communication networks - Network and system security - Part 2-1: Establishing an industrial automation and control system security program |
UNE-ISO/IEC TR 19791:2013 IN | Information technology. Security techniques. Security assessment of operational systems |
UNE 71512:2011 | Applications with the Spanish DNIe. Electronic signature creation and verification. Type 2 for personal computers, and with a Evaluation Assurance Level «EAL1» |
BIS IS 14990-1 : 2012 | INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - EVALUATION CRITERIA FOR IT SECURITY - PART 1: INTRODUCTION AND GENERAL MODEL |
I.S. CWA 14365-1:2004 | GUIDE ON THE USE OF ELECTRONIC SIGNATURES - PART 1: LEGAL AND TECHNICAL ASPECTS |
EG 202 387 : 1.1.1 | TELECOMMUNICATIONS AND INTERNET CONVERGED SERVICES AND PROTOCOLS FOR ADVANCED NETWORKING (TISPAN); SECURITY DESIGN GUIDE; METHOD FOR APPLICATION OF COMMON CRITERIA TO ETSI DELIVERABLES |
TR 102 420 : 1.1.1 | TELECOMMUNICATIONS AND INTERNET CONVERGED SERVICES AND PROTOCOLS FOR ADVANCED NETWORKING (TISPAN); REVIEW OF ACTIVITY ON SECURITY |
I.S. EN 62601:2016 | INDUSTRIAL NETWORKS - WIRELESS COMMUNICATION NETWORK AND COMMUNICATION PROFILES - WIA-PA |
PREN 419241-2 : DRAFT 2017 | TRUSTWORTHY SYSTEMS SUPPORTING SERVER SIGNING - PART 2: PROTECTION PROFILE FOR QSCD FOR SERVER SIGNING |
UNI CEN ISO/TS 14441 : 2014 | HEALTH INFORMATICS - SECURITY AND PRIVACY REQUIREMENTS OF HER SYSTEMS FOR USE IN CONFORMITY ASSESSMENT |
UNE 71511:2011 | Applications with the Spanish DNIe. Electronic signature creation and verification. Type 1 for IT platforms that allow an exclusive control of signer’s interfaces, and with a Evaluation Assurance Level «EAL3» |
I.S. CWA 14172-3:2004 | EESSI CONFORMITY ASSESSMENT GUIDANCE - PART 3: TRUSTWORTHY SYSTEMS MANAGING CERTIFICATES FOR ELECTRONIC SIGNATURES |
UNE 71513:2011 | Applications with the Spanish DNIe. Electronic signature creation and verification. Type 2 for personal computers, and with a Evaluation Assurance Level «EAL3» |
UNE-ISO/IEC TR 15446:2013 IN | Information technology. Security techniques. Guide for the production of Protection Profiles and Security Targets |
TR 187 020 : 1.1.1 | RADIO FREQUENCY IDENTIFICATION (RFID); COORDINATED ESO RESPONSE TO PHASE 1 OF EU MANDATE M436 |
CSA ISO/IEC 15026-1 : 2015 | SYSTEMS AND SOFTWARE ENGINEERING - SYSTEMS AND SOFTWARE ASSURANCE - PART 1: CONCEPTS AND VOCABULARY |
I.S. CWA 14355:2004 | GUIDELINES FOR THE IMPLEMENTATION OF SECURE SIGNATURE-CREATION DEVICES |
DIN EN 419251-2:2013-06 | SECURITY REQUIREMENTS FOR DEVICE FOR AUTHENTICATION - PART 2: PROTECTION PROFILE FOR EXTENSION FOR TRUSTED CHANNEL TO CERTIFICATE GENERATION APPLICATION |
GS NFV-SEC 006 : 1.1.1 | NETWORK FUNCTIONS VIRTUALISATION (NFV); SECURITY GUIDE; REPORT ON SECURITY ASPECTS AND REGULATORY CONCERNS |
ISO/IEC 29167-11:2014 | Information technology — Automatic identification and data capture techniques — Part 11: Crypto suite PRESENT-80 security services for air interface communications |
04/30040790 DC : DRAFT MARCH 2004 | ISO/IEC DTR 15443-2 - INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - A FRAMEWORK FOR IT SECURITY ASSURANCE - PART 2 - ASSURANCE METHODS |
BS EN 419211-2:2013 | Protection profiles for secure signature creation device Device with key generation |
DIN EN 419251-3 E : 2013 | SECURITY REQUIREMENTS FOR DEVICE FOR AUTHENTICATION - PART 3: ADDITIONAL FUNCTIONALITY FOR SECURITY TARGETS |
GS NFV-SEC 014 : 3.1.1 | NETWORK FUNCTIONS VIRTUALISATION (NFV) RELEASE 3; NFV SECURITY; SECURITY SPECIFICATION FOR MANO COMPONENTS AND REFERENCE POINTS |
