Standards search

Use the form below to find particular standards or projects. Enter your criteria for searching (single or in combination) in the fields below and press the button “Search”. You can also search using the Advance Search facility.

Information technology — Process assessment — Process capability assessment model for information security management

90.60 Close of review

ISO/IEC JTC 1/SC 7

Information technology — Process assessment — Process capability assessment model for quality management

90.93 Standard confirmed

ISO/IEC JTC 1/SC 7

Information technology — Process assessment — Process capability assessment model for service management

90.60 Close of review

ISO/IEC JTC 1/SC 7

Information technology — Governance of IT — Implementation guide

90.92 Standard to be revised

ISO/IEC JTC 1/SC 40

Information technology — Governance of data — Part 3: Guidelines for data classification

60.60 Standard published

ISO/IEC JTC 1/SC 40

Information technology — Governance of IT — Governance implications of the use of a shared digital service platform among ecosystem organizations

60.60 Standard published

ISO/IEC JTC 1/SC 40

Information technology — Artificial intelligence — Assessment of machine learning classification performance

60.60 Standard published

ISO/IEC JTC 1/SC 42

Information technology — Computer graphics, image processing and environmental data representation — Guidelines for representation and visualization of smart cities

60.60 Standard published

ISO/IEC JTC 1/SC 24

Trustworthiness — Vocabulary

60.60 Standard published

ISO/IEC JTC 1

Information technology — Cloud computing and distributed platforms — Taxonomy for digital platforms

60.60 Standard published

ISO/IEC JTC 1/SC 38

Information technology — Artificial intelligence — Controllability of automated artificial intelligence systems

60.60 Standard published

ISO/IEC JTC 1/SC 42

Information security, cybersecurity and privacy protection — Evaluation criteria for IT security — Patch Management Extension for the ISO/IEC 15408 series and ISO/IEC 18045

60.60 Standard published

ISO/IEC JTC 1/SC 27

Information technology — Security techniques — Key management — Part 4: Mechanisms based on weak secrets

20.20 Working draft (WD) study initiated

ISO/IEC JTC 1/SC 27

Information security, cybersecurity and privacy protection — Evaluation criteria for IT security — Part 1: Introduction and general model

20.60 Close of comment period

ISO/IEC JTC 1/SC 27

Information security, cybersecurity and privacy protection — Evaluation criteria for IT security — Part 2: Security functional components

20.60 Close of comment period

ISO/IEC JTC 1/SC 27

Information security, cybersecurity and privacy protection — Evaluation criteria for IT security — Part 3: Security assurance components

20.60 Close of comment period

ISO/IEC JTC 1/SC 27

Information security, cybersecurity and privacy protection — Evaluation criteria for IT security — Part 4: Framework for the specification of evaluation methods and activities

20.60 Close of comment period

ISO/IEC JTC 1/SC 27

Information security, cybersecurity and privacy protection — Evaluation criteria for IT security — Part 5: Pre-defined packages of security requirements

20.60 Close of comment period

ISO/IEC JTC 1/SC 27