BUREAU OF INDIAN STANDARDS
Programme of Work
LITD17 : Information Systems Security And Privacy
- Scope : Standardization in Security and Privacy aspects of Information Systems
-
Liaison :ISO/IEC JTC 1/SC 27 - Information security, cybersecurity and privacy protection - Participating (P)
ISO/IEC/JTC1 SC 27/WG 1 - Information security management systems
ISO/IEC/JTC1 SC 27/WG 2 - Cryptography and security mechanisms
ISO/IEC/JTC1 SC 27/WG 3 - Security evaluation, testing and specification
ISO/IEC/JTC1 SC 27/WG 4 - Security controls and services
ISO/IEC/JTC1 SC 27/WG 5 - Identity management and privacy technologies
ISO/IEC JTC1 /SC 44 - Consumer protection in the field of privacy by design - Participating (P)
ISO/IEC/JTC1 SC 27/WG AG 9 - Advisory Group on Diversity - Participating (P)
ISO/IEC/JTC1 SC 44/WG 1 - High level requirements and foundational concepts - Participating (P)
|
IS/ISO/IEC/TR 27039:2015 ISO/IEC 27039 : 2015 Reviewed In : 2024 |
Information Technology - Security Techniques - Selection, Deployment and Operations of Intrusion Detection Systems ( IDPS )
|
June, 2024
|
-
|
Identical under single numbering
|
|
|
IS/ISO/IEC 11770-5:2020 ISO/IEC 11770-5:2020 |
Information Security - Key Management Part 5: Group Key Management ( First Revision )
|
-
|
Identical under single numbering
|
||
|
IS/ISO/IEC 11770-6:2016 ISO/IEC 11770-6 : 2016 |
Information Technology - Security Techniques - Key Management Part 6: Key Derivation
|
January, 2023
|
-
|
Identical under single numbering
|
|
|
IS/ISO/IEC 11770-7:2021 ISO/IEC 11770-7: 2021 |
Information Security - Key Management Part 7: Cross-Domain Password-Based Authenticated Key Exchange
|
-
|
Identical under single numbering
|
||
|
IS/ISO/IEC 11770-1:2010 ISO/IEC 11770-1 : 2010 Reviewed In : 2023 |
Information Technology - Security Techniques - Key Management Part 1: Framework
|
March, 2023
|
-
|
Identical under single numbering
|
|
|
IS/ISO/IEC 11770-2:2018 ISO/IEC 11770-2 : 2018 Reviewed In : 2023 |
IT Security Techniques - Key Management Part 2: Mechanisms Using Symmetric Techniques ( First Revision )
|
September, 2023
|
-
|
Identical under single numbering
|
|
|
IS/ISO/IEC 11770-3:2021 ISO/IEC 11770-3:2021 |
Information Security - Key Management Part 3: Mechanisms using Asymmetric Techniques Second Revision
|
-
|
Identical under single numbering
|
||
|
IS/ISO/IEC 11770-4:2017 ISO/IEC 11770-4 : 2017 Reviewed In : 2025 |
Information Technology - Security Techniques - Key Management Part 4: Mechanisms Based on Weak Secrets (First Revision)
|
May, 2025
|
2
|
Identical under single numbering
|
|
|
IS/ISO/IEC 14888-3:2018 ISO/IEC 14888-3 : 2018 |
IT Security Techniques - Digital Signatures with Appendix Part 3: Discrete Logarithm Based Mechanisms ( First Revision )
|
January, 2023
|
-
|
Identical under single numbering
|
|
|
IS/ISO/IEC 14888-1:2008 ISO/IEC 14888-1 : 2008 Reviewed In : 2025 |
Information Technology - Security Techniques - Digital Signatures with Appendix Part 1: General
|
July, 2025
|
-
|
Identical under single numbering
|
|
|
IS/ISO/IEC 14888-2:2008 ISO/IEC 14888-2 : 2008 Reviewed In : 2025 |
Information Technology - Security Techniques - Digital Signatures with Appendix Part 2: Integer Factorization Based Mechanisms
|
May, 2025
|
1
|
Identical under single numbering
|
|
|
IS 14990 (Part 1):2024 ISO/IEC 15408-1:2022 |
Information Security, Cybersecurity and Privacy Protection - Evaluation Criteria for IT Security Part 1: Introduction and General Model Third Revision
|
-
|
Identical under dual numbering
|
||
|
IS 14990 (Part 2):2024 ISO/IEC 15408-2:2022 |
Information Security, Cybersecurity and Privacy Protection - Evaluation Criteria for IT Security Part 2: Security Functional Components (Third Revision)
|
-
|
Identical under dual numbering
|
||
|
IS 14990 (Part 3):2024 ISO/IEC 15408-3:2022 |
Information Security, Cybersecurity and Privacy Protection - Evaluation Criteria for IT Security Part 3: Security Assurance Components (Third Revision)
|
-
|
Identical under dual numbering
|
||
|
IS 14990 (Part 4):2024 ISO/IEC 15408-4:2022 |
Information Security, Cybersecurity and Privacy Protection - Evaluation Criteria for IT Security Part 4: Framework for the Specification of Evaluation Methods and Activities
|
-
|
Identical under dual numbering
|
||
|
IS 14990 (Part 5):2024 ISO/IEC 15408-5:2022 |
Information Security, Cybersecurity and Privacy Protection - Evaluation Criteria for IT Security Part 5: Pre-defined Packages of Security Requirements
|
-
|
Identical under dual numbering
|
||
|
IS 15116:2018 ISO/IEC 10116 : 2017 Reviewed In : 2024 |
Information Technology - Security Techniques - Modes of Operation for an n-Bit Block Cipher (Second Revision)
|
November, 2024
|
1
|
Identical under dual numbering
|
|
|
IS/ISO/IEC/TR 15446:2017 ISO/IEC TR 15446 : 2017 Reviewed In : 2025 |
Information Technology - Security Techniques - Guidance for the Production of Protection Profiles and Security targets
|
May, 2025
|
-
|
Identical under single numbering
|
|
|
IS 15580:2012 ISO/IEC 21827 : 2008 Reviewed In : 2024 |
Information Technology - Security Techniques - Systems: Security Engineering - Capability Maturity Model® (SSE - CMM®) (First Revision)
|
October, 2024
|
-
|
Identical under dual numbering
|
|
|
IS 15671:2024 ISO/IEC 18045:2022 |
Information Security, Cybersecurity and Privacy Protection - Evaluation Criteria for IT Security - Methodology for IT Security Evaluation (Second Revision)
|
-
|
Identical under dual numbering
|
||
|
IS/ISO/IEC 15946-1:2016 ISO/IEC 15946 -1 : 2016 Reviewed In : 2024 |
Information Technology - Security Techniques - Cryptographic Techniques Based on Elliptic Curves Part 1 General
|
June, 2024
|
-
|
Identical under single numbering
|
|
|
IS 17428 (Part 1):2020 Reviewed In : 2023 |
Data Privacy Assurance Part 1: Engineering and Management Requirements
|
December, 2023
|
-
|
Indigenous
|
|
|
IS 17428 (Part 2):2020 Reviewed In : 2023 |
Data Privacy Assurance Part 2: Engineering and Management Guidelines
|
December, 2023
|
-
|
Indigenous
|
|
|
IS 17737 (Part 1):2021 Reviewed In : 2024 |
Mobile Device Security Part 1: Overview
|
December, 2024
|
-
|
Indigenous
|
|
|
IS 17737 (Part 2):2021 Reviewed In : 2024 |
Mobile Device Security Part 2: Security Requirements
|
December, 2024
|
-
|
Indigenous
|
|
|
IS 17737 (Part 3):2021 Reviewed In : 2024 |
Mobile Device Security Part 3: Security Levels
|
December, 2024
|
-
|
Indigenous
|
|
|
IS 17737 (Part 4):2021 Reviewed In : 2024 |
Mobile Device Security Part 4: Assessment and Evaluation
|
December, 2024
|
-
|
Indigenous
|
|
|
IS/ISO/IEC 18014-2:2021 ISO/IEC 18014-2 : 2021 |
Information Security - Time - Stamping Services Part 2: Mechanisms Producing Independent Tokens Amendment - 1
|
1
|
Identical under single numbering
|
||
|
IS/ISO/IEC 18014-1:2008 ISO/IEC 18014-1 : 2008 Reviewed In : 2024 |
Information Technology - Security Techniques - Time Stamping Services Part 1: Framework
|
February, 2024
|
-
|
Identical under single numbering
|
|
|
IS/ISO/IEC 18014-3:2009 ISO/IEC 18014-3 : 2009 Reviewed In : 2024 |
Information Technology - Security Techniques - Time - Stamping services Part 3: Mechanisms Producing Linked Tokens
|
February, 2024
|
-
|
Identical under single numbering
|
|
|
IS/ISO/IEC 18014-4:2015 ISO/IEC 18014-4 : 2015 Reviewed In : 2025 |
