12/30236518 DC : 0
|
BS ISO/IEC 27000 - INFORMATION SECURITY - SECURITY TECHNIQUES - INFORMATION SECURITY MANAGEMENT SYSTEMS - OVERVIEW AND VOCABULARY |
UNE-ISO 37001:2017
|
Anti-bribery management systems. Requirements with guidance for use. |
07/30117272 DC : 0
|
BS ISO/IEC 27005 - INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - INFORMATION SECURITY RISK MANAGEMENT |
BS ISO/IEC 29134:2017
|
Information technology. Security techniques. Guidelines for privacy impact assessment |
15/30322573 DC : 0
|
BS ISO/IEC 33071 - INFORMATION TECHNOLOGY - PROCESS ASSESSMENT - AN INTEGRATED PROCESS CAPABILITY ASSESSMENT MODEL FOR ENTERPRISE PROCESSES |
PD CEN/TS 16850:2015
|
Societal and Citizen Security. Guidance for managing security in healthcare facilities |
CEI EN 61587-6 : 1ED 2017
|
MECHANICAL STRUCTURES FOR ELECTRICAL AND ELECTRONIC EQUIPMENT - TESTS FOR IEC 60917 AND IEC 60297 SERIES - PART 6: SECURITY ASPECTS FOR INDOOR CABINETS |
ISO/IEC 18598:2016
|
Information technology Automated infrastructure management (AIM) systems Requirements, data exchange and applications |
05/30040757 DC : DRAFT JUN 2005
|
ISO/IEC 18028 - INFORMATION TECHNOLOGY - IT NETWORK SECURITY - PART 1: NETWORK SECURITY MANAGEMENT |
18/30361485 DC : 0
|
BS ISO/IEC 19896-3 - INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - COMPETENCE REQUIREMENTS FOR INFORMATION SECURITY TESTERS AND EVALUATORS - PART 3: KNOWLEDGE, SKILLS AND EFFECTIVENESS REQUIREMENTS FOR ISO/IEC 15408 EVALUATORS |
18/30346433 DC : 0
|
BS ISO/IEC 19086-4 - INFORMATION TECHNOLOGY - CLOUD COMPUTING SERVICE LEVEL AGREEMENT (SLA) FRAMEWORK - PART 4: SECURITY AND PRIVACY |
DD ISO/TS 21547:2010
|
HEALTH INFORMATICS - SECURITY REQUIREMENTS FOR ARCHIVING OF ELECTRONIC HEALTH RECORDS - PRINCIPLES |
PD ISO/TR 12859:2009
|
INTELLIGENT TRANSPORT SYSTEMS - SYSTEM ARCHITECTURE - PRIVACY ASPECTS IN ITS STANDARDS AND SYSTEMS |
12/30232747 DC : DRAFT JAN 2013
|
BS ISO/IEC 29182-4 - INFORMATION TECHNOLOGY-SENSOR NETWORKS: SENSOR NETWORK REFERENCE ARCHITECTURE (SNRA) - PART 4: ENTITY MODELS |
15/30268877 DC : 0
|
BS ISO/IEC 27035-2 - INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - INFORMATION SECURITY INCIDENT MANAGEMENT - PART 2: GUIDELINES TO PLAN AND PREPARE FOR INCIDENT RESPONSE |
15/30299331 DC : 0
|
BS ISO/IEC 27011 - INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - CODE OF PRACTICE FOR INFORMATION SECURITY CONTROLS BASED ON ISO/IEC 27002 FOR TELECOMMUNICATIONS ORGANIZATIONS |
15/30285726 DC : 0
|
BS ISO/IEC 27009 - INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - SECTOR-SPECIFIC APPLICATION OF ISO/IEC 27001 - REQUIREMENTS |
INCITS/ISO/IEC 30111 : 2014
|
INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - VULNERABILITY HANDLING PROCESSES |
15/30319488 DC : 0
|
BS ISO/IEC 27000 - INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - INFORMATION SECURITY MANAGEMENT SYSTEMS - OVERVIEW AND VOCABULARY |
CSA ISO/IEC 19770-1 :2013
|
INFORMATION TECHNOLOGY - SOFTWARE ASSET MANAGEMENT - PART 1: PROCESSES AND TIERED ASSESSMENT OF CONFORMANCE |
BS ISO/IEC 19086-1:2016
|
INFORMATION TECHNOLOGY - CLOUD COMPUTING - SERVICE LEVEL AGREEMENT (SLA) FRAMEWORK - PART 1: OVERVIEW AND CONCEPTS |
09/30140724 DC : 0
|
BS ISO 26000 - GUIDANCE ON SOCIAL RESPONSIBILITY |
SWIFT 10:2012
|
ADOPTING THE CLOUD - DECISION SUPPORT FOR CLOUD COMPUTING |
BS ISO/IEC 20000-2:2012
|
INFORMATION TECHNOLOGY - SERVICE MANAGEMENT - PART 2: GUIDANCE ON THE APPLICATION OF SERVICE MANAGEMENT SYSTEMS |
ISO 15489-1:2016
|
Information and documentation Records management Part 1: Concepts and principles |
PD ISO/IEC TR 20000-5:2013 (published 2013-11)
|
Information technology. Service management Exemplar implementation plan for ISO/IEC 20000-1 |
BS EN 50436-6:2015
|
ALCOHOL INTERLOCKS - TEST METHODS AND PERFORMANCE REQUIREMENTS - PART 6: DATA SECURITY |
CAN/CSA-IEC 62443-2-1:17
|
Industrial communication networks — Network and system security — Part 2-1: Establishing an industrial automation and control system security program (Adopted IEC 62443-2-1:2010, first edition, 2010-11) | Réseaux industriels de communication — Sécurité dans les réseaux et les systèmes — Partie 2-1 : Établissement d’un programme de sécurité pour les systèmes d’automatisation et de commande industrielles (norme IEC 62443-2-1:2010 adoptée, première édition, 2010-11) |
BS TICKIT GUIDE : ISSUE 5.5
|
A GUIDE TO SOFTWARE QUALITY MANAGEMENT SYSTEM CONSTRUCTION AND CERTIFICATION TO ISO 9001:2000 |
TR 119 001 : 1.2.1
|
ELECTRONIC SIGNATURES AND INFRASTRUCTURES (ESI); THE FRAMEWORK FOR STANDARDIZATION OF SIGNATURES; DEFINITIONS AND ABBREVIATIONS |
10/30207796 DC : 0
|
BS ISO/IEC 15289 - SOFTWARE AND SYSTEMS ENGINEERING - CONTENT OF LIFE-CYCLE INFORMATION PRODUCTS |
BS ISO/IEC 27033-4:2014
|
INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - NETWORK SECURITY - PART 4: SECURING COMMUNICATIONS BETWEEN NETWORKS USING SECURITY GATEWAYS |
17/30351843 DC : 0
|
BS 10754-1 - INFORMATION TECHNOLOGY - SOFTWARE TRUSTWORTHINESS - PART 1 - GOVERNANCE AND MANAGEMENT SPECIFICATION |
BIS IS/ISO 15189 : 2012
|
MEDICAL LABORATORIES - REQUIREMENTS FOR QUALITY AND COMPETENCE |
PD ISO/IEC TR 20000-3:2009
|
INFORMATION TECHNOLOGY - SERVICE MANAGEMENT - PART 3: GUIDANCE ON SCOPE DEFINITION AND APPLICABILITY OF ISO/IEC 20000-1 |
BS ISO/IEC 33071:2016
|
Information technology. Process assessment. An integrated process capability assessment model for Enterprise processes |
17/30354834 DC : 0
|
BS EN ISO 19011 - GUIDELINES FOR AUDITING MANAGEMENT SYSTEMS |
14/30268906 DC : 0
|
BS ISO/IEC 17789 - INFORMATION TECHNOLOGY - CLOUD COMPUTING - REFERENCE ARCHITECTURE |
DIN ISO 37500:2015-08
|
GUIDANCE ON OUTSOURCING (ISO 37500:2014) |
BS ISO/IEC/IEEE 24748-4:2016
|
Systems and software engineering. Life cycle management Systems engineering planning |
14/30271159 DC : 0
|
BS ISO/IEC 24748-4 - SYSTEMS AND SOFTWARE ENGINEERING - LIFE CYCLE MANAGEMENT - PART 4: SYSTEMS ENGINEERING PLANNING |
BS ISO/IEC 27033-1:2015
|
INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - NETWORK SECURITY - PART 1: OVERVIEW AND CONCEPTS |
12/30204847 DC : 0
|
BS ISO/IEC 29147 - INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - VULNERABILITY DISCLOSURE |
DIN EN 15224:2016-04 (Draft)
|
QUALITY MANAGEMENT SYSTEMS - EN ISO 9001:2015 FOR HEALTHCARE |
PD ISO/IEC TR 90006:2013
|
INFORMATION TECHNOLOGY - GUIDELINES FOR THE APPLICATION OF ISO 9001:2008 TO IT SERVICE MANAGEMENT AND ITS INTEGRATION WITH ISO/IEC 20000-1:2011 |
ISO/IEC TR 27008:2011
|
Information technology Security techniques Guidelines for auditors on information security controls |
CAN/CSA-ISO/IEC 27034-1:12 (R2017)
|
Information technology - Security techniques - Application security - Part 1: Overview and concepts (Adopted ISO/IEC 27034-1:2011, first edition, 2011-11-15) |
15/30266416 DC : 0
|
BS ISO/IEC 27006 - INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - REQUIREMENTS FOR BODIES PROVIDING AUDIT AND CERTIFICATION OF INFORMATION SECURITY MANAGEMENT SYSTEMS |
FD Z42 017 : 2009 FD
|
ELECTRONIC IMAGING - SCANNING OF OFFICE DOCUMENTS - SUBCONTRACTING OF SCANNING - GUIDE TO DETAILED TECHNICAL INSTRUCTIONS FOR SERVICES BUREAU |
I.S. EN 61587-6:2017
|
MECHANICAL STRUCTURES FOR ELECTRICAL AND ELECTRONIC EQUIPMENT - TESTS FOR IEC 60917 AND IEC 60297 SERIES - PART 6: SECURITY ASPECTS FOR INDOOR CABINETS |
12/30204795 DC : 0
|
BS ISO/IEC 19790 - INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - SECURITY REQUIREMENTS FOR CRYPTOGRAPHIC MODULES |
BS ISO/IEC 15408-1:2009
|
Information technology. Security techniques. Evaluation criteria for IT security Introduction and general model |
BS EN ISO/IEC 27037:2016
|
INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - GUIDELINES FOR IDENTIFICATION, COLLECTION, ACQUISITION AND PRESERVATION OF DIGITAL EVIDENCE (ISO/IEC 27037:2012) |
INCITS/ISO/IEC 27040 : 2017
|
INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - STORAGE SECURITY |
ISO/IEC/IEEE 15289:2017
|
Systems and software engineering Content of life-cycle information items (documentation) |
17/30354844 DC : 0
|
BS ISO 55002 - ASSET MANAGEMENT - MANAGEMENT SYSTEMS - GUIDELINES FOR THE APPLICATION OF ISO 55001 |
DD IEC/PAS 62443-3:2008
|
Security for industrial process measurement and control Network and system security |
BS ISO/IEC 15026-4:2012
|
SYSTEMS AND SOFTWARE ENGINEERING - SYSTEMS AND SOFTWARE ASSURANCE - PART 4: ASSURANCE IN THE LIFE CYCLE |
12/30249455 DC : 0
|
BS ISO/IEC 27036-1 - INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - INFORMATION SECURITY FOR SUPPLIER RELATIONSHIPS - PART 1: OVERVIEW AND CONCEPTS |
INCITS/ISO/IEC 27011 : 2009(R2014)
|
INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - INFORMATION SECURITY MANAGEMENT GUIDELINES FOR TELECOMMUNICATIONS ORGANIZATIONS BASED ON ISO/IEC 27002 |
CAN/CSA-ISO/IEC 27033-1:16
|
Information technology - Security techniques - Network security - Part 1: Overview and concepts (Adopted ISO/IEC 27033-1:2015, second edition, 2015-08-15) |
INCITS/ISO/IEC 29182-4 : 2014
|
INFORMATION TECHNOLOGY - SENSOR NETWORKS: SENSOR NETWORK REFERENCE ARCHITECTURE (SNRA) - PART 4: ENTITY MODELS |
CSA TELECOM ORGANIZATIONS PACKAGE : 2018
|
CONSISTS OF CAN/CSA-ISO/IEC 27000:18 - INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - INFORMATION SECURITY MANAGEMENT SYSTEMS - OVERVIEW AND VOCABULARY; CAN/CSA-ISO/IEC 27001:14, INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - INFORMATION SECURITY MANAGEMENT SYSTEMS - REQUIREMENTS; CAN/CSA-ISO/IEC 27002:15 - INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - CODE OF PRACTICE FOR |
CSA ISO/IEC 27034-1:2012
|
INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - APPLICATION SECURITY - PART 1: OVERVIEW AND CONCEPTS |
PD ISO/TR 18638:2017
|
