AAMI IEC TIR 80001-2-2 : 2012
|
APPLICATION OF RISK MANAGEMENT FOR IT-NETWORKS INCORPORATING MEDICAL DEVICES - PART 2-2: GUIDANCE FOR THE DISCLOSURE AND COMMUNICATION OF MEDICAL DEVICE SECURITY NEEDS, RISKS AND CONTROLS |
CSA ISO/IEC 27009 : 2018
|
INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - SECTOR-SPECIFIC APPLICATION OF ISO/IEC 27001 - REQUIREMENTS |
TR 101 564 : 1.1.1
|
ELECTRONIC SIGNATURES AND INFRASTRUCTURES (ESI); GUIDANCE ON ETSI TS 102 042 FOR ISSUING EXTENDED VALIDATION CERTIFICATES FOR AUDITORS AND CSPS |
BS IEC 62443-3-3 : 2013
|
INDUSTRIAL COMMUNICATION NETWORKS - NETWORK AND SYSTEM SECURITY - PART 3-3: SYSTEM SECURITY REQUIREMENTS AND SECURITY LEVELS |
DIN ISO/IEC 27001 : 2017
|
INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - INFORMATION SECURITY MANAGEMENT SYSTEMS - REQUIREMENTS (ISO/IEC 27001:2013 + COR. 1:2014) |
BS ISO/IEC 27014 : 2013
|
INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - GOVERNANCE OF INFORMATION SECURITY |
ISO/IEC 27003 : 2017
|
INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - INFORMATION SECURITY MANAGEMENT SYSTEMS - GUIDANCE |
CSA ISO/IEC 27007 : 2013 : R2017
|
INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - GUIDELINES FOR INFORMATION SECURITY MANAGEMENT SYSTEMS AUDITING |
DIN ISO/IEC 27000 E : 2011
|
INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - INFORMATION SECURITY MANAGEMENT SYSTEMS - OVERVIEW AND VOCABULARY |
CSA ISO 10008 : 2015
|
QUALITY MANAGEMENT - CUSTOMER SATISFACTION - GUIDELINES FOR BUSINESS-TO-CONSUMER ELECTRONIC COMMERCE TRANSACTIONS |
INCITS/ISO/IEC 24762 : 2009(R2014)
|
INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - GUIDELINES FOR INFORMATION AND COMMUNICATIONS TECHNOLOGY DISASTER RECOVERY SERVICES |
12/30209299 DC : 0
|
BS ISO 10008 - QUALITY MANAGEMENT - CUSTOMER SATISFACTION - GUIDELINES FOR BUSINESS-TO-CONSUMER ELECTRONIC COMMERCE TRANSACTIONS |
INCITS/ISO/IEC 27037 : 2014
|
INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - GUIDELINES FOR IDENTIFICATION, COLLECTION, ACQUISITION AND PRESERVATION OF DIGITAL EVIDENCE |
DIN EN ISO/IEC 27001 E : 2017
|
INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - INFORMATION SECURITY MANAGEMENT SYSTEMS - REQUIREMENTS (ISO/IEC 27001:2013 INCLUDING COR 1:2014 AND COR 2:2015) |
BS ISO/IEC 27036-2 : 2014
|
INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - INFORMATION SECURITY FOR SUPPLIER RELATIONSHIPS - PART 2: REQUIREMENTS |
TR 103 305 : 1.1.1
|
CYBER; CRITICAL SECURITY CONTROLS FOR EFFECTIVE CYBER DEFENCE |
10/30184538 DC : 0
|
BS ISO/IEC 20000-2 - INFORMATION TECHNOLOGY - SERVICE MANAGEMENT - PART 2: GUIDANCE ON THE APPLICATION OF SERVICE MANAGEMENT SYSTEMS |
18/30348902 DC : 0
|
BS ISO/IEC 21878 - INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - SECURITY GUIDELINES FOR DESIGN AND IMPLEMENTATION OF VIRTUALIZED SERVERS |
BS ISO/IEC 15408-1 : 2009
|
INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - EVALUATION CRITERIA FOR IT SECURITY - PART 1: INTRODUCTION AND GENERAL MODEL |
07/30117272 DC : 0
|
BS ISO/IEC 27005 - INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - INFORMATION SECURITY RISK MANAGEMENT |
BS ISO/IEC 29134 : 2017
|
INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - GUIDELINES FOR PRIVACY IMPACT ASSESSMENT |
15/30230399 DC : 0
|
BS ISO/IEC 24760-3 - INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - A FRAMEWORK FOR IDENTITY MANAGEMENT - PART 3: PRACTICE |
I.S. EN ISO 11073-00103:2017
|
HEALTH INFORMATICS - PERSONAL HEALTH DEVICE COMMUNICATION - PART 00103: OVERVIEW (ISO/IEEE 11073-00103:2015) |
BS ISO/IEC 19770-1 : 2017
|
INFORMATION TECHNOLOGY - IT ASSET MANAGEMENT - PART 1: IT ASSET MANAGEMENT SYSTEMS - REQUIREMENTS |
12/30249606 DC : 0
|
BS EN 62645 ED 1.0 - NUCLEAR POWER PLANTS - INSTRUMENTATION AND CONTROL SYSTEMS - REQUIREMENT S FOR SECURITY PROGRAMMES FOR COMPUTER-BASED SYSTEMS |
BS ISO/IEC 27036-3 : 2013
|
INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - INFORMATION SECURITY FOR SUPPLIER RELATIONSHIPS - PART 3: GUIDELINES FOR INFORMATION AND COMMUNICATION TECHNOLOGY SUPPLY CHAIN SECURITY |
BS PD ISO/IEC TR 15443-3 : 2007
|
INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - A FRAMEWORK FOR IT SECURITY ASSURANCE - PART 3: ANALYSIS OF ASSURANCE METHODS |
CEI EN 61069-5 : 1996
|
INDUSTRIAL-PROCESS MEASUREMENT, CONTROL AND AUTOMATION - EVALUATION OF SYSTEM PROPERTIES FOR THE PURPOSE OF SYSTEM ASSESSMENT - PART 5: ASSESSMENT OF SYSTEM DEPENDABILITY |
BS ISO/IEC 27018 : 2014
|
INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - CODE OF PRACTICE FOR PROTECTION OF PERSONALLY IDENTIFIABLE INFORMATION (PII) IN PUBLIC CLOUDS ACTING AS PII PROCESSORS |
UNI CEI ISO/IEC TR 20000-3 : 2010
|
INFORMATION TECHNOLOGY - SERVICE MANAGEMENT - PART 3: GUIDANCE ON SCOPE DEFINITION AND APPLICABILITY OF ISO/IEC 20000-1 |
BS ISO/IEC 29151 : 2017
|
INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - CODE OF PRACTICE FOR PERSONALLY IDENTIFIABLE INFORMATION PROTECTION |
BS PD IEC TR 80001-2-3 : 2012
|
APPLICATION OF RISK MANAGEMENT FOR IT-NETWORKS INCORPORATING MEDICAL DEVICES - PART 2-3: GUIDANCE FOR WIRELESS NETWORKS |
(INACTIVE RECORD)DIN ISO/IEC 27018 E : 2017
|
INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - CODE OF PRACTICE FOR PROTECTION OF PERSONALLY IDENTIFIABLE INFORMATION (PII) IN PUBLIC CLOUDS ACTING AS PII PROCESSORS (ISO/IEC 27018:2014) |
10/30162769 DC : DRAFT NOV 2010
|
BS ISO/IEC 27007 - INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - GUIDELINES FOR INFORMATION SECURITY MANAGEMENT SYSTEMS AUDITING |
12/30250178 DC : 0
|
BS ISO/IEC 27036-3 - INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - INFORMATION SECURITY FOR SUPPLIER RELATIONSHIPS - PART 3: GUIDELINES FOR ICT SUPPLY CHAIN SECURITY |
DIN EN ISO 22313 : 2016
|
SOCIETAL SECURITY - BUSINESS CONTINUITY MANAGEMENT SYSTEMS - GUIDANCE (ISO 22313:2012) |
BS PAS 7000(2014) : 2014
|
SUPPLY CHAIN RISK MANAGEMENT - SUPPLIER PREQUALIFICATION |
BS ISO/IEC 27035 : 2011
|
INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - INFORMATION SECURITY INCIDENT MANAGEMENT |
17/30281253 DC : 0
|
BS ISO 21188 - PUBLIC KEY INFRASTRUCTURE FOR FINANCIAL SERVICES - PRACTICES AND POLICY FRAMEWORK |
CSA ISO 19011:2012
|
GUIDELINES FOR AUDITING MANAGEMENT SYSTEMS |
16/30331802 DC : 0
|
BS EN 62887 ED 1.0 - NUCLEAR POWER PLANTS - INSTRUMENTATION SYSTEMS IMPORTANT TO SAFETY - PRESSURE TRANSMITTERS: CHARACTERISTICS AND TEST METHODS |
ISO/IEC TR 27103 : 2018
|
INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - CYBERSECURITY AND ISO AND IEC STANDARDS |
SAE AS 9115 : 2017
|
QUALITY MANAGEMENT SYSTEMS - REQUIREMENTS FOR AVIATION, SPACE, AND DEFENSE ORGANIZATIONS - DELIVERABLE SOFTWARE (SUPPLEMENT TO 9100:2016) |
15/30279952 DC : 0
|
BS ISO/IEC 30124 - CODE OF PRACTICE FOR THE IMPLEMENTATION OF A BIOMETRIC SYSTEM |
16/30286013 DC : 0
|
BS ISO/IEC 27003 - INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - INFORMATION SECURITY MANAGEMENT SYSTEM - GUIDANCE |
BS ISO/IEEE 11073-00103 : 2015
|
HEALTH INFORMATICS - PERSONAL HEALTH DEVICE COMMUNICATION - PART 00103: OVERVIEW |
CSA ISO/IEC TR 24729-4 : 2014(R2019)
|
INFORMATION TECHNOLOGY - RADIO FREQUENCY IDENTIFICATION FOR ITEM MANAGEMENT - IMPLEMENTATION GUIDELINES - PART 4: TAG DATA SECURITY |
BS PD CEN/TS 16850 : 2015
|
SOCIETAL AND CITIZEN SECURITY - GUIDANCE FOR MANAGING SECURITY IN HEALTHCARE FACILITIES |
BS IEC 62855 : 2016
|
NUCLEAR POWER PLANTS - ELECTRICAL POWER SYSTEMS - ELECTRICAL POWER SYSTEMS ANALYSIS |
DIN EN 16082 E : 2011
|
AIRPORT AND AVIATION SECURITY SERVICES |
ISO/IEC TR 24714-1 : 2008(R2015)
|
INFORMATION TECHNOLOGY - BIOMETRICS - JURISDICTIONAL AND SOCIETAL CONSIDERATIONS FOR COMMERCIAL APPLICATIONS - PART 1: GENERAL GUIDANCE |
ISO/IEC TR 27008 : 2011
|
INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - GUIDELINES FOR AUDITORS ON INFORMATION SECURITY CONTROLS |
BS PD IEC TR 80001-2-8 : 2016
|
APPLICATION OF RISK MANAGEMENT FOR IT-NETWORKS INCORPORATING MEDICAL DEVICES - PART 2-8: APPLICATION GUIDANCE - GUIDANCE ON STANDARDS FOR ESTABLISHING THE SECURITY CAPABILITIES IDENTIFIED IN IEC TR 80001-2-2 |
CSA ISO/IEC 27010 : 2016
|
INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - INFORMATION SECURITY MANAGEMENT FOR INTER-SECTOR AND INTER-ORGANIZATIONAL COMMUNICATIONS |
ISO 17090-1 : 2013(R2018)
|
HEALTH INFORMATICS - PUBLIC KEY INFRASTRUCTURE - PART 1: OVERVIEW OF DIGITAL CERTIFICATE SERVICES |
BS ISO/IEC 27017 : 2015
|
INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - CODE OF PRACTICE FOR INFORMATION SECURITY CONTROLS BASED ON ISO/IEC 27002 FOR CLOUD SERVICES |
INCITS/ISO/IEC 27010 : 2017
|
INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - INFORMATION SECURITY MANAGEMENT FOR INTER-SECTOR AND INTER-ORGANIZATIONAL COMMUNICATIONS |
ISO/IEC TR 38505-2:2018
|
