Know Your Standard Standards under Mandatory Certification Group Wise Classification Ministry/Department Wise Classification
( Sub Sub Group : Information Systems Security )
Total Standards : 84
Revised Standards
New Standards
| S.No | IS Number | IS Title | Amendment | Reaffirmation Year | Document | Action |
|---|---|---|---|---|---|---|
| 1 | IS/ISO/IEC/TR 27039 : 2015/ISO/IEC 27039:2015 |
Information Technology - Security Techniques - Selection, Deployment and Operations of Intrusion Detection Systems ( IDPS ) | 0 | Jun, 2024 | Buy | |
| 2 | IS 11770 : Part 1 : 1987 |
Recommendations for control of emission of asbestos dust in premises manufacturing products containing asbestos: Part 1 asbestos cement products | 1 | Jan, 2022 | Download | |
| 3 | IS/ISO/IEC 11770 : Part 1 : 2010/ISO/IEC 11770-1:2010 |
Information Technology - Security Techniques - Key Management Part 1: Framework | 0 | Mar, 2023 | Buy | |
| 4 | IS 11770 : Part 2 : 2006/11770-2:2018 (1 Revision) |
Recommendations for control of emission of asbestos dust in premises manufacturing products contaning asbestos: Part 2 friction materials (First Revision) | 0 | Feb, 2021 | Buy | |
| 5 | IS/ISO/IEC 11770 : Part 2 : 2018/ISO/IEC 11770-2:2018 (1 Revision) |
IT Security Techniques - Key Management Part 2: Mechanisms Using Symmetric Techniques ( First Revision ) | 0 | Sep, 2023 | Buy | |
| 6 | IS 11770 : Part 3 : 1987/ISO/IEC 11770-3:2008 |
Recommendations For Control Of Emission Of Asbestos Dust In Premises Manufacturing Products Containing Asbestos: Part 3 Non-cement Asbestos Products Other Than Friction Materials | 0 | Jan, 2022 | Buy | |
| 7 | IS/ISO/IEC 11770-4 : 2017/ISO/IEC 11770-4:2017 (1 Revision) |
Information Technology - Security Techniques - Key Management Part 4: Mechanisms Based on Weak Secrets (First Revision) | 2 | May, 2025 | Buy | |
| 8 | IS/ISO/IEC 11770 : Part 6 : 2016/ISO/IEC 11770-6:2016 |
Information Technology - Security Techniques - Key Management Part 6: Key Derivation | 0 | Jan, 2023 | Buy | |
| 9 | IS/ISO 12619 : Part 14 : 2017/ISO/IEC 29192-7:2019 |
ROAD VEHICLES COMPRESSED GASEOUS HYDROGEN CGH2 AND HYDROGEN NATURAL GAS BLENDS FUEL SYSTEM COMPONENTS FLEXIBLE FUEL LINE | 0 | ---- | Buy | |
| 10 | IS 13529 : 2021/ISO/IEC 30136:2018 (1 Revision) |
Guide on Effects of Unbalanced Voltages on the Performance of Three-Phase Cage Induction Motors ( First Revision ) | 0 | ---- | Buy | |
| 11 | IS 14888 : 2000/ISO/IEC 14888-3 :201 |
VSWR meter - Performance requirements | 0 | Jul, 2024 | Buy | |
| 12 | IS/ISO/IEC 14888 : Part 1 : 2008/ISO/IEC 14888-1:2008 |
Information Technology - Security Techniques - Digital Signatures with Appendix Part 1: General | 0 | Jul, 2025 | Buy | |
| 13 | IS/ISO/IEC 14888 : Part 2 : 2008/ISO/IEC 14888-2:2008 |
Information Technology - Security Techniques - Digital Signatures with Appendix Part 2: Integer Factorization Based Mechanisms | 1 | May, 2025 | Buy | |
| 14 | IS/ISO/IEC 14888 : Part 3 : 2018/ISO/IEC 14888-3:2018 (1 Revision) |
IT Security Techniques - Digital Signatures with Appendix Part 3: Discrete Logarithm Based Mechanisms ( First Revision ) | 0 | Jan, 2023 | Buy | |
| 15 | IS 15076 : 2018/ISO/IEC 27050-4: 2021 (1 Revision) |
Chloroprene Rubber CR - General Purpose Types Evaluation Procedure First Revision | 0 | Mar, 2024 | Buy | |
| 16 | IS 15116 : 2018/ISO/IEC 10116:2017 (2 Revision) |