Information Technology - Security Techniques - Time - Stamping Services Part 4: Traceability of Time Sources
|
May, 2025
|
-
|
Identical under single numbering
|
|
|
IS/ISO/IEC 18031:2025 |
Information Technology Security Techniques Random Bit Generation First Revision
|
-
|
Identical under single numbering
|
||
|
IS/ISO/IEC 18031:2011 ISO/IEC 18031 : 2011 Reviewed In : 2024 |
Information Technology - Security Techniques - Random Bit Generation
|
July, 2024
|
1
|
Identical under single numbering
|
|
|
IS/ISO/IEC 18033-1:2021 ISO/IEC 18033-1:2021 |
Information Security - Encryption Algorithms Part 1: General (First Revision)
|
-
|
Identical under single numbering
|
||
|
IS/ISO/IEC 18033-2:2006 ISO/IEC 18033-2 : 2006 Reviewed In : 2024 |
Information Technology - Security Techniques - Encryption Algorithms Part 2: Asymmetric Ciphers
|
June, 2024
|
1
|
Identical under single numbering
|
|
|
IS/ISO/IEC 18033-3:2010 ISO/IEC 18033-3 : 2010 Reviewed In : 2024 |
Information Technology - Security Techniques - Encryption Algorithms Part 3: Block Ciphers
|
June, 2024
|
1
|
Identical under single numbering
|
|
|
IS/ISO/IEC 18033-4:2011 ISO/IEC 18033-4 : 2011 Reviewed In : 2025 |
Information Technology - Security Techniques - Encryption Algorithms Part 4: Stream Ciphers
|
May, 2025
|
1
|
Identical under single numbering
|
|
|
IS/ISO/IEC 18033-5:2015 Reviewed In : 2025 |
Information Technology - Security Techniques - Encryption Algorithms Part 5: Identity - Based Ciphers
|
May, 2025
|
1
|
Identical under single numbering
|
|
|
IS 19319:2025 |
Internet of Things Security and Privacy - Assessment and Evaluation
|
-
|
Indigenous
|
||
|
IS/ISO/IEC 19790:2026 |
Information Security Cybersecurity and Privacy Protection Security Requirements For Cryptographic Modules First Revision
|
-
|
Identical under single numbering
|
||
|
IS/ISO/IEC 19790:2012 ISO/IEC 19790:2012 Reviewed In : 2025 |
Information Technology - Security Techniques - Security Requirements for Cryptographic Modules
|
March, 2025
|
-
|
Identical under single numbering
|
|
|
IS/ISO/IEC 19792:2025 |
Information security cybersecurity and privacy protection General principles requirements and guidance for security evaluation of biometric systems First Revision
|
-
|
Identical under single numbering
|
||
|
IS/ISO/IEC 19792:2009 ISO/IEC 19792 :2009 Reviewed In : 2024 |
Information Technology - Security Techniques - Security Evaluation of Biometrics
|
August, 2024
|
-
|
Identical under single numbering
|
|
|
IS/ISO/IEC 19896-1:2018 ISO/IEC 19896-1 : 2018 |
IT Security Techniques - Competence Requirements for Information Security Testers and Evaluators Part 1: Introduction, Concepts and General Requirements
|
January, 2023
|
-
|
Identical under single numbering
|
|
|
IS/ISO/IEC 19896-2:2018 ISO/IEC 19896-2 : 2018 |
IT Security Techniques - Competence Requirements for Information Security Testers and Evaluators Part 2: Knowledge, Skills and Effectiveness Requirements for ISO/IEC 19790 Testers
|
January, 2023
|
-
|
Identical under single numbering
|
|
|
IS/ISO/IEC 19896-3:2018 ISO/IEC 19896-3 : 2018 |
IT Security Techniques - Competence Requirements for Information Security Testers and Evaluators Part 3: Knowledge, Skills and Effectiveness Requirements for ISO/IEC 15408 Evaluators
|
January, 2023
|
-
|
Identical under single numbering
|
|
|
IS/ISO/IEC 20540:2025 |
Information security cybersecurity and privacy protection Testing cryptographic modules in their field First Revision
|
-
|
Identical under single numbering
|
||
|
IS/ISO/IEC/TS 20540:2018 ISO/IEC TS 20540 : 2018 Reviewed In : 2023 |
Information Technology - Security Techniques - Testing Cryptographic Modules in their Operational Environment
|
January, 2023
|
-
|
Identical under single numbering
|
|
|
IS/ISO/IEC 20543:2019 ISO/IEC 20543:2019 Reviewed In : 2024 |
Information Technology - Security Techniques - Test and Analysis Methods for Random Bit Generators within ISO/IEC 19790 and ISO/IEC 15408
|
September, 2024
|
-
|
Identical under single numbering
|
|
|
IS/ISO/IEC 20547-4:2020 ISO/IEC 20547-4:2020 |
Information Technology - Big Data Reference Architecture Part 4: Security and Privacy
|
-
|
Identical under single numbering
|
||
|
IS/ISO/IEC 24745:2022 ISO/IEC 24745:2022 |
Information Security, Cyber Security and Privacy Protection - Biometric Information Protection
|
-
|
Identical under single numbering
|
||
|
IS/ISO/IEC 24759:2017 ISO/IEC 24759:2017 |
Information Technology - Security Techniques - Test Requirements for Cryptographic Modules
|
-
|
Identical under single numbering
|
||
|
IS/ISO/IEC 24761:2019 ISO/IEC 24761:2019 Reviewed In : 2024 |
Information Technology - Security Techniques - Authentication Context for Biometrics
|
September, 2024
|
-
|
Identical under single numbering
|
|
|
IS/ISO/IEC 27000:2018 ISO/IEC 27000 : 2018 Reviewed In : 2025 |
Information Technology - Security Techniques - Information Security Management Systems - Overview and Vocabulary ( First Revision )
|
June, 2025
|
-
|
Identical under single numbering
|
|
|
IS/ISO/IEC 27001:2022 ISO/IEC 27001 : 2022 |
Information Security, Cybersecurity and Privacy Protection - Information Security Management Systems - Requirements (Second Revision)
|
1
|
Identical under single numbering
|
||
|
IS/ISO/IEC 27002:2022 ISO/IEC 27002:2022 Reviewed In : 2025 |
Information Security, Cybersecurity and Privacy Protection - Information Security Controls ( First Revision )
|
July, 2025
|
-
|
Identical under single numbering
|
|
|
IS/ISO/IEC 27003:2017 ISO/IEC 27003 : 2017 Reviewed In : 2024 |
Information Technology - Security Techniques - Information Security Management Systems - Guidance ( First Revision )
|
September, 2024
|
-
|
Identical under single numbering
|
|
|
IS/ISO/IEC 27004:2016 ISO/IEC 27004 : 2016 Reviewed In : 2025 |
Information Technology - Security Techniques - Information Security Management - Monitoring, Measurement, Analysis and Evaluation ( First Revision )
|
May, 2025
|
-
|
Identical under single numbering
|
|
|
IS/ISO/IEC 27005:2022 ISO/IEC 27005:2022 |
Information Security, Cybersecurity and Privacy Protection - Guidance on Managing Information Security Risks ( Third Revision )
|
-
|
Identical under single numbering
|
||
|
IS/ISO/IEC 27006-1:2024 ISO/IEC 27006-1:2024 |
Information Security Cybersecurity and Privacy Protection Requirements for Bodies Providing Audit and Certification of Information Security Management Systems Part 1: General (Second Revision)
|
-
|
Identical under single numbering
|
||
|
IS/ISO/IEC 27007:2020 ISO/IEC 27007:2020 |
Information Security, Cybersecurity and Privacy Protection - Guidelines for Information Security Management Systems Auditing ( First Revision )
|
-
|
Identical under single numbering
|
||
|
IS/ISO/IEC/TS 27008:2019 ISO/IEC TS 27008 : 2019 Reviewed In : 2023 |
Information Technology - Security Techniques - Guidelines for the Assessment of Information Security Controls ( First Revision )
|
September, 2023
|
-
|
Identical under single numbering
|
|
|
IS/ISO/IEC 27010:2015 ISO/IEC 27010:2015 Reviewed In : 2024 |
Information Technology - Security Techniques - Information Security Management for Inter-Sector and Inter-Organizational Communications
|
May, 2024
|
-
|
Identical under single numbering
|
|
|
IS/ISO/IEC 27011:2024 ISO/IEC 27011:2024 |
