Know Your Standard Standards under Mandatory Certification Group Wise Classification Ministry/Department Wise Classification
Total Standards : 116
Revised Standards
New Standards
| S.No | IS Number | IS Title | Amendment | Reaffirmation Year | Document | Action |
|---|---|---|---|---|---|---|
| 1 |
IS/ISO/IEC/TR 27039 : 2015 Reviewed In : 2024 ISO/IEC 27039:2015 |
Information Technology - Security Techniques - Selection, Deployment and Operations of Intrusion Detection Systems ( IDPS ) | 0 | Jun, 2024 | Buy | |
| 2 |
IS/ISO/IEC 11770-1 : 2010 Reviewed In : 2023 ISO/IEC 11770-1:2010 |
Information Technology - Security Techniques - Key Management Part 1: Framework | 0 | Mar, 2023 | Buy | |
| 3 |
IS/ISO/IEC 11770-2 : 2018 Reviewed In : 2023 ISO/IEC 11770-2:2018 (First Revision) |
IT Security Techniques - Key Management Part 2: Mechanisms Using Symmetric Techniques ( First Revision ) | 0 | Sep, 2023 | Buy | |
| 4 |
IS/ISO/IEC 11770-3 : 2021 ISO 4628-10 : 2024 ISO 4628-10 : 2024 (Second Revision) |
Information Security - Key Management Part 3: Mechanisms using Asymmetric Techniques Second Revision | 0 | ---- | Buy | |
| 5 |
IS/ISO/IEC 11770-4 : 2017 Reviewed In : 2025 ISO/IEC 11770-4:2017 (First Revision) |
Information Technology - Security Techniques - Key Management Part 4: Mechanisms Based on Weak Secrets (First Revision) | 2 | May, 2025 | Buy | |
| 6 |
IS/ISO/IEC 11770-5 : 2020 ISO 21561-2:2016 ISO 21561-2:2016 (First Revision) |
Information Security - Key Management Part 5: Group Key Management ( First Revision ) | 0 | ---- | Buy | |
| 7 |
IS/ISO/IEC 11770-6 : 2016 Reviewed In : 2023 ISO/IEC 11770-6:2016 |
Information Technology - Security Techniques - Key Management Part 6: Key Derivation | 0 | Jan, 2023 | Buy | |
| 8 |
IS/ISO/IEC 11770-7 : 2021 12123 12123 |
Information Security - Key Management Part 7: Cross-Domain Password-Based Authenticated Key Exchange | 0 | ---- | Buy | |
| 9 |
IS/ISO/IEC 14888-1 : 2008 Reviewed In : 2025 ISO/IEC 14888-1:2008 |
Information Technology - Security Techniques - Digital Signatures with Appendix Part 1: General | 0 | Jul, 2025 | Buy | |
| 10 |
IS/ISO/IEC 14888-2 : 2008 Reviewed In : 2025 ISO/IEC 14888-2:2008 |
Information Technology - Security Techniques - Digital Signatures with Appendix Part 2: Integer Factorization Based Mechanisms | 1 | May, 2025 | Buy | |
| 11 |
IS/ISO/IEC 14888-3 : 2018 Reviewed In : 2023 ISO/IEC 14888-3:2018 (First Revision) |
IT Security Techniques - Digital Signatures with Appendix Part 3: Discrete Logarithm Based Mechanisms ( First Revision ) | 0 | Jan, 2023 | Buy | |
| 12 |
IS 14990 (Part 1) : 2024 (Third Revision) |
Information Security, Cybersecurity and Privacy Protection - Evaluation Criteria for IT Security Part 1: Introduction and General Model Third Revision | 0 | ---- | Buy | |
| 13 |
IS 14990 (Part 2) : 2024 (Third Revision) |
Information Security, Cybersecurity and Privacy Protection - Evaluation Criteria for IT Security Part 2: Security Functional Components (Third Revision) | 0 | ---- | Buy | |
| 14 |
IS 14990 (Part 3) : 2024 (Third Revision) |
Information Security, Cybersecurity and Privacy Protection - Evaluation Criteria for IT Security Part 3: Security Assurance Components (Third Revision) | 0 | ---- | Buy | |
| 15 |
IS 14990 (Part 4) : 2024 |
Information Security, Cybersecurity and Privacy Protection - Evaluation Criteria for IT Security Part 4: Framework for the Specification of Evaluation Methods and Activities | 0 | ---- | Buy | |
