Use the form below to find particular standards or projects. Enter your criteria for searching (single or in combination) in the fields below and press the button “Search”. You can also search using the Advance Search facility.
Digital authentication: Risks and mitigations
00.00 Proposal for new project received
Digital authentication: Risks and mitigations
00.00 Proposal for new project received
Information technology – Security techniques – Security assurance throughout the life cycle
00.00 Proposal for new project received
Requirement standards for bodies providing audit and certification of sector-specific information security management systems
00.00 Proposal for new project received
Information technology — Big data security and privacy – Security and privacy-preserving guidelines for multi- sourced data processing
00.00 Proposal for new project received
Authority on identity information quality and related architecture description
00.00 Proposal for new project received
Preparation for a revision of ISO/IEC 29151
00.00 Proposal for new project received
Preparation for a revision of ISO/IEC 27018
00.00 Proposal for new project received
Information technology — Security techniques — Information security management — Organizational economics
00.00 Proposal for new project received
Information technology — Guidance on information security management system processes
00.00 Proposal for new project received
Personal identifiable information (PII) processing record information structure
00.00 Proposal for new project received
Information technology — Big data security and privacy - Security and privacy-preserving guidelines for multi-sourced data processing
00.60 Close of review
Information technology — Security techniques — Guidelines for the use and management of Trusted Third Party services
90.93 Standard confirmed
Information technology — Security techniques — Security assurance framework — Part 1: Introduction and concepts
90.93 Standard confirmed
Information technology — Security techniques — Security assurance framework — Part 2: Analysis
90.93 Standard confirmed
Information technology — Security techniques — Guidance for the production of protection profiles and security targets
60.60 Standard published
Information technology — Security techniques — Security assessment of operational systems
90.93 Standard confirmed