INFORMATION TECHNOLOGY - GOVERNANCE OF IT - GOVERNANCE OF DATA - PART 2: IMPLICATIONS OF ISO/IEC 38505-1 FOR DATA MANAGEMENT |
17/30342692 DC : 0
|
BS ISO/IEC 27007 - INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - GUIDELINES FOR INFORMATION SECURITY MANAGEMENT SYSTEMS AUDITING |
BS EN ISO 9004 : 2018
|
QUALITY MANAGEMENT - QUALITY OF AN ORGANIZATION - GUIDANCE TO ACHIEVE SUSTAINED SUCCESS (ISO 9004:2018) |
DIN ISO/IEC 27000 : 2015
|
INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - INFORMATION SECURITY MANAGEMENT SYSTEMS - OVERVIEW AND VOCABULARY |
TS 102 573 : 2.1.1
|
ELECTRONIC SIGNATURES AND INFRASTRUCTURES (ESI); POLICY REQUIREMENTS FOR TRUST SERVICE PROVIDERS SIGNING AND/OR STORING DATA OBJECTS |
BS ISO/IEC 15944-8 : 2012
|
INFORMATION TECHNOLOGY - BUSINESS OPERATIONAL VIEW - PART 8: IDENTIFICATION OF PRIVACY PROTECTION REQUIREMENTS AS EXTERNAL CONSTRAINTS ON BUSINESS TRANSACTIONS |
DIN EN ISO 22313 E : 2016
|
SOCIETAL SECURITY - BUSINESS CONTINUITY MANAGEMENT SYSTEMS - GUIDANCE (ISO 22313:2012) |
CSA INFORMATION SECURITY PACKAGE : 2018
|
CONSISTS OF CAN/CSA-ISO/IEC 27000:18 - INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - INFORMATION SECURITY MANAGEMENT SYSTEMS - OVERVIEW AND VOCABULARY; CAN/CSA-ISO/IEC 27001:14, INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - INFORMATION SECURITY MANAGEMENT SYSTEMS - REQUIREMENTS; CAN/CSA-ISO/IEC 27002:15 - INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - CODE OF PRACTICE FOR INFORMATION |
BS ISO 10008 : 2013
|
QUALITY MANAGEMENT - CUSTOMER SATISFACTION - GUIDELINES FOR BUSINESS-TO-CONSUMER ELECTRONIC COMMERCE TRANSACTIONS |
12/30192109 DC : 0
|
BS ISO/IEC 27033-5 - INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - IT NETWORK SECURITY - PART 5: SECURING COMMUNICATIONS ACROSS NETWORKS USING VIRTUAL PRIVATE NETWORK (VPNS) |
BS PD ISO/IEC TR 24714-1 : 2008
|
INFORMATION TECHNOLOGY - BIOMETRICS - JURISDICTIONAL AND SOCIETAL CONSIDERATIONS FOR COMMERCIAL APPLICATIONS - PART 1: GENERAL GUIDANCE |
BS ISO/IEC 27039 : 2015
|
INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - SELECTION, DEPLOYMENT AND OPERATIONS OF INTRUSION DETECTION SYSTEMS (IDPS) |
14/30304350 DC : 0
|
BS EN ISO 27799 - HEALTH INFORMATICS - INFORMATION SECURITY MANAGEMENT IN HEALTH USING ISO/IEC 27002 |
11/30207799 DC : 0
|
BS ISO/IEC 27037 - INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - GUIDELINES FOR IDENTIFICATION, COLLECTION, ACQUISITION AND PRESERVATION OF DIGITAL EVIDENCE |
BS ISO/IEC 20000-2 : 2012
|
INFORMATION TECHNOLOGY - SERVICE MANAGEMENT - PART 2: GUIDANCE ON THE APPLICATION OF SERVICE MANAGEMENT SYSTEMS |
BIP 0139 : 2013
|
AN INTRODUCTION TO ISO/IEC 27001:2013 |
14/30278505 DC : 0
|
BS ISO/IEC 27033-1 - INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - NETWORK SECURITY PART 1: OVERVIEW AND CONCEPTS |
15/30285708 DC : 0
|
BS EN ISO 25237 - HEALTH INFORMATICS - PSEUDONYMISATION |
UNE ISO/IEC 20000-3 : 2015
|
INFORMATION TECHNOLOGY - SERVICE MANAGEMENT - PART 3: GUIDANCE ON SCOPE DEFINITION AND APPLICABILITY OF ISO/IEC 20000-1 |
BIS IS/ISO/IEC 27005 : 2008
|
INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - INFORMATION SECURITY RISK MANAGEMENT |
16/30313398 DC : 0
|
BS ISO/IEC 15944-12 - INFORMATION TECHNOLOGY - BUSINESS OPERATIONAL VIEW - PART 12: PRIVACY PROTECTION REQUIREMENTS ON INFORMATION LIFE CYCLE MANAGEMENT (ILCM) AND EDI OF PERSONAL INFORMATION |
17/30347919 DC : 0
|
BS ISO 10005 - QUALITY MANAGEMENT SYSTEMS - GUIDELINES FOR QUALITY PLANS |
15/30268877 DC : 0
|
BS ISO/IEC 27035-2 - INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - INFORMATION SECURITY INCIDENT MANAGEMENT - PART 2: GUIDELINES TO PLAN AND PREPARE FOR INCIDENT RESPONSE |
BS PD CEN/TS 15480-4 : 2012
|
IDENTIFICATION CARD SYSTEMS - EUROPEAN CITIZEN CARD - PART 4: RECOMMENDATIONS FOR EUROPEAN CITIZEN CARD ISSUANCE, OPERATION AND USE |
11/30168516 DC : 0
|
BS ISO/IEC 27032 - INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - GUIDELINES FOR CYBERSECURITY |
15/30299331 DC : 0
|
BS ISO/IEC 27011 - INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - CODE OF PRACTICE FOR INFORMATION SECURITY CONTROLS BASED ON ISO/IEC 27002 FOR TELECOMMUNICATIONS ORGANIZATIONS |
15/30285726 DC : 0
|
BS ISO/IEC 27009 - INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - SECTOR-SPECIFIC APPLICATION OF ISO/IEC 27001 - REQUIREMENTS |
12/30269414 DC : 0
|
BS EN 16495 - AIR TRAFFIC MANAGEMENT - INFORMATION SECURITY FOR ORGANISATIONS SUPPORTING CIVIL AVIATION OPERATIONS |
DIN EN ISO/IEC 27001 : 2017
|
INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - INFORMATION SECURITY MANAGEMENT SYSTEMS - REQUIREMENTS (ISO/IEC 27001:2013 INCLUDING COR 1:2014 AND COR 2:2015) |
15/30319488 DC : 0
|
BS ISO/IEC 27000 - INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - INFORMATION SECURITY MANAGEMENT SYSTEMS - OVERVIEW AND VOCABULARY |
CSA ISO/IEC 27000 : 2018
|
INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - INFORMATION SECURITY MANAGEMENT SYSTEMS - OVERVIEW AND VOCABULARY |
BIP 0064 : 2007
|
INFORMATION SECURITY INCIDENT MANAGEMENT - A METHODOLOGY |
BS ISO/IEC 19086-1 : 2016
|
INFORMATION TECHNOLOGY - CLOUD COMPUTING - SERVICE LEVEL AGREEMENT (SLA) FRAMEWORK - PART 1: OVERVIEW AND CONCEPTS |
CSA ISO/IEC 17789 : 2016
|
INFORMATION TECHNOLOGY - CLOUD COMPUTING - REFERENCE ARCHITECTURE |
BS ISO/IEC 27036-1 : 2014
|
INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - INFORMATION SECURITY FOR SUPPLIER RELATIONSHIPS - PART 1: OVERVIEW AND CONCEPTS |
BS EN 16747 : 2015
|
MARITIME AND PORT SECURITY SERVICES |
CSA ISO/IEC 24762 : 2008 : R2013
|
INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - GUIDELINES FOR INFORMATION AND COMMUNICATIONS TECHNOLOGY DISASTER RECOVERY SERVICES |
BS ISO/IEC 27007 : 2017
|
INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - GUIDELINES FOR INFORMATION SECURITY MANAGEMENT SYSTEMS AUDITING |
ISO/IEC 27035-1 : 2016
|
INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - INFORMATION SECURITY INCIDENT MANAGEMENT - PART 1: PRINCIPLES OF INCIDENT MANAGEMENT |
DIN ISO/IEC 17789 E : 2017
|
INFORMATION TECHNOLOGY - CLOUD COMPUTING - REFERENCE ARCHITECTURE (ISO/IEC 17789:2014) |
09/30184534 DC : DRAFT JAN 2009
|
BS ISO/IEC 20000-1 - INFORMATION TECHNOLOGY - SERVICE MANAGEMENT - PART 1: SERVICE MANAGEMENT SYSTEM REQUIREMENTS |
BS PD IEC TR 80001-2-2 : 2012
|
APPLICATION OF RISK MANAGEMENT FOR IT-NETWORKS INCORPORATING MEDICAL DEVICES - PART 2-2: GUIDANCE FOR THE DISCLOSURE AND COMMUNICATION OF MEDICAL DEVICE SECURITY NEEDS, RISKS AND CONTROLS |
BS ISO/IEC 15026-1 : 2013
|
SYSTEMS AND SOFTWARE ENGINEERING - SYSTEMS AND SOFTWARE ASSURANCE - PART 1: CONCEPTS AND VOCABULARY |
BS PD IEC TR 80001-2-1 : 2012
|
APPLICATION OF RISK MANAGEMENT FOR IT-NETWORKS INCORPORATING MEDICAL DEVICES - PART 2-1: STEP-BY-STEP RISK MANAGEMENT OF MEDICAL IT-NETWORKS - PRACTICAL APPLICATIONS AND EXAMPLES |
SR CEN/TS 15480-4:2012
|
IDENTIFICATION CARD SYSTEMS - EUROPEAN CITIZEN CARD - PART 4: RECOMMENDATIONS FOR EUROPEAN CITIZEN CARD ISSUANCE, OPERATION AND USE |
BIP 0071 : 2014
|
GUIDELINES ON REQUIREMENTS AND PREPARATION FOR ISMS CERTIFICATION BASED ON ISO/IEC 27001 |
BS ISO/IEC 27033-4 : 2014
|
INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - NETWORK SECURITY - PART 4: SECURING COMMUNICATIONS BETWEEN NETWORKS USING SECURITY GATEWAYS |
BS ISO/IEC 27009 : 2016
|
INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - SECTOR-SPECIFIC APPLICATION OF ISO/IEC 27001 - REQUIREMENTS |
CSA ISO/IEC 27035 : 2013
|
INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - INFORMATION SECURITY INCIDENT MANAGEMENT |
ISO/IEC TR 19791 : 2010(R2015)
|
INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - SECURITY ASSESSMENT OF OPERATIONAL SYSTEMS |
11/30204593 DC : DRAFT MAY 2011
|
BS ISO/IEC 27010 - INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - INFORMATION SECURITY MANAGEMENT FOR INTER-SECTOR AND INTER-ORGANIZATIONAL COMMUNICATIONS |
BS ISO/IEC 27010 : 2015
|
INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - INFORMATION SECURITY MANAGEMENT FOR INTER-SECTOR AND INTER-ORGANIZATIONAL COMMUNICATIONS |
BS ISO 17090-1 : 2013
|
HEALTH INFORMATICS - PUBLIC KEY INFRASTRUCTURE - PART 1: OVERVIEW OF DIGITAL CERTIFICATE SERVICES |
BS PD IEC TR 62351-10 : 2012
|
POWER SYSTEMS MANAGEMENT AND ASSOCIATED INFORMATION EXCHANGE - DATA AND COMMUNICATIONS SECURITY - PART 10: SECURITY ARCHITECTURE GUIDELINES |
BS ISO/IEC 24762 : 2008
|
INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - GUIDELINES FOR INFORMATION AND COMMUNICATIONS TECHNOLOGY DISASTER RECOVERY SERVICES |
BS PD CEN/TR 16742 : 2014
|
INTELLIGENT TRANSPORT SYSTEMS - PRIVACY ASPECTS IN ITS STANDARDS AND SYSTEMS IN EUROPE |
OLF 104 : 2016
|
INFORMATION SECURITY BASELINE REQUIREMENTS FOR PROCESS CONTROL, SAFETY AND SUPPORT ICT SYSTEMS |