| 16 |
IS 14990 (Part 5) : 2024 |
Information Security, Cybersecurity and Privacy Protection - Evaluation Criteria for IT Security Part 5: Pre-defined Packages of Security Requirements | 0 | ---- | Buy | |
| 17 |
IS 15116 : 2018 ISO/IEC 10116:2017 Reviewed In : 2024 ISO/IEC 10116:2017 (Second Revision) |
Information Technology - Security Techniques - Modes of Operation for an n-Bit Block Cipher (Second Revision) | 1 | Nov, 2024 | Buy | |
| 18 |
IS/ISO/IEC/TR 15446 : 2017 Reviewed In : 2025 ISO/IEC TR 15446:2017 |
Information Technology - Security Techniques - Guidance for the Production of Protection Profiles and Security targets | 0 | May, 2025 | Buy | |
| 19 |
IS 15580 : 2012 ISO/IEC 21827:2008 Reviewed In : 2024 ISO/IEC 21827:2008 (First Revision) |
Information Technology - Security Techniques - Systems: Security Engineering - Capability Maturity Model® (SSE - CMM®) (First Revision) | 0 | Oct, 2024 | Buy | |
| 20 |
IS 15671 : 2024 (Second Revision) |
Information Security, Cybersecurity and Privacy Protection - Evaluation Criteria for IT Security - Methodology for IT Security Evaluation (Second Revision) | 0 | ---- | Buy | |
| 21 |
IS/ISO/IEC 15946-1 : 2016 Reviewed In : 2024 ISO/IEC 15946 -1 : 2016 |
Information Technology - Security Techniques - Cryptographic Techniques Based on Elliptic Curves Part 1 General | 0 | Jun, 2024 | Buy | |
| 22 |
IS 17428 (Part 1) : 2020 Reviewed In : 2023 |
Data Privacy Assurance Part 1: Engineering and Management Requirements | 0 | Dec, 2023 | Download | |
| 23 |
IS 17428 (Part 2) : 2020 Reviewed In : 2023 |
Data Privacy Assurance Part 2: Engineering and Management Guidelines | 0 | Dec, 2023 | Download | |
| 24 |
IS 17737 (Part 1) : 2021 ISO 14243-3:2014 Reviewed In : 2024 ISO 14243-3:2014 |
Mobile Device Security Part 1: Overview | 0 | Dec, 2024 | Buy | |
| 25 |
IS 17737 (Part 2) : 2021 ISO 16827 : 2012 Reviewed In : 2024 ISO 16827 : 2012 |
Mobile Device Security Part 2: Security Requirements | 0 | Dec, 2024 | Buy | |
| 26 |
IS 17737 (Part 3) : 2021 Reviewed In : 2024 IEC 60834-1: 1999 |
Mobile Device Security Part 3: Security Levels | 0 | Dec, 2024 | Buy | |
| 27 |
IS 17737 (Part 4) : 2021 ISO/TS 11059 : 2009 Reviewed In : 2024 ISO/TS 11059 : 2009 |
Mobile Device Security Part 4: Assessment and Evaluation | 0 | Dec, 2024 | Buy | |
| 28 |
IS/ISO/IEC 18014-1 : 2008 Reviewed In : 2024 ISO/IEC 18014-1 : 2008 |
Information Technology - Security Techniques - Time Stamping Services Part 1: Framework | 0 | Feb, 2024 | Buy | |
| 29 |
IS/ISO/IEC 18014-2 : 2021 ISO 18692-5:2024 ISO 18692-5:2024 (First Revision) |
Information Security - Time - Stamping Services Part 2: Mechanisms Producing Independent Tokens | 0 | ---- | Buy | |
| 30 |
IS/ISO/IEC 18014-3 : 2009 Reviewed In : 2024 ISO/IEC 18014-3:2009 |
Information Technology - Security Techniques - Time - Stamping services Part 3: Mechanisms Producing Linked Tokens | 0 | Feb, 2024 | Buy | |
| 31 |
IS/ISO/IEC 18014-4 : 2015 Reviewed In : 2025 ISO/IEC 18014-4 : 2015 |
Information Technology - Security Techniques - Time - Stamping Services Part 4: Traceability of Time Sources | 0 | May, 2025 | Buy | |
| 32 |
IS/ISO/IEC 18031 : 2011 Reviewed In : 2024 ISO/IEC 18031:2011 |
Information Technology - Security Techniques - Random Bit Generation | 1 | Jul, 2024 | Buy | |
| 33 |
