Revised Standards    New Standards

Standards List

S.No IS Number IS Title Category Reaffirmation Year Scope
1 IS 14990 : PART 1 : 2012/ISO/IEC 15408-1:2009
(2 Revision)
Information technology - Security techniques - Evaluation criteria for it: Security: Part 1 introduction and general model (Second Revision) Product Specification 2018, Dec Buy
2 IS 14990 : Part 2 : 2017/ISO/IEC 15408-2:2008
(2 Revision)
Information technology - Security techniques - Evaluation criteria for it: Security: Part 2 Security functional requirements (Second Revision) Product Specification 2020, Jan Buy
3 IS 14990 : Part 3 : 2016/ISO/IEC 15408-3 : 2008
(2 Revision)
Information technology - Security techniques - Evaluation criteria for it: Security: Part 3 Security assurance components (Second Revision) Product Specification 2019, Mar Buy
4 IS 15116 : 2018/ISO/IEC 10116:2017
(2 Revision)
Information technology - Security techniques - Modes of operation for an n - Bit block cipher (Second Revision) Others 0 Buy
5 IS 15580 : 2012/ISO/IEC 21827:2008
(1 Revision)
Information technology - Security techniques - Systems: Security engineering - Capability maturity model® (SSE - CMM®) (First Revision) Product Specification 2018, Oct Buy
6 IS 15671 : 2016/ISO/IEC 18045:2008
(1 Revision)
Information technology - Security techniques - Methodology for IT Security evaluation (First Revision) Methods of tests 2019, Jul Buy
7 IS 17428 : Part 1 : 2020
Data Privacy Assurance Part 1 Engineering and Management Requirements Others 0 Download
8 IS 17428 : Part 2 : 2020
Data Privacy Assurance Part 2 Engineering and Management Guidelines Others 0 Download
9 IS/ISO/IEC 11770 : Part 1 : 2010/ISO/IEC 11770-1:2010
Information technology - Security techniques - Key management: Part 1 framework Others 2020, Mar Buy
10 IS/ISO/IEC 11770 : Part 2 : 2018/ISO/IEC 11770-2:2018
(1 Revision)
IT Security Techniques — Key Management Part 2 Mechanisms Using Symmetric Techniques ( First Revision ) Others 0 Buy
11 IS/ISO/IEC 11770 : Part 3 : 2015/ISO/IEC 11770-3:2015
(1 Revision)
Information technology - Security techniques - Key management: Part 3 mechanisms using asymmetric techniques (First Revision) Others 0 Buy
12 IS/ISO/IEC 11770 : Part 5 : 2011/ISO/IEC 11770-5 : 2011
Information Technology - Security Techniques - Key Management Part 5 Group Key Management Others 0 Buy
13 IS/ISO/IEC 11770 : Part 6 : 2016/ISO/IEC 11770-6:2016
Information Technology - Security Techniques - Key Management Part 6 Key Derivation Others 0 Buy
14 IS/ISO/IEC 11770-4 : 2006 : 2017/ISO/IEC 11770-4:2017
(1 Revision)
Information technology - Security techniques - Key management: Part 4 mechanisms based on weak: Secrets (First Revision) Others 0 Buy
15 IS/ISO/IEC 14888 : Part 1 : 2008/ISO/IEC 14888-1:2008
Information technology - Security techniques - Digital signatures with appendix: Part 1 general Others 0 Buy
16 IS/ISO/IEC 14888 : Part 2 : 2008/ISO/IEC 14888-2:2008
Information technology - Security techniques - digital signatures with appendix: Part 2 integer factorization based mechanisms Others 0 Buy
17 IS/ISO/IEC 14888 : Part 3 : 2018/ISO/IEC 14888-3:2018
(1 Revision)
IT Security Techniques — Digital Signatures with Appendix Part 3 Discrete Logarithm Based Mechanisms ( First Revision ) Others 0 Buy
18 IS/ISO/IEC 15946 : Part 1 : 2016/ISO/IEC 15946 -1 : 2016
Information Technology - Security Techniques - Cryptographic Techniques Based on Elliptic Curves Part 1 General Others 0 Buy
19 IS/ISO/IEC 18014 : Part 1 : 2008/ISO/IEC 18014-1 : 2008
Information Technology- Security Techniques- Time Stamping Services Part 1 Framework Others 0 Buy
20 IS/ISO/IEC 18014 : Part 2 : 2009/ISO/IEC18014-2 : 2009
Information technology - Security Techniques - Time - Stamping Services Part 2 Mechanisms Producing Independent Tokens Others 0 Buy
21 IS/ISO/IEC 18014 : Part 3 : 2009/ISO/IEC 18014-3:2009