DIN CEN ISO/TS 14907-1;DIN SPEC 91192:2015-12 | ELECTRONIC FEE COLLECTION - TEST PROCEDURES FOR USER AND FIXED EQUIPMENT - PART 1: DESCRIPTION OF TEST PROCEDURES (ISO/TS 14907-1:2015) |
INCITS/ISO 19153 : 2014 | GEOGRAPHIC INFORMATION - GEOSPATIAL DIGITAL RIGHTS MANAGEMENT REFERENCE MODEL (GEODRM RM) |
DIN EN 62601:2016-10 | Industrial networks - Wireless communication network and communication profiles - WIA-PA (IEC 62601:2015); English version EN 62601:2016 |
15/30285708 DC : 0 | BS EN ISO 25237 - HEALTH INFORMATICS - PSEUDONYMISATION |
DIN EN 419251-1:2013-05 | SECURITY REQUIREMENTS FOR DEVICE FOR AUTHENTICATION - PART 1: PROTECTION PROFILE FOR CORE FUNCTIONALITY |
BS ISO/IEC TR 15942:2000 | Information technology. Programming languages. Guide for the use of the Ada programming language in high integrity systems |
BS ISO/IEC 15408-3:2008 | Information technolgy. Security techniques. Evaluation criteria for IT security Security assurance components |
ES 202 382 : 1.1.1 | TELECOMMUNICATIONS AND INTERNET CONVERGED SERVICES AND PROTOCOLS FOR ADVANCED NETWORKING (TISPAN); SECURITY DESIGN GUIDE; METHOD AND PROFORMA FOR DEFINING PROTECTION PROFILES |
ISO/IEC TR 19791:2010 | Information technology Security techniques Security assessment of operational systems |
DIN EN 419251-2 E : 2013 | SECURITY REQUIREMENTS FOR DEVICE FOR AUTHENTICATION - PART 2: PROTECTION PROFILE FOR EXTENSION FOR TRUSTED CHANNEL TO CERTIFICATE GENERATION APPLICATION |
TS 187 001 : 3.9.1 | NETWORK TECHNOLOGIES (NTECH); NGN SECURITY (SEC); REQUIREMENTS |
SR 002 564 : 2.0.0 | APPLICABILITY OF EXISTING ETSI AND ETSI/3GPP DELIVERABLES TO EHEALTH |
BS IEC 62443-2-1 : 2010 | INDUSTRIAL COMMUNICATION NETWORKS - NETWORK AND SYSTEM SECURITY - PART 2-1: ESTABLISHING AN INDUSTRIAL AUTOMATION AND CONTROL SYSTEM SECURITY PROGRAM |
CSA ISO/IEC TR 15942 : 2004 : R2014 | INFORMATION TECHNOLOGY - PROGRAMMING LANGUAGES - GUIDE FOR THE USE OF THE ADA PROGRAMMING LANGUAGE IN HIGH INTEGRITY SYSTEMS |
PD ISO/IEC TR 20004:2015 | Information technology. Security techniques. Refining software vulnerability analysis under ISO/IEC 15408 and ISO/IEC 18045 |
DIN EN 419211-6 E : 2014 | PROTECTION PROFILES FOR SECURE SIGNATURE CREATION DEVICE - PART 6: EXTENSION FOR DEVICE WITH KEY IMPORT AND TRUSTED CHANNEL TO SIGNATURE CREATION APPLICATION |
BS EN 419251-3:2013 | Security requirements for device for authentication Additional functionality for security targets |
07/30162799 DC : 0 | BS ISO/IEC 15408-3 - INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - EVALUATION CRITERIA FOR IT SECURITY - PART 3: SECURITY ASSURANCE REQUIREMENTS |
07/30161079 DC : 0 | BS EN 14890-1 - APPLICATION INTERFACE FOR SMART CARDS USED AS SECURE SIGNATURE CREATION DEVICES - PART 1: BASIC SERVICES |
ISA 99.02.01 : 2009 | SECURITY FOR INDUSTRIAL AUTOMATION AND CONTROL SYSTEMS: ESTABLISHING AN INDUSTRIAL AUTOMATION AND CONTROL SYSTEMS SECURITY PROGRAM |
07/30143790 DC : 0 | BS ISO/IEC 24759 - INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - TEST REQUIREMENTS FOR CRYPTOGRAPHIC MODULES |
10/30192143 DC : 0 | BS ISO/IEC 29128 - INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - VERIFICATION OF CRYPTOGRAPHIC PROTOCOLS |
07/30107763 DC : 0 | BS ISO/IEC 24713-2 - INFORMATION TECHNOLOGY - BIOMETRIC PROFILES FOR INTEROPERABILITY AND DATA INTERCHANGE - PART 2: PHYSICAL ACCESS CONTROL FOR EMPLOYEES AT AIRPORTS |
I.S. EN 419251-2:2013 | SECURITY REQUIREMENTS FOR DEVICE FOR AUTHENTICATION - PART 2: PROTECTION PROFILE FOR EXTENSION FOR TRUSTED CHANNEL TO CERTIFICATE GENERATION APPLICATION |
IEC PAS 62601:2009 | Industrial communication networks - Fieldbus specifications - WIA-PA communication network and communication profile |