Information Security, Cybersecurity and Privacy Protection - Information Security Controls Based on ISO/IEC 27002 for Telecommunications Organizations ( Second Revision )
|
-
|
Identical under single numbering
|
||
|
IS/ISO/IEC 27017:2015 ISO/IEC 27017 : 2015 Reviewed In : 2024 |
Information Technology - Security Techniques - Code of Practice for Information Security Controls Based on ISO/IEC 27002 for Cloud Services
|
June, 2024
|
-
|
Identical under single numbering
|
|
|
IS/ISO/IEC 27018:2019 ISO/IEC 27018 : 2019 Reviewed In : 2023 |
Information Technology - Security Techniques - Code of Practice for Protection of Personally Identifiable Information ( PII ) in Public Clouds Acting as PII Processors ( First Revision )
|
September, 2023
|
-
|
Identical under single numbering
|
|
|
IS/ISO/IEC 27019:2024 |
Information Security Cybersecurity and Privacy Protection Information Security Controls for the Energy Utility Industry First revision
|
-
|
Identical under single numbering
|
||
|
IS/ISO/IEC 27019:2017 ISO/IEC 27019 : 2017 Reviewed In : 2022 |
Information Technology - Security Techniques - Information Security Controls for the Energy Utility Industry
|
December, 2022
|
-
|
Identical under single numbering
|
|
|
IS/ISO/IEC 27032:2023 ISO/IEC 27032:2023 |
Cyber Security - Internet Security - Guidelines ( First Revision )
|
-
|
Identical under single numbering
|
||
|
IS/ISO/IEC 27033-4:2014 ISO/IEC 27033-4 : 2014 |
Information Technology - Security Techniques - Network Security Part 4: Securing Communications Between Networks Using Security Gateways
|
November, 2022
|
-
|
Identical under single numbering
|
|
|
IS/ISO/IEC 27033-7:2023 |
Information technology Network security Part 7: Guidelines for network virtualization security
|
-
|
|||
|
IS/ISO/IEC 27033-1:2015 ISO/IEC 27033-1 : 2015 Reviewed In : 2024 |
Information Technology - Security Techniques - Network Security Part 1: Overview and Concepts (First Revision)
|
June, 2024
|
-
|
Identical under single numbering
|
|
|
IS/ISO/IEC 27033-2:2012 ISO/IEC 27033-2 : 2012 Reviewed In : 2024 |
Information Technology - Security Techniques Part 2: Guidelines for the Design and Implementation of Network Security
|
July, 2024
|
-
|
Identical under single numbering
|
|
|
IS/ISO/IEC 27033-3:2010 Reviewed In : 2022 |
Information Technology - Security Techniques - Network Security Part 3: Reference Networking Scenarios - Threats, Design Techniques and Control Issues
|
January, 2022
|
-
|
Identical under single numbering
|
|
|
IS/ISO/IEC 27033-5:2013 ISO/IEC 27033-5 : 2013 Reviewed In : 2024 |
Information Technology - Security Techniques - Network Security Part 5: Securing Communications Across Networks Using Virtual Private Networks (VPNs)
|
June, 2024
|
-
|
Identical under single numbering
|
|
|
IS/ISO/IEC 27033-6:2016 ISO/IEC 27033-6 : 2016 Reviewed In : 2025 |
Information Technology - Security Techniques - Network Security Part 6: Securing Wireless IP Network Access
|
May, 2025
|
-
|
Identical under single numbering
|
|
|
IS/ISO/IEC 27034-3:2018 ISO/IEC 27034-3 : 2018 |
Information Technology - Application Security Part 3: Application Security Management Process
|
January, 2023
|
-
|
Identical under single numbering
|
|
|
IS/ISO/IEC/TS 27034-5-1):2018 ISO/IEC TS 27034-5-1 : 2018 |
Information Technology - Application Security Part 5-1 Protocols and Application Security Controls Data Structure, XML Schemas
|
January, 2023
|
-
|
Identical under single numbering
|
|
|
IS/ISO/IEC 27034-7:2018 ISO/IEC 27034-7 : 2018 |
Information Technology - Application Security Part 7: Assurance Prediction Framework
|
January, 2023
|
-
|
Identical under single numbering
|
|
|
IS/ISO/IEC 27034-1:2011 ISO/IEC 27034-1 : 2011 Reviewed In : 2024 |
Information Technology - Security Techniques - Application Security Part 1: Overview and Concepts
|
July, 2024
|
1
|
Identical under single numbering
|
|
|
IS/ISO/IEC 27034-2:2015 ISO/IEC 27034-2 : 2015 Reviewed In : 2025 |
Information Technology - Security Techniques - Application Security Part 2: Organization Normative Framework
|
May, 2025
|
-
|
Identical under single numbering
|
|
|
IS/ISO/IEC 27034-5:2017 ISO/IEC 27034-5 : 2017 Reviewed In : 2025 |
Information Technology - Security Techniques - Application Security Part 5: Protocols and Application Security Controls Data Structure
|
May, 2025
|
-
|
Identical under single numbering
|
|
|
IS/ISO/IEC 27034-6:2016 ISO/IEC 27034-6 : 2016 Reviewed In : 2025 |
Information Technology - Security Techniques - Application Security Part 6: Case Studies
|
May, 2025
|
-
|
Identical under single numbering
|
|
|
IS/ISO/IEC 27035-4:2024 |
Information Technology Information Security Incident Management Part 4: Coordination
|
-
|
|||
|
IS/ISO/IEC 27035-1:2023 ISO/IEC 27035-1 :2023 |
Information Technology - Information Security Incident Management Part 1: Principles and Process ( Second Revision )
|
-
|
Identical under single numbering
|
||
|
IS/ISO/IEC 27035-2:2023 ISO/IEC 27035-2 :2023 |
Information Technology - Information Security Incident Management Part 2: Guidelines to Plan and Prepare for Incident Response ( Second Revision )
|
-
|
Identical under single numbering
|
||
|
IS/ISO/IEC 27035-3:2020 ISO/IEC 27035-3:2020 |
Information Technology - Information Security Incident Management Part 3: Guidelines for ICT Incident Response Operations
|
-
|
Identical under single numbering
|
||
|
IS/ISO/IEC 27036-1:2021 ISO/IEC 27036-1: 2021 |
Cybersecurity - Supplier Relationships Part 1: Overview and Concepts ( First Revision )
|
-
|
Identical under single numbering
|
||
|
IS/ISO/IEC 27036-4:2016 ISO/IEC 27036-4 : 2016 |
Information Technology - Security Techniques - Information Security for Supplier Relationships Part 4: Guidelines for Security of Cloud Services
|
December, 2022
|
-
|
Identical under single numbering
|
|
|
IS/ISO/IEC 27036-2:2022 ISO/IEC 27036-2:2022 |
Cybersecurity - Supplier Relationships Part 2: Requirements
|
-
|
Identical under single numbering
|
||
|
IS/ISO/IEC 27036-3:2023 ISO/IEC 27036-3:2023 |
Cybersecurity - Supplier Relationships Part 3: Guidelines for Hardware Software and Services Supply Chain Security ( First Revision )
|
-
|
Identical under single numbering
|
||
|
IS/ISO/IEC 27037:2012 ISO/IEC 27037 : 2012 Reviewed In : 2024 |
Information Technology - Security Techniques - Guidelines for Identification, Collection, Acquisition and Preservation of Digital Evidence
|
June, 2024
|
-
|
Identical under single numbering
|
|
|
IS/ISO/IEC 27040:2024 ISO/IEC 27040:2024 |
Information Technology - Security Techniques - Storage Security ( First Revision )
|
-
|
Identical under single numbering
|
||
|
IS/ISO/IEC 27050-4:2021 ISO/IEC 27050-4: 2021 |
Information Technology - Electronic Discovery Part 4: Technical Readiness
|
-
|
Identical under single numbering
|
||
|
IS/ISO/IEC 27050-1:2019 ISO/IEC 27050-1:2019 Reviewed In : 2024 |
Information Technology - Electronic Discovery Part 1: Overview and Concepts ( First Revision )
|
November, 2024
|
-
|
Identical under single numbering
|
|
|
IS/ISO/IEC 27050-2:2018 ISO/IEC 27050-2:2018 |
Information Technology - Electronic Discovery Part 2: Guidance for Governance and Management of Electronic Discovery
|
-
|
Identical under single numbering
|
||
|
IS/ISO/IEC 27050-3:2020 ISO/IEC 27050-3:2020 Reviewed In : 2024 |