Information Technology - Security Techniques - Modes of Operation for an n-Bit Block Cipher (Second Revision) | 1 | Nov, 2024 | Buy | |
| 17 | IS 15393 : Part 4 : 2021/ISO/IEC 30107-2:2017 (1 Revision) |
Accuracy trueness and precision of measurement methods and results -- Part 4: Basic method for the determination of the trueness of a standard measurement method (First Revision) | 0 | ---- | Buy | |
| 18 | IS/ISO/IEC/TR 15446 : 2017/ISO/IEC TR 15446:2017 |
Information Technology - Security Techniques - Guidance for the Production of Protection Profiles and Security targets | 0 | May, 2025 | Buy | |
| 19 | IS 15475 : Part 6 : 2022/ISO/IEC 15408-4:2022 (1 Revision) |
CODE OF RECOMMENDED PRACTICE FOR AMUSEMENT RIDES SAFETY PART 6 PERFORMANCE TESTS | 0 | ---- | Buy | |
| 20 | IS 15580 : 2012/ISO/IEC 21827:2008 (1 Revision) |
Information Technology - Security Techniques - Systems: Security Engineering - Capability Maturity Model® (SSE - CMM®) (First Revision) | 0 | Oct, 2024 | Buy | |
| 21 | IS 15756 : 2022/ISO/IEC 15408-5:2022 (1 Revision) |
Metallic materials - Sheet and strip - Determination of tensile strain hardening exponent | 0 | ---- | Buy | |
| 22 | IS/ISO 15848 : Part 1 : 2015/ISO/IEC 30107-1:2016 |
Industrial valves Measurement test and qualification procedures for fugitive emissions Part 1: Classification system and qualification procedures for type testing of valves | 0 | ---- | Buy | |
| 23 | IS/ISO/IEC 15946 : Part 1 : 2016/ISO/IEC 15946 -1 : 2016 |
Information Technology - Security Techniques - Cryptographic Techniques Based on Elliptic Curves Part 1 General | 0 | Jun, 2024 | Buy | |
| 24 | IS 16061 : 2021/ISO/IEC 20543:2019 (1 Revision) |
HYDROGEN FUEL QUALITY PRODUCT SPECIFICATION | 0 | Mar, 2026 | Buy | |
| 25 | IS 17428 : Part 2 : 2020 |
Data Privacy Assurance Part 2: Engineering and Management Guidelines | 0 | Dec, 2023 | Download | |
| 26 | IS 17532 : 2021/ISO/IEC TR 27550:2019 |
ATM Safes-Specification | 0 | ---- | Buy | |
| 27 | IS 17541 : 2021/ISO/IEC 29184:2020 |
Modular panel for security of premises specification | 0 | ---- | Buy | |
| 28 | IS 17620 : 2021/ISO/IEC 19790:2012 |
Coffee sampling Triers for green coffee or raw coffee and parchment coffee | 0 | ---- | Buy | |
| 29 | IS 17629 : 2021/ISO/IEC/TS 19795-9:2019 |
Medical Textiles — Caps — Specification | 0 | ---- | Buy | |
| 30 | IS 17702 : 2021/ISO/IEC TS 27100:2020 |
Dentistry- Integrated dental floss and handles | 0 | ---- | Buy | |
| 31 | IS 17979 : 2022/ISO/IEC 24759:2017 |
Photovoltaic Power Systems (PVPS) - Information Model for Availability (First Revision) | 0 | ---- | Buy | |
| 32 | IS 18010 : Part 5 : Sec 1 : 2020/ISO/IEC 24761:2019 |
Unified Digital Infrastructure Unified Last Mile Communication Protocols Stack Part 5 Network Access Layer ( IEEE 802.15.4 ) Section 1 Specification | 1 | Dec, 2023 | Buy | |
| 33 | IS/ISO/IEC 18014 : Part 1 : 2008/ISO/IEC 18014-1 : 2008 |
Information Technology - Security Techniques - Time Stamping Services Part 1: Framework | 0 | Feb, 2024 | Buy | |
| 34 | IS/ISO/IEC 18014 : Part 3 : 2009/ISO/IEC 18014-3:2009 |
Information Technology - Security Techniques - Time - Stamping services Part 3: Mechanisms Producing Linked Tokens | 0 | Feb, 2024 | Buy | |
| 35 | IS/ISO/IEC 18014-4 : 2015/ISO/IEC 18014-4 : 2015 |
Information Technology - Security Techniques - Time - Stamping Services Part 4: Traceability of Time Sources | 0 | May, 2025 | Buy | |