CSA ISO/IEC 27003 : 2010 : R2015 | INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - INFORMATION SECURITY MANAGEMENT SYSTEM IMPLEMENTATION GUIDANCE |
CSA ISO/IEC 15408-3 : 2009 | INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - EVALUATION CRITERIA FOR IT SECURITY - PART 3: SECURITY ASSURANCE COMPONENTS |
CAN/CSA-ISO/IEC 29167-12:16 | Information technology Automatic identification and data capture techniques Part 12: Crypto suite ECC-DH security services for air interface communication (Adopted ISO/IEC 29167-12:2015, first edition, 2015-05-15) |
SAE J 3061 : 2016 | CYBERSECURITY GUIDEBOOK FOR CYBER-PHYSICAL VEHICLE SYSTEMS |
I.S. EN ISO 25237:2017 | HEALTH INFORMATICS - PSEUDONYMIZATION (ISO 25237:2017) |
AAMI/IEC TIR80001-2-8:2016 | APPLICATION OF RISK MANAGEMENT FOR IT NETWORKS INCORPORATING MEDICAL DEVICES - PART 2-8: APPLICATION GUIDANCE - GUIDANCE ON STANDARDS FOR ESTABLISHING THE SECURITY CAPABILITIES IDENTIFIED IN IEC 80001-2-2 |
TR 187 011 : 2.1.1 | TELECOMMUNICATIONS AND INTERNET CONVERGED SERVICES AND PROTOCOLS FOR ADVANCED NETWORKING (TISPAN); NGN SECURITY; APPLICATION OF ISO-15408-2 REQUIREMENTS TO ETSI STANDARDS - GUIDE, METHOD AND APPLICATION WITH EXAMPLES |
PD CEN/TS 419221-2:2016 | Protection Profiles for TSP cryptographic modules Cryptographic module for CSP signing operations with backup |
ISO/IEC 19792:2009 | Information technology Security techniques Security evaluation of biometrics |
I.S. CWA 14169:2004 | SECURE SIGNATURE-CREATION DEVICES 'EAL 4+' |
TR 102 572 : 1.1.1 | BEST PRACTICES FOR HANDLING ELECTRONIC SIGNATURES AND SIGNED DATA FOR DIGITAL ACCOUNTING |
UNE 71510:2011 | Applications with the Spanish DNIe. Electronic signature creation and verification. Type 1 for IT platforms that allow an exclusive control of signer’s interfaces, and with a Evaluation Assurance Level «EAL1». |
IEC TR 80001-2-8:2016 | Application of risk management for IT-networks incorporating medical devices - Part 2-8: Application guidance - Guidance on standards for establishing the security capabilities identified in IEC TR 80001-2-2 |
TS 102 165-1 : 4.2.3 | CYBER; METHODS AND PROTOCOLS; PART 1: METHOD AND PRO FORMA FOR THREAT, VULNERABILITY, RISK ANALYSIS (TVRA) |
UNE EN 419211-2 : 2016 | PROTECTION PROFILES FOR SECURE SIGNATURE CREATION DEVICE - PART 2: DEVICE WITH KEY GENERATION |
UNI EN ISO 27789 : 2013 | HEALTH INFORMATICS - AUDIT TRAILS FOR ELECTRONIC HEALTH RECORDS |
UNI EN 419211-6 : 2014 | PROTECTION PROFILES FOR SECURE SIGNATURE CREATION DEVICE - PART 6: EXTENSION FOR DEVICE WITH KEY IMPORT AND TRUSTED CHANNEL TO SIGNATURE CREATION APPLICATION |
ISO/TS 25110:2013 | Electronic fee collection Interface definition for on-board account using integrated circuit card (ICC) |
UNI EN 419212-1 : 2015 | APPLICATION INTERFACE FOR SMART CARDS USED AS SECURE SIGNATURE CREATION DEVICES - PART 1: BASIC SERVICES |
I.S. EN 419211-6:2014 | PROTECTION PROFILES FOR SECURE SIGNATURE CREATION DEVICE - PART 6: EXTENSION FOR DEVICE WITH KEY IMPORT AND TRUSTED CHANNEL TO SIGNATURE CREATION APPLICATION |
PD IEC/TR 80001-2-3:2012 | Application of risk management for IT-networks incorporating medical devices Guidance for wireless networks |
PD ISO/IEC TR 15446:2009 | Information technology. Security techniques. Guide for the production of protection profiles and security targets |
PD IEC/TR 80001-2-8:2016 | Application of risk management for IT-networks incorporating medical devices Application guidance. Guidance on standards for establishing the security capabilities identified in IEC TR 80001-2-2 |