Information Technology - Electronic Discovery Part 3: Code of Practice for Electronic Discovery ( First Revision )
|
September, 2024
|
-
|
Identical under single numbering
|
|
|
IS/ISO/IEC 27071:2023 ISO/IEC 27071:2023 |
Cybersecurity - Security Recommendations for Establishing Trusted Connections Between Devices and Services
|
-
|
Identical under single numbering
|
||
|
IS/ISO/IEC 27099:2022 ISO/IEC 27099:2022 |
Information Technology - Public Key Infrastructure - Practices and Policy Framework
|
-
|
Identical under single numbering
|
||
|
IS/ISO/IEC/TS 27100:2020 ISO/IEC TS 27100:2020 |
Information Technology - Cyber Security - Overview and Concepts
|
-
|
Identical under single numbering
|
||
|
IS/ISO/IEC/TR 27103:2018 ISO/IEC TR 27103 : 2018 |
Information Technology - Security Techniques - Cybersecurity and ISO and IEC Standards
|
January, 2023
|
-
|
Identical under single numbering
|
|
|
IS/ISO/IEC 27400:2022 ISO/IEC 27400: 2022 |
Cybersecurity - IoT Security and Privacy - Guidelines
|
-
|
Identical under single numbering
|
||
|
IS/ISO/IEC 27402:2023 ISO/IEC 27402:2023 |
Cybersecurity - IoT Security and Privacy - Device Baseline Requirements
|
-
|
Identical under single numbering
|
||
|
IS/ISO/IEC 27403:2024 |
Cybersecurity IoT security and privacy Guidelines for IoT-domotics
|
-
|
|||
|
IS/ISO/IEC/TR 27550:2019 ISO/IEC TR 27550:2019 Reviewed In : 2024 |
Information Technology - Security Techniques - Privacy Engineering for System Life Cycle Processes
|
September, 2024
|
-
|
Identical under single numbering
|
|
|
IS/ISO/IEC 27561:2024 |
Information Security Cybersecurity and Privacy Protection Privacy Operationalisation Model and Method for Engineering POMME
|
-
|
|||
|
IS/ISO/IEC 29100:2024 ISO/IEC 29100:2024 |
Information Technology - Security Techniques - Privacy Framework (First Revision)
|
-
|
Identical under single numbering
|
||
|
IS/ISO/IEC 29101:2018 ISO/IEC 29101 : 2018 Reviewed In : 2023 |
Information Technology - Security Techniques - Privacy Architecture Framework
|
September, 2023
|
-
|
Identical under single numbering
|
|
|
IS/ISO/IEC 29184:2020 ISO/IEC 29184:2020 Reviewed In : 2024 |
Information Technology - Online Privacy Notices and Consent
|
September, 2024
|
-
|
Identical under single numbering
|
|
|
IS/ISO/IEC 29192-5:2016 ISO/IEC 29192-5 : 2016 |
Information Technology - Security Techniques - Lightweight Cryptography Part 5: Hash-Functions
|
December, 2022
|
-
|
Identical under single numbering
|
|
|
IS/ISO/IEC 29192-1:2012 ISO/IEC 29192-1 : 2012 Reviewed In : 2024 |
Information Technology - Security Techniques - Lightweight Crytography Part 1: General
|
June, 2024
|
-
|
Identical under single numbering
|
|
|
IS/ISO/IEC 29192-2:2019 ISO/IEC 29192-2: 2019 Reviewed In : 2024 |
Information Security - Lightweight Cryptography Part 2: Block Ciphers ( First Revision )
|
September, 2024
|
-
|
Identical under single numbering
|
|
|
IS/ISO/IEC 29192-3:2012 ISO/IEC 29192-3 : 2012 Reviewed In : 2024 |
Information Technology - Security Techniques - Lightweight Cryptography Part 3: Stream Ciphers
|
May, 2024
|
-
|
Identical under single numbering
|
|
|
IS/ISO/IEC 29192-4:2013 ISO/IEC 29192-4 : 2013 Reviewed In : 2024 |
Information Technology - Security Techniques - Lightweight Cryptography Part 4: Mechanisms Using Asymmetric Techniques
|
June, 2024
|
1
|
Identical under single numbering
|
|
|
IS/ISO/IEC 29192-6:2019 ISO/IEC 29192-6:2019 Reviewed In : 2024 |
Information Technology - Lightweight Cryptography Part 6: Message Authentication Codes ( MACs )
|
September, 2024
|
-
|
Identical under single numbering
|
|
|
IS/ISO/IEC 29192-7:2019 ISO/IEC 29192-7:2019 Reviewed In : 2024 |
Information Security - Lightweight Cryptography Part 7: Broadcast Authentication Protocols
|
September, 2024
|
-
|
Identical under single numbering
|
|
|
IS/ISO/IEC 29192-8:2022 ISO/IEC 29192-8:2022 |
Information Security - Lightweight Cryptography Part 8: Authenticated Encryption
|
-
|
Identical under single numbering
|
||
|
IS/ISO/IEC 9796-2:2010 ISO/IEC 9796-2 : 2010 Reviewed In : 2024 |
Information Technology - Security Techniques - Digital Signature Schemes Giving Message Recovery Part 2: Integer Factorization Based Mechanisms ( First Revision )
|
June, 2024
|
-
|
Identical under single numbering
|
|
|
IS/ISO/IEC 9796-3:2006 Reviewed In : 2025 |
Information Technology - Security Techniques - Digital Signature Schemes Giving Message Recovery Part 3: Discrete Logarithm Based Mechanisms
|
April, 2025
|
-
|
Identical under single numbering
|
| No Records Found |
| No Records Found |
| No Records Found |
| No Records Found | ||
| No Records Found | ||
|
LITD 17 (03444)
Revision of: IS/ISO/IEC 9796:2010 |
Information Technology - Security Techniques - Digital Signature Schemes giving Message Recovery Part 2 Integer Factorization based Mechanisms First Revision | |
|
LITD 17 (03445)
|
INFORMATION TECHNOLOGY SECURITY TECHNIQUES KEY MANAGEMENT PART 1 FRAMEWORK | |
|
LITD 17 (03446)
|
INFORMATION TECHNOLOGY SECURITY TECHNIQUES KEY MANAGEMENT PART 2 MECHANISMS USING SYMMETRIC TECHNIQUES | |
|
LITD 17 (03447)
|
INFORMATION TECHNOLOGY SECURITY TECHNIQUES KEY MANAGEMENT PART 3 MECHANISMS USING ASYMMETRIC TECHNIQUES | |
|
LITD 17 (03448)
|
INFORMATION TECHNOLOGY SECURITY TECHNIQUES KEY MANAGEMENT PART 4 MECHANISMS BASED ON WEAK SECRETS | |
|
LITD 17 (03449)
|
INFORMATION TECHNOLOGY SECURITY TECHNIQUES KEY MANAGEMENT PART 5 GROUP KEY MANAGEMENT | |
|
LITD 17 (03452)
|
INFORMATION TECHNOLOGY SECURITY TECHNIQUES DIGITAL SIGNATURES WITH APPENDIX PART 3 DISCRETE LOGARITHM BASED MECHANISMS | |
|
LITD 17 (03454)
|
INFORMATION TECHNOLOGY SECURITY TECHNIQUES PART 2 GUIDELINES FOR THE DESIGN AND IMPLEMENTATION OF NETWORK SECURITY | |
|
LITD 17 (03456)
|
INFORMATION TECHNOLOGY SECURITY TECHNIQUES NETWORK SECURITY PART 4 SECURING COMMUNICATIONS BETWEEN NETWORKS USING SECURITY GATEWAYS | |
|
LITD 17 (03457)
|
INFORMATION TECHNOLOGY SECURITY TECHNIQUES NETWORK SECURITY PART 5 SECURING COMMUNICATIONS ACROSS NETWORKS USING VIRTUAL PRIVATE NETWORKS VPNS | |
|
LITD 17 (03458)
|
INFORMATION TECHNOLOGY SECURITY TECHNIQUES APPLICATION SECURITY PART 1 OVERVIEW AND CONCEPTS | |
|
LITD 17 (03459)
|
INFORMATION TECHNOLOGY SECURITY TECHNIQUES INFORMATION SECURITY INCIDENT MANAGEMENT | |
|
LITD 17 (03460)
|
INFORMATION TECHNOLOGY SECURITY TECHNIQUES INFORMATION SECURITY FOR SUPPLIER RELATIONSHIPS PART 1 OVERVIEW AND CONCEPTS | |
|
LITD 17 (03461)
|
INFORMATION TECHNOLOGY SECURITY TECHNIQUES INFORMATION SECURITY FOR SUPPLIER RELATIONSHIPS PART 3 GUIDELINES FOR INFORMATION ANS COMMUNICATION TECHNOLOGY SUPPLY CHAIN SECURITY | |
|
LITD 17 (03462)
|
INFORMATION TECHNOLOGY COMMON BIOMETRIC EXCHANGE FORMATS FRAMEWORK PART 2 PROCEDURES FOR THE OPERATION OF THE BIOMETRIC REGISTRATION AUTHORITY | |
|
LITD 17 (03467)
|
INFORMATION TECHNOLOGY SECURITY TECHNIQUES CODE OF PRACTICE FOR INFORMATION SECURITY CONTROLS | |
|
LITD 17 (03228)
|
INFORMATION TECHNOLOGY-SECURITY TECHNIQUES - NETWORK SECURITY PART 3 REFERENCE NETWORKING SCENARIOS -THREATS DESIGN TECHNIQUES AND CONTROL ISSUES | |
|
LITD 17 (03248)
|
Information Technology - Biometric Applicaton Programming Interface Part 2 Biometric Archive Function Provider Interface | |
|
LITD 17 (03249)
|
Information technology Biometric Application Programming Interface Part 4 Biometric Sensor Function provider interface | |
|