| 36 | IS/ISO/IEC 18031 : 2011/ISO/IEC 18031:2011 |
Information Technology - Security Techniques - Random Bit Generation | 1 | Jul, 2024 | Buy | |
| 37 | IS/ISO/IEC 18033 : Part 2 : 2006/18033-2:2006 |
Information Technology - Security Techniques - Encryption Algorithms Part 2: Asymmetric Ciphers | 1 | Jun, 2024 | Buy | |
| 38 | IS/ISO/IEC 18033 : Part 3 : 2010/ISO/IEC 18033-3 : 2010 |
Information Technology - Security Techniques - Encryption Algorithms Part 3: Block Ciphers | 1 | Jun, 2024 | Buy | |
| 39 | IS/ISO/IEC 18033 : Part 4 : 2011/ISO/IEC 18033-4:2011 |
Information Technology - Security Techniques - Encryption Algorithms Part 4: Stream Ciphers | 1 | May, 2025 | Buy | |
| 40 | IS/ISO/IEC 18033 : Part 5 : 2015/ISO/IEC 18033-5:2015 |
Information Technology - Security Techniques - Encryption Algorithms Part 5: Identity - Based Ciphers | 1 | May, 2025 | Buy | |
| 41 | IS 18133 : 2023/ISO/IEC 27402:2023 |
Animal feeding stuffs, cereals and milled cereal products � Guidelines for the application of near infrared spectrometry | 0 | ---- | Buy | |
| 42 | IS/ISO/IEC 19896 : Part 1 : 2018/ISO/IEC 19896-1:2018 |
IT Security Techniques - Competence Requirements for Information Security Testers and Evaluators Part 1: Introduction, Concepts and General Requirements | 0 | Jan, 2023 | Buy | |
| 43 | IS/ISO/IEC 19896 : Part 2 : 2018/ISO/IEC 19896-2:2018 |
IT Security Techniques - Competence Requirements for Information Security Testers and Evaluators Part 2: Knowledge, Skills and Effectiveness Requirements for ISO/IEC 19790 Testers | 0 | Jan, 2023 | Buy | |
| 44 | IS/ISO/IEC 19896 : Part 3 : 2018/ISO/IEC 19896-3:2018 |
IT Security Techniques - Competence Requirements for Information Security Testers and Evaluators Part 3: Knowledge, Skills and Effectiveness Requirements for ISO/IEC 15408 Evaluators | 0 | Jan, 2023 | Buy | |
| 45 | IS/ISO 20283 : Part 5 : 2016/ISO/IEC 30107-4:2020 |
Mechanical vibration Measurement of vibration on ships Part 5: Guidelines for measurement evaluation and reporting of vibration with regard to habitability on passenger and merchant ships Adoption of ISO 20283-5 : 2016 | 0 | Sep, 2022 | Buy | |
| 46 | IS/ISO/IEC/TS 20540 : 2018/ISO/IEC TS 20540:2018 |
Information Technology - Security Techniques - Testing Cryptographic Modules in their Operational Environment | 0 | Jan, 2023 | Buy | |
| 47 | IS/ISO 21188 : 2018/ISO/IEC 20547-4:2020 (1 Revision) |
Public key infrastructure for financial services Practices and policy framework First Revision | 0 | ---- | Buy | |
| 48 | IS/ISO/IEC 27000 : 2018/ISO/IEC 27000:2018 (1 Revision) |
Information Technology - Security Techniques - Information Security Management Systems - Overview and Vocabulary ( First Revision ) | 0 | Jun, 2025 | Buy | |
| 49 | IS/ISO/IEC 27001 : 2013/ISO/IEC 27001:2013 (1 Revision) |
Information Technologies - Security Techniques - information Security Managemet Systems - Requirements (First Revision) | 1 | Dec, 2022 | Buy | |
| 50 | IS/ISO/IEC 27003 : 2017/ISO/IEC 27003:2017 (1 Revision) |
Information Technology - Security Techniques - Information Security Management Systems - Guidance ( First Revision ) | 0 | Sep, 2024 | Buy | |
| 51 | IS/ISO/IEC 27004 : 2016/ISO/IEC 27004:2016 (1 Revision) |
Information Technology - Security Techniques - Information Security Management - Monitoring, Measurement, Analysis and Evaluation ( First Revision ) | 0 | May, 2025 | Buy | |