HEALTH INFORMATICS - GUIDANCE ON HEALTH INFORMATION PRIVACY EDUCATION IN HEALTHCARE ORGANIZATIONS |
PD ISO/IEC TR 15443-1:2012
|
Information technology. Security techniques. Security assurance framework Introduction and concepts |
ISO/IEC 27031:2011
|
Information technology Security techniques Guidelines for information and communication technology readiness for business continuity |
CSA ISO/IEC 20000-1 :2013
|
INFORMATION TECHNOLOGY - SERVICE MANAGEMENT - PART 1: SERVICE MANAGEMENT SYSTEM REQUIREMENTS |
BS EN ISO 19011:2011
|
GUIDELINES FOR AUDITING MANAGEMENT SYSTEMS (ISO 19011:2011) |
CSA ISO/IEC 27035 : 2013
|
INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - INFORMATION SECURITY INCIDENT MANAGEMENT |
IEEE 20000-2:2013
|
INFORMATION TECHNOLOGY - SERVICE MANAGEMENT - PART 2: GUIDANCE ON THE APPLICATION OF SERVICE MANAGEMENT SYSTEMS |
CSA ISO/IEC 27035 : 2013 : R2017
|
INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - INFORMATION SECURITY INCIDENT MANAGEMENT |
S.R. CEN ISO/TS 14441:2013
|
HEALTH INFORMATICS - SECURITY AND PRIVACY REQUIREMENTS OF EHR SYSTEMS FOR USE IN CONFORMITY ASSESSMENT (ISO/TS 14441:2013) |
CSA ISO/IEC 24762: 2008
|
INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - GUIDELINES FOR INFORMATION AND COMMUNICATIONS TECHNOLOGY DISASTER RECOVERY SERVICES |
DIN EN ISO 22301 E : 2014
|
SOCIETAL SECURITY - BUSINESS CONTINUITY MANAGEMENT SYSTEMS - REQUIREMENTS (ISO 22301:2012) |
ISO/IEC 27004:2016
|
Information technology — Security techniques — Information security management — Monitoring, measurement, analysis and evaluation |
CSA ISO/IEC TR 27008 : 2013 : R2017
|
INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - GUIDELINES FOR AUDITORS ON INFORMATION SECURITY CONTROLS |
ISO/IEC 27009:2016
|
Information technology Security techniques Sector-specific application of ISO/IEC 27001 Requirements |
UNE-ISO/IEC 20000-1:2011
|
Information technology. Service management. Part 1: Service Management System requirements |
ISO/IEC 24762:2008
|
Information technology Security techniques Guidelines for information and communications technology disaster recovery services |
CAN/CSA-ISO/IEC/IEEE 24748-4:18
|
Systems and software engineering ? Life cycle management ? Part 4: Systems engineering planning (Adopted ISO/IEC/IEEE 24748-4:2016, first edition, 2016-05-15) |
ISO/IEC TR 15443-3:2007
|
Information technology Security techniques A framework for IT security assurance Part 3: Analysis of assurance methods |
AAMI/IEC TIR80001-2-8:2016
|
APPLICATION OF RISK MANAGEMENT FOR IT NETWORKS INCORPORATING MEDICAL DEVICES - PART 2-8: APPLICATION GUIDANCE - GUIDANCE ON STANDARDS FOR ESTABLISHING THE SECURITY CAPABILITIES IDENTIFIED IN IEC 80001-2-2 |
ISO/IEC 27018:2014
|
Information technology Security techniques Code of practice for protection of personally identifiable information (PII) in public clouds acting as PII processors |
S.R. CEN/TR 16742:2014
|
INTELLIGENT TRANSPORT SYSTEMS - PRIVACY ASPECTS IN ITS STANDARDS AND SYSTEMS IN EUROPE |
PD ISO/IEC/TR 15026-1:2010
|
Systems and software engineering. Systems and software assurance Concepts and vocabulary |
I.S. EN 50436-6:2015
|
ALCOHOL INTERLOCKS - TEST METHODS AND PERFORMANCE REQUIREMENTS - PART 6: DATA SECURITY |
INCITS/ISO/IEC 27006 : 2012
|
INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - REQUIREMENTS FOR BODIES PROVIDING AUDIT AND CERTIFICATION OF INFORMATION SECURITY MANAGEMENT SYSTEMS |
I.S. EN ISO 18295-1:2017
|
CUSTOMER CONTACT CENTRES - PART 1: REQUIREMENTS FOR CUSTOMER CONTACT CENTRES (ISO 18295-1:2017) |
ISO/IEC TR 27023:2015
|
Information technology — Security techniques — Mapping the revised editions of ISO/IEC 27001 and ISO/IEC 27002 |
AAMI/IEC TIR80001-2-3:2012
|
APPLICATION OF RISK MANAGEMENT FOR IT-NETWORKS INCORPORATING MEDICAL DEVICES - PART 2-3: GUIDANCE FOR WIRELESS NETWORKS |
DIN EN ISO/IEC 27040:2016-04 (Draft)
|
INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - STORAGE SECURITY (ISO/IEC 27040:2015) |
UNE-EN ISO 18295-1:2018
|
Customer contact centres - Part 1: Requirements for customer contact centres (ISO 18295-1:2017) |
ISO 9241-960:2017
|
Ergonomics of human-system interaction — Part 960: Framework and guidance for gesture interactions |
ISO 10789:2011
|
Space systems Programme management Information and documentation management |
UNE-EN 15224:2017
|
Quality management systems - EN ISO 9001:2015 for healthcare |
EN IEC 62443-4-1:2018
|
Security for industrial automation and control systems - Part 4-1: Secure product development lifecycle requirements |
I.S. EN ISO 27799:2016
|
HEALTH INFORMATICS - INFORMATION SECURITY MANAGEMENT IN HEALTH USING ISO/IEC 27002 |
CEN/TS 17159:2018
|
Societal and citizen security - Guidance for the security of hazardous materials (CBRNE) in healthcare facilities |
ISO/IEC TS 33072:2016
|
Information technology — Process assessment — Process capability assessment model for information security management |
UNE-ISO 14641-1:2015
|
Electronic archiving. Part 1: Specifications concerning the design and the operation of an information system for electronic information preservation. |
TR 102 764 : 1.1.1
|
EHEALTH; ARCHITECTURE; ANALYSIS OF USER SERVICE MODELS, TECHNOLOGIES AND APPLICATIONS SUPPORTING EHEALTH |
ISO/IEC 27000:2018
|
Information technology — Security techniques — Information security management systems — Overview and vocabulary |
14/30249803 DC : 0
|
BS ISO/IEC 27040 - INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - STORAGE SECURITY |
ISO/IEC 27002:2013
|
Information technology Security techniques Code of practice for information security controls |
UNE-ISO 37500:2016
|
Guidance on outsourcing |
IEC 61069-5:2016
|
Industrial-process measurement, control and automation - Evaluation of system properties for the purpose of system assessment - Part 5: Assessment of system dependability |
UNE-ISO 22301:2013
|
Societal security. Business continuity management systems. Requirements |
I.S. EN ISO 15189:2012
|
MEDICAL LABORATORIES - REQUIREMENTS FOR QUALITY AND COMPETENCE (ISO 15189:2012, CORRECTED VERSION 2014-08-15) |
CEN/TS 15480-4:2012
|
Identification card systems - European Citizen Card - Part 4: Recommendations for European Citizen Card issuance, operation and use |
CEN ISO/TS 19299 : 2015
|
ELECTRONIC FEE COLLECTION - SECURITY FRAMEWORK (ISO/TS 19299:2015) |
EN 15224:2016
|
Quality management systems - EN ISO 9001:2015 for healthcare |
CEN/TS 16850:2015
|
Societal and Citizen Security - Guidance for managing security in healthcare facilities |
EN 50436-6:2015
|
Alcohol interlocks - Test methods and performance requirements - Part 6: Data security |
DIN ISO/IEC 17789:2017-07
|
INFORMATION TECHNOLOGY - CLOUD COMPUTING - REFERENCE ARCHITECTURE (ISO/IEC 17789:2014) |
EN 50136-1-5:2008
|
Alarm systems - Alarm transmission systems and equipment - Part 1-5: Requirements for Packet Switched Network PSN |
TR 102 780 : 1.1.1
|
METHODS FOR TESTING AND SPECIFICATION (MTS); SECURITY; GUIDE TO THE USE OF METHODS IN DEVELOPMENT OF ETSI SECURITY STANDARDS |
PD ISO/IEC TR 27019:2013
|
Information technology. Security techniques. Information security management guidelines based on ISO/IEC 27002 for process control systems specific to the energy utility industry |
15/30299325 DC : 0
|
BS ISO/IEC 27013 - INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - GUIDANCE ON THE INTEGRATED IMPLEMENTATION OF ISO/IEC 27001 AND ISO/IEC 20000-1 |
TS 102 640-6-1 : 1.1.1
|
ELECTRONIC SIGNATURES AND INFRASTRUCTURES (ESI); REGISTERED ELECTRONIC MAIL (REM); PART 6: INTEROPERABILITY PROFILES; SUB-PART 1: REM-MD UPU PREM INTEROPERABILITY PROFILE |
TR 101 564 : 1.1.1
|
ELECTRONIC SIGNATURES AND INFRASTRUCTURES (ESI); GUIDANCE ON ETSI TS 102 042 FOR ISSUING EXTENDED VALIDATION CERTIFICATES FOR AUDITORS AND CSPS |
INCITS/ISO/IEC 27037 : 2014
|
INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - GUIDELINES FOR IDENTIFICATION, COLLECTION, ACQUISITION AND PRESERVATION OF DIGITAL EVIDENCE |
BS EN 15224:2016
|
Quality management systems. EN ISO 9001:2015 for healthcare |
CSA ISO/IEC 27018 : 2015
|
INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - CODE OF PRACTICE FOR PROTECTION OF PERSONALLY IDENTIFIABLE INFORMATION (PII) IN PUBLIC CLOUDS ACTING AS PII PROCESSORS |
BS ISO/IEC 27034-2:2015
|
INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - APPLICATION SECURITY - PART 2: ORGANIZATION NORMATIVE FRAMEWORK |
10/30184538 DC : 0
|
BS ISO/IEC 20000-2 - INFORMATION TECHNOLOGY - SERVICE MANAGEMENT - PART 2: GUIDANCE ON THE APPLICATION OF SERVICE MANAGEMENT SYSTEMS |
BS ISO/IEC 27035 : 2011
|
INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - INFORMATION SECURITY INCIDENT MANAGEMENT |
BS ISO 19153:2014
|
Geospatial Digital Rights Management Reference Model (GeoDRM RM) |
ISO/IEC TR 27103:2018
|
Information technology — Security techniques — Cybersecurity and ISO and IEC Standards |
INCITS/ISO/IEC 29115 : 2014
|
INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - ENTITY AUTHENTICATION ASSURANCE FRAMEWORK |
15/30279952 DC : 0
|
BS ISO/IEC 30124 - CODE OF PRACTICE FOR THE IMPLEMENTATION OF A BIOMETRIC SYSTEM |
DIN ISO 37500 E : 2015
|
GUIDANCE ON OUTSOURCING (ISO 37500:2014) |
16/30286013 DC : 0
|
BS ISO/IEC 27003 - INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - INFORMATION SECURITY MANAGEMENT SYSTEM - GUIDANCE |
BS ISO 14641-1:2012
|
ELECTRONIC ARCHIVING - PART 1: SPECIFICATIONS CONCERNING THE DESIGN AND THE OPERATION OF AN INFORMATION SYSTEM FOR ELECTRONIC INFORMATION PRESERVATION |
ISO/IEC 15026-1:2013
|
Systems and software engineering Systems and software assurance Part 1: Concepts and vocabulary |
ISO/IEC TR 20000-11:2015
|
Information technology Service management Part 11: Guidance on the relationship between ISO/IEC 20000-1:2011 and service management frameworks: ITIL |
BS EN ISO 21091:2013
|