TS 102 158 : 1.1.1 | ELECTRONIC SIGNATURES AND INFRASTRUCTURES (ESI); POLICY REQUIREMENTS FOR CERTIFICATION SERVICE PROVIDERS ISSUING ATTRIBUTE CERTIFICATES USABLE WITH QUALIFIED CERTIFICATES |
BS IEC 62601:2011 | Industrial communication networks. Fieldbus specifications. WIA-PA communication network and communication profile |
08/30182164 DC : DRAFT MAY 2008 | BS ISO 31000 - RISK MANAGEMENT - PRINCIPLES AND GUIDELINES ON IMPLEMENTATION |
I.S. EN ISO 25110:2017 | ELECTRONIC FEE COLLECTION - INTERFACE DEFINITION FOR ON-BOARD ACCOUNT USING INTEGRATED CIRCUIT CARD (ICC) (ISO 25110:2017) |
CSA INFORMATION SECURITY PACKAGE : 2018 | CONSISTS OF CAN/CSA-ISO/IEC 27000:18 - INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - INFORMATION SECURITY MANAGEMENT SYSTEMS - OVERVIEW AND VOCABULARY; CAN/CSA-ISO/IEC 27001:14, INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - INFORMATION SECURITY MANAGEMENT SYSTEMS - REQUIREMENTS; CAN/CSA-ISO/IEC 27002:15 - INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - CODE OF PRACTICE FOR INFORMATION |
TS 102 181 : 1.2.1 | EMERGENCY COMMUNICATIONS (EMTEL); REQUIREMENTS FOR COMMUNICATION BETWEEN AUTHORITIES/ORGANIZATIONS DURING EMERGENCIES |
BS ISO/IEC 29128:2011 | Information technology. Security techniques. Verification of cryptographic protocols |
BIS IS/ISO 21188 : 2006 | PUBLIC KEY INFRASTRUCTURE FOR FINANCIAL SERVICES - PRACTICES AND POLICY FRAMEWORK |
PD IEC/TR 80001-2-2:2012 | Application of risk management for IT-networks incorporating medical devices Guidance for the disclosure and communication of medical device security needs, risks and controls |
S.R. CEN/TS 419221-4:2016 | PROTECTION PROFILES FOR TSP CRYPTOGRAPHIC MODULES - PART 4: CRYPTOGRAPHIC MODULE FOR CSP SIGNING OPERATIONS WITHOUT BACKUP |
BS ISO/IEC 15026-1:2013 | Systems and software engineering. Systems and software assurance Concepts and vocabulary |
BS ISO/IEC TR 14516:2002 | Information technology. Security techniques. Guidelines for the use and management of trusted third party services |
UNI EN 419211-2 : 2014 | PROTECTION PROFILES FOR SECURE SIGNATURE CREATION DEVICE - PART 2: DEVICE WITH KEY GENERATION |
BS EN 62601:2016 | Industrial networks. Wireless communication network and communication profiles. WIA-PA |
UNI EN 419251-3 : 2013 | SECURITY REQUIREMENTS FOR DEVICE FOR AUTHENTICATION - PART 3: ADDITIONAL FUNCTIONALITY FOR SECURITY TARGETS |
UNI EN 419251-1 : 2013 | SECURITY REQUIREMENTS FOR DEVICE FOR AUTHENTICATION - PART 1: PROTECTION PROFILE FOR CORE FUNCTIONALITY |
PD ISO/IEC/TR 19249:2017 | Information technology. Security techniques Catalogue of architectural and design principles for secure products, systems and applications |
DIN EN ISO 25237:2015-10 (Draft) | HEALTH INFORMATICS - PSEUDONYMIZATION (ISO 25237:2017) |
17/30346588 DC : 0 | BS EN 419221-5 - PROTECTION PROFILES FOR TRUST SERVICE PROVIDER CRYPTOGRAPHIC MODULES - PART 5: CRYPTOGRAPHIC MODULE FOR TRUST SERVICES |
TR 187 002 : 3.1.1 | TELECOMMUNICATIONS AND INTERNET CONVERGED SERVICES AND PROTOCOLS FOR ADVANCED NETWORKING (TISPAN); TISPAN NGN SECURITY (NGN SEC); THREAT, VULNERABILITY AND RISK ANALYSIS |
09/30207165 DC : 0 | BS EN 62601 - INDUSTRIAL COMMUNICATION NETWORKS - FIELDBUS SPECIFICATIONS - WIA-PA COMMUNICATION NETWORK AND COMMUNICATION PROFILE |
DD CEN ISO/TS 25110:2008 | Electronic fee collection. Interface definition for on-board account using integrated circuit card (ICC) |
CSA ISO/IEC 15408-1 : 2010 : R2015 | INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - EVALUATION CRITERIA FOR IT SECURITY - PART 1: INTRODUCTION AND GENERAL MODEL |
03/652682 DC : DRAFT NOV 2003 | BS ISO/IEC TR 15446 - INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - GUIDE FOR THE PRODUCTION OF PROTECTION PROFILES AND SECURITY TARGETS |