IS/ISO/IEC 18033-1 : 2021 ISO/TS 19837:2018 (First Revision) |
Information Security - Encryption Algorithms Part 1: General (First Revision) | 0 | ---- | Buy | |
| 34 |
IS/ISO/IEC 18033-2 : 2006 Reviewed In : 2024 18033-2:2006 |
Information Technology - Security Techniques - Encryption Algorithms Part 2: Asymmetric Ciphers | 1 | Jun, 2024 | Buy | |
| 35 |
IS/ISO/IEC 18033-3 : 2010 Reviewed In : 2024 ISO/IEC 18033-3 : 2010 |
Information Technology - Security Techniques - Encryption Algorithms Part 3: Block Ciphers | 1 | Jun, 2024 | Buy | |
| 36 |
IS/ISO/IEC 18033-4 : 2011 Reviewed In : 2025 ISO/IEC 18033-4:2011 |
Information Technology - Security Techniques - Encryption Algorithms Part 4: Stream Ciphers | 1 | May, 2025 | Buy | |
| 37 |
IS/ISO/IEC 18033-5 : 2015 Reviewed In : 2025 ISO/IEC 18033-5:2015 |
Information Technology - Security Techniques - Encryption Algorithms Part 5: Identity - Based Ciphers | 1 | May, 2025 | Buy | |
| 38 |
IS 19319 : 2025 |
Internet of Things Security and Privacy - Assessment and Evaluation | 0 | ---- | Buy | |
| 39 |
IS/ISO/IEC 19790 : 2012 Reviewed In : 2025 ISO/TS 30423: 2021 |
Information Technology - Security Techniques - Security Requirements for Cryptographic Modules | 0 | Mar, 2025 | Buy | |
| 40 |
IS/ISO/IEC 19792 : 2009 Reviewed In : 2024 IEC 60068-1:2013 |
Information Technology - Security Techniques - Security Evaluation of Biometrics | 0 | Aug, 2024 | Buy | |
| 41 |
IS/ISO/IEC 19896-1 : 2018 Reviewed In : 2023 ISO/IEC 19896-1:2018 |
IT Security Techniques - Competence Requirements for Information Security Testers and Evaluators Part 1: Introduction, Concepts and General Requirements | 0 | Jan, 2023 | Buy | |
| 42 |
IS/ISO/IEC 19896-2 : 2018 Reviewed In : 2023 ISO/IEC 19896-2:2018 |
IT Security Techniques - Competence Requirements for Information Security Testers and Evaluators Part 2: Knowledge, Skills and Effectiveness Requirements for ISO/IEC 19790 Testers | 0 | Jan, 2023 | Buy | |
| 43 |
IS/ISO/IEC 19896-3 : 2018 Reviewed In : 2023 ISO/IEC 19896-3:2018 |
IT Security Techniques - Competence Requirements for Information Security Testers and Evaluators Part 3: Knowledge, Skills and Effectiveness Requirements for ISO/IEC 15408 Evaluators | 0 | Jan, 2023 | Buy | |
| 44 |
IS/ISO/IEC/TS 20540 : 2018 Reviewed In : 2023 ISO/IEC TS 20540:2018 |
Information Technology - Security Techniques - Testing Cryptographic Modules in their Operational Environment | 0 | Jan, 2023 | Buy | |
| 45 |
IS/ISO/IEC 20543 : 2019 Reviewed In : 2024 |
Information Technology - Security Techniques - Test and Analysis Methods for Random Bit Generators within ISO/IEC 19790 and ISO/IEC 15408 | 0 | Sep, 2024 | Buy | |
| 46 |
IS/ISO/IEC 20547-4 : 2020 |
Information Technology - Big Data Reference Architecture Part 4: Security and Privacy | 0 | ---- | Buy | |
| 47 |
IS/ISO/IEC 24745 : 2022 ISO 23527:2022 ISO 23527:2022 |
Information Security, Cyber Security and Privacy Protection - Biometric Information Protection | 0 | ---- | Buy | |
| 48 |
IS/ISO/IEC 24759 : 2017 |
Information Technology - Security Techniques - Test Requirements for Cryptographic Modules | 0 | ---- | Buy | |
| 49 |
IS/ISO/IEC 24761 : 2019 Reviewed In : 2024 ISO 37000 |
Information Technology - Security Techniques - Authentication Context for Biometrics | 0 | Sep, 2024 | Buy | |
| 50 |
IS/ISO/IEC 27000 : 2018 Reviewed In : 2025 ISO/IEC 27000:2018 (First Revision) |