HEALTH INFORMATICS - DIRECTORY SERVICES FOR HEALTHCARE PROVIDERS, SUBJECTS OF CARE AND OTHER ENTITIES |
DIN ISO 26000:2011-01
|
Guidance on social responsibility (ISO 26000:2010) |
TS 102 573 : 2.1.1
|
ELECTRONIC SIGNATURES AND INFRASTRUCTURES (ESI); POLICY REQUIREMENTS FOR TRUST SERVICE PROVIDERS SIGNING AND/OR STORING DATA OBJECTS |
PD ISO/TR 27809:2007
|
Health informatics. Measures for ensuring patient safety of health software |
PD ISO/IEC TR 27008:2011
|
INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - GUIDELINES FOR AUDITORS ON INFORMATION SECURITY CONTROLS |
BIS IS/ISO/IEC 27005 : 2008
|
INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - INFORMATION SECURITY RISK MANAGEMENT |
TS 102 640-2 : 2.2.1
|
ELECTRONIC SIGNATURES AND INFRASTRUCTURES (ESI); REGISTERED ELECTRONIC MAIL (REM); PART 2: DATA REQUIREMENTS, FORMATS AND SIGNATURES FOR REM |
BS ISO/IEC 27043 : 2015
|
INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - INCIDENT INVESTIGATION PRINCIPLES AND PROCESSES |
BS ISO 15489-1:2016
|
INFORMATION AND DOCUMENTATION - RECORDS MANAGEMENT - PART 1: CONCEPTS AND PRINCIPLES |
BIP 0106 : 2008
|
IMPLEMENTING INFORMATION SECURITY BASED ON ISO 27001/ISO 17799: A MANAGEMENT GUIDE |
11/30189374 DC : 0
|
BS ISO 19153 - GEOSPATIAL DIGITAL RIGHTS MANAGEMENT REFERENCE MODEL (GEODRM RM) |
11/30204593 DC : DRAFT MAY 2011
|
BS ISO/IEC 27010 - INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - INFORMATION SECURITY MANAGEMENT FOR INTER-SECTOR AND INTER-ORGANIZATIONAL COMMUNICATIONS |
11/30168516 DC : 0
|
BS ISO/IEC 27032 - INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - GUIDELINES FOR CYBERSECURITY |
BS ISO 22301 : 2012
|
SOCIETAL SECURITY - BUSINESS CONTINUITY MANAGEMENT SYSTEMS - REQUIREMENTS |
BS ISO/IEC 29115:2013
|
INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - ENTITY AUTHENTICATION ASSURANCE FRAMEWORK |
PD IEC/TR 62351-10:2012
|
Power systems management and associated information exchange. Data and communications security Security architecture guidelines |
BS ISO/IEC 24762:2008
|
INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - GUIDELINES FOR INFORMATION AND COMMUNICATIONS TECHNOLOGY DISASTER RECOVERY SERVICES |
DIN ISO/IEC 27000:2015-12 (Draft)
|
INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - INFORMATION SECURITY MANAGEMENT SYSTEMS - OVERVIEW AND VOCABULARY |
BS ISO/IEC 27036-1:2014
|
INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - INFORMATION SECURITY FOR SUPPLIER RELATIONSHIPS - PART 1: OVERVIEW AND CONCEPTS |
I.S. EN 50667:2016
|
INFORMATION TECHNOLOGY - AUTOMATED INFRASTRUCTURE MANAGEMENT (AIM) SYSTEMS - REQUIREMENTS, DATA EXCHANGE AND APPLICATIONS |
CSA ISO/IEC 27002 : 2015
|
INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - CODE OF PRACTICE FOR INFORMATION SECURITY CONTROLS |
PD ISO/IEC TR 27023:2015
|
Information technology. Security techniques. Mapping the revised editions of ISO/IEC 27001 and ISO/IEC 27002 |
BS ISO/IEC 17789:2014
|
Information technology. Cloud computing. Reference architecture |
BS EN 50667:2016
|
Information technology. Automated infrastructure management (AIM) systems. Requirements, data exchange and applications |
BS ISO/IEC/IEEE 15289:2011
|
SYSTEMS AND SOFTWARE ENGINEERING - CONTENT OF LIFE-CYCLE INFORMATION ITEMS (DOCUMENTATION) |
BS ISO/IEC/IEEE 23026:2015
|
Systems and software engineering. Engineering and management of websites for systems, software, and services information |
08/30133461 DC : 0
|
ISO/IEC 27003 - INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - INFORMATION SECURITY MANAGEMENT SYSTEM IMPLEMENTATION GUIDANCE |
CAN/CSA-ISO/IEC 27013:16
|
Information technology - Security techniques - Guidance on the integrated implementation of ISO/IEC 27001 and ISO/IEC 20000-1 (Adopted ISO/IEC 27013:2015, second edition, 2015-12-01) |
BS ISO/IEC 27003:2017
|
Information technology. Security techniques. Information security management systems. Guidance |
CAN/CSA-ISO/IEC 27034-2:16
|
Information technology Security techniques Application security Part 2: Organization normative framework (Adopted ISO/IEC 27034-2:2015, first edition, 2015-08-15) |
CSA ISO 26000 : 2016
|
GUIDANCE ON SOCIAL RESPONSIBILITY |
TR 101 533-2 : 1.3.1
|
ELECTRONIC SIGNATURES AND INFRASTRUCTURES (ESI); DATA PRESERVATION SYSTEMS SECURITY; PART 2: GUIDELINES FOR ASSESSORS |
17/30331337 DC : 0
|
BS ISO 19475-1 - DOCUMENT MANAGEMENT APPLICATIONS - MINIMUM REQUIREMENTS FOR THE STORAGE OF DOCUMENTS - PART 1: CAPTURE |
PD ISO/TR 21548:2010
|
Health informatics. Security requirements for archiving of electronic health records. Guidelines |
17/30355373 DC : 0
|
BS ISO/IEC 27019 - INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - INFORMATION SECURITY CONTROLS FOR THE ENERGY UTILITY INDUSTRY |
13/30277648 DC : 0
|
BS EN 50436-6 - ALCOHOL INTERLOCKS - TEST METHODS AND PERFORMANCE REQUIREMENTS - PART 6: DATA SECURITY |
BS ISO/IEC 27000 : 2016
|
INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - INFORMATION SECURITY MANAGEMENT SYSTEMS - OVERVIEW AND VOCABULARY |
DIN EN ISO 22301:2014-12
|
SOCIETAL SECURITY - BUSINESS CONTINUITY MANAGEMENT SYSTEMS - REQUIREMENTS (ISO 22301:2012) |
BS EN 61069-5:2016
|
Industrial-process measurement, control and automation. Evaluation of system properties for the purpose of system assessment Assessment of system dependability |
BS ISO/IEC 19790:2012
|
Information technology. Security techniques. Security requirements for cryptographic modules |
BS ISO/IEC 29151:2017
|
Information technology. Security techniques. Code of practice for personally identifiable information protection |
12/30192106 DC : 0
|
BS ISO/IEC 27033-4 - INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - IT NETWORK SECURITY - PART 4: SECURING COMMUNICATIONS BETWEEN NETWORKS USING SECURITY GATEWAYS |
BS ISO/IEC 27035-2:2016
|
Information technology. Security techniques. Information security incident management Guidelines to plan and prepare for incident response |
ISO/TR 27809:2007
|
Health informatics Measures for ensuring patient safety of health software |
TS 102 844 : 1.2.1
|
USER GROUP; QUALITY OF TELECOM SERVICES; CONFORMITY ASSESSMENT; REQUIREMENTS FOR BODIES PROVIDING QOS ASSESSMENTS AND SURVEYS |
TS 102 640-4 : 2.1.2
|
ELECTRONIC SIGNATURES AND INFRASTRUCTURES (ESI); REGISTERED ELECTRONIC MAIL (REM) PART 4: REM-MD CONFORMANCE PROFILES |
BS ISO/IEC 20000-6:2017
|
Information technology. Service management Requirements for bodies providing audit and certification of service management systems |
UNE-ISO/IEC 27002:2015
|
Information technology -- Security techniques -- Code of practice for information security controls |
BS EN 50136-1-5:2008
|
ALARM SYSTEMS - ALARM TRANSMISSION SYSTEMS AND EQUIPMENT - PART 1-5: REQUIREMENTS FOR PACKET SWITCHED NETWORK PSN |
I.S. EN ISO 22301:2014
|
SOCIETAL SECURITY - BUSINESS CONTINUITY MANAGEMENT SYSTEMS - REQUIREMENTS |
BS ISO/IEC 27035-1:2016
|
Information technology. Security techniques. Information security incident management Principles of incident management |
CSA ISO/IEC 15408-1 : 2010
|
INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - EVALUATION CRITERIA FOR IT SECURITY - PART 1: INTRODUCTION AND GENERAL MODEL |
ISO/TR 11633-2:2009
|
Health informatics Information security management for remote maintenance of medical devices and medical information systems Part 2: Implementation of an information security management system (ISMS) |
ISO/IEC 27021:2017
|
Information technology — Security techniques — Competence requirements for information security management systems professionals |
TS 119 101 : 1.1.1
|
ELECTRONIC SIGNATURES AND INFRASTRUCTURES (ESI); POLICY AND SECURITY REQUIREMENTS FOR APPLICATIONS FOR SIGNATURE CREATION AND SIGNATURE VALIDATION |
CSA ISO/IEC TR 27008: 2013
|
INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - GUIDELINES FOR AUDITORS ON INFORMATION SECURITY CONTROLS |
INCITS/ISO/IEC 15408-1 : 2012
|
INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - EVALUATION CRITERIA FOR IT SECURITY - PART 1: INTRODUCTION AND GENERAL MODEL |
CEI UNI EN ISO/IEC 27040 : 1ED 2017
|
INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - STORAGE SECURITY |
CSA ISO/IEC 20000-1 : 2013 : R2017
|
INFORMATION TECHNOLOGY - SERVICE MANAGEMENT - PART 1: SERVICE MANAGEMENT SYSTEM REQUIREMENTS |
I.S. EN 61511-1:2017
|
FUNCTIONAL SAFETY - SAFETY INSTRUMENTED SYSTEMS FOR THE PROCESS INDUSTRY SECTOR - NORMATIVE (UON) - PART 1: FRAMEWORK, DEFINITIONS, SYSTEM, HARDWARE AND SOFTWARE REQUIREMENTS |
I.S. EN 16844:2017+A2:2019
|
Aesthetic medicine services - Non-surgical medical treatments |
CAN/CSA-C22.2 NO. 61511-1:17
|
Functional safety — Safety instrumented systems for the process industry sector — Part 1: Framework, definitions, system, hardware and application programming requirements (Adopted IEC 61511-1:2016, second edition, 2016-02, with Canadian deviations) | Sécurité fonctionnelle — Systèmes instrumentes de sécurité pour le secteur des industries de transformation — Partie 1 : Cadre, définitions, exigences pour le système, le matériel et la programmation d’application (norme IEC 61511-1:2016 adoptée, deuxième édition, 2016-02, avec exigences propres au Canada) |
TS 119 403 : 2.2.1
|
ELECTRONIC SIGNATURES AND INFRASTRUCTURES (ESI); TRUST SERVICE PROVIDER CONFORMITY ASSESSMENT - REQUIREMENTS FOR CONFORMITY ASSESSMENT BODIES ASSESSING TRUST SERVICE PROVIDERS |
TR 102 538 : 1.1.1
|
USER GROUP; LIST OF DEFINITIONS AND ABBREVIATIONS |
ISO/IEC TR 27015:2012
|
Information technology Security techniques Information security management guidelines for financial services |
CSA N286.0.1 : 2014
|
COMMENTARY ON N286-12, MANAGEMENT SYSTEM REQUIREMENTS FOR NUCLEAR FACILITIES |
TR 103 123 : 1.1.1
|
ELECTRONIC SIGNATURES AND INFRASTRUCTURES (ESI); GUIDANCE FOR AUDITORS AND CSPS ON ETSI TS 102 042 FOR ISSUING PUBLICLY-TRUSTED TLS/SSL CERTIFICATES |