CSA ISO/IEC TR 15446 : 2010 : R2015 | INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - GUIDE FOR THE PRODUCTION OF PROTECTION PROFILES AND SECURITY TARGETS |
07/30161082 DC : 0 | BS EN 14890-2 - APPLICATION INTERFACE FOR SMART CARDS USED AS SECURE SIGNATURE CREATION DEVICES - PART 2: ADDITIONAL SERVICES |
CSA ISO/IEC 27003 : 2010 | INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - INFORMATION SECURITY MANAGEMENT SYSTEM IMPLEMENTATION GUIDANCE |
SR 019 020 : 1.1.2 | THE FRAMEWORK FOR STANDARDIZATION OF SIGNATURES; STANDARDS FOR ADES DIGITAL SIGNATURES IN MOBILE AND DISTRIBUTED ENVIRONMENTS |
TS 187 016 : 3.1.1 | TELECOMMUNICATIONS AND INTERNET CONVERGED SERVICES AND PROTOCOLS FOR ADVANCED NETWORKING (TISPAN); NGN SECURITY; IDENTITY PROTECTION (PROTECTION PROFILE) |
CR 14301 : 2002 | HEALTH INFORMATICS - FRAMEWORK FOR SECURITY PROTECTION OF HEALTHCARE COMMUNICATION |
CAN/CSA-ISO/IEC 29167-14:16 | Information technology Automatic identification and data capture techniques Part 14: Crypto suite AES OFB security services for air interface communications (Adopted ISO/IEC 29167-14:2015, first edition, 2015-10-15) |
CSA ISO/IEC 15945 : 2004 | INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - SPECIFICATION OF TTP SERVICES TO SUPPORT THE APPLICATION OF DIGITAL SIGNATURES |
CSA ISO/IEC 15408-3 : 2009 : R2014 | INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - EVALUATION CRITERIA FOR IT SECURITY - PART 3: SECURITY ASSURANCE COMPONENTS |
16/30315782 DC : 0 | BS ISO 16461 - INTELLIGENT TRANSPORT SYSTEMS - CRITERIA FOR PRIVACY AND INTEGRITY PROTECTION |
ES 202 383 : 1.1.1 | TELECOMMUNICATIONS AND INTERNET CONVERGED SERVICES AND PROTOCOLS FOR ADVANCED NETWORKING (TISPAN); SECURITY DESIGN GUIDE; METHOD AND PROFORMA FOR DEFINING SECURITY TARGETS |
S.R. CEN ISO/TS 17574:2017 | ELECTRONIC FEE COLLECTION - GUIDELINES FOR SECURITY PROTECTION PROFILES (ISO/TS 17574:2017) |
I.S. EN IEC 62443-4-1:2018 | SECURITY FOR INDUSTRIAL AUTOMATION AND CONTROL SYSTEMS - PART 4-1: SECURE PRODUCT DEVELOPMENT LIFECYCLE REQUIREMENTS |
GS ISI 001-2 : 1.1.2 | INFORMATION SECURITY INDICATORS (ISI); INDICATORS (INC); PART 2: GUIDE TO SELECT OPERATIONAL INDICATORS BASED ON THE FULL SET GIVEN IN PART 1 |
I.S. CWA 14838-2:2003 | FACILITATING SMART CARD TECHNOLOGY FOR ELECTRONIC TICKETING AND SEAMLESS TRAVEL - PART 2: DEVELOPMENT OF SMART CARD BASED INTEROPERABLE TICKETING SYSTEMS |
I.S. CWA 14172-1:2004 | EESSI CONFORMITY ASSESSMENT GUIDANCE - PART 1: GENERAL INTRODUCTION |
TR 187 009 : 2.1.1 | TELECOMMUNICATIONS AND INTERNET CONVERGED SERVICES AND PROTOCOLS FOR ADVANCED NETWORKING (TISPAN); FEASIBILITY STUDY OF PREVENTION OF UNSOLICITED COMMUNICATION IN THE NGN |
TR 102 512 : 1.1.1 | TERRESTRIAL TRUNKED RADIO (TETRA); SECURITY; SECURITY REQUIREMENTS ANALYSIS FOR MODULATION ENHANCEMENTS TO TETRA |
I.S. CWA 14890-2:2004 | APPLICATION INTERFACE FOR SMART CARDS USED AS SECURE SIGNATURE CREATION DEVICES - PART 2: ADDITIONAL SERVICES |
TS 102 747 : 1.1.1 | HUMAN FACTORS (HF); PERSONALIZATION AND USER PROFILE MANAGEMENT; ARCHITECTURAL FRAMEWORK |
I.S. CWA 14365:2003 | GUIDE ON THE USE OF ELECTRONIC SIGNATURES |
ISO/TS 25237:2008 | Health informatics Pseudonymization |
I.S. EN 419221-5:2018 | PROTECTION PROFILES FOR TSP CRYPTOGRAPHIC MODULES - PART 5: CRYPTOGRAPHIC MODULE FOR TRUST SERVICES |
CEN/TS 419221-2:2016 | Protection Profiles for TSP cryptographic modules - Part 2: Cryptographic module for CSP signing operations with backup |
IEC TR 80001-2-3:2012 | Application of risk management for IT-networks incorporating medical devices - Part 2-3: Guidance for wireless networks |
