Use the form below to find particular standards or projects. Enter your criteria for searching (single or in combination) in the fields below and press the button “Search”. You can also search using the Advance Search facility.
Information technology — Security techniques — Message Authentication Codes (MACs) — Part 3: Mechanisms using a universal hash-function — Amendment 1
60.60 Standard published
Information technology — Security techniques — Entity authentication — Part 1: General
90.93 Standard confirmed
IT Security techniques — Entity authentication — Part 2: Mechanisms using authenticated encryption
90.20 Standard under periodical review
IT Security techniques — Entity authentication — Part 3: Mechanisms using digital signature techniques
90.20 Standard under periodical review
Information technology — Security techniques — Entity authentication — Part 4: Mechanisms using a cryptographic check function
90.93 Standard confirmed
Information technology — Security techniques — Entity authentication — Part 4: Mechanisms using a cryptographic check function — Technical Corrigendum 1
60.60 Standard published
Information technology — Security techniques — Entity authentication — Part 4: Mechanisms using a cryptographic check function — Technical Corrigendum 2
60.60 Standard published
Information technology — Security techniques — Entity authentication — Part 5: Mechanisms using zero-knowledge techniques
90.92 Standard to be revised
Information technology — Security techniques — Entity authentication — Part 6: Mechanisms using manual data transfer
90.93 Standard confirmed
Information security, cybersecurity and privacy protection — Requirements for the competence of IT security conformance assessment body personnel — Part 1: Overview and concepts
30.60 Close of voting/ comment period
Information security, cybersecurity and privacy protection — Requirements for the competence of IT security conformance assessment body personnel — Part 2: Knowledge and skills requirements for ISO/IEC 19790 testers and validators
30.60 Close of voting/ comment period
Methodologies to evaluate the resistance of biometric recognition systems to morphing attacks
30.60 Close of voting/ comment period
Information technology — Security techniques — Code of practice for information security controls based on ISO/IEC 27002 for cloud services
30.20 CD study/ballot initiated
Information security, cyber security and privacy protection — Guidance on ISO/IEC 27002 attributes
30.60 Close of voting/ comment period
Cybersecurity — Artificial Intelligence — Guidance for addressing security threats and failures in artificial intelligence systems
30.60 Close of voting/ comment period
Guidelines on privacy preservation based on zero knowledge proofs
30.20 CD study/ballot initiated
additional document for ISO/IEC 27002 and ISO and IEC standards
30.99 CD approved for registration as DIS
Information technology — Security techniques — Random bit generation
40.60 Close of voting