CSA ISO/IEC 27005 : 2011 : R2016
|
INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - INFORMATION SECURITY RISK MANAGEMENT |
VDMA 66418 : DRAFT 2017
|
INDUSTRIAL SECURITY - GENERAL REQUIREMENTS FOR SECURITY OF MACHINES, SYSTEMS AND RELATED COMPONENTS |
ISO/TR 11633-1:2009
|
Health informatics Information security management for remote maintenance of medical devices and medical information systems Part 1: Requirements and risk analysis |
BS ISO/IEC 27002 : 2013
|
INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - CODE OF PRACTICE FOR INFORMATION SECURITY CONTROLS |
IEC 61511-1 REDLINE : 2ED 2016
|
FUNCTIONAL SAFETY - SAFETY INSTRUMENTED SYSTEMS FOR THE PROCESS INDUSTRY SECTOR - PART 1: FRAMEWORK, DEFINITIONS, SYSTEM, HARDWARE AND APPLICATION PROGRAMMING REQUIREMENTS |
ISO/TR 12859:2009
|
Intelligent transport systems System architecture Privacy aspects in ITS standards and systems |
I.S. EN ISO/IEC 27043:2016
|
INFORMATION TECHNOLOGY - SECURITY TECHNIQUES INCIDENT INVESTIGATION PRINCIPLES AND PROCESSES (ISO/IEC 27043:2015) |
I.S. ISO 26000:2010
|
GUIDANCE ON SOCIAL RESPONSIBILITY |
ABS 0252 : 2016
|
DATA INTEGRITY FOR MARINE AND OFFSHORE OPERATIONS - CYBERSAFETY[TM] VOLUME 3 |
UNE-EN ISO/IEC 27002:2017
|
Information technology - Security techniques - Code of practice for information security controls (ISO/IEC 27002:2013 including Cor 1:2014 and Cor 2:2015) |
ISO 37001:2016
|
Anti-bribery management systems — Requirements with guidance for use |
EN ISO 9241-960:2017
|
Ergonomics of human-system interaction - Part 960: Framework and guidance for gesture interactions (ISO 9241-960:2017) |
CSA ISO/IEC 18028-3 : 2006
|
INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - IT NETWORK SECURITY - PART 3: SECURING COMMUNICATIONS BETWEEN NETWORKS USING SECURITY GATEWAYS |
ISO/IEC TR 27016:2014
|
Information technology Security techniques Information security management Organizational economics |
ISO/TR 15801:2017
|
Document management — Electronically stored information — Recommendations for trustworthiness and reliability |
UNI CEN ISO/TS 14441 : 2014
|
HEALTH INFORMATICS - SECURITY AND PRIVACY REQUIREMENTS OF HER SYSTEMS FOR USE IN CONFORMITY ASSESSMENT |
CSA ISO/IEC 27005 : 2011
|
INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - INFORMATION SECURITY RISK MANAGEMENT |
TR 103 331 : 1.1.1
|
CYBER; STRUCTURED THREAT INFORMATION SHARING |
BS ISO/IEC 29147:2014
|
INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - VULNERABILITY DISCLOSURE |
BS ISO/IEC/IEEE 15289:2019
|
SYSTEMS AND SOFTWARE ENGINEERING - CONTENT OF LIFE-CYCLE INFORMATION ITEMS (DOCUMENTATION) |
CSA ISO/IEC TR 15026-1 : 2013
|
SYSTEMS AND SOFTWARE ENGINEERING - SYSTEMS AND SOFTWARE ASSURANCE - PART 1: CONCEPTS AND VOCABULARY |
UNE-ISO 30301:2011
|
Information and documentation. Management system for records. Requirements. |
BS EN ISO 22301:2014
|
SOCIETAL SECURITY - BUSINESS CONTINUITY MANAGEMENTSYSTEMS - REQUIREMENTS (ISO 22301:2012) |
UNI CEN/TS 15480-4 : 2012
|
IDENTIFICATION CARD SYSTEMS - EUROPEAN CITIZEN CARD - PART 4: RECOMMENDATIONS FOR EUROPEAN CITIZEN CARD ISSUANCE, OPERATION AND USE |
TR 187 020 : 1.1.1
|
RADIO FREQUENCY IDENTIFICATION (RFID); COORDINATED ESO RESPONSE TO PHASE 1 OF EU MANDATE M436 |
UNI EN ISO 19011 : 2012
|
GUIDELINES FOR AUDITING MANAGEMENT SYSTEMS |
CSA ISO/IEC 15026-1 : 2015
|
SYSTEMS AND SOFTWARE ENGINEERING - SYSTEMS AND SOFTWARE ASSURANCE - PART 1: CONCEPTS AND VOCABULARY |
TS 102 640-1 : 2.2.1
|
ELECTRONIC SIGNATURES AND INFRASTRUCTURES (ESI); REGISTERED ELECTRONIC MAIL (REM); PART 1: ARCHITECTURE |
I.S. EN 50136-1-5:2008
|
ALARM SYSTEMS - ALARM TRANSMISSION SYSTEMS AND EQUIPMENT - PART 1-5: REQUIREMENTS FOR PACKET SWITCHED NETWORK PSN |
ISO/IEC 27005:2011
|
Information technology Security techniques Information security risk management |
IEC TR 80001-2-1:2012
|
Application of risk management for IT-networks incorporating medical devices - Part 2-1: Step by step risk management of medical IT-networks - Practical applications and examples |
EN ISO 9000:2015
|
Quality management systems - Fundamentals and vocabulary (ISO 9000:2015) |
ISO/IEC 27013:2015
|
Information technology Security techniques Guidance on the integrated implementation of ISO/IEC 27001 and ISO/IEC 20000-1 |
ISO 9000:2015
|
Quality management systems Fundamentals and vocabulary |
ISO/IEC 27043:2015
|
Information technology Security techniques Incident investigation principles and processes |
UNE-EN ISO 9000:2015
|
Quality management systems - Fundamentals and vocabulary (ISO 9000:2015) |
IEC 61511-1:2016 RLV
|
Functional safety - Safety instrumented systems for the process industry sector - Part 1: Framework, definitions, system, hardware and application programming requirements |
VDI/VDE 2657 Blatt 1:2013-01
|
MIDDLEWARE IN INDUSTRIAL AUTOMATION - FUNDAMENTALS |
NEMA CPSP 1 : 2015
|
SUPPLY CHAIN BEST PRACTICES |
VDI/VDE 2182 Blatt 1:2011-01
|
IT-security for industrial automation - General model |
UNE-ISO/IEC 20000-2:2015
|
Information technology. Service management. Part 2: Guidance on the application of service management systems |
CSA ISO/IEC 27007 : 2013 : R2017
|
INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - GUIDELINES FOR INFORMATION SECURITY MANAGEMENT SYSTEMS AUDITING |
ISO/IEC 27003:2017
|
Information technology — Security techniques — Information security management systems — Guidance |
INCITS/ISO/IEC 24762 : 2009(R2014)
|
INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - GUIDELINES FOR INFORMATION AND COMMUNICATIONS TECHNOLOGY DISASTER RECOVERY SERVICES |
GS NFV-SEC 006 : 1.1.1
|
NETWORK FUNCTIONS VIRTUALISATION (NFV); SECURITY GUIDE; REPORT ON SECURITY ASPECTS AND REGULATORY CONCERNS |
DIN EN ISO 18295-1 E : 2017
|
CUSTOMER CONTACT CENTRES - PART 1: REQUIREMENTS FOR CUSTOMER CONTACT CENTRES (ISO 18295-1:2017) |
PD ISO/IEC TR 15443-3:2007
|
Information technology. Security techniques. A framework for IT security assurance Analysis of assurance methods |
CEI EN 61069-5 : 1996
|
INDUSTRIAL-PROCESS MEASUREMENT, CONTROL AND AUTOMATION - EVALUATION OF SYSTEM PROPERTIES FOR THE PURPOSE OF SYSTEM ASSESSMENT - PART 5: ASSESSMENT OF SYSTEM DEPENDABILITY |
CSA ISO/IEC 19770-1 : 2013 : R2017
|
INFORMATION TECHNOLOGY - SOFTWARE ASSET MANAGEMENT - PART 1: PROCESSES AND TIERED ASSESSMENT OF CONFORMANCE |
BS ISO 30301:2011
|
INFORMATION AND DOCUMENTATION - MANAGEMENT SYSTEMS FOR RECORDS - REQUIREMENTS |
PD ISO/IEC TR 20000-12:2016
|
Information technology. Service management Guidance on the relationship between ISO/IEC 20000-1:2011 and service management frameworks: CMMI-SVC® |
BS PAS 7000(2014) : 2014
|
SUPPLY CHAIN RISK MANAGEMENT - SUPPLIER PREQUALIFICATION |
BS ISO 18788:2015
|
Management system for private security operations. Requirements with guidance for use |
16/30331802 DC : 0
|
BS EN 62887 ED 1.0 - NUCLEAR POWER PLANTS - INSTRUMENTATION SYSTEMS IMPORTANT TO SAFETY - PRESSURE TRANSMITTERS: CHARACTERISTICS AND TEST METHODS |
DIN EN ISO/IEC 27002 E : 2017
|
INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - CODE OF PRACTICE FOR INFORMATION SECURITY CONTROLS (ISO/IEC 27002:2013 INCLUDING COR 1:2014 AND COR 2:2015) |
PREN 15341 : DRAFT 2017
|
MAINTENANCE - MAINTENANCE KEY PERFORMANCE INDICATORS |
BS EN 61587-6:2017 (published 2017-09)
|
Mechanical structures for electrical and electronic equipment. Tests for IEC 60917 and IEC 60297 series Security aspects for indoor cabinets |
S.R. CEN/TR 419010:2017
|
FRAMEWORK FOR STANDARDIZATION OF SIGNATURES - EXTENDED STRUCTURE INCLUDING ELECTRONIC IDENTIFICATION AND AUTHENTICATION |
14/30296554 DC : 0
|
BS EN 61587-6 - MECHANICAL STRUCTURES FOR ELECTRONIC EQUIPMENT - PART 6: SECURITY AND PERFORMANCE FOR DOOR LOCKING HANDLES FOR INDOOR CABINETS |
17/30342692 DC : 0
|
BS ISO/IEC 27007 - INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - GUIDELINES FOR INFORMATION SECURITY MANAGEMENT SYSTEMS AUDITING |
ISO/IEC 27017:2015
|
Information technology — Security techniques — Code of practice for information security controls based on ISO/IEC 27002 for cloud services |
BS ISO 30302:2015
|
Information and documentation. Management systems for records. Guidelines for implementation |
BIP 0076 : 2010
|
INFORMATION SECURITY RISK MANAGEMENT - HANDBOOK FOR ISO/IEC 27001 |
BIP 0139 : 2013
|
AN INTRODUCTION TO ISO/IEC 27001:2013 |
BS EN ISO 9004:2018
|
Quality management. Quality of an organization. Guidance to achieve sustained success |
14/30278505 DC : 0
|
BS ISO/IEC 27033-1 - INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - NETWORK SECURITY PART 1: OVERVIEW AND CONCEPTS |
BS EN ISO/IEC 27002:2017
|
Information technology. Security techniques. Code of practice for information security controls |
UNE-ISO/IEC 20000-3:2015
|
Information technology. Service management. Part 3: Guidance on scope definition and applicability of ISO/IEC 20000-1 |
PD CEN/TS 15480-4:2012
|
Identification card systems. European Citizen Card Recommendations for European Citizen Card issuance, operation and use |
BS ISO/IEC 27009:2016
|
INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - SECTOR-SPECIFIC APPLICATION OF ISO/IEC 27001 - REQUIREMENTS |
BS ISO/IEC 18028-1 : 2006
|
INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - IT NETWORK SECURITY - NETWORK SECURITY MANAGEMENT |
UNI ISO 20252 : 2012
|
MARKET, OPINION AND SOCIAL RESEARCH - VOCABULARY AND SERVICE REQUIREMENTS |
15/30299657 DC : 0
|
BS 7958 - CLOSED CIRCUIT TELEVISION (CCTV) - MANAGEMENT AND OPERATION - CODE OF PRACTICE |
ISO/IEC 21277:2018
|
Information technology — Radio frequency identification device performance test methods — Crypto suite |
BS TICKITPLUS - KICK START GUIDE : 2011
|
KICK START GUIDE, TICKITPLUS - SOFTWARE AND IT QUALITY MANAGEMENT AND CERTIFICATION |
