Standards search

Use the form below to find particular standards or projects. Enter your criteria for searching (single or in combination) in the fields below and press the button “Search”. You can also search using the Advance Search facility.

Information technology — Security techniques — Message Authentication Codes (MACs) — Part 3: Mechanisms using a universal hash-function — Amendment 1

60.60 Standard published

ISO/IEC JTC 1/SC 27

Information technology — Security techniques — Entity authentication — Part 1: General

90.93 Standard confirmed

ISO/IEC JTC 1/SC 27

IT Security techniques — Entity authentication — Part 2: Mechanisms using authenticated encryption

90.20 Standard under periodical review

ISO/IEC JTC 1/SC 27

IT Security techniques — Entity authentication — Part 3: Mechanisms using digital signature techniques

90.20 Standard under periodical review

ISO/IEC JTC 1/SC 27

Information technology — Security techniques — Entity authentication — Part 4: Mechanisms using a cryptographic check function

90.93 Standard confirmed

ISO/IEC JTC 1/SC 27

Information technology — Security techniques — Entity authentication — Part 4: Mechanisms using a cryptographic check function — Technical Corrigendum 1

60.60 Standard published

ISO/IEC JTC 1/SC 27

Information technology — Security techniques — Entity authentication — Part 4: Mechanisms using a cryptographic check function — Technical Corrigendum 2

60.60 Standard published

ISO/IEC JTC 1/SC 27

Information technology — Security techniques — Entity authentication — Part 5: Mechanisms using zero-knowledge techniques

90.92 Standard to be revised

ISO/IEC JTC 1/SC 27

Information technology — Security techniques — Entity authentication — Part 6: Mechanisms using manual data transfer

90.93 Standard confirmed

ISO/IEC JTC 1/SC 27

Information security, cybersecurity and privacy protection — Requirements for the competence of IT security conformance assessment body personnel — Part 1: Overview and concepts

30.60 Close of voting/ comment period

ISO/IEC JTC 1/SC 27

Information security, cybersecurity and privacy protection — Requirements for the competence of IT security conformance assessment body personnel — Part 2: Knowledge and skills requirements for ISO/IEC 19790 testers and validators

30.60 Close of voting/ comment period

ISO/IEC JTC 1/SC 27

Methodologies to evaluate the resistance of biometric recognition systems to morphing attacks

30.60 Close of voting/ comment period

ISO/IEC JTC 1/SC 37

Information technology — Security techniques — Code of practice for information security controls based on ISO/IEC 27002 for cloud services

30.20 CD study/ballot initiated

ISO/IEC JTC 1/SC 27

Information security, cyber security and privacy protection — Guidance on ISO/IEC 27002 attributes

30.60 Close of voting/ comment period

ISO/IEC JTC 1/SC 27

Cybersecurity — Artificial Intelligence — Guidance for addressing security threats and failures in artificial intelligence systems

30.60 Close of voting/ comment period

ISO/IEC JTC 1/SC 27

Guidelines on privacy preservation based on zero knowledge proofs

30.20 CD study/ballot initiated

ISO/IEC JTC 1/SC 27

additional document for ISO/IEC 27002 and ISO and IEC standards

30.99 CD approved for registration as DIS

ISO/IEC JTC 1/SC 27

Information technology — Security techniques — Random bit generation

40.60 Close of voting

ISO/IEC JTC 1/SC 27