Information Technology - Security Techniques - Information Security Management Systems - Overview and Vocabulary ( First Revision ) | 0 | Jun, 2025 | Buy | |
| 51 |
IS/ISO/IEC 27001 : 2013 Reviewed In : 2022 ISO/IEC 27001:2013 (First Revision) |
Information Technologies - Security Techniques - information Security Managemet Systems - Requirements (First Revision) | 1 | Dec, 2022 | Buy | |
| 52 |
IS/ISO/IEC 27001 : 2022 ISO/IEC 27001:2022 (Second Revision) |
Information Security, Cybersecurity and Privacy Protection - Information Security Management Systems - Requirements (Second Revision) | 1 | ---- | Buy | |
| 53 |
IS/ISO/IEC 27002 : 2022 Reviewed In : 2025 (Second Revision) |
Information Security, Cybersecurity and Privacy Protection - Information Security Controls ( First Revision ) | 0 | Jul, 2025 | Buy | |
| 54 |
IS/ISO/IEC 27003 : 2017 Reviewed In : 2024 ISO/IEC 27003:2017 (First Revision) |
Information Technology - Security Techniques - Information Security Management Systems - Guidance ( First Revision ) | 0 | Sep, 2024 | Buy | |
| 55 |
IS/ISO/IEC 27004 : 2016 Reviewed In : 2025 ISO/IEC 27004:2016 (First Revision) |
Information Technology - Security Techniques - Information Security Management - Monitoring, Measurement, Analysis and Evaluation ( First Revision ) | 0 | May, 2025 | Buy | |
| 56 |
IS/ISO/IEC 27005 : 2022 (Third Revision) |
Information Security, Cybersecurity and Privacy Protection - Guidance on Managing Information Security Risks ( Third Revision ) | 0 | ---- | Buy | |
| 57 |
IS/ISO/IEC 27006-1 : 2024 (Second Revision) |
Information Security Cybersecurity and Privacy Protection Requirements for Bodies Providing Audit and Certification of Information Security Management Systems Part 1: General (Second Revision) | 0 | ---- | Buy | |
| 58 |
IS/ISO/IEC 27006-1 : 2015 Reviewed In : 2024 ISO/IEC 27006-1:2024 (First Revision) |
Information Technology — Security Techniques — Requirements for Bodies Providing Audit and Certification of Information Security Management Systems ( First Revision ) | 1 | Jun, 2024 | Buy | |
| 59 |
IS/ISO/IEC 27007 : 2020 ISO 28564-3 : 2019 ISO 28564-3 : 2019 (First Revision) |
Information Security, Cybersecurity and Privacy Protection - Guidelines for Information Security Management Systems Auditing ( First Revision ) | 0 | ---- | Buy | |
| 60 |
IS/ISO/IEC/TS 27008 : 2019 Reviewed In : 2023 ISO/IEC TS 27008:2019 (First Revision) |
Information Technology - Security Techniques - Guidelines for the Assessment of Information Security Controls ( First Revision ) | 0 | Sep, 2023 | Buy | |
| 61 |
IS/ISO/IEC 27010 : 2015 Reviewed In : 2024 ISO/IEC 27010:2015 |
Information Technology - Security Techniques - Information Security Management for Inter-Sector and Inter-Organizational Communications | 0 | May, 2024 | Buy | |
| 62 |
IS/ISO/IEC 27011 : 2024 (Second Revision) |
Information Security, Cybersecurity and Privacy Protection - Information Security Controls Based on ISO/IEC 27002 for Telecommunications Organizations ( Second Revision ) | 0 | ---- | Buy | |
| 63 |
IS/ISO/IEC 27017 : 2015 Reviewed In : 2024 ISO/IEC 27017 : 2015 |
Information Technology - Security Techniques - Code of Practice for Information Security Controls Based on ISO/IEC 27002 for Cloud Services | 0 | Jun, 2024 | Buy | |
| 64 |
IS/ISO/IEC 27018 : 2019 Reviewed In : 2023 ISO/IEC 27018:2019 (First Revision) |