| 52 | IS/ISO/IEC/TS 27008 : 2019/ISO/IEC TS 27008:2019 (1 Revision) |
Information Technology - Security Techniques - Guidelines for the Assessment of Information Security Controls ( First Revision ) | 0 | Sep, 2023 | Buy | |
| 53 | IS/ISO/IEC 27010 : 2015/ISO/IEC 27010:2015 |
Information Technology - Security Techniques - Information Security Management for Inter-Sector and Inter-Organizational Communications | 0 | May, 2024 | Buy | |
| 54 | IS/ISO/IEC 27017 : 2015/ISO/IEC 27017 : 2015 |
Information Technology - Security Techniques - Code of Practice for Information Security Controls Based on ISO/IEC 27002 for Cloud Services | 0 | Jun, 2024 | Buy | |
| 55 | IS/ISO/IEC 27018 : 2019/ISO/IEC 27018:2019 (1 Revision) |
Information Technology - Security Techniques - Code of Practice for Protection of Personally Identifiable Information ( PII ) in Public Clouds Acting as PII Processors ( First Revision ) | 0 | Sep, 2023 | Buy | |
| 56 | IS/ISO/IEC 27019 : 2017/ISO/IEC 27019:2017 |
Information Technology - Security Techniques - Information Security Controls for the Energy Utility Industry | 0 | Dec, 2022 | Buy | |
| 57 | IS/ISO/IEC 27033 : Part 1 : 2015/ISO/IEC 27033-1:2015 (1 Revision) |
Information Technology - Security Techniques - Network Security Part 1: Overview and Concepts (First Revision) | 0 | Jun, 2024 | Buy | |
| 58 | IS/ISO/IEC 27033 : Part 2 : 2012/ISO/IEC 27033-2:2012 |
Information Technology - Security Techniques Part 2: Guidelines for the Design and Implementation of Network Security | 0 | Jul, 2024 | Buy | |
| 59 | IS/ISO/IEC 27033 : Part 4 : 2014/ISO/IEC 27033-4:2014 |
Information Technology - Security Techniques - Network Security Part 4: Securing Communications Between Networks Using Security Gateways | 0 | Nov, 2022 | Buy | |
| 60 | IS/ISO/IEC 27033 : Part 5 : 2013/ISO/IEC 27033-5:2013 |
Information Technology - Security Techniques - Network Security Part 5: Securing Communications Across Networks Using Virtual Private Networks (VPNs) | 0 | Jun, 2024 | Buy | |
| 61 | IS/ISO/IEC 27033 : Part 6 : 2016/ISO/IEC 27033-6:2016 |
Information Technology - Security Techniques - Network Security Part 6: Securing Wireless IP Network Access | 0 | May, 2025 | Buy | |
| 62 | IS/ISO/IEC 27034 : Part 1 : 2011/ISO/IEC 27034-1 : 2011 |
Information Technology - Security Techniques - Application Security Part 1: Overview and Concepts | 1 | Jul, 2024 | Buy | |
| 63 | IS/ISO/IEC 27034 : Part 2 : 2015/ISO/IEC 27034-2:2015 |
Information Technology - Security Techniques - Application Security Part 2: Organization Normative Framework | 0 | May, 2025 | Buy | |
| 64 | IS/ISO/IEC 27034 : Part 3 : 2018/ISO/IEC 27034-3:2018 |
Information Technology - Application Security Part 3: Application Security Management Process | 0 | Jan, 2023 | Buy | |
| 65 | IS/ISO/IEC/TS 27034 : Part 5 : Sec 1 : 2018/ISO/IEC TS 27034-5-1:2018 |
Information Technology - Application Security Part 5-1 Protocols and Application Security Controls Data Structure, XML Schemas | 0 | Jan, 2023 | Buy | |
| 66 | IS/ISO/IEC 27034 : Part 5 : 2017/ISO/IEC 27034-5:2017 |
Information Technology - Security Techniques - Application Security Part 5: Protocols and Application Security Controls Data Structure | 0 | May, 2025 | Buy | |
| 67 | IS/ISO/IEC 27034 : Part 6 : 2016/ISO/IEC 27034-6:2016 |
