Use the form below to find particular standards or projects. Enter your criteria for searching (single or in combination) in the fields below and press the button “Search”. You can also search using the Advance Search facility.
Information technology — Security techniques — Test and analysis methods for random bit generators within ISO/IEC 19790 and ISO/IEC 15408
60.60 Standard published
Information technology — Big data reference architecture — Part 4: Security and privacy
60.60 Standard published
Privacy enhancing data de-identification terminology and classification of techniques
90.93 Standard confirmed
Information security, cybersecurity and privacy protection — Physically unclonable functions — Part 1: Security requirements
60.60 Standard published
Information security, cybersecurity and privacy protection — Physically unclonable functions — Part 2: Test and evaluation methods
60.60 Standard published
Information technology — Security techniques — Systems Security Engineering — Capability Maturity Model® (SSE-CMM®)
90.93 Standard confirmed
Information technology — Security techniques — Security guidelines for design and implementation of virtualized servers
90.60 Close of review
Information security — Redaction of authentic data — Part 1: General
60.60 Standard published
Information security — Security requirements, test and evaluation methods for quantum key distribution — Part 1: Requirements
60.60 Standard published
Information security — Security requirements, test and evaluation methods for quantum key distribution — Part 2: Evaluation and testing methods
60.60 Standard published
Cybersecurity — Security reference model for industrial internet platform (SRM- IIP)
60.60 Standard published
Information security, cybersecurity and privacy protection — Biometric information protection
60.60 Standard published
Information technology — Security techniques — Test requirements for cryptographic modules
90.92 Standard to be revised
IT Security and Privacy — A framework for identity management — Part 1: Terminology and concepts
90.92 Standard to be revised
IT Security and Privacy — A framework for identity management — Part 1: Terminology and concepts — Amendment 1
60.60 Standard published
Information technology — Security techniques — A framework for identity management — Part 2: Reference architecture and requirements
90.92 Standard to be revised
Information technology — Security techniques — A framework for identity management — Part 3: Practice
90.92 Standard to be revised
Information technology — Security techniques — A framework for identity management — Part 3: Practice — Amendment 1: Identity Information Lifecycle processes
60.60 Standard published