I.S. CWA 14365-2:2004 | GUIDE ON THE USE OF ELECTRONIC SIGNATURES - PART 2: PROTECTION PROFILE FOR SOFTWARE SIGNATURE CREATION DEVICES |
PREN 419212-4 : DRAFT 2016 | APPLICATION INTERFACE FOR SECURE ELEMENTS FOR ELECTRONIC IDENTIFICATION, AUTHENTICATION AND TRUSTED SERVICES - PART 4: PRIVACY SPECIFIC PROTOCOLS |
I.S. CWA 14172-6:2004 | EESSI CONFORMITY ASSESSMENT GUIDANCE - PART 6: SIGNATURE-CREATION DEVICE SUPPORTING SIGNATURES OTHER THAN QUALIFIED |
S.R. CWA 15929:2009 | BEST PRACTICES FOR THE DESIGN AND DEVELOPMENT OF CRITICAL INFORMATION SYSTEMS |
IEC TR 80001-2-2:2012 | Application of risk management for IT-networks incorporating medical devices - Part 2-2: Guidance for the disclosure and communication of medical device security needs, risks and controls |
I.S. CEN ISO TS 17574:2005 | ROAD TRANSPORT AND TRAFFIC TELEMATICS - ELECTRONIC FEE COLLECTION (EFC) - GUIDELINES FOR EFC SECURITY PROTECTION PROFILES |
ANSI X9.97-1 : 2009 | FINANCIAL SERVICES - SECURE CRYPTOGRAPHIC DEVICES (RETAIL) - PART 1: CONCEPTS, REQUIREMENTS AND EVALUATION METHODS |
IEC 62601:2015 | Industrial networks - Wireless communication network and communication profiles - WIA-PA |
ISO/TS 14907-1:2015 | Electronic fee collection Test procedures for user and fixed equipment Part 1: Description of test procedures |
ISO 25237:2017 | Health informatics — Pseudonymization |
ISO/TS 14441:2013 | Health informatics — Security and privacy requirements of EHR systems for use in conformity assessment |
ISO/TS 17574:2017 | Electronic fee collection — Guidelines for security protection profiles |
EN 419221-5:2018 | Protection Profiles for TSP Cryptographic Modules - Part 5: Cryptographic Module for Trust Services |
EN 419251-2:2013 | Security requirements for device for authentication - Part 2: Protection profile for extension for trusted channel to certificate generation application |
EN 419251-3:2013 | Security requirements for device for authentication - Part 3: Additional functionality for security targets |
EN 419212-4:2018 | Application Interface for Secure Elements for Electronic Identification, Authentication and Trusted Services - Part 4: Privacy specific Protocols |
EN ISO 25237:2017 | Health informatics - Pseudonymization (ISO 25237:2017) |
EN 419251-1:2013 | Security requirements for device for authentication - Part 1: Protection profile for core functionality |
EN 419211-6:2014 | Protection profiles for secure signature creation device - Part 6: Extension for device with key import and trusted channel to signature creation application |
EN 419211-2:2013 | Protection profiles for secure signature creation device - Part 2: Device with key generation |
PREN 50436-6 : DRAFT 2013 | ALCOHOL INTERLOCKS - TEST METHODS AND PERFORMANCE REQUIREMENTS - PART 6: DATA SECURITY |
PD ISO/IEC TR 15443-3:2007 | Information technology. Security techniques. A framework for IT security assurance Analysis of assurance methods |
TS 102 941 : 1.1.1 | INTELLIGENT TRANSPORT SYSTEMS (ITS); SECURITY; TRUST AND PRIVACY MANAGEMENT |
08/30193508 DC : DRAFT NOV 2008 | BS EN 61508-1 - FUNCTIONAL SAFETY OF ELECTRICAL/ELECTRONIC/PROGRAMMABLE ELECTRONIC SAFETY-RELATED SYSTEMS - PART 1: GENERAL REQUIREMENTS |
17/30351732 DC : 0 | BS ISO/IEC 19896-1 - INFORMATION TECHNOLOGY - IT SECURITY TECHNIQUES - COMPETENCE REQUIREMENTS FOR INFORMATION SECURITY TESTERS AND EVALUATORS - PART 1: INTRODUCTION, CONCEPTS AND GENERAL REQUIREMENTS |
ISO/IEC TR 14516:2002 | Information technology Security techniques Guidelines for the use and management of Trusted Third Party services |