ISO/IEC 38505-1 : 2017
|
INFORMATION TECHNOLOGY - GOVERNANCE OF IT - GOVERNANCE OF DATA - PART 1: APPLICATION OF ISO/IEC 38500 TO THE GOVERNANCE OF DATA |
CSA ISO/IEC 27034-1 : 2012
|
INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - APPLICATION SECURITY - PART 1: OVERVIEW AND CONCEPTS |
ISO 17090-3 : 2008(R2018)
|
HEALTH INFORMATICS - PUBLIC KEY INFRASTRUCTURE - PART 3: POLICY MANAGEMENT OF CERTIFICATION AUTHORITY |
CSA ISO/IEC 27007 : 2013
|
INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - GUIDELINES FOR INFORMATION SECURITY MANAGEMENT SYSTEMS AUDITING |
NASA CCSDS 350.7-G : ISSUE 1
|
SECURITY GUIDE FOR MISSION PLANNERS |
ISO/IEC 27007 : 2017
|
INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - GUIDELINES FOR INFORMATION SECURITY MANAGEMENT SYSTEMS AUDITING |
GS ISI 001-1 : 1.1.2
|
INFORMATION SECURITY INDICATORS (ISI); INDICATORS (INC); PART 1: A FULL SET OF OPERATIONAL INDICATORS FOR ORGANIZATIONS TO USE TO BENCHMARK THEIR SECURITY POSTURE |
GS ISI 004 : 1.1.1
|
INFORMATION SECURITY INDICATORS (ISI); GUIDELINES FOR EVENT DETECTION IMPLEMENTATION |
12/30192064 DC : 0
|
BS ISO/IEC 27001 - INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - INFORMATION SECURITY MANAGEMENT SYSTEM - REQUIREMENTS |
BS ISO 21188 : 2006
|
PUBLIC KEY INFRASTRUCTURE FOR FINANCIAL SERVICES - PRACTICES AND POLICY FRAMEWORK |
ISO/IEC 29182-4 : 2013
|
INFORMATION TECHNOLOGY - SENSOR NETWORKS: SENSOR NETWORK REFERENCE ARCHITECTURE (SNRA) - PART 4: ENTITY MODELS |
BS PD IEC TR 63084 : 2017
|
NUCLEAR POWER PLANTS - INSTRUMENTATION AND CONTROL IMPORTANT TO SAFETY - PLATFORM QUALIFACTION FOR SYSTEMS IMPORTANT TO SAFETY |
BS PD ISO/TR 11633-1 : 2009
|
HEALTH INFORMATICS - INFORMATION SECURITY MANAGEMENT FOR REMOTE MAINTENANCE OF MEDICAL DEVICES AND MEDICAL INFORMATION SYSTEMS - PART 1: REQUIREMENTS AND RISK ANALYSIS |
DIN EN 16747 E : 2015
|
MARITIME AND PORT SECURITY SERVICES |
10/30184432 DC : 0
|
BS ISO/IEC 27035 - INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - INFORMATION SECURITY INCIDENT MANAGEMENT |
BS EN ISO/IEC 27001 : 2017
|
INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - INFORMATION SECURITY MANAGEMENT SYSTEMS - REQUIREMENTS (ISO/IEC 27001:2013) |
12/30257208 DC : DRAFT FEB 2012
|
BS ISO/IEC 20000-3 - INFORMATION TECHNOLOGY - SERVICE MANAGEMENT - PART 3: GUIDANCE ON SCOPE DEFINITION AND APPLICABILITY OF ISO/IEC 20000-1 |
UNE EN ISO/IEC 27001 : 2017
|
INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - INFORMATION SECURITY MANAGEMENT SYSTEMS - REQUIREMENTS (ISO/IEC 27001:2013 INCLUDING COR 1:2014 AND COR 2:2015) |
BS PD ISO/IEC TR 27023 : 2015
|
INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - MAPPING THE REVISED EDITIONS OF ISO/IEC 27001 AND ISO/IEC 27002 |
ISO/IEC TR 20000-3 : 2009
|
INFORMATION TECHNOLOGY - SERVICE MANAGEMENT - PART 3: GUIDANCE ON SCOPE DEFINITION AND APPLICABILITY OF ISO/IEC 20000-1 |
BS ISO/IEC 17789 : 2014
|
INFORMATION TECHNOLOGY - CLOUD COMPUTING - REFERENCE ARCHITECTURE |
BS PD ISO/IEC TR 27008 : 2011
|
INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - GUIDELINES FOR AUDITORS ON INFORMATION SECURITY CONTROLS |
09/30168526 DC : 0
|
BS ISO/IEC 27033-1 - INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - NETWORK SECURITY - PART 1: GUIDELINES FOR NETWORK SECURITY |
UNI CEI ISO/IEC 27001 : 2014
|
INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - INFORMATION SECURITY MANAGEMENT SYSTEMS - REQUIREMENTS |
BS PD ISO/IEC TR 20000-5 : 2013
|
INFORMATION TECHNOLOGY - SERVICE MANAGEMENT - PART 5: EXEMPLAR IMPLEMENTATION PLAN FOR ISO/IEC 20000-1 |
11/30192880 DC : 0
|
BS ISO 22857 - HEALTH INFORMATICS - GUIDELINES ON DATA PROTECTION TO FACILITATE TRANS-BORDER FLOWS OF PERSONAL HEALTH INFORMATION |
ISO/IEC 29182-1 : 2013
|
INFORMATION TECHNOLOGY - SENSOR NETWORKS: SENSOR NETWORK REFERENCE ARCHITECTURE (SNRA) - PART 1: GENERAL OVERVIEW AND REQUIREMENTS |
BS TICKIT GUIDE : ISSUE 5.5
|
A GUIDE TO SOFTWARE QUALITY MANAGEMENT SYSTEM CONSTRUCTION AND CERTIFICATION TO ISO 9001:2000 |
17/30351843 DC : 0
|
BS 10754-1 - INFORMATION TECHNOLOGY - SOFTWARE TRUSTWORTHINESS - PART 1 - GOVERNANCE AND MANAGEMENT SPECIFICATION |
BS ISO/IEC 27033-2 : 2012
|
INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - NETWORK SECURITY - PART 2: GUIDELINES FOR THE DESIGN AND IMPLEMENTATION OF NETWORK SECURITY |
15/30259619 DC : 0
|
BS ISO/IEC 27017 - INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - CODE OF PRACTICE FOR INFORMATION SECURITY CONTROLS BASED ON ISO/IEC 27002 FOR CLOUD SERVICES |
BS ISO/IEC 27001 : 2013
|
INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - INFORMATION SECURITY MANAGEMENT SYSTEMS - REQUIREMENTS |
UNE EN 16747 : 2016
|
MARITIME AND PORT SECURITY SERVICES |
17/30349211 DC : 0
|
BS ISO/IEC 29147 - INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - VULNERABILITY DISCLOSURE |
BS ISO/IEC 27033-1 : 2015
|
INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - NETWORK SECURITY - PART 1: OVERVIEW AND CONCEPTS |
ISO/IEC 27036-3 : 2013
|
INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - INFORMATION SECURITY FOR SUPPLIER RELATIONSHIPS - PART 3: GUIDELINES FOR INFORMATION AND COMMUNICATION TECHNOLOGY SUPPLY CHAIN SECURITY |
AAMI IEC TIR 80001-2-1 : 2012
|
APPLICATION OF RISK MANAGEMENT FOR IT-NETWORKS INCORPORATING MEDICAL DEVICES - PART 2-1: STEP BY STEP RISK MANAGEMENT OF MEDICAL IT-NETWORKS - PRACTICAL APPLICATIONS AND EXAMPLES |
BS ISO/IEC 27034-1 : 2011
|
INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - APPLICATION SECURITY - PART 1: OVERVIEW AND CONCEPTS |
CEI UNI ISO/IEC TR 20000-3 : 2011
|
INFORMATION TECHNOLOGY - SERVICE MANAGEMENT - PART 3: GUIDANCE ON SCOPE DEFINITION AND APPLICABILITY OF ISO/IEC 20000-1 |
DIN ISO/IEC 17789 : 2016
|
INFORMATION TECHNOLOGY - CLOUD COMPUTING - REFERENCE ARCHITECTURE (ISO/IEC 17789:2014) |
TS 118 111 : 2.4.1
|
ONEM2M; COMMON TERMINOLOGY (ONEM2M TS-0011 VERSION 2.4.1 RELEASE 2) |
VDI/VDE 2182-1 : 2011
|
IT-SECURITY FOR INDUSTRIAL AUTOMATION - GENERAL MODEL |
17/30354834 DC : 0
|
BS EN ISO 19011 - GUIDELINES FOR AUDITING MANAGEMENT SYSTEMS |
BS PD ISO/IEC TR 20000-3 : 2009
|
INFORMATION TECHNOLOGY - SERVICE MANAGEMENT - PART 3: GUIDANCE ON SCOPE DEFINITION AND APPLICABILITY OF ISO/IEC 20000-1 |
14/30268906 DC : 0
|
BS ISO/IEC 17789 - INFORMATION TECHNOLOGY - CLOUD COMPUTING - REFERENCE ARCHITECTURE |
BS ISO 22313 : 2012
|
SOCIETAL SECURITY - BUSINESS CONTINUITY MANAGEMENT SYSTEMS - GUIDANCE |
12/30204847 DC : 0
|
BS ISO/IEC 29147 - INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - VULNERABILITY DISCLOSURE |
BS ISO/IEC 27000 : 2016
|
INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - INFORMATION SECURITY MANAGEMENT SYSTEMS - OVERVIEW AND VOCABULARY |
08/30146238 DC : DRAFT JUNE 2008
|
BS ISO/IEC 27000 - INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - INFORMATION SECURITY MANAGEMENT SYSTEM - OVERVIEW AND VOCABULARY |
CSA ISO/IEC TR 27008 : 2013
|
INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - GUIDELINES FOR AUDITORS ON INFORMATION SECURITY CONTROLS |
DIN ISO/IEC 27018 : 2017
|
INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - CODE OF PRACTICE FOR PROTECTION OF PERSONALLY IDENTIFIABLE INFORMATION (PII) IN PUBLIC CLOUDS ACTING AS PII PROCESSORS (ISO/IEC 27018:2014) |
10/30168519 DC : DRAFT JUNE 2010
|
BS ISO/IEC 27034-1 - INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - APPLICATION SECURITY - PART 1: OVERVIEW AND CONCEPTS |
16/30333228 DC : 0
|
BS ISO/IEC 38505-1 - INFORMATION TECHNOLOGY - GOVERNANCE OF IT - PART 1: THE APPLICATION OF ISO/IEC 38500 TO THE GOVERNANCE OF DATA |
BS PD CEN ISO/TS 14441 : 2013
|
HEALTH INFORMATICS - SECURITY AND PRIVACY REQUIREMENTS OF EHR SYSTEMS FOR USE IN CONFORMITY ASSESSMENT |
DIN SPEC 74125 : 2016
|
ELECTRONIC FEE COLLECTION - SECURITY FRAMEWORK (ISO/TS 19299:2015) |
ISO/IEC 24760-3 : 2016
|
INFORMATION TECHNOLOGY - ECURITY TECHNIQUES - FRAMEWORK FOR IDENTITY MANAGEMENT - PART 3: PRACTICE |
16/30316173 DC : 0
|
BS ISO/IEC 19086-1 - INFORMATION TECHNOLOGY - CLOUD COMPUTING - SERVICE LEVEL AGREEMENT (SLA) FRAMEWORK - PART 1: OVERVIEW AND CONCEPTS |
OLF 112-2 : 2013
|
DEPLOYMENT OF RADIO FREQUENCY IDENTIFICATION (RFID) IN THE OIL AND GAS INDUSTRY - PART 2: ARCHITECTURE AND INTEGRATION |
ISO/IEC TR 27015 : 2012
|
INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - INFORMATION SECURITY MANAGEMENT GUIDELINES FOR FINANCIAL SERVICES |
BS ISO/IEC 27033-5 : 2013
|
INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - NETWORK SECURITY - PART 5: SECURING COMMUNICATIONS ACROSS NETWORKS USING VIRTUAL PRIVATE NETWORKS (VPNS) |
11/30199101 DC : 0
|
BS ISO 12931 - PERFORMANCE CRITERIA FOR AUTHENTICATION SOLUTIONS FOR ANTI-COUNTERFEITING IN THE FIELD OF MATERIAL GOODS |
14/30230396 DC : 0
|