BIP 0140 : 2014
|
UNDERSTANDING THE NEW ISO MANAGEMENT SYSTEM REQUIREMENTS |
10/30184432 DC : 0
|
BS ISO/IEC 27035 - INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - INFORMATION SECURITY INCIDENT MANAGEMENT |
12/30257208 DC : DRAFT FEB 2012
|
BS ISO/IEC 20000-3 - INFORMATION TECHNOLOGY - SERVICE MANAGEMENT - PART 3: GUIDANCE ON SCOPE DEFINITION AND APPLICABILITY OF ISO/IEC 20000-1 |
16/30320028 DC : 0
|
BS ISO 26262-2 - ROAD VEHICLES - FUNCTIONAL SAFETY - PART 2: MANAGEMENT OF FUNCTIONAL SAFETY |
18/30348902 DC : 0
|
BS ISO/IEC 21878 - INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - SECURITY GUIDELINES FOR DESIGN AND IMPLEMENTATION OF VIRTUALIZED SERVERS |
ISO/IEC 29182-4:2013
|
Information technology Sensor networks: Sensor Network Reference Architecture (SNRA) Part 4: Entity models |
TS 118 111 : 2.4.1
|
ONEM2M; COMMON TERMINOLOGY (ONEM2M TS-0011 VERSION 2.4.1 RELEASE 2) |
TS 102 640-6-3 : 1.1.1
|
ELECTRONIC SIGNATURES AND INFRASTRUCTURES (ESI); REGISTERED ELECTRONIC MAIL (REM); PART 6: INTEROPERABILITY PROFILES; SUB-PART 3: REM-MD SOAP BINDING PROFILE |
BS ISO 37500:2014
|
Guidance on outsourcing |
BS IEC 62443-2-1 : 2010
|
INDUSTRIAL COMMUNICATION NETWORKS - NETWORK AND SYSTEM SECURITY - PART 2-1: ESTABLISHING AN INDUSTRIAL AUTOMATION AND CONTROL SYSTEM SECURITY PROGRAM |
OLF 112-2 : 2013
|
DEPLOYMENT OF RADIO FREQUENCY IDENTIFICATION (RFID) IN THE OIL AND GAS INDUSTRY - PART 2: ARCHITECTURE AND INTEGRATION |
BS ISO/IEC 27033-5:2013
|
INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - NETWORK SECURITY - PART 5: SECURING COMMUNICATIONS ACROSS NETWORKS USING VIRTUAL PRIVATE NETWORKS (VPNS) |
ISO 28002:2011
|
Security management systems for the supply chain Development of resilience in the supply chain Requirements with guidance for use |
BS ISO/IEC 18028-3:2005
|
INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - IT NETWORK SECURITY - PART 3: SECURING COMMUNICATIONS BETWEEN NETWORKS USING SECURITY GATEWAYS |
INCITS/ISO 19153 : 2014
|
GEOGRAPHIC INFORMATION - GEOSPATIAL DIGITAL RIGHTS MANAGEMENT REFERENCE MODEL (GEODRM RM) |
BS ISO/IEC 27006:2015
|
Information technology. Security techniques. Requirements for bodies providing audit and certification of information security management systems |
16/30286027 DC : 0
|
BS ISO/IEC 27004 - INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - INFORMATION SECURITY MANAGEMENT - MONITORING, MEASUREMENT, ANALYSIS AND EVALUATION |
17/30342673 DC : 0
|
BS ISO/IEC 27021 - INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - COMPETENCE REQUIREMENTS FOR INFORMATION SECURITY MANAGEMENT SYSTEMS PROFESSIONALS |
PD ISO/TR 11633-2:2009
|
HEALTH INFORMATICS - INFORMATION SECURITY MANAGEMENT FOR REMOTE MAINTENANCE OF MEDICAL DEVICES AND MEDICAL INFORMATION SYSTEMS - PART 2: IMPLEMENTATION OF AN INFORMATION SECURITY MANAGEMENT SYSTEM (ISMS) |
ISA 99.02.01 : 2009
|
SECURITY FOR INDUSTRIAL AUTOMATION AND CONTROL SYSTEMS: ESTABLISHING AN INDUSTRIAL AUTOMATION AND CONTROL SYSTEMS SECURITY PROGRAM |
BS TICKITPLUS - ASSESSORS & PRACTITIONER : 2011
|
REQUIREMENTS FOR ASSESSORS AND PRACTITIONERS - THE TICKITPLUS SCHEME |
BS ISO/IEC 27005:2011
|
INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - INFORMATION SECURITY RISK MANAGEMENT |
PD CEN/TR 419010:2017
|
FRAMEWORK FOR STANDARDIZATION OF SIGNATURES - EXTENDED STRUCTURE INCLUDING ELECTRONIC IDENTIFICATION AND AUTHENTICATION |
BS EN ISO 18295-1:2017
|
Customer contact centres Requirements for customer contact centres |
15/30298890 DC : 0
|
BS ISO 15489-1 - INFORMATION AND DOCUMENTATION - RECORDS MANAGEMENT - PART 1: CONCEPTS AND PRINCIPLES |
BS ISO/IEC 27032:2012
|
Information technology. Security techniques. Guidelines for cybersecurity |
DIN EN ISO/IEC 27002:2017-06
|
INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - CODE OF PRACTICE FOR INFORMATION SECURITY CONTROLS (ISO/IEC 27002:2013 INCLUDING COR 1:2014 AND COR 2:2015) |
09/30184534 DC : DRAFT JAN 2009
|
BS ISO/IEC 20000-1 - INFORMATION TECHNOLOGY - SERVICE MANAGEMENT - PART 1: SERVICE MANAGEMENT SYSTEM REQUIREMENTS |
14/30213618 DC : 0
|
BS ISO/IEC 27034-2 - INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - APPLICATION SECURITY - PART 2: ORGANIZATION NORMATIVE FRAMEWORK |
CSA ISO/IEC 27003 : 2010 : R2015
|
INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - INFORMATION SECURITY MANAGEMENT SYSTEM IMPLEMENTATION GUIDANCE |
I.S. EN ISO 21091:2013
|
HEALTH INFORMATICS - DIRECTORY SERVICES FOR HEALTHCARE PROVIDERS, SUBJECTS OF CARE AND OTHER ENTITIES (ISO 21091:2013) |
ISO/IEC TR 20000-9:2015
|
Information technology Service management Part 9: Guidance on the application of ISO/IEC 20000-1 to cloud services |
BIS IS/ISO/IEC 27003 : 2010
|
INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - INFORMATION SECURITY MANAGEMENT SYSTEM IMPLEMENTATION GUIDANCE |
CSA ISO/IEC 20000-2 : 2013 : R2017
|
INFORMATION TECHNOLOGY - SERVICE MANAGEMENT - PART 2: GUIDANCE ON THE APPLICATION OF SERVICE MANAGEMENT SYSTEMS |
06/30144361 DC : 0
|
ISO 27799 - HEALTH INFORMATICS - SECURITY MANAGEMENT IN HEALTH USING ISO/IEC 17799 |
CSA ISO/IEC 27031 : 2013
|
INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - GUIDELINES FOR INFORMATION AND COMMUNICATION TECHNOLOGY READINESS FOR BUSINESS CONTINUITY |
DIN CEN ISO/TS 19299;DIN SPEC 74125:2016-02
|
ELECTRONIC FEE COLLECTION - SECURITY FRAMEWORK (ISO/TS 19299:2015) |
CSA ISO 19011 : 2012
|
GUIDELINES FOR AUDITING MANAGEMENT SYSTEMS |
UNI ISO 30301 : 2013
|
INFORMATION AND DOCUMENTATION - MANAGEMENT SYSTEMS FOR RECORDS - REQUIREMENTS |
ISO/IEC/IEEE 26531:2015
|
Systems and software engineering — Content management for product life-cycle, user and service management documentation |
IEC PAS 62443-3:2008
|
Security for industrial process measurement and control - Network and system security |
IEC 62443-2-1:2010
|
Industrial communication networks - Network and system security - Part 2-1: Establishing an industrial automation and control system security program |
IEC TR 62351-10:2012
|
Power systems management and associated information exchange - Data and communications security - Part 10: Security architecture guidelines |
SAE J 3061 : 2016
|
CYBERSECURITY GUIDEBOOK FOR CYBER-PHYSICAL VEHICLE SYSTEMS |
ISO/IEC 27034-3:2018
|
Information technology — Application security — Part 3: Application security management process |
ISO/IEC TR 29110-5-3:2018
|
Systems and software engineering — Lifecycle profiles for Very Small Entities (VSEs) — Part 5-3: Service delivery guidelines |
CAN/CSA-ISO/IEC 27035-2:18
|
Information technology ? Security techniques ? Information security incident management ? Part 2: Guidelines to plan and prepare for incident response (Adopted ISO/IEC 27035-2:2016, first edition, 2016-11-01) |
S.R. CWA 16460:2012
|
GOOD PRACTICE: E-INVOICING COMPLIANCE GUIDELINES - THE COMMENTARY |
I.S. EN ISO/IEC 27000:2017
|
INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - INFORMATION SECURITY MANAGEMENT SYSTEMS - OVERVIEW AND VOCABULARY (ISO/IEC 27000:2016) |
EN 61587-6:2017
|
Mechanical structures for electrical and electronic equipment - Tests for IEC 60917 and IEC 60297 series - Part 6: Security aspects for indoor cabinets |
I.S. EN 15224:2016
|
QUALITY MANAGEMENT SYSTEMS - EN ISO 9001:2015 FOR HEALTHCARE |
S.R. CEN ISO/TS 19299:2015
|
ELECTRONIC FEE COLLECTION - SECURITY FRAMEWORK (ISO/TS 19299:2015) |
UNE-ISO 20252:2012
|
Market, opinion and social research. Vocabulary and service requirements. |
ISO/IEC 30111:2013
|
Information technology Security techniques Vulnerability handling processes |
BS EN ISO/IEC 27000:2017
|
INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - INFORMATION SECURITY MANAGEMENT SYSTEMS - OVERVIEW AND VOCABULARY (ISO/IEC 27000:2016) |
CSA ISO 19011 : 2012 : R2017
|
GUIDELINES FOR AUDITING MANAGEMENT SYSTEMS |
ISO/IEC TR 20000-10:2015
|
Information technology Service management Part 10: Concepts and terminology |
TR 102 572 : 1.1.1
|
BEST PRACTICES FOR HANDLING ELECTRONIC SIGNATURES AND SIGNED DATA FOR DIGITAL ACCOUNTING |
ISO/IEC TR 90006:2013
|
Information technology Guidelines for the application of ISO 9001:2008 to IT service management and its integration with ISO/IEC 20000-1:2011 |
ISO/IEC 18028-3:2005
|
Information technology Security techniques IT network security Part 3: Securing communications between networks using security gateways |
CAN/CSA-ISO/IEC 27017:16
|
Information technology Security techniques Code of practice for information security controls based on ISO/IEC 27002 for cloud services (Adopted ISO/IEC 27017:2015, first edition, 2015-12-15) |
IEC TR 80001-2-8:2016
|
Application of risk management for IT-networks incorporating medical devices - Part 2-8: Application guidance - Guidance on standards for establishing the security capabilities identified in IEC TR 80001-2-2 |
CEN/TR 15640:2007
|
Health informatics - Measures for ensuring the patient safety of health software |
BS EN 16495:2014
|
AIR TRAFFIC MANAGEMENT - INFORMATION SECURITY FOR ORGANISATIONS SUPPORTING CIVIL AVIATION OPERATIONS |
CEN/TR 419010:2017
|
Framework for standardization of signatures - Extended structure including electronic identification and authentication |
UNI EN 16495 : 2014
|
AIR TRAFFIC MANAGEMENT - INFORMATION SECURITY FOR ORGANIZATIONS SUPPORTING CIVIL AVIATION OPERATIONS |
TS 102 165-1 : 4.2.3
|
CYBER; METHODS AND PROTOCOLS; PART 1: METHOD AND PRO FORMA FOR THREAT, VULNERABILITY, RISK ANALYSIS (TVRA) |
ISO/IEC 27033-2:2012
|
Information technology Security techniques Network security Part 2: Guidelines for the design and implementation of network security |
ISO/IEC 27035:2011
|
Information technology Security techniques Information security incident management |
ISO/IEC 27033-4:2014
|