Information technology - Security techniques - Time - Stamping services: Part 3 mechanisms producing linked tokens Others 0 Buy
22 IS/ISO/IEC 18031 : 2011/ISO/IEC 18031:2011
Information technology - Security techniques - Random bit generation Others 0 Buy
23 IS/ISO/IEC 18033 : Part 1 : 2015/ISO/IEC 18033-1 : 2015
Information Technology - Security Techniques - Encryption Algorithms Part 1 General Others 0 Buy
24 IS/ISO/IEC 18033 : Part 2 : 2006/18033-2:2006
Information Technology - Security Techniques - Encryption Algorithms Part 2 Asymmetric Ciphers Others 0 Buy
25 IS/ISO/IEC 18033 : Part 3 : 2010/ISO/IEC 18033-3 : 2010
Information Technology-Security Techniques - Encryption Algorithms Part 3 Block Ciphers Others 0 Buy
26 IS/ISO/IEC 18033 : Part 4 : 2011/ISO/IEC 18033-4:2011
Information technology - Security techniques - encryption algorithms: Part 4 stream ciphers Others 0 Buy
27 IS/ISO/IEC 18033 : Part 5 : 2015/ISO/IEC 18033-5:2015
Information technology - Security techniques - Encryption algorithms: Part 5 identity - Based ciphers Others 0 Buy
28 IS/ISO/IEC 18104 : Part 4 : 2015/ISO/IEC 18014-4 : 2015
Information Technology - Security Techniques - Time-Stamping Services Part 4 Traceability of Time Sources Others 0 Buy
29 IS/ISO/IEC 19785 : Part 2 : 2018/ISO/IEC 19785-2 : 20
Information Technology- Common Biometric Exchange Formats Framework Part 2 Procedures for the Operation of the Biometric Registration Authority Others 0 Buy
30 IS/ISO/IEC 19896 : Part 1 : 2018/ISO/IEC 19896-1:2018
IT Security Techniques - Competence Requirements for Information Security Testers and Evaluators Part 1 Introduction, Concepts and General Requirements Others 0 Buy
31 IS/ISO/IEC 19896 : Part 2 : 2018/ISO/IEC 19896-2:2018
IT Security Techniques - Competence Requirements for Information Security Testers and Evaluators Part 2 Knowledge, Skills and Effectiveness Requirements for ISO / IEC 19790 Testers Others 0 Buy
32 IS/ISO/IEC 19896 : Part 3 : 2018/ISO/IEC 19896-3:2018
IT Security Techniques - Competence Requirements for Information Security Testers and Evaluators Part 3 Knowledge, Skills and Effectiveness Requirements for ISO/IEC 15408 Evaluators Others 0 Buy
33 IS/ISO/IEC 27000 : 2018/ISO/IEC 27000:2018
(1 Revision)
Information technology - Security techniques - information: Security management systems - Overview and vocabulary (First Revision) Terminology 0 Buy
34 IS/ISO/IEC 27001 : 2013/IS/ISO/IEC 27001 : 2013
(1 Revision)
Information Technologies - Security Techniques - information Security Managemet Systems - Requirements (First Revision) Product Specification 2019, Dec Buy
35 IS/ISO/IEC 27002 : 2013/ISO/IEC 27002 : 2013
Information technology - Security techniques - Code of practice for information: Security controls Others 0 Buy
36 IS/ISO/IEC 27003 : 2017/ISO/IEC 27003:2017
(1 Revision)
Information technology - Security techniques - Information: Security management systems - Guidance (First Revision) Others 0 Buy
37 IS/ISO/IEC 27004 : 2016/ISO/IEC 27004:2016
(1 Revision)
Information technology - Security techniques - Information: Security management - Monitoring, measurement, analysis and evaluation (First Revision) Others 0 Buy
38 IS/ISO/IEC 27005 : 2018/ISO/IEC 27005:2018
(2 Revision)
Information Technology Security Techniques — Information Security Risk Management ( Second Revision ) Others 0 Buy
39 IS/ISO/IEC 27006 : 2015/ISO/IEC 27006 : 2015
(1 Revision)
Information technology - Security techniques - Requirements for bodies providing audit and Certification of Information Security Management systems (First Revision) System Standard 0 Buy
40 IS/ISO/IEC 27007 : 2017/ISO/IEC 27007:2017
Information technology - Security techniques - Guidelines for information security management systems auditing Others 0 Buy
41 IS/ISO/IEC 27010 : 2015/ISO/IEC 27010:2015
Information Technology - Security Techniques - Information Security Management for Inter-Sector and Inter-Organizational Communications Others 0 Buy