DIN EN 419211-6:2014-12 | PROTECTION PROFILES FOR SECURE SIGNATURE CREATION DEVICE - PART 6: EXTENSION FOR DEVICE WITH KEY IMPORT AND TRUSTED CHANNEL TO SIGNATURE CREATION APPLICATION |
I.S. EN ISO 27789:2013 | HEALTH INFORMATICS - AUDIT TRAILS FOR ELECTRONIC HEALTH RECORDS (ISO 27789:2013) |
NASA CCSDS 350.4-G : ISSUE 1 | CCSDS GUIDE FOR SECURE SYSTEM INTERCONNECTION |
PD CEN/TS 419221-3:2016 | Protection Profiles for TSP Cryptographic modules Cryptographic module for CSP key generation services |
BS EN ISO 25237:2017 | Health informatics. Pseudonymization |
05/30107724 DC : DRAFT JAN 2005 | ISO/IEC 19794-1 - BIOMETRIC DATA INTERCHANGE - PART 1: FRAMEWORK |
PD IEC TR 62210:2003 | Power system control and associated communications. Data and communication security |
CSA ISO/IEC TR 15942:2004 | INFORMATION TECHNOLOGY - PROGRAMMING LANGUAGES - GUIDE FOR THE USE OF THE ADA PROGRAMMING LANGUAGE IN HIGH INTEGRITY SYSTEMS |
EN 319 411-1 : 1.2.2 | ELECTRONIC SIGNATURES AND INFRASTRUCTURES (ESI); POLICY AND SECURITY REQUIREMENTS FOR TRUST SERVICE PROVIDERS ISSUING CERTIFICATES; PART 1: GENERAL REQUIREMENTS |
DD CEN ISO/TS 17574:2009 | Electronic fee collection. Guidelines for security protection profiles |
TS 102 731 : 1.1.1 | INTELLIGENT TRANSPORT SYSTEMS (ITS); SECURITY; SECURITY SERVICES AND ARCHITECTURE |
PD CEN ISO/TS 14441:2013 | Health informatics. Security and privacy requirements of EHR systems for use in conformity assessment |
14/30285138 DC : 0 | BS ISO/IEC 29167-14 - INFORMATION TECHNOLOGY - AUTOMATIC IDENTIFICATION AND DATA CAPTURE TECHNIQUES - PART 14: CRYPTO SUITE AES OFB SECURITY SERVICES FOR AIR INTERFACE COMMUNICATIONS |
CSA ISO/IEC 15945 : 2004 : R2012 | INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - SPECIFICATION OF TTP SERVICES TO SUPPORT THE APPLICATION OF DIGITAL SIGNATURES |
UNE-EN 419211-6:2016 | Protection profiles for secure signature creation device - Part 6: Extension for device with key import and trusted channel to signature creation application |
PD CEN/TS 419221-4:2016 | Protection Profiles for TSP cryptographic modules Cryptographic module for CSP signing operations without backup |
ISO/IEC 15408-1:2009 | Information technology — Security techniques — Evaluation criteria for IT security — Part 1: Introduction and general model |
PD CEN ISO/TS 17574:2017 | Electronic fee collection. Guidelines for security protection profiles |
CAN/CSA-ISO/IEC TR 14516-04 (R2017) | Information Technology - Security Techniques - Guidelines for the use and Management of Trusted Third Party Services (Adopted ISO/IEC TR 14516:2002, first edition, 2002-06-15) |
UNI EN 419251-2 : 2013 | SECURITY REQUIREMENTS FOR DEVICE FOR AUTHENTICATION - PART 2: PROTECTION PROFILE FOR EXTENSION FOR TRUSTED CHANNEL TO CERTIFICATE GENERATION APPLICATION |
IEC TR 62210:2003 | Power system control and associated communications - Data and communication security |
INCITS/ISO/IEC 15292 : 2001 | INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - PROTECTION PROFILE REGISTRATION PROCEDURES |
ARINC 664-5 : 2005 | AIRCRAFT DATA NETWORK - PART 5: NETWORK DOMAIN CHARACTERISTICS AND INTERCONNECTION |
INCITS/ISO/IEC 19792 : 2012 | INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - SECURITY EVALUATION OF BIOMETRICS |
INCITS/ISO/IEC 15945 : 2002 : R2007 | INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - SPECIFICATION OF TTP SERVICES TO SUPPORT THE APPLICATION OF DIGITAL SIGNATURES |
TR 187 014 : 2.1.1 | TELECOMMUNICATIONS AND INTERNET CONVERGED SERVICES AND PROTOCOLS FOR ADVANCED NETWORKING (TISPAN); ESECURITY; USER GUIDE TO ETVRA WEB-DATABASE |