BS ISO/IEC 24760-2 - INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - A FRAMEWORK FOR IDENTITY MANAGEMENT - PART 2: REFERENCE ARCHITECTURE AND REQUIREMENTS |
CSA ISO/IEC 27013 : 2016
|
INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - GUIDANCE ON THE INTEGRATED IMPLEMENTATION OF ISO/IEC 27001 AND ISO/IEC 20000-1 |
BS ISO/IEC 27003 : 2017
|
INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - INFORMATION SECURITY MANAGEMENT SYSTEMS - GUIDANCE |
BS ISO/IEC 29146 : 2016
|
INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - A FRAMEWORK FOR ACCESS MANAGEMENT |
TR 101 533-2 : 1.3.1
|
ELECTRONIC SIGNATURES AND INFRASTRUCTURES (ESI); DATA PRESERVATION SYSTEMS SECURITY; PART 2: GUIDELINES FOR ASSESSORS |
17/30355373 DC : 0
|
BS ISO/IEC 27019 - INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - INFORMATION SECURITY CONTROLS FOR THE ENERGY UTILITY INDUSTRY |
BS PD ISO/TR 21548 : 2010
|
HEALTH INFORMATICS - SECURITY REQUIREMENTS FOR ARCHIVING OF ELECTRONIC HEALTH RECORDS - GUIDELINES |
BS EN 61069-5 : 2016
|
INDUSTRIAL-PROCESS MEASUREMENT, CONTROL AND AUTOMATION - EVALUATION OF SYSTEM PROPERTIES FOR THE PURPOSE OF SYSTEM ASSESSMENT - PART 5: ASSESSMENT OF SYSTEM DEPENDABILITY |
CSA ISO/IEC 27034-1 : 2012 : R2017
|
INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - APPLICATION SECURITY - PART 1: OVERVIEW AND CONCEPTS |
14/30298031 DC : 0
|
BS EN 61069-5 ED 2.0 - INDUSTRIAL-PROCESS MEASUREMENT AND CONTROL - EVALUATION OF SYSTEM PROPERTIES FOR THE PURPOSE OF SYSTEM ASSESSMENT - PART 5: ASSESSMENT OF SYSTEM DEPENDABILITY |
12/30232738 DC : 0
|
BS ISO/IEC 29182-1 - INFORMATION TECHNOLOGY - SENSOR NETWORKS: SENSOR NETWORK REFERENCE ARCHITECTURE (SNRA) - PART 1: GENERAL OVERVIEW AND REQUIREMENTS |
INCITS/ISO/IEC 27040 : 2017
|
INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - STORAGE SECURITY |
11/30207802 DC : 0
|
BS ISO/IEC 27013 - INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - GUIDELINES ON THE INTEGRATED IMPLEMENTATION OF ISO/IEC 27001 AND ISO/IEC 20000-1 |
IEEE 15026-4 : 2013
|
ADOPTION OF ISO/IEC 15026-4 - SYSTEMS AND SOFTWARE ENGINEERING - SYSTEMS AND SOFTWARE ASSURANCE - PART 4: ASSURANCE IN THE LIFE CYCLE |
BS ISO/IEC 27021 : 2017
|
INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - COMPETENCE REQUIREMENTS FOR INFORMATION SECURITY MANAGEMENT SYSTEMS PROFESSIONALS |
CSA ISO/IEC 30100-2 : 2018
|
INFORMATION TECHNOLOGY - HOME NETWORK RESOURCE MANAGEMENT - PART 2: ARCHITECTURE |
BS EN ISO 11073-00103 : 2017
|
HEALTH INFORMATICS - PERSONAL HEALTH DEVICE COMMUNICATION - PART 00103: OVERVIEW (ISO/IEEE 11073-00103:2015) |
07/30166242 DC : 0
|
BS ISO/IEC 27011 - INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - INFORMATION SECURITY MANAGEMENT GUIDELINES FOR TELECOMMUNICATIONS |
BS PD CEN ISO/TS 19299 : 2015
|
ELECTRONIC FEE COLLECTION - SECURITY FRAMEWORK |
BS ISO/IEC 27031 : 2011
|
INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - GUIDELINES FOR INFORMATION AND COMMUNICATION TECHNOLOGY READINESS FOR BUSINESS CONTINUITY |
15/30320354 DC : 0
|
BS ISO/IEC 27010 - INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - INFORMATION SECURITY MANAGEMENT FOR INTER-SECTOR AND INTER-ORGANIZATIONAL COMMUNICATIONS |
DIN EN ISO 22600-2 : 2015
|
HEALTH INFORMATICS - PRIVILEGE MANAGEMENT AND ACCESS CONTROL - PART 2: FORMAL MODELS (ISO 22600-2:2014) |
BS ISO/IEC 29182-4 : 2013
|
INFORMATION TECHNOLOGY - SENSOR NETWORKS: SENSOR NETWORK REFERENCE ARCHITECTURE (SNRA) - PART 4: ENTITY MODELS |
13/30266767 DC : 0
|
BS ISO/IEC 27018 - INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - CODE OF PRACTICE FOR P2 PROTECTION IN PUBLIC CLOUD ACTING AS P2 PROCESSORS |
BS EN ISO 22600-2 : 2014
|
HEALTH INFORMATICS - PRIVILEGE MANAGEMENT AND ACCESS CONTROL - PART 2: FORMAL MODELS |
17/30342673 DC : 0
|
BS ISO/IEC 27021 - INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - COMPETENCE REQUIREMENTS FOR INFORMATION SECURITY MANAGEMENT SYSTEMS PROFESSIONALS |
ISO/IEC 15408-1 : 2009(R2015)
|
INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - EVALUATION CRITERIA FOR IT SECURITY - PART 1: INTRODUCTION AND GENERAL MODEL |
BS PD ISO/TR 11633-2 : 2009
|
HEALTH INFORMATICS - INFORMATION SECURITY MANAGEMENT FOR REMOTE MAINTENANCE OF MEDICAL DEVICES AND MEDICAL INFORMATION SYSTEMS - PART 2: IMPLEMENTATION OF AN INFORMATION SECURITY MANAGEMENT SYSTEM (ISMS) |
BS ISO 17090-3 : 2008
|
HEALTH INFORMATICS - PUBLIC KEY INFRASTRUCTURE - PART 3: POLICY MANAGEMENT OF CERTIFICATION AUTHORITY |
ISO/IEC 27031 : 2011
|
INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - GUIDELINES FOR INFORMATION AND COMMUNICATION TECHNOLOGY READINESS FOR BUSINESS CONTINUITY |
BS ISO/IEC 38505-1 : 2017
|
INFORMATION TECHNOLOGY - GOVERNANCE OF IT - GOVERNANCE OF DATA - PART 1: APPLICATION OF ISO/IEC 38500 TO THE GOVERNANCE OF DATA |
BS EN 16082 : 2011
|
AIRPORT AND AVIATION SECURITY SERVICES |
BS PD ISO/TS 17975 : 2015
|
HEALTH INFORMATICS - PRINCIPLES AND DATA REQUIREMENTS FOR CONSENT IN THE COLLECTION, USE OR DISCLOSURE OF PERSONAL HEALTH INFORMATION |
12/30192106 DC : 0
|
BS ISO/IEC 27033-4 - INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - IT NETWORK SECURITY - PART 4: SECURING COMMUNICATIONS BETWEEN NETWORKS USING SECURITY GATEWAYS |
BS ISO 12931 : 2012
|
PERFORMANCE CRITERIA FOR AUTHENTICATION SOLUTIONS USED TO COMBAT COUNTERFEITING OF MATERIAL GOODS |
BS ISO/IEC 27035-2 : 2016
|
INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - INFORMATION SECURITY INCIDENT MANAGEMENT - PART 2: GUIDELINES TO PLAN AND PREPARE FOR INCIDENT RESPONSE |
BS EN ISO 22313 : 2014
|
SOCIETAL SECURITY - BUSINESS CONTINUITY MANAGEMENT SYSTEMS - GUIDANCE |
15/30192160 DC : 0
|
BS ISO/IEC 29146 - INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - A FRAMEWORK FOR ACCESS MANAGEMENT |
SR CEN/TS 16439:2013
|
ELECTRONIC FEE COLLECTION - SECURITY FRAMEWORK |
ISO 19011 : 2011
|
GUIDELINES FOR AUDITING MANAGEMENT SYSTEMS |
ISO/IEC 27017 : 2015
|
INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - CODE OF PRACTICE FOR INFORMATION SECURITY CONTROLS BASED ON ISO/IEC 27002 FOR CLOUD SERVICES |
BS EN ISO/IEC 27037 : 2016
|
INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - GUIDELINES FOR IDENTIFICATION, COLLECTION, ACQUISITION AND PRESERVATION OF DIGITAL EVIDENCE (ISO/IEC 27037:2012) |
DD IEC PAS 62443-3 : 2008
|
SECURITY FOR INDUSTRIAL PROCESS MEASUREMENT AND CONTROL - PART 3: NETWORK AND SYSTEM SECURITY |
BS ISO/IEC 15026-4 : 2012
|
SYSTEMS AND SOFTWARE ENGINEERING - SYSTEMS AND SOFTWARE ASSURANCE - PART 4: ASSURANCE IN THE LIFE CYCLE |
12/30249455 DC : 0
|
BS ISO/IEC 27036-1 - INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - INFORMATION SECURITY FOR SUPPLIER RELATIONSHIPS - PART 1: OVERVIEW AND CONCEPTS |
DIN EN ISO 22600-2 E : 2015
|
HEALTH INFORMATICS - PRIVILEGE MANAGEMENT AND ACCESS CONTROL - PART 2: FORMAL MODELS (ISO 22600-2:2014) |
INCITS/ISO/IEC 27011 : 2009(R2014)
|
INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - INFORMATION SECURITY MANAGEMENT GUIDELINES FOR TELECOMMUNICATIONS ORGANIZATIONS BASED ON ISO/IEC 27002 |
BS ISO/IEC 27013 : 2015
|
INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - GUIDANCE ON THE INTEGRATED IMPLEMENTATION OF ISO/IEC 27001 AND ISO/IEC 20000-1 |
BS PD CEN/TS 16439 : 2013
|
ELECTRONIC FEE COLLECTION - SECURITY FRAMEWORK |
UNE-ISO/IEC 27001:2014
|
INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - INFORMATION SECURITY MANAGEMENT SYSTEMS - REQUIREMENTS |
BS PD ISO/IEC TR 27016 : 2014
|
INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - INFORMATION SECURITY MANAGEMENT - ORGANIZATIONAL ECONOMICS |
17/30213621 DC : 0
|
BS ISO/IEC 27034-3 - INFORMATION TECHNOLOGY - APPLICATION SECURITY - PART 3: APPLICATION SECURITY MANAGEMENT PROCESS |
13/30250756 DC : 0
|
BS ISO/IEC 27039 - INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - SELECTION, DEPLOYMENT AND OPERATIONS OF INTRUSION DETECTION SYSTEMS |
DIN EN 16747 : 2015
|
MARITIME AND PORT SECURITY SERVICES |
CSA ISO/IEC 15408-1 : 2010
|
INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - EVALUATION CRITERIA FOR IT SECURITY - PART 1: INTRODUCTION AND GENERAL MODEL |
DIN ISO/IEC 27001 E : 2015
|
INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - INFORMATION SECURITY MANAGEMENT SYSTEMS - REQUIREMENTS (ISO/IEC 27001:2013 + COR. 1:2014) |
BS EN ISO 27799 : 2008
|
HEALTH INFORMATICS - INFORMATION SECURITY MANAGEMENT IN HEALTH USING ISO/IEC 27002 (ISO 27799:2016) |
BS ISO/IEC 29182-1 : 2013
|
INFORMATION TECHNOLOGY - SENSOR NETWORKS: SENSOR NETWORK REFERENCE ARCHITECTURE (SNRA) - PART 1: GENERAL OVERVIEW AND REQUIREMENTS |
14/30299515 DC : 0
|
BS EN 16747 - MARITIME AND PORT SECURITY SERVICES |
08/30134763 DC : DRAFT JUNE 2008
|
BS ISO/IEC 27004 - INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - INFORMATION SECURITY MANAGEMENT - MEASUREMENT |
12/30209825 DC : 0
|