Information Technology - Security Techniques - Application Security Part 6: Case Studies | 0 | May, 2025 | Buy | |
| 68 | IS/ISO/IEC 27034 : Part 7 : 2018/ISO/IEC 27034-7:2018 |
Information Technology - Application Security Part 7: Assurance Prediction Framework | 0 | Jan, 2023 | Buy | |
| 69 | IS/ISO/IEC 27036 : Part 4 : 2016/ISO/IEC 27036-4:2016 |
Information Technology - Security Techniques - Information Security for Supplier Relationships Part 4: Guidelines for Security of Cloud Services | 0 | Dec, 2022 | Buy | |
| 70 | IS/ISO/IEC 27037 : 2012/ISO/IEC 27037 : 2012 |
Information Technology - Security Techniques - Guidelines for Identification, Collection, Acquisition and Preservation of Digital Evidence | 0 | Jun, 2024 | Buy | |
| 71 | IS/ISO/IEC/TR 27103 : 2018/ISO/IEC TR 27103:2018 |
Information Technology - Security Techniques - Cybersecurity and ISO and IEC Standards | 0 | Jan, 2023 | Buy | |
| 72 | IS/ISO/IEC 29101 : 2018/ISO/IEC 29101:2018 |
Information Technology - Security Techniques - Privacy Architecture Framework | 0 | Sep, 2023 | Buy | |
| 73 | IS/ISO/IEC 29141 : 2009/ISO/IEC 11770-7: 2021 |
Information technology Biometrics Tenprint capture using biometric application programming interface BioAPI | 0 | Jun, 2024 | Buy | |
| 74 | IS/ISO/IEC 29192 : Part 1 : 2012/ISO/IEC 29192-1 : 2012 |
Information Technology - Security Techniques - Lightweight Crytography Part 1: General | 0 | Jun, 2024 | Buy | |
| 75 | IS/ISO/IEC 29192 : Part 3 : 2012/ISO/IEC 29192-3 : 2012 |
Information Technology - Security Techniques - Lightweight Cryptography Part 3: Stream Ciphers | 0 | May, 2024 | Buy | |
| 76 | IS/ISO/IEC 29192 : Part 4 : 2013/ISO/IEC 29192-4 : 2013 |
Information Technology - Security Techniques - Lightweight Cryptography Part 4: Mechanisms Using Asymmetric Techniques | 1 | Jun, 2024 | Buy | |
| 77 | IS/ISO/IEC 29192 : Part 5 : 2016/ISO/IEC 29192-5:2016 |
Information Technology - Security Techniques - Lightweight Cryptography Part 5: Hash-Functions | 0 | Dec, 2022 | Buy | |
| 78 | IS 4386 : 2022/ISO/IEC 27036-2:2022 (3 Revision) |
SPECIFICATION FOR PUTTING SHOTS Second Revision | 0 | ---- | Buy | |
| 79 | IS 4493 : Part 7 : 2022/ISO/IEC 29192-8:2022 (1 Revision) |
Hollow Metallic Waveguides Part 7 Relevant Specifications for Circular Waveguides ( First Revision ) | 0 | ---- | Buy | |
| 80 | IS/IEC 61936 : Part 1 : 2021/ISO/IEC 27400: 2022 |
Power installations exceeding 1 kV ac Part 1: Common Rules | 0 | ---- | Buy | |
| 81 | IS/IEC 62351 : Part 6 : 2020/ISO/IEC 24745:2022 (1 Revision) |
POWER SYSTEMS MANAGEMENT AND ASSOCIATED INFORMATION EXCHANGE DATA AND COMMUNICATION SECURITY Part 6: Security for IEC 61850 | 0 | Nov, 2024 | Buy | |
| 82 | IS/IEC 62351 : Part 7 : 2017/ISO/IEC 27035-3:2020 (1 Revision) |
Power systems management and associated information exchange Data and communications security Part 7: Network and System Management NSM data object models | 0 | Dec, 2024 | Buy | |
| 83 | IS/ISO/IEC 9796 : PART 2 : 2010/ISO/IEC 9796-2:2010 (1 Revision) |
Information Technology - Security Techniques - Digital Signature Schemes Giving Message Recovery Part 2: Integer Factorization Based Mechanisms ( First Revision ) | 0 | Jun, 2024 | Buy | |
| 84 | IS/ISO/IEC 9796 : Part 3 : 2006/ISO/IEC 9796-3:2006 |
Information Technology - Security Techniques - Digital Signature Schemes Giving Message Recovery Part 3: Discrete Logarithm Based Mechanisms | 0 | Apr, 2025 | Buy |