IEEE/ISO/IEC 15026-1-2014 | IEEE Standard Adoption of ISO/IEC 15026-1--Systems and Software Engineering--Systems and Software Assurance--Part 1: Concepts and Vocabulary |
S.R. CEN ISO/TS 25110:2013 | ELECTRONIC FEE COLLECTION - INTERFACE DEFINITION FOR ON-BOARD ACCOUNT USING INTEGRATED CIRCUIT CARD (ICC) (ISO/TS 25110:2013) |
I.S. EN 419211-2:2013 | PROTECTION PROFILES FOR SECURE SIGNATURE CREATION DEVICE - PART 2: DEVICE WITH KEY GENERATION |
ISO/IEC 15292:2001 | Information technology - Security techniques - Protection Profile registration procedures |
IEEE 1074-2006 | IEEE Standard for Developing a Software Project Life Cycle Process |
I.S. EN 419251-3:2013 | SECURITY REQUIREMENTS FOR DEVICE FOR AUTHENTICATION - PART 3: ADDITIONAL FUNCTIONALITY FOR SECURITY TARGETS |
I.S. EN CWA 14172-5:2004 | EESSI CONFORMITY ASSESSMENT GUIDANCE - PART 5: SECURE SIGNATURE CREATION DEVICES |
I.S. EN 419251-1:2013 | SECURITY REQUIREMENTS FOR DEVICE FOR AUTHENTICATION - PART 1: PROTECTION PROFILE FOR CORE FUNCTIONALITY |
17/30357420 DC : 0 | BS EN 419241-2 - TRUSTWORTHY SYSTEMS SUPPORTING SERVER SIGNING - PART 2: PROTECTION PROFILE FOR QSCD FOR SERVER SIGNING |
TS 102 556 : 1.1.1 | TELECOMMUNICATIONS AND INTERNET CONVERGED SERVICES AND PROTOCOLS FOR ADVANCED NETWORKING (TISPAN); PROTECTION PROFILE |
CSA ISO/IEC TR 15942:04 (R2019) | Information Technology - Programming Languages - Guide for the Use of the Ada Programming Language in High Integrity Systems (Adopted ISO/IEC TR 15942:2000, first edition, 2000-03-01) |
BS EN ISO 25110:2017 | Electronic fee collection. Interface definition for on-board account using integrated circuit card (ICC) |
ISO 25110:2017 | Electronic fee collection — Interface definition for on-board account using integrated circuit card (ICC) |
I.S. CR 14301:2002 | HEALTH INFORMATICS - FRAMEWORK FOR SECURITY PROTECTION OF HEALTHCARE COMMUNICATION |
I.S. CWA 14172-4:2004 | EESSI CONFORMITY ASSESSMENT GUIDANCE - PART 4: SIGNATURE CREATION APPLICATIONS AND GENERAL GUIDELINES FOR ELECTRONIC SIGNATURE VERIFICATION |
ISO 27789:2013 | Health informatics Audit trails for electronic health records |
EN ISO 27789:2013 | Health informatics - Audit trails for electronic health records (ISO 27789:2013) |
CEN/TS 419221-4:2016 | Protection Profiles for TSP cryptographic modules - Part 4: Cryptographic module for CSP signing operations without backup |
CEN/TS 419221-3:2016 | Protection Profiles for TSP Cryptographic modules - Part 3: Cryptographic module for CSP key generation services |
CEN ISO/TS 14907-1:2015 | Electronic fee collection - Test procedures for user and fixed equipment - Part 1: Description of test procedures (ISO/TS 14907-1:2015) |
AS ISO 13491.1:2019 | Financial services - Secure cryptographic devices (retail) Concepts, requirements and evaluation methods |
AS ISO 13491.2:2019 | Financial services - Secure cryptographic devices (retail) Security compliance checklists for devices used in financial transactions |
ISO/IEC 15408-1:2009 | Information technology — Security techniques — Evaluation criteria for IT security — Part 1: Introduction and general model |
Please Login or Create an Account so you can add users to your Multi user PDF Later.
Important note : All end users must be registered with an Account prior to user licenses being assigned.
Users cannot be edited or removed once added to your Multi user PDF.
Access your standards online with a subscription
Features
-
Simple online access to standards, technical information and regulations.
-
Critical updates of standards and customisable alerts and notifications.
-
Multi-user online standards collection: secure, flexible and cost effective.