LITD 17 (03412)
Revision of: IS/ISO/IEC 27005:2018 |
Information Technology - Security Techniques - Information Security Risk Mangement First Revision | |
|
LITD 17 (03368)
Revision of: IS 14990:2016 |
Information Technology - Security Techniques - Evaluation Criteria for it Security Part 3 Security Assurance Requirements Second Revision | |
|
LITD 17 (03413)
Revision of: IS/ISO/IEC 27006:2015 |
Information Technology - Security Techniques - Requirements for the Accreditation of Bodies Providing Certification of Information Security Mangement Systems First Revision | |
|
LITD 17 (03410)
Revision of: IS 15671:2016 |
Information Technology - Security Techniques - Methodology For IT Security Evaluation First Revision | |
|
LITD 17 (03367)
Revision of: IS 14990:2017 |
Information Technology - Security Techniques - Evaluation Criteria for it Security Part 2 Security Functional Requirements Second Revision | |
|
LITD 17 (03366)
|
Information Technology - Security Techniques - Information Security Mangement Guidelines For Telecommunications Organizations Based on ISO IEC 27002 | |
|
LITD 17 (03441)
Revision of: IS/ISO/IEC 27001:2013 |
Information Technology - Security Techniques - Information Security Mangement - Requirements First Revision | |
|
LITD 17 (03575)
|
Information Technology- Biometric data interchange formats Part 2 Finger minutiae data | |
|
LITD 17 (03577)
|
Information Technology - Biometric data interchange formats Part 4 Finger image data | |
|
LITD 17 (03580)
|
Information Technology - Biometric data interchange formats Part 7 Signature Sign time series data | |
|
LITD 17 (03581)
|
Information Technology - Biometric data interchange formats Part 8 Finger pattern skeletal data | |
|
LITD 17 (03582)
|
Information Technology - Biometric data interchange formats - Part 9 Vascular image data conformance testing methodology | |
|
LITD 17 (03583)
|
Information Technology - Biometric data interchange formats - Part 10 Hand geometry silhouette data | |
|
LITD 17 (03584)
|
Information Technology - Biometric data interchange formats - Part 11 Signature Sign processed dynamic data | |
|
LITD 17 (03585)
|
INFORMATION TECHNOLOGY BIOMETRIC DATA INTERCHANGE FORMATS PART 14 DNA DATA | |
|
LITD 17 (03586)
|
Information Technology - Conformance testing methodology for biometric data interchange formats defined in ISO IEC 19794 - Part 1 Generalized conformance testing methodology | |
|
LITD 17 (03587)
|
Information Technology Conformance testing methodology for biometric data interchange formats defined in ISO IEC 19794 Part 2 Finger minutiae data | |
|
LITD 17 (03588)
|
Information Technology - Conformance testing methodology for biometric data interchange formats defined in ISO IEC 19794 Part 4 Finger image data | |
|
LITD 17 (03589)
|
Information Technology - Conformance testing methodology for biometric data interchange formats defined in ISO IEC 19794 Part 5 Face image data | |
|
LITD 17 (03590)
|
Information Technology - Conformance testing methodology for biometric data interchange formats defined in ISO IEC 19794 Part 7 Signature Sign series data | |
|
LITD 17 (03591)
|
Information Technology - Conformance testing methodology for biometric data interchange formats defined in ISO IEC 19794 Part 8 Finger pattern skeletal data | |
|
LITD 17 (03592)
|
Information Technology - Conformance testing methodology for biometric data interchange formats defined in ISO IEC 19794 Part 9 Vascular image data | |
|
LITD 17 (03593)
|
Information Technology Conformance testing methodology for biometric data interchange formats defined in ISO IEC 19794 Part 10 Hand geometry silhouette data | |
|
LITD 17 (10651)
|
Information technology Security techniques Guidelines for identification collection acquisition and preservation of digital evidence | |
|
LITD 17 (10672)
|
Information technology -- Security techniques -- Guidelines for cyber security | |
|
LITD 17 (10673)
|
Information security management for inter-sector and inter-organizational communications | |
|
LITD 17 (10674)
|
Code of practice for protection of personally identifiable information PII in public clouds acting as PII processors | |
|
LITD 17 (10675)
|
Guidance for auditors on ISMS controls focused on the information security controls | |
|
LITD 17 (10676)
|
Information technology -- Security techniques -- Selection deployment and operations of intrusion detection systems IDPS | |
|
LITD 17 (10677)
|
Information technology -- Security techniques -- Storage security | |
|
LITD 17 (10678)
|
Information technology -- Security techniques -- Requirements for bodies providing audit and certification of information security management systems | |
|
LITD 17 (10679)
|
Information technology -- Security techniques -- Code of practice for information security controls based on ISOIEC 27002 for cloud services | |
|
LITD 17 (10680)
|
Information technology security techniques network security Part 1 overview and concepts | |
|
LITD 17 (10696)
|
Information technology -- Security techniques -- Privacy framework | |
|
LITD 17 (10698)
|
Information technology -- Security techniques -- Lightweight cryptography -- Part 1 General | |
|
LITD 17 (10699)
|
Information technology -- Security techniques -- Lightweight cryptography -- Part 2 Block ciphers | |
|
LITD 17 (10700)
|
Information technology -- Security techniques -- Lightweight cryptography -- Part 3 Stream ciphers | |
|
LITD 17 (10701)
|
INFORMATION TECHNOLOGY SECURITY TECHNIQUES LIGHTWEIGHT CRYPTOGRAPHY PART 4 MECHANISMS USING ASYMMETRIC TECHNIQUES | |
|
LITD 17 (10702)
|
Information technology -- Security techniques -- Cryptographic techniques based on elliptic curves Part 1 General | |
|
LITD 17 (10703)
|
Information technology -- Security techniques -- Encryption algorithms -- Part 2 Asymmetric ciphers | |
|
LITD 17 (10704)
|
Information technology -- Security techniques -- Encryption algorithms -- Part 1 General | |
|
LITD 17 (10705)
|
Information technology -- Security techniques -- Encryption algorithms -- Part 3 Block ciphers | |
|
LITD 17 (10706)
|
Information technology -- Security techniques -- Time-stamping services -- Part 1 Framework | |
|
LITD 17 (10707)
|
Information technology -- Security techniques -- Time-stamping services -- Part 2 Mechanisms producing independent tokens | |
|
LITD 17 (10708)
|
Information technology -- Security techniques -- Time-stamping services -- Part 3 Mechanisms producing linked tokens | |
|
LITD 17 (10709)
|
Information technology -- Security techniques -- Random bit generation | |
|
LITD 17 (11839)
Revision of: IS/ISO/IEC 27004:2016 |
INFORMATION TECHNOLOGY SECURITY TECHNIQUES - INFORMATION SECURITY MANAGEMENT - MONITORING MEASUREMENT ANALYSIS AND EVALUATION | |
|
LITD 17 (12158)
Revision of: IS/ISO/IEC 27003:2017 |
INFORMATION TECHNOLOGY SECURITY TECHNIQUES INFORMATION SECURITY MANAGEMENT SYSTEMS GUIDANCE First Revision | |
|
LITD 17 (12160)
Revision of: IS 15116:2018 |
INFORMATION TECHNOLOGY SECURITY TECHNIQUES MODES OF OPERATION FOR AN n-BIT BLOCK CIPHER Second Revision | |
|
LITD 17 (12162)
|
DATA PRIVACY ASSURANCE Part 1 ENGINEERING AND MANAGEMENT REQUIREMENTS | |
|
LITD 17 (12163)
|
DATA PRIVACY ASSURANCE Part 2 ENGINEERING AND MANAGEMENT GUIDELINES | |
|
LITD 17 (12225)
|
Information Technology - Biometric Application Programming Interface Part 2 Biometric Archive Function Provider Interface Amendment - 1 | |
