Use the form below to find particular standards or projects. Enter your criteria for searching (single or in combination) in the fields below and press the button “Search”. You can also search using the Advance Search facility.
Information technology — Security techniques — Security requirements for cryptographic modules
40.60 Close of voting
Information security, cybersecurity and privacy protection — General principles of security evaluation of biometric systems
40.00 DIS registered
Information technology — Security techniques — Anonymous digital signatures — Part 3: Mechanisms using multiple public keys
40.60 Close of voting
Information technology — Security techniques — Test requirements for cryptographic modules
40.60 Close of voting
IT Security and Privacy — A framework for identity management — Part 1: Terminology and concepts
40.99 Full report circulated: DIS approved for registration as FDIS
IT Security and Privacy — A framework for identity management — Part 2: Reference architecture and requirements
40.99 Full report circulated: DIS approved for registration as FDIS
IT Security and Privacy — A framework for identity management — Part 3: Practice
40.99 Full report circulated: DIS approved for registration as FDIS
Information technology — Security techniques — Code of practice for protection of personally identifiable information (PII) in public clouds acting as PII processors
40.20 DIS ballot initiated: 12 weeks
Information technology — Information security incident management — Part 4: Coordination
40.60 Close of voting
Information security, cybersecurity and privacy protection — Security and privacy requirements for authentication using biometrics on mobile devices — Part 2: Remote modes
40.00 DIS registered
Information technology — Security techniques — Privacy guidelines for fintech services
40.99 Full report circulated: DIS approved for registration as FDIS
Information security, cybersecurity and privacy protection — Privacy information management systems — Requirements and guidance
40.99 Full report circulated: DIS approved for registration as FDIS
Requirements for bodies providing audit and certification of privacy information management systems
40.60 Close of voting
Information technology — TLS specification for storage systems
50.20 Proof sent to secretariat or FDIS ballot initiated: 8 weeks
Information security — Redaction of authentic data — Part 2: Redactable signature schemes based on asymmetric mechanisms
50.20 Proof sent to secretariat or FDIS ballot initiated: 8 weeks
Information security, cybersecurity and privacy protection — Information security controls for the energy utility industry“
50.00 Final text received or FDIS registered for formal approval
Cybersecurity — Information and communication technology readiness for business continuity
50.00 Final text received or FDIS registered for formal approval
Cybersecurity – IoT security and privacy – Guidelines for IoT-domotics
50.20 Proof sent to secretariat or FDIS ballot initiated: 8 weeks