Information technology Security techniques Network security Part 4: Securing communications between networks using security gateways |
ISO/IEC 27032:2012
|
Information technology Security techniques Guidelines for cybersecurity |
ISO/TS 21547:2010
|
Health informatics Security requirements for archiving of electronic health records Principles |
ISO/IEC 27039:2015
|
Information technology Security techniques Selection, deployment and operations of intrusion detection and prevention systems (IDPS) |
EN 16844:2017
|
Aesthetic medicine services - Non-surgical medical treatments |
ISO/IEC 27036-1:2014
|
Information technology Security techniques Information security for supplier relationships Part 1: Overview and concepts |
ISO/IEC/IEEE 24748-4:2016
|
Systems and software engineering Life cycle management Part 4: Systems engineering planning |
ISO/IEC 27034-2:2015
|
Information technology Security techniques Application security Part 2: Organization normative framework |
ISO/IEC 15026-4:2012
|
Systems and software engineering Systems and software assurance Part 4: Assurance in the life cycle |
ISO 37500:2014
|
Guidance on outsourcing |
ISO/TR 17522:2015
|
Health informatics Provisions for health applications on mobile/smart devices |
ISO 18788:2015
|
Management system for private security operations Requirements with guidance for use |
IEC TR 62653:2012
|
Guideline for safe operation of medical equipment used for haemodialysis treatments |
ISO 14641-1:2012
|
Electronic archiving Part 1: Specifications concerning the design and the operation of an information system for electronic information preservation |
DIN EN ISO 15189:2014-11
|
Medical laboratories - Requirements for quality and competence (ISO 15189:2012, Corrected version 2014-08-15) |
ISO/IEC 27037:2012
|
Information technology Security techniques Guidelines for identification, collection, acquisition and preservation of digital evidence |
ISO/TS 19299:2015
|
Electronic fee collection Security framework |
DIN EN ISO/IEC 27040 E : 2017
|
INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - STORAGE SECURITY (ISO/IEC 27040:2015) |
ISO/IEC TS 15504-8:2012
|
Information technology Process assessment Part 8: An exemplar process assessment model for IT service management |
I.S. EN ISO 9000:2015
|
QUALITY MANAGEMENT SYSTEMS - FUNDAMENTALS AND VOCABULARY (ISO 9000:2015) |
EN ISO 21091:2013
|
Health informatics - Directory services for healthcare providers, subjects of care and other entities (ISO 21091:2013) |
EN ISO/IEC 27043:2016
|
Information technology - Security techniques - Incident investigation principles and processes (ISO/IEC 27043:2015) |
UNI/TS 11465-1 : 2012
|
ELECTRONIC SIGNATURES AND INFRASTRUCTURES (ESI) - DATA PRESERVATION SYSTEMS SECURITY - PART 1: REQUIREMENTS FOR IMPLEMENTATION AND MANAGEMENT |
UNI EN ISO 15189 : 2013
|
MEDICAL LABORATORIES - REQUIREMENTS FOR QUALITY AND COMPETENCE |
CSA ISO/IEC 27009 : 2018
|
INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - SECTOR-SPECIFIC APPLICATION OF ISO/IEC 27001 - REQUIREMENTS |
BS ISO/IEC 27018:2014
|
INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - CODE OF PRACTICE FOR PROTECTION OF PERSONALLY IDENTIFIABLE INFORMATION (PII) IN PUBLIC CLOUDS ACTING AS PII PROCESSORS |
UNI CEI ISO/IEC TR 20000-3 : 2010
|
INFORMATION TECHNOLOGY - SERVICE MANAGEMENT - PART 3: GUIDANCE ON SCOPE DEFINITION AND APPLICABILITY OF ISO/IEC 20000-1 |
PD IEC/TR 80001-2-3:2012
|
Application of risk management for IT-networks incorporating medical devices Guidance for wireless networks |
12/30250178 DC : 0
|
BS ISO/IEC 27036-3 - INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - INFORMATION SECURITY FOR SUPPLIER RELATIONSHIPS - PART 3: GUIDELINES FOR ICT SUPPLY CHAIN SECURITY |
12/30249606 DC : 0
|
BS EN 62645 ED 1.0 - NUCLEAR POWER PLANTS - INSTRUMENTATION AND CONTROL SYSTEMS - REQUIREMENT S FOR SECURITY PROGRAMMES FOR COMPUTER-BASED SYSTEMS |
10/30162769 DC : DRAFT NOV 2010
|
BS ISO/IEC 27007 - INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - GUIDELINES FOR INFORMATION SECURITY MANAGEMENT SYSTEMS AUDITING |
ISO/TR 21548:2010
|
Health informatics Security requirements for archiving of electronic health records Guidelines |
PD IEC/TR 80001-2-8:2016
|
Application of risk management for IT-networks incorporating medical devices Application guidance. Guidance on standards for establishing the security capabilities identified in IEC TR 80001-2-2 |
CAN/CSA-ISO/IEC 27010:16
|
Information technology - Security techniques - Information security management for inter-sector and inter-organizational communications (Adopted ISO/IEC 27010:2015, second edition, 2015-11-15) |
BS ISO/IEC/IEEE 26531:2015
|
Systems and software engineering. Content management for product lifecycle, user and service management documentation |
BS IEC 62855:2016
|
Nuclear power plants. Electrical power systems. Electrical power systems analysis |
CAN/CSA-ISO/IEC 27004:18
|
Information technology ? Security techniques ? Information security management ? Monitoring, measurement, analysis and evaluation (Adopted ISO/IEC 27004:2016, second edition, 2016-12-15) |
BS ISO/IEC 27017:2015
|
Information technology. Security techniques. Code of practice for information security controls based on ISO/IEC 27002 for cloud services |
TS 102 640-5 : 2.1.2
|
ELECTRONIC SIGNATURES AND INFRASTRUCTURES (ESI); REGISTERED ELECTRONIC MAIL (REM); PART 5: REM-MD INTEROPERABILITY PROFILES |
INCITS/ISO/IEC 27010 : 2017
|
INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - INFORMATION SECURITY MANAGEMENT FOR INTER-SECTOR AND INTER-ORGANIZATIONAL COMMUNICATIONS |
I.S. EN 16844:2017
|
AESTHETIC MEDICINE SERVICES - NON-SURGICAL MEDICAL PROCEDURES |
CAN/CSA-ISO/IEC TS 33072:18
|
Information technology ? Process assessment ? Process capability assessment model for information security management (Adopted ISO/IEC TS 33072:2016, first edition, 2016-07-15, corrected version 2016-09-01) |
12/30250175 DC : 0
|
BS ISO/IEC 27036-2 - INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - INFORMATION SECURITY FOR SUPPLIER RELATIONSHIPS - PART 2: COMMON REQUIREMENTS |
11/30207799 DC : 0
|
BS ISO/IEC 27037 - INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - GUIDELINES FOR IDENTIFICATION, COLLECTION, ACQUISITION AND PRESERVATION OF DIGITAL EVIDENCE |
CSA INFORMATION SECURITY PACKAGE : 2018
|
CONSISTS OF CAN/CSA-ISO/IEC 27000:18 - INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - INFORMATION SECURITY MANAGEMENT SYSTEMS - OVERVIEW AND VOCABULARY; CAN/CSA-ISO/IEC 27001:14, INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - INFORMATION SECURITY MANAGEMENT SYSTEMS - REQUIREMENTS; CAN/CSA-ISO/IEC 27002:15 - INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - CODE OF PRACTICE FOR INFORMATION |
GS NFV-REL 005 : 1.1.1
|
NETWORK FUNCTIONS VIRTUALISATION (NFV); ACCOUNTABILITY; REPORT ON QUALITY ACCOUNTABILITY FRAMEWORK |
14/30304350 DC : 0
|
BS EN ISO 27799 - HEALTH INFORMATICS - INFORMATION SECURITY MANAGEMENT IN HEALTH USING ISO/IEC 27002 |
BS ISO/IEC 27039:2015
|
INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - SELECTION, DEPLOYMENT AND OPERATIONS OF INTRUSION DETECTION SYSTEMS (IDPS) |
PD IEC/TR 80001-2-2:2012
|
Application of risk management for IT-networks incorporating medical devices Guidance for the disclosure and communication of medical device security needs, risks and controls |
14/30296542 DC : 0
|
BS ISO/IEC/IEEE 23026 - SYSTEMS AND SOFTWARE ENGINEERING - ENGINEERING AND MANAGEMENT OF WEBSITES FOR SYSTEMS, SOFTWARE, AND SERVICES INFORMATION |
PD CEN/TR 15640:2007
|
HEALTH INFORMATICS - MEASURES FOR ENSURING THE PATIENT SAFETY OF HEALTH SOFTWARE |
ISO/IEC 27035-1:2016
|
Information technology — Security techniques — Information security incident management — Part 1: Principles of incident management |
IEC 61587-6:2017
|
Mechanical structures for electrical and electronic equipment - Tests for IEC 60917 and IEC 60297 series - Part 6: Security aspects for indoor cabinets |
BS ISO/IEC 15026-1:2013
|
SYSTEMS AND SOFTWARE ENGINEERING - SYSTEMS AND SOFTWARE ASSURANCE - PART 1: CONCEPTS AND VOCABULARY |
ISO 19153:2014
|
Geospatial Digital Rights Management Reference Model (GeoDRM RM) |
16/30338037 DC : 0
|
BS ISO/IEC 30754 - INFORMATION TECHNOLOGY - SOFTWARE TRUSTWORTHINESS - GOVERNANCE AND MANAGEMENT - SPECIFICATION |
BIP 0071 : 2014
|
GUIDELINES ON REQUIREMENTS AND PREPARATION FOR ISMS CERTIFICATION BASED ON ISO/IEC 27001 |
BS ISO/IEC 27010:2015
|
INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - INFORMATION SECURITY MANAGEMENT FOR INTER-SECTOR AND INTER-ORGANIZATIONAL COMMUNICATIONS |
15/30302614 DC : 0
|
BS ISO/IEC 18598 - INFORMATION TECHNOLOGY - AUTOMATED INFRASTRUCTURE MANAGEMENT (AIM) SYSTEMS - REQUIREMENTS, DATA EXCHANGE AND APPLICATIONS |
13/30268559 DC : 0
|
BS ISO/IEC 15026-1 - SYSTEMS AND SOFTWARE ENGINEERING - SYSTEMS AND SOFTWARE ASSURANCE - PART 1: CONCEPTS AND VOCABULARY |
PD IEC/TR 63084:2017
|
Nuclear power plants. Instrumentation and control important to safety. Platform qualification for systems important to safety |
BS ISO/IEC 27007:2017
|
Information technology. Security techniques. Guidelines for information security management systems auditing |
PD ISO/TR 11633-1:2009
|
HEALTH INFORMATICS - INFORMATION SECURITY MANAGEMENT FOR REMOTE MAINTENANCE OF MEDICAL DEVICES AND MEDICAL INFORMATION SYSTEMS - PART 1: REQUIREMENTS AND RISK ANALYSIS |
BS ISO 10008:2013
|
Quality management. Customer satisfaction. Guidelines for business-to-consumer electronic commerce transactions |
PD CEN/TR 16742:2014
|
Intelligent transport systems. Privacy aspects in ITS standards and systems in Europe |
12/30168696 DC : 0
|
BS ISO/IEC 29115 - INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - ENTITY AUTHENTICATION ASSURANCE FRAMEWORK |
ISO 20488:2018
|