BS ISO/IEC 27014 - INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - GOVERNANCE OF INFORMATION SECURITY |
BIS IS/ISO 19011 : 2011(R2016)
|
GUIDELINES FOR AUDITING MANAGEMENT SYSTEMS |
BS PD ISO/IEC TR 15443-1 : 2012
|
INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - SECURITY ASSURANCE FRAMEWORK - PART 1: INTRODUCTION AND CONCEPTS |
BS ISO/IEC 27005 : 2011
|
INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - INFORMATION SECURITY RISK MANAGEMENT |
BS ISO/IEC 27032 : 2012
|
INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - GUIDELINES FOR CYBERSECURITY |
ISO/IEC 29134 : 2017
|
INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - GUIDELINES FOR PRIVACY IMPACT ASSESSMENT |
12/30254927 DC : 0
|
BS EN 16372 - AESTHETIC SURGERY SERVICES |
TS 102 640-4 : 2.1.2
|
ELECTRONIC SIGNATURES AND INFRASTRUCTURES (ESI); REGISTERED ELECTRONIC MAIL (REM) PART 4: REM-MD CONFORMANCE PROFILES |
UNI EN 16082 : 2011
|
AIRPORT AND AVIATION SECURITY SERVICES |
CSA ISO/IEC 27031 : 2013 : R2017
|
INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - GUIDELINES FOR INFORMATION AND COMMUNICATION TECHNOLOGY READINESS FOR BUSINESS CONTINUITY |
BS ISO/IEC 27035-1 : 2016
|
INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - INFORMATION SECURITY INCIDENT MANAGEMENT - PART 1: PRINCIPLES OF INCIDENT MANAGEMENT |
ISO/IEC 27009 : 2016
|
INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - SECTOR-SPECIFIC APPLICATION OF ISO/IEC 27001 - REQUIREMENTS |
CSA ISO/IEC 27033-1 : 2016
|
INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - NETWORK SECURITY - PART 1: OVERVIEW AND CONCEPTS |
GS ISI 003 : 1.2.1
|
INFORMATION SECURITY INDICATORS (ISI); KEY PERFORMANCE SECURITY INDICATORS (KPSI) TO EVALUATE THE MATURITY OF SECURITY EVENT DETECTION |
CSA ISO/IEC 15408-1 : 2010 : R2015
|
INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - EVALUATION CRITERIA FOR IT SECURITY - PART 1: INTRODUCTION AND GENERAL MODEL |
INCITS/ISO/IEC 27033-2 : 2014
|
INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - NETWORK SECURITY - PART 2: GUIDELINES FOR THE DESIGN AND IMPLEMENTATION OF NETWORK SECURITY |
DD IEC TS 62351-2 : 2008
|
POWER SYSTEMS MANAGEMENT AND ASSOCIATED INFORMATION EXCHANGE - DATA AND COMMUNICATIONS SECURITY - PART 2: GLOSSARY OF TERMS |
UNI CEN/TS 16439 : 2013
|
ELECTRONIC FEE COLLECTION - SECURITY FRAMEWORK |
TS 119 401 : 2.0.1
|
ELECTRONIC SIGNATURES AND INFRASTRUCTURES (ESI); GENERAL POLICY REQUIREMENTS FOR TRUST SERVICE PROVIDERS |
CSA ISO/IEC 20000-2 :
|
INFORMATION TECHNOLOGY - SERVICE MANAGEMENT - PART 2: GUIDANCE ON THE APPLICATION OF SERVICE MANAGEMENT SYSTEMS |
ISO/IEC 27021 : 2017
|
INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - COMPETENCE REQUIREMENTS FOR INFORMATION SECURITY MANAGEMENT SYSTEMS PROFESSIONALS |
CSA ISO/IEC 20000-2 : 2013 : R2017
|
INFORMATION TECHNOLOGY - SERVICE MANAGEMENT - PART 2: GUIDANCE ON THE APPLICATION OF SERVICE MANAGEMENT SYSTEMS |
UNE ISO/IEC 29182-1 : 2016
|
INFORMATION TECHNOLOGY - SENSOR NETWORKS: SENSOR NETWORK REFERENCE ARCHITECTURE (SNRA) - PART 1: GENERAL OVERVIEW AND REQUIREMENTS |
ANSI X9.95 : 2016
|
FINANCIAL SERVICES - TRUSTED TIME STAMP MANAGEMENT AND SECURITY |
CSA ISO/IEC 27035 : 2013
|
INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - INFORMATION SECURITY INCIDENT MANAGEMENT |
CSA ISO/IEC 27035 : 2013 : R2017
|
INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - INFORMATION SECURITY INCIDENT MANAGEMENT |
CSA ISO/IEC 15408-1 : 2010
|
INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - EVALUATION CRITERIA FOR IT SECURITY - PART 1: INTRODUCTION AND GENERAL MODEL |
INCITS/ISO/IEC 29182-4 : 2014
|
INFORMATION TECHNOLOGY - SENSOR NETWORKS: SENSOR NETWORK REFERENCE ARCHITECTURE (SNRA) - PART 4: ENTITY MODELS |
CSA TELECOM ORGANIZATIONS PACKAGE : 2018
|
CONSISTS OF CAN/CSA-ISO/IEC 27000:18 - INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - INFORMATION SECURITY MANAGEMENT SYSTEMS - OVERVIEW AND VOCABULARY; CAN/CSA-ISO/IEC 27001:14, INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - INFORMATION SECURITY MANAGEMENT SYSTEMS - REQUIREMENTS; CAN/CSA-ISO/IEC 27002:15 - INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - CODE OF PRACTICE FOR |
CSA ISO/IEC 20000-2
|
INFORMATION TECHNOLOGY - SERVICE MANAGEMENT - PART 2: GUIDANCE ON THE APPLICATION OF SERVICE MANAGEMENT SYSTEMS |
CSA ISO/IEC 27034-1 : 2012
|
INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - APPLICATION SECURITY - PART 1: OVERVIEW AND CONCEPTS |
BS PD ISO/TR 18638 : 2017
|
HEALTH INFORMATICS - GUIDANCE ON HEALTH INFORMATION PRIVACY EDUCATION IN HEALTHCARE ORGANIZATIONS |
CSA ISO/IEC 24762 : 2008
|
INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - GUIDELINES FOR INFORMATION AND COMMUNICATIONS TECHNOLOGY DISASTER RECOVERY SERVICES |
BS EN ISO 19011 : 2011
|
GUIDELINES FOR AUDITING MANAGEMENT SYSTEMS (ISO 19011:2011) |
BIP 2151 : 2012
|
AUDITING BUSINESS CONTINUITY MANAGEMENT PLANS - ASSESS AND IMPROVE YOUR PERFORMANCE AGAINST ISO 22301 |
16/30326000 DC : 0
|
BS ISO/IEC 19770-1 - INFORMATION TECHNOLOGY - IT ASSET MANAGEMENT - PART 1: IT ASSET MANAGEMENT SYSTEMS - REQUIREMENTS |
CSA ISO 19011 : 2012
|
GUIDELINES FOR AUDITING MANAGEMENT SYSTEMS |
IEEE 20000-2 : 2013
|
INFORMATION TECHNOLOGY - SERVICE MANAGEMENT - PART 2: GUIDANCE ON THE APPLICATION OF SERVICE MANAGEMENT SYSTEMS |
CSA ISO/IEC 27035-1 : 2018
|
INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - INFORMATION SECURITY INCIDENT MANAGEMENT - PART 1: PRINCIPLES OF INCIDENT MANAGEMENT |
CSA ISO/IEC 20000-2 : 2013
|
INFORMATION TECHNOLOGY - SERVICE MANAGEMENT - PART 2: GUIDANCE ON THE APPLICATION OF SERVICE MANAGEMENT SYSTEMS |
CSA IEC 62443-3-3 : 2017
|
INDUSTRIAL COMMUNICATION NETWORKS - NETWORK AND SYSTEM SECURITY - PART 3-3: SYSTEM SECURITY REQUIREMENTS AND SECURITY LEVELS |
CSA ISO/IEC 27031 : 2013
|
INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - GUIDELINES FOR INFORMATION AND COMMUNICATION TECHNOLOGY READINESS FOR BUSINESS CONTINUITY |
DIN CEN ISO/TS 19299;DIN SPEC 74125:2016-02
|
ELECTRONIC FEE COLLECTION - SECURITY FRAMEWORK (ISO/TS 19299:2015) |
INCITS/ISO/IEC 27033-5 : 2014
|
INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - NETWORK SECURITY - PART 5: SECURING COMMUNICATIONS ACROSSS NETWORKS USING VIRTUAL PRIVATE NETWORKS (VPNS) |
ISO/IEC 15026-1 : 2013
|
SYSTEMS AND SOFTWARE ENGINEERING - SYSTEMS AND SOFTWARE ASSURANCE - PART 1: CONCEPTS AND VOCABULARY |
ISO/IEC TR 15443-3 : 2007
|
INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - A FRAMEWORK FOR IT SECURITY ASSURANCE - PART 3: ANALYSIS OF ASSURANCE METHODS |
ISO TR 11633-2 : 2009
|
HEALTH INFORMATICS - INFORMATION SECURITY MANAGEMENT FOR REMOTE MAINTENANCE OF MEDICAL DEVICES AND MEDICAL INFORMATION SYSTEMS - PART 2: IMPLEMENTATION OF AN INFORMATION SECURITY MANAGEMENT SYSTEM (ISMS) |
TS 119 101 : 1.1.1
|
ELECTRONIC SIGNATURES AND INFRASTRUCTURES (ESI); POLICY AND SECURITY REQUIREMENTS FOR APPLICATIONS FOR SIGNATURE CREATION AND SIGNATURE VALIDATION |
CSA ISO/IEC TR 27008 : 2013
|
INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - GUIDELINES FOR AUDITORS ON INFORMATION SECURITY CONTROLS |
INCITS/ISO/IEC 15408-1 : 2012
|
INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - EVALUATION CRITERIA FOR IT SECURITY - PART 1: INTRODUCTION AND GENERAL MODEL |
SR CEN ISO/TS 14441:2013
|
HEALTH INFORMATICS - SECURITY AND PRIVACY REQUIREMENTS OF EHR SYSTEMS FOR USE IN CONFORMITY ASSESSMENT (ISO/TS 14441:2013) |
ISO/IEC TR 27016 : 2014
|
INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - INFORMATION SECURITY MANAGEMENT - ORGANIZATIONAL ECONOMICS |
INCITS/ISO/IEC 27039 : 2017
|
INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - SELECTION, DEPLOYMENT AND OPERATIONS OF INTRUSION DETECTION AND PREVENTION SYSTEMS (IDPS) |
CSA ISO/IEC 24762 : 2008
|
INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - GUIDELINES FOR INFORMATION AND COMMUNICATIONS TECHNOLOGY DISASTER RECOVERY SERVICES |
ISO TS 21089 : 1ED 2018
|
HEALTH INFORMATICS - TRUSTED END-TO-END INFORMATION FLOWS |
CSA ISO/IEC TR 27008 : 2013 : R2017
|
INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - GUIDELINES FOR AUDITORS ON INFORMATION SECURITY CONTROLS |
CSA ISO/IEC 27001 : 2014
|
INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - INFORMATION SECURITY MANAGEMENT SYSTEMS - REQUIREMENTS |
GS ISI 002 : 1.2.1
|
INFORMATION SECURITY INDICATORS (ISI); EVENT MODEL A SECURITY EVENT CLASSIFICATION MODEL AND TAXONOMY |
ISO/IEC 27018 : 2014
|
INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - CODE OF PRACTICE FOR PROTECTION OF PERSONALLY IDENTIFIABLE INFORMATION (PII) IN PUBLIC CLOUDS ACTING AS PII PROCESSORS |
UNI/TR 11465-2 : 2012
|
ELECTRONIC SIGNATURES AND INFRASTRUCTURES (ESI) - DATA PRESERVATION SYSTEMS SECURITY - PART 2: GUIDELINES FOR ASSESSORS |
CSA ISO/IEC 27031
|
INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - GUIDELINES FOR INFORMATION AND COMMUNICATION TECHNOLOGY READINESS FOR BUSINESS CONTINUITY |
ISO/IEC 24760-2 : 2015
|
INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - A FRAMEWORK FOR IDENTITY MANAGEMENT - PART 2: REFERENCE ARCHITECTURE AND REQUIREMENTS |
CSA ISO/IEC 19086-1 : 2018
|
INFORMATION TECHNOLOGY - CLOUD COMPUTING - SERVICE LEVEL AGREEMENT (SLA) FRAMEWORK - PART 1: OVERVIEW AND CONCEPTS |
15/30267674 DC : 0
|
BS ISO/IEC 27035-1 - INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - INFORMATION SECURITY INCIDENT MANAGEMENT - PART 1: PRINCIPLES OF INCIDENT MANAGEMENT |
16/30298078 DC : 0
|
BS EN 82079-1 ED 2.0 - PREPARATION OF INSTRUCTIONS FOR USE - STRUCTURING, CONTENT AND PRESENTATION - PART 1: GENERAL PRINCIPLES AND DETAILED REQUIREMENTS |
ANSI X9.112-1 : 2009
|
WIRELESS MANAGEMENT AND SECURITY - PART 1: GENERAL REQUIREMENTS |
IEC PAS 62443-3 : 1.0
|
SECURITY FOR INDUSTRIAL PROCESS MEASUREMENT AND CONTROL - NETWORK AND SYSTEM SECURITY |
BS ISO/IEC 20000-3 : 2012
|
INFORMATION TECHNOLOGY - SERVICE MANAGEMENT - PART 3: GUIDANCE ON SCOPE DEFINITION AND APPLICABILITY OF ISO/IEC 20000-1 |
CEI UNI ISO/IEC 27001 : 2014
|
INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - INFORMATION SECURITY MANAGEMENT SYSTEMS - REQUIREMENTS |
ISO/IEC TR 24729-4 : 2009(2016)
|
INFORMATION TECHNOLOGY - RADIO FREQUENCY IDENTIFICATION FOR ITEM MANAGEMENT - IMPLEMENTATION GUIDELINES - PART 4: TAG DATA SECURITY |
TS 119 403 : 2.2.1
|
ELECTRONIC SIGNATURES AND INFRASTRUCTURES (ESI); TRUST SERVICE PROVIDER CONFORMITY ASSESSMENT - REQUIREMENTS FOR CONFORMITY ASSESSMENT BODIES ASSESSING TRUST SERVICE PROVIDERS |
ISO/IEC 29146 : 2016
|
INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - A FRAMEWORK FOR ACCESS MANAGEMENT |
TR 103 123 : 1.1.1
|
ELECTRONIC SIGNATURES AND INFRASTRUCTURES (ESI); GUIDANCE FOR AUDITORS AND CSPS ON ETSI TS 102 042 FOR ISSUING PUBLICLY-TRUSTED TLS/SSL CERTIFICATES |
ISO/IEC 24767-1 : 2008(R2018)
|
INFORMATION TECHNOLOGY - HOME NETWORK SECURITY - PART 1: SECURITY REQUIREMENTS |
CSA ISO/IEC 27005 : 2011 : R2016
|
INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - INFORMATION SECURITY RISK MANAGEMENT |
CSA ISO/IEC 27031 :
|
INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - GUIDELINES FOR INFORMATION AND COMMUNICATION TECHNOLOGY READINESS FOR BUSINESS CONTINUITY |
I.S. EN ISO/IEC 27001:2017
|
INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - INFORMATION SECURITY MANAGEMENT SYSTEMS - REQUIREMENTS (ISO/IEC 27001:2013 INCLUDING COR 1:2014 AND COR 2:2015) |
PREN 9115 : 200P1
|
QUALITY MANAGEMENT SYSTEMS - REQUIREMENTS FOR AVIATION, SPACE AND DEFENSE ORGANIZATIONS - DELIVERABLE SOFTWARE (SUPPLEMENT TO EN 9100) |
ISO/IEC 27035-2 : 2016
|
INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - INFORMATION SECURITY INCIDENT MANAGEMENT - PART 2: GUIDELINES TO PLAN AND PREPARE FOR INCIDENT RESPONSE |
CSA ISO/IEC TR 20000-5 : 2015
|
INFORMATION TECHNOLOGY - SERVICE MANAGEMENT - PART 5: EXEMPLAR IMPLEMENTATION PLAN FOR ISO/IEC 20000-1 |
TS 119 172-1 : 1.1.1
|
ELECTRONIC SIGNATURES AND INFRASTRUCTURES (ESI); SIGNATURE POLICIES; PART 1: BUILDING BLOCKS AND TABLE OF CONTENTS FOR HUMAN READABLE SIGNATURE POLICY DOCUMENTS |
UNE ISO/IEC 27000 : 2014
|
INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - INFORMATION SECURITY MANAGEMENT SYSTEMS - OVERVIEW AND VOCABULARY |
ISO/IEC 19770-1 : 2017
|
INFORMATION TECHNOLOGY - IT ASSET MANAGEMENT - PART 1: IT ASSET MANAGEMENT SYSTEMS - REQUIREMENTS |
SR 003 391 : 2.1.1
|
CLOUD STANDARDS COORDINATION PHASE 2; INTEROPERABILITY AND SECURITY IN CLOUD COMPUTING |
IEC TR 62351-10 : 1.0
|
POWER SYSTEMS MANAGEMENT AND ASSOCIATED INFORMATION EXCHANGE - DATA AND COMMUNICATIONS SECURITY - PART 10: SECURITY ARCHITECTURE GUIDELINES |
ISO/IEC 27034-3 : 1ED 2018
|
INFORMATION TECHNOLOGY - APPLICATION SECURITY - PART 3: APPLICATION SECURITY MANAGEMENT PROCESS |
DNV-RP A203 : LATEST
|
TECHNOLOGY QUALIFICATION |
ISO/IEC TS 20540:2018
|
INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - TESTING CRYPTOGRAPHIC MODULES IN THEIR OPERATIONAL ENVIRONMENT |
UNE ISO/IEC TR 19791 : 2013
|
INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - SECURITY ASSESSMENT OF OPERATIONAL SYSTEMS |
I.S. EN 16747:2015
|
MARITIME AND PORT SECURITY SERVICES |
I.S. EN 16495:2014
|
AIR TRAFFIC MANAGEMENT - INFORMATION SECURITY FOR ORGANISATIONS SUPPORTING CIVIL AVIATION OPERATIONS |
IEEE 11073-00103 : 2012
|
HEALTH INFORMATICS - PERSONAL HEALTH DEVICE COMMUNICATION - PART 00103: OVERVIEW |
IEEE 15026-1 : 2014
|
ADOPTION OF ISO/IEC 15026-1 - SYSTEMS AND SOFTWARE ENGINEERING - SYSTEMS AND SOFTWARE ASSURANCE - PART 1: CONCEPTS AND VOCABULARY |
I.S. EN ISO 9004:2009
|
QUALITY MANAGEMENT - QUALITY OF AN ORGANIZATION - GUIDANCE TO ACHIEVE SUSTAINED SUCCESS (ISO 9004:2018) |
I.S. EN IEC 62443-4-1:2018
|
SECURITY FOR INDUSTRIAL AUTOMATION AND CONTROL SYSTEMS - PART 4-1: SECURE PRODUCT DEVELOPMENT LIFECYCLE REQUIREMENTS |
INCITS/ISO/IEC 29182-1 : 2014
|
INFORMATION TECHNOLOGY - SENSOR NETWORKS: SENSOR NETWORK REFERENCE ARCHITECTURE (SNRA) - PART 1: GENERAL OVERVIEW AND REQUIREMENTS |
GS ISI 001-2 : 1.1.2
|
INFORMATION SECURITY INDICATORS (ISI); INDICATORS (INC); PART 2: GUIDE TO SELECT OPERATIONAL INDICATORS BASED ON THE FULL SET GIVEN IN PART 1 |
I.S. EN ISO/IEC 27037:2016
|
INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - GUIDELINES FOR IDENTIFICATION, COLLECTION, ACQUISITION AND PRESERVATION OF DIGITAL EVIDENCE (ISO/IEC 27037:2012) |
I.S. EN 16082:2011
|
AIRPORT AND AVIATION SECURITY SERVICES |
I.S. EN 61069-5:2016
|
INDUSTRIAL-PROCESS MEASUREMENT, CONTROL AND AUTOMATION - EVALUATION OF SYSTEM PROPERTIES FOR THE PURPOSE OF SYSTEM ASSESSMENT - PART 5: ASSESSMENT OF SYSTEM DEPENDABILITY |
ISO/IEC 24762 : 2008
|
INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - GUIDELINES FOR INFORMATION AND COMMUNICATIONS TECHNOLOGY DISASTER RECOVERY SERVICES |
TR 119 400 : 1.1.1
|
ELECTRONIC SIGNATURES AND INFRASTRUCTURES (ESI); GUIDANCE ON THE USE OF STANDARDS FOR TRUST SERVICE PROVIDERS SUPPORTING DIGITAL SIGNATURES AND RELATED SERVICES |
CSA ISO/IEC 27035-2 : 2018
|
INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - INFORMATION SECURITY INCIDENT MANAGEMENT - PART 2: GUIDELINES TO PLAN AND PREPARE FOR INCIDENT RESPONSE |
SR CWA 16460:2012
|
GOOD PRACTICE: E-INVOICING COMPLIANCE GUIDELINES - THE COMMENTARY |
I.S. EN ISO/IEC 27000:2017
|
INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - INFORMATION SECURITY MANAGEMENT SYSTEMS - OVERVIEW AND VOCABULARY (ISO/IEC 27000:2016) |
AAMI IEC TIR 80001-2-8 : 2016
|
APPLICATION OF RISK MANAGEMENT FOR IT NETWORKS INCORPORATING MEDICAL DEVICES - PART 2-8: APPLICATION GUIDANCE - GUIDANCE ON STANDARDS FOR ESTABLISHING THE SECURITY CAPABILITIES IDENTIFIED IN IEC 80001-2-2 |
EN ISO 19011:2011 COR 2011
|
GUIDELINES FOR AUDITING MANAGEMENT SYSTEMS (ISO 19011:2011) |
ISO TR 11633-1 : 2009
|
HEALTH INFORMATICS - INFORMATION SECURITY MANAGEMENT FOR REMOTE MAINTENANCE OF MEDICAL DEVICES AND MEDICAL INFORMATION SYSTEMS - PART 1: REQUIREMENTS AND RISK ANALYSIS |
ISO/IEC/IEEE 15289 : 2017
|
SYSTEMS AND SOFTWARE ENGINEERING - CONTENT OF LIFE-CYCLE INFORMATION ITEMS (DOCUMENTATION) |
ISO TR 12859 : 2009
|
INTELLIGENT TRANSPORT SYSTEMS - SYSTEM ARCHITECTURE - PRIVACY ASPECTS IN ITS STANDARDS AND SYSTEMS |
SR CEN/TR 16742:2014
|
INTELLIGENT TRANSPORT SYSTEMS - PRIVACY ASPECTS IN ITS STANDARDS AND SYSTEMS IN EUROPE |
IEC 62645 : 2014 COR 1 2015
|
NUCLEAR POWER PLANTS - INSTRUMENTATION AND CONTROL SYSTEMS - REQUIREMENTS FOR SECURITY PROGRAMMES FOR COMPUTER-BASED SYSTEMS |
ISO/IEC 27036-2 : 2014
|
INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - INFORMATION SECURITY FOR SUPPLIER RELATIONSHIPS - PART 2: REQUIREMENTS |
BS PD ISO/IEC TR 15026-1 : 2010
|
SYSTEMS AND SOFTWARE ENGINEERING - SYSTEMS AND SOFTWARE ASSURANCE - PART 1: CONCEPTS AND VOCABULARY |
ISO TS 13606-4 : 2009
|
HEALTH INFORMATICS - ELECTRONIC HEALTH RECORD COMMUNICATION - PART 4: SECURITY |
ISO/IEC TR 27023 : 2015
|
INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - MAPPING THE REVISED EDITIONS OF ISO/IEC 27001 AND ISO/IEC 27002 |
AAMI IEC TIR 80001-2-3 : 2012
|
APPLICATION OF RISK MANAGEMENT FOR IT-NETWORKS INCORPORATING MEDICAL DEVICES - PART 2-3: GUIDANCE FOR WIRELESS NETWORKS |
ISO/IEC 29151 : 2017
|
INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - CODE OF PRACTICE FOR PERSONALLY IDENTIFIABLE INFORMATION PROTECTION |
ISO 9004 : 2018
|
QUALITY MANAGEMENT - QUALITY OF AN ORGANIZATION - GUIDANCE TO ACHIEVE SUSTAINED SUCCESS |
NEMA CPSP 1 : 2015
|
SUPPLY CHAIN BEST PRACTICES |
SR CEN/TS 16850:2015
|
SOCIETAL AND CITIZEN SECURITY - GUIDANCE FOR MANAGING SECURITY IN HEALTHCARE FACILITIES |
I.S. EN ISO/IEC 27040:2016
|
INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - STORAGE SECURITY (ISO/IEC 27040:2015) |
SR CEN/TS 17159:2018
|
SOCIETAL AND CITIZEN SECURITY - GUIDANCE FOR THE SECURITY OF HAZARDOUS MATERIALS (CBRNE) IN HEALTHCARE FACILITIES |
SR CWA 16036:2009
|
CYBER-IDENTITY - UNIQUE IDENTIFICATION SYSTEMS FOR ORGANIZATIONS AND PARTS THEREOF |
SAE J 3061 : 2016
|
CYBERSECURITY GUIDEBOOK FOR CYBER-PHYSICAL VEHICLE SYSTEMS |
CSA ISO/IEC TR 15443-1 : 2015
|
INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - SECURITY ASSURANCE FRAMEWORK - PART 1: INTRODUCTION AND CONCEPTS |
SR CEN ISO/TS 19299:2015
|
ELECTRONIC FEE COLLECTION - SECURITY FRAMEWORK (ISO/TS 19299:2015) |
ABS 0252 : 2016
|
DATA INTEGRITY FOR MARINE AND OFFSHORE OPERATIONS - CYBERSAFETY[TM] VOLUME 3 |
ISO/IEC 27036-1 : 2014
|
INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - INFORMATION SECURITY FOR SUPPLIER RELATIONSHIPS - PART 1: OVERVIEW AND CONCEPTS |
ISO/IEC 27034-1 : 2011(R2017)
|
INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - APPLICATION SECURITY - PART 1: OVERVIEW AND CONCEPTS |
ISO 21188 : 2018
|
PUBLIC KEY INFRASTRUCTURE FOR FINANCIAL SERVICES - PRACTICES AND POLICY FRAMEWORK |
DIN EN ISO/IEC 27040 : 2016
|
INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - STORAGE SECURITY (ISO/IEC 27040:2015) |
ISO/IEC 27033-2 : 2012(R2018)
|
INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - NETWORK SECURITY - PART 2: GUIDELINES FOR THE DESIGN AND IMPLEMENTATION OF NETWORK SECURITY |
ISO 10008 : 2013(R2019)
|
QUALITY MANAGEMENT - CUSTOMER SATISFACTION - GUIDELINES FOR BUSINESS-TO-CONSUMER ELECTRONIC COMMERCE TRANSACTIONS |
BS EN ISO/IEC 27000 : 2017
|
INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - INFORMATION SECURITY MANAGEMENT SYSTEMS - OVERVIEW AND VOCABULARY (ISO/IEC 27000:2016) |
INCITS/ISO/IEC 27001 : 2014
|
INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - INFORMATION SECURITY MANAGEMENT SYSTEMS - REQUIREMENTS |
ISO TR 18638 : 2017
|
HEALTH INFORMATICS - GUIDANCE ON HEALTH INFORMATION PRIVACY EDUCATION IN HEALTHCARE ORGANIZATIONS |
CSA ISO 19011 : 2012:R2017
|
GUIDELINES FOR AUDITING MANAGEMENT SYSTEMS |
IEC 62443-3-3 : 2013 COR 1 2014
|
INDUSTRIAL COMMUNICATION NETWORKS - NETWORK AND SYSTEM SECURITY - PART 3-3: SYSTEM SECURITY REQUIREMENTS AND SECURITY LEVELS |
CSA ISO 19011: 2012
|
GUIDELINES FOR AUDITING MANAGEMENT SYSTEMS |
IEC TR 80001-2-8 : 1ED 2016
|
APPLICATION OF RISK MANAGEMENT FOR IT-NETWORKS INCORPORATING MEDICAL DEVICES - PART 2-8: APPLICATION GUIDANCE - GUIDANCE ON STANDARDS FOR ESTABLISHING THE SECURITY CAPABILITIES IDENTIFIED IN IEC TR 80001-2-2 |
ISO/IEC TR 15443-1 : 2012(R2018)
|
INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - SECURITY ASSURANCE FRAMEWORK - PART 1: INTRODUCTION AND CONCEPTS |
CSA ISO 19011 : 2012 : R2017
|
GUIDELINES FOR AUDITING MANAGEMENT SYSTEMS |
TR 103 331 : 1.1.1
|
CYBER; STRUCTURED THREAT INFORMATION SHARING |
UNI CEN ISO/TS 14441 : 2014
|
HEALTH INFORMATICS - SECURITY AND PRIVACY REQUIREMENTS OF HER SYSTEMS FOR USE IN CONFORMITY ASSESSMENT |
CSA ISO/IEC 27005 : 2011
|
INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - INFORMATION SECURITY RISK MANAGEMENT |
BS ISO/IEC 29147 : 2014
|
INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - VULNERABILITY DISCLOSURE |
BS ISO/IEC IEEE 15289 : 2011
|
SYSTEMS AND SOFTWARE ENGINEERING - CONTENT OF LIFE-CYCLE INFORMATION ITEMS (DOCUMENTATION) |
DIN EN 16082 : 2011
|
AIRPORT AND AVIATION SECURITY SERVICES |
CSA ISO/IEC 27011 : 2018
|
INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - CODE OF PRACTICE FOR INFORMATION SECURITY CONTROLS BASED ON ISO/IEC 27002 FOR TELECOMMUNICATIONS ORGANIZATIONS |
UNI EN ISO 22600-2 : 2014
|
HEALTH INFORMATICS - PRIVILEGE MANAGEMENT AND ACCESS CONTROL - PART 2: FORMAL MODELS |
UNI EN ISO 19011 : 2012
|
GUIDELINES FOR AUDITING MANAGEMENT SYSTEMS |
I.S. EN ISO 22313:2014
|
SOCIETAL SECURITY - BUSINESS CONTINUITY MANAGEMENT SYSTEMS - GUIDANCE (ISO 22313:2012) |
EN IEC 62443-4-1 : 2018
|
SECURITY FOR INDUSTRIAL AUTOMATION AND CONTROL SYSTEMS - PART 4-1: SECURE PRODUCT DEVELOPMENT LIFECYCLE REQUIREMENTS |
I.S. EN ISO 27799:2016
|
HEALTH INFORMATICS - INFORMATION SECURITY MANAGEMENT IN HEALTH USING ISO/IEC 27002 |
CSA ISO/IEC 24760-3 : 2018
|
INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - A FRAMEWORK FOR IDENTITY MANAGEMENT - PART 3: PRACTICE |
I.S. EN ISO 22600-2:2014
|
HEALTH INFORMATICS - PRIVILEGE MANAGEMENT AND ACCESS CONTROL - PART 2: FORMAL MODELS (ISO 22600-2:2014) |
CSA ISO/IEC 27017 : 2016
|
INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - CODE OF PRACTICE FOR INFORMATION SECURITY CONTROLS BASED ON ISO/IEC 27002 FOR CLOUD SERVICES |
ISO 12931 : 2012(R2017)
|
PERFORMANCE CRITERIA FOR AUTHENTICATION SOLUTIONS USED TO COMBAT COUNTERFEITING OF MATERIAL GOODS |
ANSI X9.112 : 2016
|
WIRELESS MANAGEMENT AND SECURITY - PART 1: GENERAL REQUIREMENTS |
BS EN 16495 : 2014
|
AIR TRAFFIC MANAGEMENT - INFORMATION SECURITY FOR ORGANISATIONS SUPPORTING CIVIL AVIATION OPERATIONS |
UNI EN 16495 : 2014
|
AIR TRAFFIC MANAGEMENT - INFORMATION SECURITY FOR ORGANIZATIONS SUPPORTING CIVIL AVIATION OPERATIONS |
TS 102 165-1 : 4.2.3
|
CYBER; METHODS AND PROTOCOLS; PART 1: METHOD AND PRO FORMA FOR THREAT, VULNERABILITY, RISK ANALYSIS (TVRA) |
CEN/TS 17159 : 2018
|
SOCIETAL AND CITIZEN SECURITY - GUIDANCE FOR THE SECURITY OF HAZARDOUS MATERIALS (CBRNE) IN HEALTHCARE FACILITIES |
ISO/IEC 19086-1 : 2016
|
INFORMATION TECHNOLOGY - CLOUD COMPUTING - SERVICE LEVEL AGREEMENT (SLA) FRAMEWORK - PART 1: OVERVIEW AND CONCEPTS |
ABS 0251 : 2016
|
CYBERSECURITY IMPLEMENTATION FOR THE MARINE AND OFFSHORE INDUSTRIES - CYBERSAFETY[TM] VOLUME 2 |
UNE ISO/IEC TR 20000-3 : 2011
|
INFORMATION TECHNOLOGY - SERVICE MANAGEMENT - PART 3: GUIDANCE ON SCOPE DEFINITION AND APPLICABILITY OF ISO/IEC 20000-1 |
UNI CEN/TS 15480-4 : 2012
|
IDENTIFICATION CARD SYSTEMS - EUROPEAN CITIZEN CARD - PART 4: RECOMMENDATIONS FOR EUROPEAN CITIZEN CARD ISSUANCE, OPERATION AND USE |
BS ISO/IEC 27019 : 2017
|
INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - INFORMATION SECURITY CONTROLS FOR THE ENERGY UTILITY INDUSTRY |
PREN 9115 : 200P1
|
QUALITY MANAGEMENT SYSTEMS - REQUIREMENTS FOR AVIATION, SPACE AND DEFENSE ORGANIZATIONS - DELIVERABLE SOFTWARE (SUPPLEMENT TO EN 9100) |
CSA ISO/IEC 15026-1 : 2015
|
SYSTEMS AND SOFTWARE ENGINEERING - SYSTEMS AND SOFTWARE ASSURANCE - PART 1: CONCEPTS AND VOCABULARY |
ISO/IEC 27000 : 2018
|
INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - INFORMATION SECURITY MANAGEMENT SYSTEMS - OVERVIEW AND VOCABULARY |
ISO/IEC 17789 : 2014
|
INFORMATION TECHNOLOGY - CLOUD COMPUTING - REFERENCE ARCHITECTURE |
UNE-EN ISO 19011:2012
|
GUIDELINES FOR AUDITING MANAGEMENT SYSTEMS (ISO 19011:2011) |
ISO TS 17975 : 2015
|
HEALTH INFORMATICS - PRINCIPLES AND DATA REQUIREMENTS FOR CONSENT IN THE COLLECTION, USE OR DISCLOSURE OF PERSONAL HEALTH INFORMATION |
ISO/IEC 15944-8 : 2012
|
INFORMATION TECHNOLOGY - BUSINESS OPERATIONAL VIEW - PART 8: IDENTIFICATION OF PRIVACY PROTECTION REQUIREMENTS AS EXTERNAL CONSTRAINTS ON BUSINESS TRANSACTIONS |
IEC 62443-4-1 : 1ED 2018
|
SECURITY FOR INDUSTRIAL AUTOMATION AND CONTROL SYSTEMS - PART 4-1: SECURE PRODUCT DEVELOPMENT LIFECYCLE REQUIREMENTS |
EN ISO 9004 : 2018
|
QUALITY MANAGEMENT - QUALITY OF AN ORGANIZATION - GUIDANCE TO ACHIEVE SUSTAINED SUCCESS (ISO 9004:2018) |
CSA ISO/IEC 27018 : 2015
|
INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - CODE OF PRACTICE FOR PROTECTION OF PERSONALLY IDENTIFIABLE INFORMATION (PII) IN PUBLIC CLOUDS ACTING AS PII PROCESSORS |
CSA ISO/IEC 20000-2 : 2013
|
INFORMATION TECHNOLOGY - SERVICE MANAGEMENT - PART 2: GUIDANCE ON THE APPLICATION OF SERVICE MANAGEMENT SYSTEMS |
13/30268559 DC : 0
|
BS ISO/IEC 15026-1 - SYSTEMS AND SOFTWARE ENGINEERING - SYSTEMS AND SOFTWARE ASSURANCE - PART 1: CONCEPTS AND VOCABULARY |
18/30361485 DC : 0
|
BS ISO/IEC 19896-3 - INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - COMPETENCE REQUIREMENTS FOR INFORMATION SECURITY TESTERS AND EVALUATORS - PART 3: KNOWLEDGE, SKILLS AND EFFECTIVENESS REQUIREMENTS FOR ISO/IEC 15408 EVALUATORS |
18/30346433 DC : 0
|
BS ISO/IEC 19086-4 - INFORMATION TECHNOLOGY - CLOUD COMPUTING SERVICE LEVEL AGREEMENT (SLA) FRAMEWORK - PART 4: SECURITY AND PRIVACY |
BS PD ISO/TR 12859 : 2009
|
INTELLIGENT TRANSPORT SYSTEMS - SYSTEM ARCHITECTURE - PRIVACY ASPECTS IN ITS STANDARDS AND SYSTEMS |
DD ISO/TS 21547 : 2010
|
HEALTH INFORMATICS - SECURITY REQUIREMENTS FOR ARCHIVING OF ELECTRONIC HEALTH RECORDS - PRINCIPLES |
CSA ISO/IEC 27005 : 2011
|
INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - INFORMATION SECURITY RISK MANAGEMENT |
12/30232747 DC : DRAFT JAN 2013
|
BS ISO/IEC 29182-4 - INFORMATION TECHNOLOGY-SENSOR NETWORKS: SENSOR NETWORK REFERENCE ARCHITECTURE (SNRA) - PART 4: ENTITY MODELS |
BS ISO/IEC 27037 : 2012
|
INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - GUIDELINES FOR IDENTIFICATION, COLLECTION, ACQUISITION, AND PRESERVATION OF DIGITAL EVIDENCE |
ISO/IEC 27033-5 : 2013
|
INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - NETWORK SECURITY - PART 5: SECURING COMMUNICATIONS ACROSS NETWORKS USING VIRTUAL PRIVATE NETWORKS (VPNS) |
UNI/TS 11465-3 : 2013
|
ELECTRONIC SIGNATURES AND INFRASTRUCTURES (ESI) - DATA PRESERVATION SYSTEMS SECURITY - ITALIAN COMPLEMENT TO ETSI TS 101 533-1 AND ETSI TR 101 533-2 |
ISO/IEC 30100-2 : 2016
|
INFORMATION TECHNOLOGY - HOME NETWORK RESOURCE MANAGEMENT - PART 2: ARCHITECTURE |
ISO/IEC 27014 : 2013
|
INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - GOVERNANCE OF INFORMATION SECURITY |
BS ISO/IEC IEEE 15289 : 2019
|
SYSTEMS AND SOFTWARE ENGINEERING - CONTENT OF LIFE-CYCLE INFORMATION ITEMS (DOCUMENTATION) |
CSA ISO/IEC TR 15026-1 : 2013
|
SYSTEMS AND SOFTWARE ENGINEERING - SYSTEMS AND SOFTWARE ASSURANCE - PART 1: CONCEPTS AND VOCABULARY |
UNE ISO/IEC 20000-2 : 2015
|
INFORMATION TECHNOLOGY - SERVICE MANAGEMENT - PART 2: GUIDANCE ON THE APPLICATION OF SERVICE MANAGEMENT SYSTEMS |
BS PD ISO/IEC TR 27019 : 2013
|
INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - INFORMATION SECURITY MANAGEMENT GUIDELINES BASED ON ISO/IEC 27002 FOR PROCESS CONTROL SYSTEMS SPECIFIC TO THE ENERGY UTILITY INDUSTRY |
ISO TR 21548 : 2010
|
HEALTH INFORMATICS - SECURITY REQUIREMENTS FOR ARCHIVING OF ELECTRONIC HEALTH RECORDS - GUIDELINES |
UNE EN 16082 : 2012
|
AIRPORT AND AVIATION SECURITY SERVICES |
15/30299325 DC : 0
|
BS ISO/IEC 27013 - INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - GUIDANCE ON THE INTEGRATED IMPLEMENTATION OF ISO/IEC 27001 AND ISO/IEC 20000-1 |
I.S. EN ISO 19011:2011
|
GUIDELINES FOR AUDITING MANAGEMENT SYSTEMS (ISO 19011:2011) |
12/30236518 DC : 0
|
BS ISO/IEC 27000 - INFORMATION SECURITY - SECURITY TECHNIQUES - INFORMATION SECURITY MANAGEMENT SYSTEMS - OVERVIEW AND VOCABULARY |
I.S. ISO/IEC 27001:2013
|
INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - INFORMATION SECURITY MANAGEMENT SYSTEMS - REQUIREMENTS |
CSA ISO/IEC 27007 : 2013
|
INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - GUIDELINES FOR INFORMATION SECURITY MANAGEMENT SYSTEMS AUDITING |
INCITS/ISO/IEC 27013 : 2014
|
INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - GUIDANCE ON THE INTEGRATED IMPLEMENTATION OF ISO/IEC 27001 AND ISO/IEC 20000-1 |
12/30250175 DC : 0
|
BS ISO/IEC 27036-2 - INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - INFORMATION SECURITY FOR SUPPLIER RELATIONSHIPS - PART 2: COMMON REQUIREMENTS |
IEC TR 80001-2-3 : 1.0
|
APPLICATION OF RISK MANAGEMENT FOR IT-NETWORKS INCORPORATING MEDICAL DEVICES - PART 2-3: GUIDANCE FOR WIRELESS NETWORKS |
ISO/IEC TR 15026-1 : 2010
|
SYSTEMS AND SOFTWARE ENGINEERING - SYSTEMS AND SOFTWARE ASSURANCE - PART 1: CONCEPTS AND VOCABULARY |
ISO/IEC 27010 : 2015
|
INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - INFORMATION SECURITY MANAGEMENT FOR INTER-SECTOR AND INTER-ORGANIZATIONAL COMMUNICATIONS |
ISO/IEC 29187-1 : 2013
|
INFORMATION TECHNOLOGY - IDENTIFICATION OF PRIVACY PROTECTION REQUIREMENTS PERTAINING TO LEARNING, EDUCATION AND TRAINING (LET) - PART 1: FRAMEWORK AND REFERENCE MODEL |
ISO/IEC 29147 : 2014
|
INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - VULNERABILITY DISCLOSURE |
ISO/IEC 27035 : 2011
|
INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - INFORMATION SECURITY INCIDENT MANAGEMENT |
ISO/IEC 27033-4 : 2014
|
INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - NETWORK SECURITY - PART 4: SECURING COMMUNICATIONS BETWEEN NETWORKS USING SECURITY GATEWAYS |
ISO/IEC 27032 : 2012(R2018)
|
INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - GUIDELINES FOR CYBERSECURITY |
ISO/IEC 27039 : 2015
|
INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - SELECTION, DEPLOYMENT AND OPERATIONS OF INTRUSION DETECTION SYSTEMS (IDPS) |
ISO TS 21547 : 2010(R2017)
|
HEALTH INFORMATICS - SECURITY REQUIREMENTS FOR ARCHIVING OF ELECTRONIC HEALTH RECORDS - PRINCIPLES |
ISO/IEC 15026-4 : 2012
|
SYSTEMS AND SOFTWARE ENGINEERING - SYSTEMS AND SOFTWARE ASSURANCE - PART 4: ASSURANCE IN THE LIFE CYCLE |
ISO/IEC TR 27019 : 2013
|
INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - INFORMATION SECURITY MANAGEMENT GUIDELINES BASED ON ISO/IEC 27002 FOR PROCESS CONTROL SYSTEMS SPECIFIC TO THE ENERGY UTILITY INDUSTRY |
IEC TS 62351-2 : 1.0
|
POWER SYSTEMS MANAGEMENT AND ASSOCIATED INFORMATION EXCHANGE - DATA AND COMMUNICATIONS SECURITY - PART 2: GLOSSARY OF TERMS |
IEC 62855 : 1ED 2016
|
NUCLEAR POWER PLANTS - ELECTRICAL POWER SYSTEMS - ELECTRICAL POWER SYSTEMS ANALYSIS |
ISO/IEC 27033-1 : 2015
|
INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - NETWORK SECURITY - PART 1: OVERVIEW AND CONCEPTS |
IEC TR 80001-2-2 : 1.0
|
APPLICATION OF RISK MANAGEMENT FOR IT-NETWORKS INCORPORATING MEDICAL DEVICES - PART 2-2: GUIDANCE FOR THE DISCLOSURE AND COMMUNICATION OF MEDICAL DEVICE SECURITY NEEDS, RISKS AND CONTROLS |
ISO/IEC 27011 : 2016
|
INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - CODE OF PRACTICE FOR INFORMATION SECURITY CONTROLS BASED ON ISO/IEC 27002 FOR TELECOMMUNICATIONS ORGANIZATIONS |
ISO/IEC 27005 : 2011
|
INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - INFORMATION SECURITY RISK MANAGEMENT |
IEC TR 80001-2-1 : 1.0
|
APPLICATION OF RISK MANAGEMENT FOR IT-NETWORKS INCORPORATING MEDICAL DEVICES - PART 2-1: STEP-BY-STEP RISK MANAGEMENT OF MEDICAL IT-NETWORKS - PRACTICAL APPLICATIONS AND EXAMPLES |
ISO 22313 : 2012
|
SOCIETAL SECURITY - BUSINESS CONTINUITY MANAGEMENT SYSTEMS - GUIDANCE |
CEN ISO/TS 14441 : 2013 COR 2014
|
HEALTH INFORMATICS - SECURITY AND PRIVACY REQUIREMENTS OF EHR SYSTEMS FOR USE IN CONFORMITY ASSESSMENT (ISO/TS 14441:2013) |
14/30249803 DC : 0
|
BS ISO/IEC 27040 - INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - STORAGE SECURITY |
UNE EN ISO 22313 : 2015
|
SOCIETAL SECURITY - BUSINESS CONTINUITY MANAGEMENT SYSTEMS - GUIDANCE (ISO 22313:2012) |
ISO/IEC 27037 : 2012(R2018)
|
INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - GUIDELINES FOR IDENTIFICATION, COLLECTION, ACQUISITION, AND PRESERVATION OF DIGITAL EVIDENCE |
ISO TS 19299 : 2015
|
ELECTRONIC FEE COLLECTION - SECURITY FRAMEWORK |
DIN EN ISO/IEC 27040 E : 2017
|
INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - STORAGE SECURITY (ISO/IEC 27040:2015) |
ISO/IEC 27013 : 2015
|
INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - GUIDANCE ON THE INTEGRATED IMPLEMENTATION OF ISO/IEC 27001 AND ISO/IEC 20000-1 |
ISO/IEEE 11073-00103 : 2015
|
HEALTH INFORMATICS - PERSONAL HEALTH DEVICE COMMUNICATION - PART 00103: OVERVIEW |
IEC 61069-5 : 2.0
|
INDUSTRIAL-PROCESS MEASUREMENT, CONTROL AND AUTOMATION - EVALUATION OF SYSTEM PROPERTIES FOR THE PURPOSE OF SYSTEM ASSESSMENT - PART 5: ASSESSMENT OF SYSTEM DEPENDABILITY |
BS ISO/IEC 27040 : 2015
|
INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - STORAGE SECURITY |
EN ISO 22313 : 2014
|
SOCIETAL SECURITY - BUSINESS CONTINUITY MANAGEMENT SYSTEMS - GUIDANCE (ISO 22313:2012) |
BS EN ISO/IEC 27040 : 2016
|
INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - STORAGE SECURITY (ISO/IEC 27040:2015) |
ISO/IEC 27040 : 2015
|
INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - STORAGE SECURITY |
ISO/IEC 20000-3 : 2012
|
INFORMATION TECHNOLOGY - SERVICE MANAGEMENT - PART 3: GUIDANCE ON SCOPE DEFINITION AND APPLICABILITY OF ISO/IEC 20000-1 |
ISO 22600-2 : 2014
|
HEALTH INFORMATICS - PRIVILEGE MANAGEMENT AND ACCESS CONTROL - PART 2: FORMAL MODELS |
ISO TS 14441 : 2013(R2017)
|
HEALTH INFORMATICS - SECURITY AND PRIVACY REQUIREMENTS OF EHR SYSTEMS FOR USE IN CONFORMITY ASSESSMENT |
UNI EN ISO 22313 : 2015
|
SOCIETAL SECURITY - BUSINESS CONTINUITY MANAGEMENT SYSTEMS - GUIDANCE |
UNE EN ISO 22313 : 2015
|
SOCIETAL SECURITY - BUSINESS CONTINUITY MANAGEMENT SYSTEMS - GUIDANCE (ISO 22313:2012) |
ISO/IEC 20000-2 : 2012
|
INFORMATION TECHNOLOGY - SERVICE MANAGEMENT - PART 2: GUIDANCE ON THE APPLICATION OF SERVICE MANAGEMENT SYSTEMS |
IEC TR 63084 : 1ED 2017
|
NUCLEAR POWER PLANTS - INSTRUMENTATION AND CONTROL IMPORTANT TO SAFETY - PLATFORM QUALIFACTION FOR SYSTEMS IMPORTANT TO SAFETY |
ISO/IEC 27001 : 2013
|
INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - INFORMATION SECURITY MANAGEMENT SYSTEMS - REQUIREMENTS |
ISO/IEC TR 20000-5:2013
|
INFORMATION TECHNOLOGY - SERVICE MANAGEMENT - PART 5: EXEMPLAR IMPLEMENTATION PLAN FOR ISO/IEC 20000-1 |
EN ISO/IEC 27000 : 2017
|
INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - INFORMATION SECURITY MANAGEMENT SYSTEMS - OVERVIEW AND VOCABULARY (ISO/IEC 27000:2016) |
CSA ISO/IEC 27031 : 2013
|
INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - GUIDELINES FOR INFORMATION AND COMMUNICATION TECHNOLOGY READINESS FOR BUSINESS CONTINUITY |