Information Technology - Security Techniques - Code of Practice for Protection of Personally Identifiable Information ( PII ) in Public Clouds Acting as PII Processors ( First Revision ) | 0 | Sep, 2023 | Buy | |
| 65 |
IS/ISO/IEC 27019 : 2017 Reviewed In : 2022 ISO/IEC 27019:2017 |
Information Technology - Security Techniques - Information Security Controls for the Energy Utility Industry | 0 | Dec, 2022 | Buy | |
| 66 |
IS/ISO/IEC 27032 : 2023 (First Revision) |
Cyber Security - Internet Security - Guidelines ( First Revision ) | 0 | ---- | Buy | |
| 67 |
IS/ISO/IEC 27033-1 : 2015 Reviewed In : 2024 ISO/IEC 27033-1:2015 (First Revision) |
Information Technology - Security Techniques - Network Security Part 1: Overview and Concepts (First Revision) | 0 | Jun, 2024 | Buy | |
| 68 |
IS/ISO/IEC 27033-2 : 2012 Reviewed In : 2024 ISO/IEC 27033-2:2012 |
Information Technology - Security Techniques Part 2: Guidelines for the Design and Implementation of Network Security | 0 | Jul, 2024 | Buy | |
| 69 |
IS/ISO/IEC 27033-3 : 2010 Reviewed In : 2022 ISO/IEC 27033-3 :2010 |
Information Technology - Security Techniques - Network Security Part 3: Reference Networking Scenarios - Threats, Design Techniques and Control Issues | 0 | Jan, 2022 | Buy | |
| 70 |
IS/ISO/IEC 27033-4 : 2014 Reviewed In : 2022 ISO/IEC 27033-4:2014 |
Information Technology - Security Techniques - Network Security Part 4: Securing Communications Between Networks Using Security Gateways | 0 | Nov, 2022 | Buy | |
| 71 |
IS/ISO/IEC 27033-5 : 2013 Reviewed In : 2024 ISO/IEC 27033-5:2013 |
Information Technology - Security Techniques - Network Security Part 5: Securing Communications Across Networks Using Virtual Private Networks (VPNs) | 0 | Jun, 2024 | Buy | |
| 72 |
IS/ISO/IEC 27033-6 : 2016 Reviewed In : 2025 ISO/IEC 27033-6:2016 |
Information Technology - Security Techniques - Network Security Part 6: Securing Wireless IP Network Access | 0 | May, 2025 | Buy | |
| 73 |
IS/ISO/IEC 27034-1 : 2011 Reviewed In : 2024 ISO/IEC 27034-1 : 2011 |
Information Technology - Security Techniques - Application Security Part 1: Overview and Concepts | 1 | Jul, 2024 | Buy | |
| 74 |
IS/ISO/IEC 27034-2 : 2015 Reviewed In : 2025 ISO/IEC 27034-2:2015 |
Information Technology - Security Techniques - Application Security Part 2: Organization Normative Framework | 0 | May, 2025 | Buy | |
| 75 |
IS/ISO/IEC 27034-3 : 2018 Reviewed In : 2023 ISO/IEC 27034-3:2018 |
Information Technology - Application Security Part 3: Application Security Management Process | 0 | Jan, 2023 | Buy | |
| 76 |
IS/ISO/IEC/TS 27034-5-1 : 2018 Reviewed In : 2023 ISO/IEC TS 27034-5-1:2018 |
Information Technology - Application Security Part 5-1 Protocols and Application Security Controls Data Structure, XML Schemas | 0 | Jan, 2023 | Buy | |
| 77 |
IS/ISO/IEC 27034-5 : 2017 Reviewed In : 2025 ISO/IEC 27034-5:2017 |
Information Technology - Security Techniques - Application Security Part 5: Protocols and Application Security Controls Data Structure | 0 | May, 2025 | Buy | |
| 78 |
IS/ISO/IEC 27034-6 : 2016 Reviewed In : 2025 ISO/IEC 27034-6:2016 |
Information Technology - Security Techniques - Application Security Part 6: Case Studies | 0 | May, 2025 | Buy | |
| 79 |
IS/ISO/IEC 27034-7 : 2018 Reviewed In : 2023 ISO/IEC 27034-7:2018 |
Information Technology - Application Security Part 7: Assurance Prediction Framework | 0 | Jan, 2023 | Buy | |