Online consumer reviews — Principles and requirements for their collection, moderation and publication |
ANSI/AAMI/IEC TIR80001-2-1:2012
|
APPLICATION OF RISK MANAGEMENT FOR IT-NETWORKS INCORPORATING MEDICAL DEVICES - PART 2-1: STEP BY STEP RISK MANAGEMENT OF MEDICAL IT-NETWORKS - PRACTICAL APPLICATIONS AND EXAMPLES |
14/30285107 DC : 0
|
BS ISO/IEC/IEEE 26531 - SYSTEMS AND SOFTWARE ENGINEERING - CONTENT MANAGEMENT FOR PRODUCT LIFE-CYCLE, USER AND SERVICE MANAGEMENT DOCUMENTATION |
PD ISO/TR 15801:2017
|
Document management. Electronically stored information. Recommendations for trustworthiness and reliability |
CSA ISO/IEC 27000 : 2018
|
INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - INFORMATION SECURITY MANAGEMENT SYSTEMS - OVERVIEW AND VOCABULARY |
UNE-ISO 26000:2012
|
Guidance on social responsibility |
CEI UNI ISO/IEC TR 20000-3 : 2011
|
INFORMATION TECHNOLOGY - SERVICE MANAGEMENT - PART 3: GUIDANCE ON SCOPE DEFINITION AND APPLICABILITY OF ISO/IEC 20000-1 |
DIN ISO/IEC 17789:2016-10 (Draft)
|
INFORMATION TECHNOLOGY - CLOUD COMPUTING - REFERENCE ARCHITECTURE (ISO/IEC 17789:2014) |
BS ISO/IEC 19941:2017
|
Information technology. Cloud computing. Interoperability and portability |
SR 003 091 : 1.1.2
|
ELECTRONIC SIGNATURES AND INFRASTRUCTURES (ESI); RECOMMENDATIONS ON GOVERNANCE AND AUDIT REGIME FOR CAB FORUM EXTENDED VALIDATION AND BASELINE CERTIFICATES |
DIN CEN ISO/TS 19299;DIN SPEC 74125:2016-02
|
ELECTRONIC FEE COLLECTION - SECURITY FRAMEWORK (ISO/TS 19299:2015) |
ISO/IEC 27036-3:2013
|
Information technology Security techniques Information security for supplier relationships Part 3: Guidelines for information and communication technology supply chain security |
11/30246891 DC : 0
|
BS ISO/IEC 27006 - INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - REQUIREMENTS FOR BODIES PROVIDING AUDIT AND CERTIFICATION OF INFORMATION SECURITY MANAGEMENT SYSTEMS |
PD IEC/TR 80001-2-1:2012
|
Application of risk management for IT-networks incorporating medical devices Step-by-step risk management of medical IT-networks. Practical applications and examples |
12/30269414 DC : 0
|
BS EN 16495 - AIR TRAFFIC MANAGEMENT - INFORMATION SECURITY FOR ORGANISATIONS SUPPORTING CIVIL AVIATION OPERATIONS |
BS EN ISO/IEC 27043 : 2016
|
INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - INCIDENT INVESTIGATION PRINCIPLES AND PROCESSES (ISO/IEC 27043:2015) |
BIP 0105 : 2008
|
INFORMATION SECURITY BASED ON ISO 27001/ISO 17799: A MANAGEMENT GUIDE |
CAN/CSA-ISO/IEC 30100-2:18
|
Information technology ? Home network resource management ? Part 2: Architecture (Adopted ISO/IEC 30100-2:2016, first edition, 2016-04) |
07/30166242 DC : 0
|
BS ISO/IEC 27011 - INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - INFORMATION SECURITY MANAGEMENT GUIDELINES FOR TELECOMMUNICATIONS |
PD CEN ISO/TS 19299:2015
|
Electronic fee collection. Security framework |
BS ISO/IEC 27031:2011
|
Information technology. Security techniques. Guidelines for information and communication technology readiness for business continuity |
15/30320354 DC : 0
|
BS ISO/IEC 27010 - INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - INFORMATION SECURITY MANAGEMENT FOR INTER-SECTOR AND INTER-ORGANIZATIONAL COMMUNICATIONS |
BS ISO/IEC 29182-4:2013
|
INFORMATION TECHNOLOGY - SENSOR NETWORKS: SENSOR NETWORK REFERENCE ARCHITECTURE (SNRA) - PART 4: ENTITY MODELS |
13/30266767 DC : 0
|
BS ISO/IEC 27018 - INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - CODE OF PRACTICE FOR P2 PROTECTION IN PUBLIC CLOUD ACTING AS P2 PROCESSORS |
BS ISO 10789:2011
|
SPACE SYSTEMS - PROGRAMME MANAGEMENT - INFORMATION AND DOCUMENTATION MANAGEMENT |
BS EN ISO 27799:2008
|
HEALTH INFORMATICS - INFORMATION SECURITY MANAGEMENT IN HEALTH USING ISO/IEC 27002 (ISO 27799:2016) |
17/30329617 DC : 0
|
BS ISO/IEC 29110-4-3 - SYSTEMS AND SOFTWARE ENGINEERING - LIFECYCLE PROFILES FOR VERY SMALL ENTITIES (VSES) - PART 4-3: SERVICE DELIVERY - PROFILE SPECIFICATION |
BIP 3093 : 2013
|
THE RISK MANAGEMENT STANDARDS AND GUIDANCE COLLECTION |
BIS IS/ISO 19011 : 2011(R2016)
|
GUIDELINES FOR AUDITING MANAGEMENT SYSTEMS |
12/30209825 DC : 0
|
BS ISO/IEC 27014 - INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - GOVERNANCE OF INFORMATION SECURITY |
BIS IS/ISO/IEC 27004 : 2009
|
INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - INFORMATION SECURITY MANAGEMENT - MEASUREMENT |
08/30134763 DC : DRAFT JUNE 2008
|
BS ISO/IEC 27004 - INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - INFORMATION SECURITY MANAGEMENT - MEASUREMENT |
CSA ISO 9004 : 2009
|
MANAGING FOR THE SUSTAINED SUCCESS OF AN ORGANIZATION - A QUALITY MANAGEMENT APPROACH |
CSA ISO/IEC 15408-1 : 2010 : R2015
|
INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - EVALUATION CRITERIA FOR IT SECURITY - PART 1: INTRODUCTION AND GENERAL MODEL |
INCITS/ISO/IEC 27033-2 : 2014
|
INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - NETWORK SECURITY - PART 2: GUIDELINES FOR THE DESIGN AND IMPLEMENTATION OF NETWORK SECURITY |
UNI CEN/TS 16439 : 2013
|
ELECTRONIC FEE COLLECTION - SECURITY FRAMEWORK |
TS 119 401 : 2.0.1
|
ELECTRONIC SIGNATURES AND INFRASTRUCTURES (ESI); GENERAL POLICY REQUIREMENTS FOR TRUST SERVICE PROVIDERS |
CSA ISO 9000 : 2016
|
QUALITY MANAGEMENT SYSTEMS - FUNDAMENTALS AND VOCABULARY |
16/30326000 DC : 0
|
BS ISO/IEC 19770-1 - INFORMATION TECHNOLOGY - IT ASSET MANAGEMENT - PART 1: IT ASSET MANAGEMENT SYSTEMS - REQUIREMENTS |
TS 102 640-6-2 : 1.1.1
|
ELECTRONIC SIGNATURES AND INFRASTRUCTURES (ESI); REGISTERED ELECTRONIC MAIL (REM); PART 6: INTEROPERABILITY PROFILES; SUB-PART 2: REM-MD BUSDOX INTEROPERABILITY PROFILE |
TR 102 605 : 1.1.1
|
ELECTRONIC SIGNATURES AND INFRASTRUCTURES (ESI); REGISTERED E-MAIL |
ISO/IEC 29134:2017
|
Information technology — Security techniques — Guidelines for privacy impact assessment |
CAN/CSA-ISO/IEC 27035-1:18
|
Information technology ? Security techniques ? Information security incident management ? Part 1: Principles of incident management (Adopted ISO/IEC 27035-1:2016, first edition, 2016-11-01) |
CSA ISO/IEC 20000-2:2013
|
INFORMATION TECHNOLOGY - SERVICE MANAGEMENT - PART 2: GUIDANCE ON THE APPLICATION OF SERVICE MANAGEMENT SYSTEMS |
CSA ISO/IEC 27003 : 2010
|
INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - INFORMATION SECURITY MANAGEMENT SYSTEM IMPLEMENTATION GUIDANCE |
INCITS/ISO/IEC 27039 : 2017
|
INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - SELECTION, DEPLOYMENT AND OPERATIONS OF INTRUSION DETECTION AND PREVENTION SYSTEMS (IDPS) |
INCITS/ISO/IEC 18028-1 : 2008
|
INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - IT NETWORK SECURITY - PART 1: NETWORK SECURITY MANAGEMENT |
CSA ISO 9004 : 2009 : R2015
|
MANAGING FOR THE SUSTAINED SUCCESS OF AN ORGANIZATION - A QUALITY MANAGEMENT APPROACH |
16/30334735 DC : 0
|
BS EN 15224 - HEALTH CARE SERVICES - QUALITY MANAGEMENT SYSTEMS - REQUIREMENTS BASED ON EN ISO 9001:2015 |
ISO 19011:2011
|
Guidelines for auditing management systems |
CAN/CSA-ISO/IEC 19086-1:18
|
Information technology ? Cloud computing ? Service level agreement (SLA) framework ? Part 1: Overview and concepts (Adopted ISO/IEC 19086-1:2016, first edition, 2016-09-15) |
BIS IS/ISO 9000 : 2015
|
QUALITY MANAGEMENT SYSTEMS - FUNDAMENTALS AND VOCABULARY |
15/30267674 DC : 0
|
BS ISO/IEC 27035-1 - INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - INFORMATION SECURITY INCIDENT MANAGEMENT - PART 1: PRINCIPLES OF INCIDENT MANAGEMENT |
ISO/IEC 27035-2:2016
|
Information technology — Security techniques — Information security incident management — Part 2: Guidelines to plan and prepare for incident response |
CSA ISO/IEC TR 20000-5 : 2015
|
INFORMATION TECHNOLOGY - SERVICE MANAGEMENT - PART 5: EXEMPLAR IMPLEMENTATION PLAN FOR ISO/IEC 20000-1 |
ISO/IEC 19770-1:2017
|
Information technology — IT asset management — Part 1: IT asset management systems — Requirements |
TS 119 172-1 : 1.1.1
|
ELECTRONIC SIGNATURES AND INFRASTRUCTURES (ESI); SIGNATURE POLICIES; PART 1: BUILDING BLOCKS AND TABLE OF CONTENTS FOR HUMAN READABLE SIGNATURE POLICY DOCUMENTS |
UNE-ISO/IEC 27000:2014
|
Information technology -- Security techniques -- Information security management systems -- Overview and vocabulary |
SR 003 391 : 2.1.1
|
CLOUD STANDARDS COORDINATION PHASE 2; INTEROPERABILITY AND SECURITY IN CLOUD COMPUTING |
I.S. EN IEC 62443-4-1:2018
|
SECURITY FOR INDUSTRIAL AUTOMATION AND CONTROL SYSTEMS - PART 4-1: SECURE PRODUCT DEVELOPMENT LIFECYCLE REQUIREMENTS |
GS ISI 001-2 : 1.1.2
|
INFORMATION SECURITY INDICATORS (ISI); INDICATORS (INC); PART 2: GUIDE TO SELECT OPERATIONAL INDICATORS BASED ON THE FULL SET GIVEN IN PART 1 |
I.S. EN ISO/IEC 27037:2016
|
INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - GUIDELINES FOR IDENTIFICATION, COLLECTION, ACQUISITION AND PRESERVATION OF DIGITAL EVIDENCE (ISO/IEC 27037:2012) |
I.S. EN 61069-5:2016
|
INDUSTRIAL-PROCESS MEASUREMENT, CONTROL AND AUTOMATION - EVALUATION OF SYSTEM PROPERTIES FOR THE PURPOSE OF SYSTEM ASSESSMENT - PART 5: ASSESSMENT OF SYSTEM DEPENDABILITY |
CSA ISO/IEC TR 15443-1 : 2015
|
INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - SECURITY ASSURANCE FRAMEWORK - PART 1: INTRODUCTION AND CONCEPTS |
ISO/IEC 19790:2012
|
Information technology Security techniques Security requirements for cryptographic modules |
PREN 15224 : DRAFT 2016
|
HEALTH CARE SERVICES - QUALITY MANAGEMENT SYSTEMS - REQUIREMENTS BASED ON EN ISO 9001:2015 |
ISO/TR 18128:2014
|
Information and documentation — Risk assessment for records processes and systems |
ISO 13485 - PRACTICAL GUIDE : 2016
|
ISO 13485:2016 - MEDICAL DEVICES - A PRACTICAL GUIDE |
UNE ISO 20252 : 2012
|
MARKET, OPINION AND SOCIAL RESEARCH - VOCABULARY AND SERVICE REQUIREMENTS |
IWA 26:2017
|
Using ISO 26000:2010 in management systems |
S.R. CWA 16036:2009
|