42 IS/ISO/IEC 27011 : 2016/ISO/IEC 27011:2016
(1 Revision)
Information Technology — Security Techniques — Code of Practice for Information Security Controls Based on ISO/IEC 27002 for Telecommunications Organizations ( First Revision ) Code of Practice 0 Buy
43 IS/ISO/IEC 27017 : 2015/ISO/IEC 27017 : 2015
Information Technology - Security Techniques - Code of Practice for Information Security Controls Based on ISO/IEC 27002 for Cloud Services System Standard 0 Buy
44 IS/ISO/IEC 27018 : 2019/ISO/IEC 27018:2019
(1 Revision)
Information Technology — Security Techniques — Code of Practice for Protection of Personally Identifiable Information ( PII ) in Public Clouds Acting as PII Processors ( First Revision ) Others 0 Buy
45 IS/ISO/IEC 27019 : 2017/ISO/IEC 27019:2017
Information Technology - Security Techniques - Information Security Controls for the Energy Utility Industry Others 0 Buy
46 IS/ISO/IEC 27032 : 2012/ISO/IEC 27032 : 2012
Information Technology - Security Techniques - Guidelines for Cyber Security Others 0 Buy
47 IS/ISO/IEC 27033 : Part 1 : 2015/ISO/IEC 27033-1:2015
(1 Revision)
Information Technology - Security Techniques - Network Security Part 1 Overview and Concepts (First Revision) Others 0 Buy
48 IS/ISO/IEC 27033 : Part 2 : 2012/ISO/IEC 27033-2:2012
Information technology - Security techniques: Part 2 guidelines for the design and implementation of network: Security Others 0 Buy
49 IS/ISO/IEC 27033 : Part 3 : 2010/ISO/IEC 27033-3 :2010
Information technology - Security techniques - Network: Security: Part 3 reference networking scenarios - Threats, design techniques and control issues Others 2019, Jan Buy
50 IS/ISO/IEC 27033 : Part 4 : 2014/ISO/IEC 27033-4:2014
Information technology - Security techniques - Network: Security: Part 4 Securing communications between networks using: Security gateways Others 2019, Nov Buy
51 IS/ISO/IEC 27033 : Part 5 : 2013/ISO/IEC 27033-5:2013
Information technology - Security techniques - Network Security: Part 5 Securing communications across networks using virtual pr4ate networks (VPNs) Others 0 Buy
52 IS/ISO/IEC 27033 : Part 6 : 2016/ISO/IEC 27033-6:2016
Information technology - Security techniques - Network Security: Part 6 Securing wireless IP network access Others 0 Buy
53 IS/ISO/IEC 27034 : Part 1 : 2011/ISO/IEC 27034-1 : 2011
Information technology - Security techniques - Application Security: Part 1 overview and concepts Others 0 Buy
54 IS/ISO/IEC 27034 : Part 2 : 2015/ISO/IEC 27034-2:2015
Information technology - Security techniques - Application Security: Part 2 organization normat4e framework Others 0 Buy
55 IS/ISO/IEC 27034 : Part 3 : 2018/ISO/IEC 27034-3:2018
Information Technology - Application Security Part 3 Application Security Management Process Others 0 Buy
56 IS/ISO/IEC 27034 : Part 5 : 2017/ISO/IEC 27034-5:2017
Information technology - Security techniques - Application Security: Part 5 protocols and application Security controls data structure Others 0 Buy
57 IS/ISO/IEC 27034 : Part 6 : 2016/ISO/IEC 27034-6:2016
Information technology - Security techniques - Application Security: Part 6 case studies Others 0 Buy
58 IS/ISO/IEC 27034 : Part 7 : 2018/ISO/IEC 27034-7:2018
Information Technology - Application Security Part 7 Assurance Prediction Framework Others 0 Buy
59 IS/ISO/IEC 27035 : Part 1 : 2016/ISO/IEC 27035-1:2016
Information technology - Security techniques - Information Security incident management: Part 1 principles of incident management (First Revision) Others 0 Buy
60 IS/ISO/IEC 27035 : Part 2 : 2016/ISO/IEC 27035-2:2016
Information technology - Security techniques - Information: Security incident management: Part 2 guidelines to plan and prepare for incident response (First Revision) Others 0 Buy
61 IS/ISO/IEC 27036 : Part 1 : 2014/ISO/IEC 27036 : Part 1 : 2014
Information technology - Security techniques - Information: Security for supplier relationships: Part 1 overview and concepts System Standard 2019, Nov Buy