| 80 |
IS/ISO/IEC 27035-1 : 2023 (First Revision) |
Information Technology - Information Security Incident Management Part 1: Principles and Process ( Second Revision ) | 0 | ---- | Buy | |
| 81 |
IS/ISO/IEC 27035-2 : 2023 (First Revision) |
Information Technology - Information Security Incident Management Part 2: Guidelines to Plan and Prepare for Incident Response ( Second Revision ) | 0 | ---- | Buy | |
| 82 |
IS/ISO/IEC 27035-3 : 2020 ISO 22468 : 2020 ISO 22468 : 2020 |
Information Technology - Information Security Incident Management Part 3: Guidelines for ICT Incident Response Operations | 0 | ---- | Buy | |
| 83 |
IS/ISO/IEC 27036-1 : 2021 ISO 7755-6:2013 ISO 7755-6:2013 (First Revision) |
Cybersecurity - Supplier Relationships Part 1: Overview and Concepts ( First Revision ) | 0 | ---- | Buy | |
| 84 |
IS/ISO/IEC 27036-2 : 2022 |
Cybersecurity - Supplier Relationships Part 2: Requirements | 0 | ---- | Buy | |
| 85 |
IS/ISO/IEC 27036-3 : 2023 (First Revision) |
Cybersecurity - Supplier Relationships Part 3: Guidelines for Hardware Software and Services Supply Chain Security ( First Revision ) | 0 | ---- | Buy | |
| 86 |
IS/ISO/IEC 27036-4 : 2016 Reviewed In : 2022 ISO/IEC 27036-4:2016 |
Information Technology - Security Techniques - Information Security for Supplier Relationships Part 4: Guidelines for Security of Cloud Services | 0 | Dec, 2022 | Buy | |
| 87 |
IS/ISO/IEC 27037 : 2012 Reviewed In : 2024 ISO/IEC 27037 : 2012 |
Information Technology - Security Techniques - Guidelines for Identification, Collection, Acquisition and Preservation of Digital Evidence | 0 | Jun, 2024 | Buy | |
| 88 |
IS/ISO/IEC 27040 : 2024 (First Revision) |
Information Technology - Security Techniques - Storage Security ( First Revision ) | 0 | ---- | Buy | |
| 89 |
IS/ISO/IEC 27050-1 : 2019 Reviewed In : 2024 ISO/IEC TR 12785-3: 2012 (First Revision) |
Information Technology - Electronic Discovery Part 1: Overview and Concepts ( First Revision ) | 0 | Nov, 2024 | Buy | |
| 90 |
IS/ISO/IEC 27050-2 : 2018 |
Information Technology - Electronic Discovery Part 2: Guidance for Governance and Management of Electronic Discovery | 0 | ---- | Buy | |
| 91 |
IS/ISO/IEC 27050-3 : 2020 Reviewed In : 2024 (First Revision) |
Information Technology - Electronic Discovery Part 3: Code of Practice for Electronic Discovery ( First Revision ) | 0 | Sep, 2024 | Buy | |
| 92 |
IS/ISO/IEC 27050-4 : 2021 ISO 8968-3:2004 ISO 8968-3:2004 |
Information Technology - Electronic Discovery Part 4: Technical Readiness | 0 | ---- | Buy | |
| 93 |
IS/ISO/IEC 27071 : 2023 |
Cybersecurity - Security Recommendations for Establishing Trusted Connections Between Devices and Services | 0 | ---- | Buy | |
| 94 |
IS/ISO/IEC 27099 : 2022 |
Information Technology - Public Key Infrastructure - Practices and Policy Framework | 0 | ---- | Buy | |
| 95 |
IS/ISO/IEC/TS 27100 : 2020 ISO 14891 : 2002 ISO 14891 : 2002 |
Information Technology - Cyber Security - Overview and Concepts | 0 | ---- | Buy | |
| 96 |
IS/ISO/IEC/TR 27103 : 2018 Reviewed In : 2023 ISO/IEC TR 27103:2018 |
Information Technology - Security Techniques - Cybersecurity and ISO and IEC Standards | 0 | Jan, 2023 | Buy | |
| 97 |
IS/ISO/IEC 27400 : 2022 |
Cybersecurity - IoT Security and Privacy - Guidelines | 0 | ---- | Buy | |
| 98 |
IS/ISO/IEC 27402 : 2023 |
Cybersecurity - IoT Security and Privacy - Device Baseline Requirements | 0 | ---- | Buy | |