CYBER-IDENTITY - UNIQUE IDENTIFICATION SYSTEMS FOR ORGANIZATIONS AND PARTS THEREOF |
ISO/IEC 27033-5:2013
|
Information technology Security techniques Network security Part 5: Securing communications across networks using Virtual Private Networks (VPNs) |
I.S. EN ISO/IEC 27002:2017
|
INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - CODE OF PRACTICE FOR INFORMATION SECURITY CONTROLS (ISO/IEC 27002:2013 INCLUDING COR 1:2014 AND COR 2:2015) |
ISO/IEC 30100-2:2016
|
Information technology Home network resource management Part 2: Architecture |
I.S. ISO/IEC 27002:2013
|
INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - CODE OF PRACTICE FOR INFORMATION SECURITY CONTROLS |
AEP-67 : 2010
|
ENGINEERING FOR SYSTEM ASSURANCE IN NATO PROGRAMMES |
ISO/IEC/IEEE 23026:2015
|
Systems and software engineering Engineering and management of websites for systems, software, and services information |
CAN/CSA-ISO/IEC 27011:18
|
Information technology ? Security techniques ? Code of practice for information security controls based on ISO/IEC 27002 for telecommunications organizations (Adopted ISO/IEC 27011:2016, second edition, 2016-12-01) |
17/30358105 DC : 0
|
BS EN 15341 - MAINTENANCE - MAINTENANCE KEY PERFORMANCE INDICATORS |
IEEE 2410 : 2015
|
BIOMETRIC OPEN PROTOCOL |
BS ISO 26000:2010
|
GUIDANCE ON SOCIAL RESPONSIBILITY |
CEI UNI ISO/IEC 27002 : 2014
|
INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - CODE OF PRACTICE FOR INFORMATION SECURITY CONTROLS |
ISO/IEC 33071:2016
|
Information technology Process assessment An integrated process capability assessment model for Enterprise processes |
UNE-ISO/IEC TR 20000-3:2011 IN
|
Information technology. Service management. Part 3: Guidance on scope definition and applicability of ISO/IEC 20000-1 |
BS ISO/IEC 27019:2017
|
Information technology. Security techniques. Information security controls for the energy utility industry |
EN ISO 9004:2018
|
Quality management - Quality of an organization - Guidance to achieve sustained success (ISO 9004:2018) |
ISO/IEC 27034-1:2011
|
Information technology — Security techniques — Application security — Part 1: Overview and concepts |
ISO/IEC TR 15026-1:2010
|
Systems and software engineering Systems and software assurance Part 1: Concepts and vocabulary |
ISO/IEC 27010:2015
|
Information technology Security techniques Information security management for inter-sector and inter-organizational communications |
UNI EN ISO 22301 : 2014
|
SOCIETAL SECURITY - BUSINESS CONTINUITY MANAGEMENT SYSTEMS - REQUIREMENTS |
ISO/IEC TR 15443-1:2012
|
Information technology Security techniques Security assurance framework Part 1: Introduction and concepts |
ISO/IEC 29147:2014
|
Information technology Security techniques Vulnerability disclosure |
ISO 10008:2013
|
Quality management — Customer satisfaction — Guidelines for business-to-consumer electronic commerce transactions |
ISO/IEC 29115:2013
|
Information technology Security techniques Entity authentication assurance framework |
ISO 30302:2015
|
Information and documentation Management systems for records Guidelines for implementation |
ISO/IEC 18028-1:2006
|
Information technology Security techniques IT network security Part 1: Network security management |
S.R. CWA 15929:2009
|
BEST PRACTICES FOR THE DESIGN AND DEVELOPMENT OF CRITICAL INFORMATION SYSTEMS |
ISO/IEC 27033-1:2015
|
Information technology Security techniques Network security Part 1: Overview and concepts |
IEC 62855:2016
|
Nuclear power plants - Electrical power systems - Electrical power systems analysis |
IEC TR 80001-2-2:2012
|
Application of risk management for IT-networks incorporating medical devices - Part 2-2: Guidance for the disclosure and communication of medical device security needs, risks and controls |
ISO/IEC 27011:2016
|
Information technology Security techniques Code of practice for Information security controls based on ISO/IEC 27002 for telecommunications organizations |
DIN EN ISO 9000:2015-11
|
QUALITY MANAGEMENT SYSTEMS - FUNDAMENTALS AND VOCABULARY (ISO 9000:2015) |
IEEE 45.3 : 2015
|
SHIPBOARD ELECTRICAL INSTALLATIONS - SYSTEMS ENGINEERING |
ISO 26000:2010
|
Guidance on social responsibility |
ISO 22301:2012
|
Societal security Business continuity management systems Requirements |
ISO 21091:2013
|
Health informatics Directory services for healthcare providers, subjects of care and other entities |
BS ISO/IEC 27040 : 2015
|
INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - STORAGE SECURITY |
BS EN ISO/IEC 27040:2016
|
INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - STORAGE SECURITY (ISO/IEC 27040:2015) |
UNE-EN ISO 22301:2015
|
Societal security - Business continuity management systems - Requirements (ISO 22301:2012) |
ISO/IEC 27040:2015
|
Information technology Security techniques Storage security |
ISO/IEC 20000-3:2012
|
Information technology Service management Part 3: Guidance on scope definition and applicability of ISO/IEC 20000-1 |
ISO/TS 14441:2013
|
Health informatics — Security and privacy requirements of EHR systems for use in conformity assessment |
ISO 15189:2012
|
Medical laboratories — Requirements for quality and competence |
ISO/IEC 20000-2:2012
|
Information technology Service management Part 2: Guidance on the application of service management systems |
IEC TR 63084:2017
|
Nuclear power plants - Instrumentation and control important to safety - Platform qualification for systems important to safety |
ISO/IEC TR 20000-5:2013
|
Information technology Service management Part 5: Exemplar implementation plan for ISO/IEC 20000-1 |
BS EN ISO 15189:2012
|
Medical laboratories. Requirements for quality and competence |
EN ISO/IEC 27000:2017
|
Information technology - Security techniques - Information security management systems - Overview and vocabulary (ISO/IEC 27000:2016) |
ISO 18295-1:2017
|
Customer contact centres — Part 1: Requirements for customer contact centres |
EN 61511-1:2017/A1:2017
|
FUNCTIONAL SAFETY - SAFETY INSTRUMENTED SYSTEMS FOR THE PROCESS INDUSTRY SECTOR - PART 1: FRAMEWORK, DEFINITIONS, SYSTEM, HARDWARE AND APPLICATION PROGRAMMING REQUIREMENTS |
EN ISO/IEC 27002:2017
|
Information technology - Security techniques - Code of practice for information security controls (ISO/IEC 27002:2013 including Cor 1:2014 and Cor 2:2015) |
EN ISO/IEC 27040:2016
|
Information technology - Security techniques - Storage security (ISO/IEC 27040:2015) |
EN ISO 22301:2014
|
Societal security - Business continuity management systems - Requirements (ISO 22301:2012) |
EN ISO 18295-1:2017
|
Customer contact centres - Part 1: Requirements for customer contact centres (ISO 18295-1:2017) |
EN ISO 27799:2016
|
Health informatics - Information security management in health using ISO/IEC 27002 (ISO 27799:2016) |
EN ISO/IEC 27037:2016
|
Information technology - Security techniques - Guidelines for identification, collection, acquisition and preservation of digital evidence (ISO/IEC 27037:2012) |
EN 16495:2014
|
Air Traffic Management - Information security for organisations supporting civil aviation operations |
I.S. EN ISO 19011:2011
|
GUIDELINES FOR AUDITING MANAGEMENT SYSTEMS (ISO 19011:2011) |
INCITS/ISO/IEC 27013 : 2014
|
INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - GUIDANCE ON THE INTEGRATED IMPLEMENTATION OF ISO/IEC 27001 AND ISO/IEC 20000-1 |
NASA CCSDS 350.8-G : ISSUE 1
|
INFORMATION SECURITY GLOSSARY OF TERMS |
PREN 50436-6 : DRAFT 2013
|
ALCOHOL INTERLOCKS - TEST METHODS AND PERFORMANCE REQUIREMENTS - PART 6: DATA SECURITY |
BS ISO/IEC 27014:2013
|
Information technology. Security techniques. Governance of information security |
AAMI IEC TIR 80001-2-2 : 2012
|
APPLICATION OF RISK MANAGEMENT FOR IT-NETWORKS INCORPORATING MEDICAL DEVICES - PART 2-2: GUIDANCE FOR THE DISCLOSURE AND COMMUNICATION OF MEDICAL DEVICE SECURITY NEEDS, RISKS AND CONTROLS |
CSA ISO 10008 : 2015
|
QUALITY MANAGEMENT - CUSTOMER SATISFACTION - GUIDELINES FOR BUSINESS-TO-CONSUMER ELECTRONIC COMMERCE TRANSACTIONS |
12/30209299 DC : 0
|
BS ISO 10008 - QUALITY MANAGEMENT - CUSTOMER SATISFACTION - GUIDELINES FOR BUSINESS-TO-CONSUMER ELECTRONIC COMMERCE TRANSACTIONS |
BS ISO/IEC 27036-2:2014
|
Information technology. Security techniques. Information security for supplier relationships Requirements |
16/30300696 DC : 0
|
BS EN ISO 18295-1 - CUSTOMER CONTACT CENTRES - PART 1: REQUIREMENTS FOR CUSTOMER CONTACT CENTRES |
BS ISO/IEC 27036-3:2013
|
INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - INFORMATION SECURITY FOR SUPPLIER RELATIONSHIPS - PART 3: GUIDELINES FOR INFORMATION AND COMMUNICATION TECHNOLOGY SUPPLY CHAIN SECURITY |
IWA 17:2014
|
Information and operations security and integrity requirements for lottery and gaming organizations |
UNI EN ISO 21091 : 2013
|
HEALTH INFORMATICS - DIRECTORY SERVICES FOR HEALTHCARE PROVIDERS, SUBJECTS OF CARE AND OTHER ENTITIES |
CAN/CSA-ISO/IEC TS 33052:18
|
Information technology ? Process reference model (PRM) for information security management (Adopted ISO/IEC TS 33052:2016, first edition, 2016-06-15) |
BS ISO 20252:2012
|
MARKET, OPINION AND SOCIAL RESEARCH - VOCABULARY AND SERVICE REQUIREMENTS |
BS ISO/IEC 27037 : 2012
|
INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - GUIDELINES FOR IDENTIFICATION, COLLECTION, ACQUISITION, AND PRESERVATION OF DIGITAL EVIDENCE |
18/30358588 DC : 0
|
BS EN ISO 29001 - PETROLEUM, PETROCHEMICAL AND NATURAL GAS INDUSTRIES - SECTOR-SPECIFIC QUALITY MANAGEMENT SYSTEMS - REQUIREMENTS FOR PRODUCT AND SERVICE SUPPLY ORGANIZATIONS |
S.R. CEN TR 15640:2007
|
HEALTH INFORMATICS - MEASURES FOR ENSURING THE PATIENT SAFETY OF HEALTH SOFTWARE |
PD ISO/IEC TR 20000-11:2015
|
INFORMATION TECHNOLOGY - SERVICE MANAGEMENT - PART 11: GUIDANCE ON THE RELATIONSHIP BETWEEN ISO/IEC 20000-1:2011 AND SERVICE MANAGEMENT FRAMEWORKS: ITIL[R] |