62 IS/ISO/IEC 27036 : Part 3 : 2013/ISO/IEC 27036 : Part 3 : 2013
Information technology - Security techniques - Information Security for supplier relationships: Part 3 guidelines for information and communication technology supply chain: Security Others 2020, Dec Buy
63 IS/ISO/IEC 27036 : Part 4 : 2016/ISO/IEC 27036-4:2016
Information Technology - Security Techniques - Information Security for Supplier Relationships Part 4 Guidelines for Security of Cloud Services Others 0 Buy
64 IS/ISO/IEC 27037 : 2012/ISO/IEC 27037 : 2012
Information Technology - Security Techniques - Guidelines for Identification,Collection,Acquisition and Preservation of Digital Evidence Code of Practice 0 Buy
65 IS/ISO/IEC 27040 : 2015/ISO/IEC 27040 : 2015
Information Technology - Security Techniques - Storage Security Others 0 Buy
66 IS/ISO/IEC 27050 : Part 1 : 2016/ISO/IEC 27050-1:2016
Information technology - Security techniques - Electronic discovery: Part 1 overview and concepts Others 0 Buy
67 IS/ISO/IEC 27050 : Part 3 : 2017/ISO/IEC 27050-3:2017
Information technology - Security techniques - Electronic discovery: Part 3 code of practice for electronic discovery Others 0 Buy
68 IS/ISO/IEC 29100 : 2011/ISO/IEC 29100 : 2011
Information Technology - Security Techniques - Privacy Framework Others 0 Buy
69 IS/ISO/IEC 29101 : 2018/ISO/IEC 29101:2018
Information Technology — Security Techniques — Privacy Architecture Framework Others 0 Buy
70 IS/ISO/IEC 29192 : Part 1 : 2012/ISO/IEC 29192-1 : 2012
Information Technology - Security Techniques - Lightweight Crytography Part 1 General Others 0 Buy
71 IS/ISO/IEC 29192 : Part 2 : 2012/ISO/IEC 29192-2 : 2012
Information Technology - Security Techniques - Lightweight Cryptography Part 2 Block Ciphers Others 0 Buy
72 IS/ISO/IEC 29192 : Part 3 : 2012/ISO/IEC 29192-3 : 2012
Information Technology - Security Techniques - Lightweight Cryptography Part 3 Stream Ciphers Others 0 Buy
73 IS/ISO/IEC 29192 : Part 4 : 2013/ISO/IEC 29192-4 : 2013
Information Technology - Security Techniques - Lightweight Cryptography Part 4 Mechanisms Using Asymmetric Techniques Others 0 Buy
74 IS/ISO/IEC 29192 : Part 5 : 2016/ISO/IEC 29192-5:2016
Information Technology - Security Techniques - Lightweight Cryptography Part 5 Hash-Functions Others 0 Buy
75 IS/ISO/IEC 9796 : PART 2 : 2010/ISO/IEC 9796-2:2010
(1 Revision)
Information technology - Security techniques - Digital signature schemes g4ing message recovery: Part 2 integer factorization based mechanisms (First Revision) Others 2016, Apr Buy
76 IS/ISO/IEC 9796 : Part 3 : 2006/ISO/IEC 9796-3:2006
Information technology - Security techniques - Digital signature schemes giving message recovery: Part 3 discrete logarithm based mechanisms Others 2019, Apr Buy
77 IS/ISO/IEC/TR 27039 : 2015/ISO/IEC 27039:2015
Information Technology - Security Techniques - Selection, Deployment and Operations of Intrusion Detection Systems ( IDPS ) Code of Practice 0 Buy
78 IS/ISO/IEC/TR 15446 : 2017/ISO/IEC TR 15446:2017
Information technology - Security techniques - Guidance for the production of protection profiles and Security targets Others 0 Buy
79 IS/ISO/IEC/TR 27008 : 2019/ISO/IEC TS 27008:2019
(1 Revision)
Information Technology — Security Techniques — Guidelines for the Assessment of Information Security Controls ( First Revision ) Others 0 Buy
80 IS/ISO/IEC/TR 27103 : 2018/ISO/IEC TR 27103:2018
Information Technology - Security Techniques - Cybersecurity and ISO and IEC Standards Others 0 Buy
81 IS/ISO/IEC/TS 20540 : 2018/ISO/IEC TS 20540:2018
Information Technology - Security Techniques - Testing Cryptographic Modules in their Operational Environment Methods of tests 0 Buy
82 IS/ISO/IEC/TS 27034 : Part 5 : Sec 1 : 2018/ISO/IEC TS 27034-5-1:2018
Information Technology - Application Security Part 5-1 Protocols and Application Security Controls Data Structure, XML Schemas Others 0 Buy