| 99 |
IS/ISO/IEC/TR 27550 : 2019 Reviewed In : 2024 |
Information Technology - Security Techniques - Privacy Engineering for System Life Cycle Processes | 0 | Sep, 2024 | Buy | |
| 100 |
IS/ISO/IEC 29100 : 2024 (First Revision) |
Information Technology - Security Techniques - Privacy Framework (First Revision) | 0 | ---- | Buy | |
| 101 |
IS/ISO/IEC 29101 : 2018 Reviewed In : 2023 ISO/IEC 29101:2018 |
Information Technology - Security Techniques - Privacy Architecture Framework | 0 | Sep, 2023 | Buy | |
| 102 |
IS/ISO/IEC 29184 : 2020 Reviewed In : 2024 |
Information Technology - Online Privacy Notices and Consent | 0 | Sep, 2024 | Buy | |
| 103 |
IS/ISO/IEC 29192-1 : 2012 Reviewed In : 2024 ISO/IEC 29192-1 : 2012 |
Information Technology - Security Techniques - Lightweight Crytography Part 1: General | 0 | Jun, 2024 | Buy | |
| 104 |
IS/ISO/IEC 29192-2 : 2019 ISO 10797 : 2012 Reviewed In : 2024 ISO 10797 : 2012 (First Revision) |
Information Security - Lightweight Cryptography Part 2: Block Ciphers ( First Revision ) | 0 | Sep, 2024 | Buy | |
| 105 |
IS/ISO/IEC 29192-3 : 2012 Reviewed In : 2024 ISO/IEC 29192-3 : 2012 |
Information Technology - Security Techniques - Lightweight Cryptography Part 3: Stream Ciphers | 0 | May, 2024 | Buy | |
| 106 |
IS/ISO/IEC 29192-4 : 2013 Reviewed In : 2024 ISO/IEC 29192-4 : 2013 |
Information Technology - Security Techniques - Lightweight Cryptography Part 4: Mechanisms Using Asymmetric Techniques | 1 | Jun, 2024 | Buy | |
| 107 |
IS/ISO/IEC 29192-5 : 2016 Reviewed In : 2022 ISO/IEC 29192-5:2016 |
Information Technology - Security Techniques - Lightweight Cryptography Part 5: Hash-Functions | 0 | Dec, 2022 | Buy | |
| 108 |
IS/ISO/IEC 29192-6 : 2019 Reviewed In : 2024 |
Information Technology - Lightweight Cryptography Part 6: Message Authentication Codes ( MACs ) | 0 | Sep, 2024 | Download | |
| 109 |
IS/ISO/IEC 29192-7 : 2019 Reviewed In : 2024 8601-2 |
Information Security - Lightweight Cryptography Part 7: Broadcast Authentication Protocols | 0 | Sep, 2024 | Buy | |
| 110 |
IS/ISO/IEC 29192-8 : 2022 |
Information Security - Lightweight Cryptography Part 8: Authenticated Encryption | 0 | ---- | Buy | |
| 111 |
IS/ISO/IEC 27561 : 2024 |
Information Security Cybersecurity and Privacy Protection Privacy Operationalisation Model and Method for Engineering POMME | 0 | ---- | Buy | |
| 112 |
IS/ISO/IEC 27033 : 2023 |
Information technology Network security Part 7: Guidelines for network virtualization security | 0 | ---- | Buy | |
| 113 |
IS/ISO/IEC 27403 : 2024 |
Cybersecurity IoT security and privacy Guidelines for IoT-domotics | 0 | ---- | Buy | |
| 114 |
IS/ISO/IEC 27019 : 2024 (First Revision) |
Information Security Cybersecurity and Privacy Protection Information Security Controls for the Energy Utility Industry First revision | 0 | ---- | Buy | |
| 115 |
IS/ISO/IEC 9796-2 : 2010 Reviewed In : 2024 ISO/IEC 9796-2:2010 (First Revision) |
Information Technology - Security Techniques - Digital Signature Schemes Giving Message Recovery Part 2: Integer Factorization Based Mechanisms ( First Revision ) | 0 | Jun, 2024 | Buy | |
| 116 |
IS/ISO/IEC 9796-3 : 2006 Reviewed In : 2025 ISO/IEC 9796-3:2006 |
Information Technology - Security Techniques - Digital Signature Schemes Giving Message Recovery Part 3: Discrete Logarithm Based Mechanisms | 0 | Apr, 2025 | Buy |