|
LITD 17 (12227)
|
Information Technology - Biometric Application Programming Interface Part 4 Biometric Sensor Function Provider Interface Amendment - 1 | |
|
LITD 17 (12699)
|
Information technology Security techniques Digital signatures with appendix Part 1 General | |
|
LITD 17 (12700)
|
Information technology - Security techniques - Digital signatures with appendix - Part 2 Integer factorization based mechanisms | |
|
LITD 17 (12701)
Revision of: IS/ISO/IEC 27035:2011 |
Information technology - Security techniques - Information security incident management - Part 1 Principles of incident management | |
|
LITD 17 (12702)
Revision of: IS/ISO/IEC 27035:2011 |
Information technology - Security techniques - Information security incident management - Part 2 Guidelines to plan and prepare for incident response | |
|
LITD 17 (12703)
Revision of: IS/ISO/IEC 11770:2015 |
Information technology - Security techniques - Key management - Part 3 Mechanisms using asymmetric techniques First Revision | |
|
LITD 17 (12704)
Revision of: IS/ISO/IEC 11770-4:2017 |
Information technology - Security techniques - Key management - Part 4 Mechanisms based on weak secrets First Revision | |
|
LITD 17 (12705)
|
Information technology - Security techniques - Network security - Part 6 Securing wireless IP network access | |
|
LITD 17 (12706)
|
Information technology -- Security techniques -- Time-stamping services -- Part 4 Traceability of time sources | |
|
LITD 17 (12707)
|
Information technology -- Security techniques -- Electronic discovery -- Part 1 Overview and concepts | |
|
LITD 17 (12708)
|
Information technology -- Security techniques -- Electronic discovery -- Part 3 Code of practice for electronic discovery | |
|
LITD 17 (12709)
|
Information technology - Security techniques - Application security - Part 2 Organization normative framework | |
|
LITD 17 (12710)
|
Information technology -- Security techniques -- Application security -- Part 5 Protocols and application security controls data structure | |
|
LITD 17 (12711)
|
Information technology - Security techniques - Application security - Part 6 Case studies | |
|
LITD 17 (12712)
|
Information technology -- Security techniques -- Guidance for the production of protection profiles and security targets | |
|
LITD 17 (12714)
|
Information technology Security techniques Encryption algorithms Part 2 Asymmetric ciphers AMENDMENT 1 FACE | |
|
LITD 17 (12715)
|
Information technology Security techniques Encryption algorithms Part 4 Stream ciphers | |
|
LITD 17 (12716)
|
Information technology Security techniques Encryption algorithms Part 5 Identity-based ciphers | |
|
LITD 17 (12717)
Revision of: IS/ISO/IEC 27000:2018 |
Information technology -- Security techniques -- Information security management systems -- Overview and vocabulary First revision | |
|
LITD 17 (12718)
|
Information technology -- Security techniques -- Guidelines for information security management systems auditing | |
|
LITD 17 (13569)
|
INFORMATION TECHNOLOGY SECURITY TECHNIQUES INFORMATION SECURITY CONTROLS FOR THE ENERGY UTILITY INDUSTRY | |
|
LITD 17 (13571)
|
INFORMATION TECHNOLOGY SECURITY TECHNIQUES INFORMATION SECURITY FOR SUPPLIER RELATIONSHIPS Part 4 Guidelines for security of cloud services | |
|
LITD 17 (13727)
|
INFORMATION TECHNOLOGY BIOMETRIC APPLICATION PROGRAMMING INTERFACE PART 1 BIOAPI SPECIFICATION | |
|
LITD 17 (13728)
Revision of: IS/ISO/IEC 27005:2018 |
INFORMATION TECHNOLOGY SECURITY TECHNIQUES INFORMATION SECURITY RISK MANAGEMENT | |
|
LITD 17 (13729)
Revision of: IS/ISO/IEC 27011:2016 |
INFORMATION TECHNOLOGY SECURITY TECHNIQUES CODE OF PRACTICE FOR INFORMATION SECURITY CONTROLS BASED ON ISOIEC 27002 FOR TELECOMMUNICATIONS ORGANIZATIONS | |
|
LITD 17 (13730)
|
INFORMATION TECHNOLOGY BIOMETRIC DATA INTERCHANGE FORMAT PART 15 PALM CREASE IMAGE DATA | |
|
LITD 17 (13731)
|
INFORMATION TECHNOLOGY BIOMETRIC DATA INTERCHANGE FORMATS PART 13 VOICE DATA | |
|
LITD 17 (13732)
|
INFORMATION TECHNOLOGY SECURITY TECHNIQUES LIGHTWEIGHT CRYPTOGRAPHY PART 5 HASH-FUNCTIONS | |
|
LITD 17 (13816)
|
IT SECURITY TECHNIQUES COMPETENCE REQUIREMENTS FOR INFORMATION SECURITY TESTERS AND EVALUATORS PART 1 INTRODUCTION CONCEPTS AND GENERAL REQUIREMENTS | |
|
LITD 17 (13818)
|
IT SECURITY TECHNIQUES COMPETENCE REQUIREMENTS FOR INFORMATION SECURITY TESTERS AND EVALUATORS PART 2 KNOWLEDGE SKILLS AND EFFECTIVENESS REQUIREMENTS FOR ISOIEC 19790 TESTERS | |
|
LITD 17 (13819)
|
IT SECURITY TECHNIQUES COMPETENCE REQUIREMENTS FOR INFORMATION SECURITY TESTERS AND EVALUATORS PART 3 KNOWLEDGE SKILLS AND EFFECTIVENESS REQUIREMENTS FOR ISOIEC 15408 EVALUATORS | |
|
LITD 17 (13820)
|
INFORMATION TECHNOLOGY SECURITY TECHNIQUES TESTING CRYPTOGRAPHIC MODULES IN THEIR OPERATIONAL ENVIRONMENT | |
|
LITD 17 (13821)
|
INFORMATION TECHNOLOGY GUIDANCE FOR BIOMETRIC ENROLMENT | |
|
LITD 17 (13822)
|
INFORMATION TECHNOLOGY SECURITY TECHNIQUES CYBERSECURITY AND ISO AND IEC STANDARDS | |
|
LITD 17 (13823)
|
INFORMATION TECHNOLOGY APPLICATION SECURITY PART 3 APPLICATION SECURITY MANAGEMENT PROCESS | |
|
LITD 17 (13824)
|
INFORMATION TECHNOLOGY APPLICATION SECURITY PART 5-1 PROTOCOLS AND APPLICATION SECURITY CONTROLS DATA STRUCTURE XML SCHEMAS | |
|
LITD 17 (13825)
|
Information technology Application security Part 7 Assurance prediction framework | |
|
LITD 17 (13826)
Revision of: IS/ISO/IEC 14888:2018 |
IT SECURITY TECHNIQUES DIGITAL SIGNATURES WITH APPENDIX PART 3 DISCRETE LOGARITHM BASED MECHANISMS First Revision | |
|
LITD 17 (13904)
|
INFORMATION TECHNOLOGY SECURITY TECHNIQUES KEY MANAGEMENT PART 6 KEY DERIVATION | |
|
LITD 17 (14243)
|
Information Technology Security Techniques Random Bit Generation Amendment - 1 | |
|
LITD 17 (14244)
|
Information Technology - biometric Data interchange formats part 1 Framework Amendment - 1 | |
|
LITD 17 (14245)
|
Information Technology - Biometric Data interchange formats part 7 Signature Sign Time Series Data Amendment - 1 | |
|
LITD 17 (14246)
|
Information Technology - Biometric Data interchange formats part 9 vascular image Data Amendment - 1 | |
|
LITD 17 (14247)
|
Information Technology- Biometric Data Interchange Formats Part 14 DNA Data Amendment - 1 | |
|
LITD 17 (14248)
|
Information Technology - Security Techniques - Lightweight Cryptography Part 4 Mechanisms Using Asymmetric Techniques Amendment - 1 | |
|
LITD 17 (14249)
|
Information Technology Biometric Data Interchange Formats Part 4 Finger Image Data Amendment - 1 | |
|
LITD 17 (14276)
|
INFORMATION TECHNOLOGY BIOMETRIC DATA INTERCHANGE FORMATS PART 3 FINGER PATTERN SPECTRAL DATA | |
|
LITD 17 (14277)
|
INFORMATION TECHNOLOGY BIOMETRIC DATA INTERCHANGE FORMATS PART 5 FACE IMAGE DATA | |
|
LITD 17 (14281)
|
INFORMATION TECHNOLOGY BIOMETRIC DATA INTERCHANGE FORMATS PART 6 IRIS IMAGE DATA | |
|
LITD 17 (14996)
|
Mobile Device Security Part 1 Overview | |
|
LITD 17 (14997)
|
Mobile Device Security Part 2 Security Requirements | |
|
LITD 17 (14998)
|
Mobile Device Security Part 3 Security levels | |
|
LITD 17 (14999)
|
Mobile Device Security Part 4 Assessment and Evaluation | |
|
LITD 17 (15068)
Revision of: IS/ISO/IEC 11770:2018 |
Information technology - Security techniques - Key management Part 2 mechanisms using symmetric techniques | |
|
LITD 17 (15069)
Revision of: IS/ISO/IEC/TS 27008:2019 |
Information Technology Security Techniques Guidelines for Auditors on Information Security Controls | |
|
LITD 17 (15070)
Revision of: IS/ISO/IEC 27018:2019 |
Information Technology - Security Techniques - Code of Practice for Protection of Personally Identifiable Information Pll in Public Clouds Acting as Pll Processors | |
|
LITD 17 (15071)
|
Information technology -- Security techniques -- Privacy architecture framework | |
|
LITD 17 (15075)
|
Information technology - Security techniques - Application Security Part 1 overview and concepts Amendment - 1 | |
|
LITD 17 (15076)
|
Information Technology - Security Techniques - Privacy Framework Amendment - 1 | |
|
LITD 17 (15078)
|
Information technology - Security techniques - digital signatures with appendix Part 2 integer factorization based mechanisms Amendment - 1 | |
|
LITD 17 (15079)
|
Information technologies - Security techniques - Information Security management systems - Requirements First Revision Amendment - 1 | |
|
LITD 17 (16422)
|
Information Technology Security techniques Security evaluation of biometrics | |
|
LITD 17 (16653)
Revision of: IS/ISO/IEC 27050:2016 |
Information technology Electronic discovery Part 1 Overview and concepts | |
|
LITD 17 (16654)
Revision of: IS/ISO/IEC 29192:2012 |
Information security Lightweight cryptography Part 2 Block ciphers First Revision | |
|
LITD 17 (16694)
|
AMENDMNET 1 TO Information technology - Security techniques - Key management Part 4 mechanisms based on weak Secrets First Revision Amendment - 1 | |
|
LITD 17 (16695)
|
Amendment 1 to 18033-4 Information technology - Security techniques - encryption algorithms Part 4 stream ciphers | |
|
LITD 17 (16696)
|
Amendment 1 to Information technology - Security techniques - Requirements for bodies providing audit and Certification of Information Security Management systems First Revision | |
|
LITD 17 (16733)
|
Information technology Lightweight cryptography Part 6 Message authentication codes MACs | |
|
LITD 17 (16734)
|
Information security Lightweight cryptography Part 7 Broadcast authentication protocols | |
|
LITD 17 (16742)
|
Information technology Security techniques Test and analysis methods for random bit generators within ISOIEC 19790 and ISOIEC 15408 | |
|
LITD 17 (16743)
|
Information technology Security techniques Authentication context for biometrics | |
|
LITD 17 (16752)
|
Information technology Security techniques Privacy engineering for system life cycle processes | |
|
LITD 17 (16753)
Revision of: IS/ISO/IEC 27007:2017 |
Information security cybersecurity and privacy protection Guidelines for information security management systems auditing | |
|
LITD 17 (16755)
|
Information technology Online privacy notices and consent | |
|
LITD 17 (16756)
Revision of: IS/ISO/IEC 27050:2017 |
Information technology Electronic discovery Part 3 Code of practice for electronic discovery | |
|
LITD 17 (16938)
|
INFORMATION TECHNOLOGY SECURITY TECHNIQUES SECURITY REQUIREMENTS FOR CRYPTOGRAPHIC MODULES | |
|
LITD 17 (17502)
Revision of: IS/ISO/IEC 11770:2011 |
INFORMATION SECURITY KEY MANAGEMENT PART 5 GROUP KEY MANAGEMENT First Revision | |
|
LITD 17 (17505)
|
Information technology - Security techniques - Encryption algorithms Part 5 identity - Based ciphers Amendment - 1 | |
|
LITD 17 (18133)
|
Information technology - Security techniques - Key management Part 4 mechanisms based on weak Secrets First Revision Amendment - 2 | |
|
LITD 17 (18209)
|
INFORMATION TECHNOLOGY BIG DATA REFERENCE ARCHITECTURE PART 4 SECURITY AND PRIVACY | |
|
LITD 17 (18210)
|
INFORMATION TECHNOLOGY INFORMATION SECURITY INCIDENT MANAGEMENT PART 3 GUIDELINES FOR ICT INCIDENT RESPONSE OPERATIONS | |
|
LITD 17 (18211)
|
INFORMATION TECHNOLOGY CYBERSECURITY OVERVIEW AND CONCEPTS | |
|
LITD 17 (18442)
|
Information technology - Security techniques - Modes of operation for an n - Bit block cipher Second Revision Amendment - 1 | |
|
LITD 17 (18953)
Revision of: IS/ISO/IEC 27002:2013 |
Information security cybersecurity and privacy protection Information security controls | |
|
LITD 17 (19027)
Revision of: IS/ISO/IEC 27036:2014 |
Cybersecurity Supplier relationships Part 1 Overview and concepts First Revision | |
|
LITD 17 (19028)
|
Information technology -Electronic discovery Part 4 Technical readiness | |
|
LITD 17 (19029)
Revision of: IS/ISO/IEC 18033:2015 |
Information security Encryption algorithms Part 1 General First Revision | |
|
LITD 17 (19031)
|
Information Technology-Security Techniques - Encryption Algorithms Part 3 Block Ciphers Amendment - 1 | |
|
LITD 17 (19039)
|
Information security Key management Part 7 Cross-domain password-based authenticated key exchange | |
|
LITD 17 (19040)
Revision of: IS/ISO/IEC 18014:2009 |
Information security Time- stamping services Part 2 Mechanisms producing independent tokens | |
|
LITD 17 (19042)
Revision of: IS/ISO/IEC 11770:2015 |
Information security Key management Part 3 Mechanisms using asymmetric techniques Second Revision | |
|
LITD 17 (19143)
|
Internet of Things Security and Privacy - Assessment and Evaluation | |
|
LITD 17 (19171)
|
Information security cybersecurity and privacy protection Biometric information protection | |
|
LITD 17 (20436)
Revision of: IS/ISO/IEC 27001:2013 |
Information security cybersecurity and privacy protection Information security management systems Requirements | |
|
LITD 17 (21674)
Revision of: IS 14990:2017 |
Information security cybersecurity and privacy protection Evaluation criteria for IT security Part 2 Security functional components Third Revision | |
|
LITD 17 (21676)
Revision of: IS 15671:2016 |
Information Security Cybersecurity and Privacy Protection Evaluation Criteria for IT Security Methodology for IT Security Evaluation Second Revision | |
|
LITD 17 (21685)
Revision of: IS/ISO/IEC 27035:2016 |
Information Technology Information Security Incident Management Part 1 Principles and Process Second Revision | |
|
LITD 17 (21686)
Revision of: IS/ISO/IEC 27035:2016 |
Information Technology Information security incident management Part 2 Guidelines to plan and prepare for incident response Second Revision | |
|
LITD 17 (21691)
Revision of: IS 14990:2012 |
Information Security Cybersecurity and Privacy Protection Evaluation Criteria for IT Security Part 1 Introduction and General Model Third Revision | |
|
LITD 17 (21692)
Revision of: IS 14990:2016 |
Information Security Cybersecurity and Privacy Protection Evaluation Criteria for IT Security Part 3 Security Assurance Components Third Revision | |
|
LITD 17 (21694)
Revision of: IS/ISO/IEC 27005:2018 |
Information security cybersecurity and privacy protection Guidance on managing information security risks | |
|
LITD 17 (21695)
|
Information Security Cybersecurity and Privacy Protection Evaluation Criteria for IT Security Part 4 Framework for the Specification of Evaluation Methods and Activities | |
|
LITD 17 (21696)
|
Information Security Cybersecurity and Privacy Protection Evaluation Criteria for IT Security Part 5 Pre-defined Packages of Security Requirements | |
|
LITD 17 (22419)
|
Information Security Lightweight Cryptography Part 8 Authenticated Encryption | |
|
LITD 17 (22427)
|
Cybersecurity Supplier Relationships Part 2 Requirements | |
|
LITD 17 (23011)
|
Information technology Public key infrastructure Practices and policy framework | |
|
LITD 17 (23560)
Revision of: IS/ISO/IEC 27032:2012 |
Cybersecurity Guidelines for Internet security | |
|
LITD 17 (23561)
|
Information technology Security techniques Test requirements for cryptographic modules | |
|
LITD 17 (23562)
|
Cybersecurity IoT Security and Privacy Guidelines | |
|
LITD 17 (24467)
|
Cybersecurity - Security Recommendations for Establishing Trusted Connections Between Devices and Services | |
|
LITD 17 (24473)
Revision of: IS/ISO/IEC 27036:2013 |
Cybersecurity - Supplier Relationships Part 3 Guidelines for Hardware Software and Services Supply Chain Security First Revision | |
|
LITD 17 (25318)
Revision of: IS/ISO/IEC 27040:2015 |
Information Technology Security Techniques Storage Security First revision | |
|
LITD 17 (25330)
Revision of: IS/ISO/IEC 29100:2011 |
Information Technology Security Techniques Privacy Framework First revision | |
|
LITD 17 (25331)
|
Cybersecurity IoT Security and Privacy Device Baseline Requirements | |
|
LITD 17 (25334)
|
Information Technology Electronic Discovery Part 2 Guidance for Governance and Management of Electronic Discovery | |
|
LITD 17 (25335)
Revision of: IS/ISO/IEC 27011:2016 |
Information security Cybersecurity and Privacy Protection Information Security Controls Based on ISO IEC 27002 for Telecommunications Organizations Second Revision | |
|
LITD 17 (25400)
|
Information security cybersecurity and privacy protection - Information security management systems - Requirements Amendment - 1 | |
|
LITD 17 (26352)
|
Information Security Cybersecurity and Privacy Protection Privacy Operationalisation Model and Method for Engineering POMME | |
|
LITD 17 (26353)
|
Information technology Network security Part 7 Guidelines for network virtualization security | |
|
LITD 17 (26354)
Revision of: IS/ISO/IEC 27006:2015 |
Information Security Cybersecurity and Privacy Protection Requirements for Bodies Providing Audit and Certification of Information Security Management Systems Part 1 General Second Revision | |
|
LITD 17 (27695)
|
Information Security - Time - Stamping Services Part 2 Mechanisms Producing Independent Tokens Amendment - 1 | |
|
LITD 17 (27696)
Revision of: IS/ISO/IEC 27019:2017 |
Information Security Cybersecurity and Privacy Protection Information Security Controls for the Energy Utility Industry First revision | |
|
LITD 17 (27881)
|
Cybersecurity IoT security and privacy Guidelines for IoT-domotics | |
|
LITD 17 (28010)
Revision of: IS/ISO/IEC 18031:2011 |
Information Technology Security Techniques Random Bit Generation First Revision | |
|
LITD 17 (28011)
Revision of: IS/ISO/IEC 24759:2017 |
Information security cybersecurity and privacy protection Test requirements for cryptographic modules First Revision | |
|
LITD 17 (28012)
Revision of: IS/ISO/IEC 19790:2012 |
Information Security Cybersecurity and Privacy Protection Security Requirements For Cryptographic Modules First Revision | |
|
LITD 17 (28175)
|
Information Technology Information Security Incident Management Part 4 Coordination | |
|
LITD 17 (28863)
Revision of: IS/ISO/IEC 19792:2009 |
Information security cybersecurity and privacy protection General principles requirements and guidance for security evaluation of biometric systems First Revision | |
|
LITD 17 (28865)
Revision of: IS/ISO/IEC/TS 20540:2018 |
Information security cybersecurity and privacy protection Testing cryptographic modules in their field First Revision | |
|
LITD 17 (28867)
|
Information Security - Key Management Part 3 Mechanisms using Asymmetric Techniques Second Revision Amendment - 1 | |
|
LITD 17 (28868)
|
Information Technology - Security Techniques - Time Stamping Services Part 1 Framework Amendment - 1 | |
|
LITD 17 (28897)
|
Mobile Device Security Part 4 Assessment and Evaluation Amendment - 1 | |
|
LITD 17 (33298)
|
Cybersecurity Information and communication technology readiness for business continuity | |
|
LITD 17 (33299)
|
IT Security Techniques - Competence Requirements for Information Security Testers and Evaluators Part 1 Introduction Concepts and General Requirements | |
|
LITD 17 (33300)
|
IT Security Techniques - Competence Requirements for Information Security Testers and Evaluators Part 3 Knowledge Skills and Effectiveness Requirements for ISO IEC 15408 Evaluators | |
|
LITD 17 (33301)
|
Information Technology - Security Techniques - Code of Practice for Protection of Personally Identifiable Information PII in Public Clouds Acting as PII Processors First Revision | |
|
LITD 17 (33471)
|
Information Security Cybersecurity and Privacy Protection - Evaluation Criteria for IT Security Part 5 Pre-defined Packages of Security Requirements |
|
|
IS/ISO/IEC 13335-1:2004 ISO/IEC 13335-1:2004 Reviewed In : 2016 |
Information Technology - Security Techniques - Management of Information and Communications Technology Security Part 1 Concepts and Models for Information and Communications Technology Security Management |
|
|
IS 14356:1996 Reviewed In : 2018 |
Guide for protection of information resources |
|
|
IS 14357:2002 |
Information Technology - Code of Practice for Information Security Management |
|
|
IS 15114:2002 Reviewed In : 2008 |
Information Processing - Modes of Operation for a 64-Bit Block Cipher Algorithm |
|
|
IS 15115:2002 Reviewed In : 2008 |
Information Technology - Security Techniques - Procedures for the Registration of Cryptographic Alogorithms |
|
|
IS 15150:2002 |
Information Security Management System - Requirements |
|
|
IS 16281 (Part 1):2014 ISO/IEC 19785-1 : 2006 |
Information Technology Common Biometric Exchange Formats Framework Part 1 Data Element Specification |
|
|
IS 16281 (Part 4):2014 ISO/IEC 19785-4 : 2010 |
Information Technology Common Biometric Exchange Formats Framework Part 4 Security Block Format Specifications |
|
|
IS/ISO/IEC 17799:2005 Reviewed In : 2010 |
Information Technology Code of practice for Information Security Management |
|
|
IS/ISO/IEC 18014:2009 ISO/IEC 18014-3 : 2009 |
Information Technology- Security Techniques- Time Stamping Services Part 3 Mechanisms Producing Linked Tokens |
|
|
IS/ISO/IEC 19785-2:2018 ISO/IEC 19785-2 : 2006 |
Information Technology- Common Biometric Exchange Formats Framework Part 2 Procedures for the Operation of the Biometric Registration Authority |
|
|
IS/ISO/IEC 24762:2008 Reviewed In : 2015 |
Information Technology-Security Techniques-Guidelines for Information and Communications Technology Disaster Recovery Services |
|
|
IS/ISO/IEC 27001:2013 ISO/IEC 27001 : 2013 Reviewed In : 2022 |
Information Technologies - Security Techniques - information Security Managemet Systems - Requirements First Revision |
|
|
IS/ISO/IEC 27035:2011 ISO/IEC 27035 : 2011 |
Information technology - Security techniques - Information Security incident management |
|
IS 17737 (Part 2):2021 Reviewed In : 2024 |
Mobile Device Security Part 2 Security Requirements |
|
|
IS 17737 (Part 3):2021 Reviewed In : 2024 |
Mobile Device Security Part 3 Security Levels |
|
|
IS 17737 (Part 4):2021 Reviewed In : 2024 |
Mobile Device Security Part 4 Assessment and Evaluation |
|
|
IS/ISO/IEC 19790:2026 |
Information Security Cybersecurity and Privacy Protection Security Requirements For Cryptographic Modules First Revision |