Help us improve the information on European and International standards we give you through this website. Give your opinion on the information we give to you this the information website: https://survey.zohopublic.eu/zs/iECGbL
Small Business Standards (SBS), the SME representing the voice of Small and Medium Enterprises in European and international standardisation, is sponsoring this service.
Standardization activities related to the Digital Sector, Digital Society or Telecom and having a particular interest for SMEs.
See at the end of the page for the list of CEN, CENELEC, ISO and IEC work items identified as a high priority for SMEs in Europe.
For ETSI work items, link is done to the ETSI Website.
SEE AT THE END OF THIS PAGE FOR ADDITIONAL INFORMATION ON PRIORITY WORK ITEMS
The following Technical Committees have been considered to be of highest priority in the Digital Society Sector. You can click on the links to obtain a fully updated view of draft standards and/or published standards corresponding to each technical body:
ISO/TC 307 - Blockchain and distributed ledger technologies
ISO/IEC JTC 1/SC 7 - Software and systems engineering
ISO/IEC JTC 1/SC 27 - Information security, cybersecurity and privacy protection
ISO/IEC JTC 1/SC 42- Artificial intelligence
IEC/TC 47 - Semiconductor devices
New ISO/IEC project with particular relevance for SMEs: ISO/IEC PWI 27404 - Cybersecurity Labelling for Consumer IoT Security
CEN/CLC/ETSI/JWG eAcc - eAccessibility
CEN/CLC/JTC 13 - Cybersecurity and Data Protection
CEN/TC 294 - Communication systems for meters
CLC/SR 33 - Power capacitors and their applications
CLC/TC 108X - Safety of electronic equipment within the fields of Audio/Video, Information Technology and Communication Technology
CLC/TC 209 - Cable networks for television signals, sound signals and interactive services
CLC/TC 215 - Electrotechnical aspects of telecommunication equipment
CLC/TC 219 - Mains communicating systems
CLC/TC 46X - Communication cables
CLC/TC 57 - Power systems management and associated information exchange
CLC/TC 65X - Industrial-process measurement, control and automation
CLC/TC 76 - Optical radiation safety and laser equipment
ARF | Augmented Reality Framework
BRAN | Broadband Radio Access Networks
DECT | Digital Enhanced Cordless Telecommunications (DECT)
ERM TG17 | EMC and Radio Spectrum Matters
ERM TG28 | EMC and Radio Spectrum Matters
ERM TG30 | EMC and Radio Spectrum Matters
ERM TG34 | EMC and Radio Spectrum Matters
ERM TG37 | EMC and Radio Spectrum Matters
ERM TGAERO | EMC and Radio Spectrum Matters
ERM TGDMR | EMC and Radio Spectrum Matters
ERM TGMARINE | EMC and Radio Spectrum Matters
ERM TGSRR | EMC and Radio Spectrum Matters
ERM TGUWB | EMC and Radio Spectrum Matters
ERM WGEMC | EMC and Radio Spectrum Matters
MSG | Mobile Standards Group
MSG TFES | Mobile Standards Group
SES HARM | SES
DGS/ARF-005 ARF
DMI/ARF-006 ARF
DEN/ERM-TGUWB-605 EN 305 550-5 ERM TGUWB
DEN/ERM-TGUWB-598EN 305 550-3 ERM TGUWB
REN/ERM-TGUWB-597EN 305 550-2 ERM TGUWB
REN/ERM-TGUWB-596EN 305 550-1 ERM TGUWB
DEN/ERM-TG28-557 ERM TG28
DEN/SES-00449 SES HARM
REN/SES-00289 SES HARM
DEN/BRAN-230026 BRAN
DEN/ERM-TG28-567 ERM TG28
DEN/BRAN-230025 BRAN
DEN/BRAN-230021 BRAN
DEN/ERM-TGUWB-591 ERM TGUWB
DEN/ERM-TG28-561 ERM TG28
DEN/ERM-TG28-560 ERM TG28
DEN/ERM-TGAERO-63 ERM TGAERO
DEN/ERM-TGDMR-362 ERM TGDMR
DEN/ERM-TGAERO-36 ERM TGAERO
REN/ERM-TG28-564 ERM TG28
REN/ERM-TG28-553 ERM TG28
DEN/ERM-TGAERO-99 ERM TGAERO
DEN/ERM-TGAERO-31-1 ERM TGAERO
DEN/ERM-TGAERO-30-2 ERM TGAERO
REN/ERM-TG17-163 ERM TG17
REN/ERM-TG17-159 ERM TG17
REN/ERM-TG17-156 ERM TG17
REN/ERM-TGMAR-605 ERM TGMARINE
REN/ERM-TGSRR-581 ERM TGSRR
REN/ERM-TGUWB-152 ERM TGUWB
REN/ERM-TG37-25 ERM TG37
REN/ERM-TG28-565 ERM TG28
REN/ERM-TG37-270 ERM TG37
REN/ERM-TG30-322 ERM TG30
REN/ERM-TG30-316 ERM TG30
REN/MSG-TFES-1126 MSG TFES
REN/ERM-TGUWB-151 ERM TGUWB
REN/ERM-TGMAR-522 ERM TGMARINE
REN/ERM-TG17-202 ERM TG17
REN/ERM-TG34-270 ERM TG34
REN/ERM-TG30-318 ERM TG30
DEN/ERM-TGMAR-600 ERM TGMARINE
REN/ERM-TGMAR-540 ERM TGMARINE
REN/ERM-TG17-201 ERM TG17
DEN/ERM-TGUWB-603302 065-4-5 ERM TGUWB
DEN/ERM-TGUWB-595302 065-4-3 ERM TGUWB
DEN/ERM-TGUWB-594302 065-4-2 ERM TGUWB
REN/ERM-TGUWB-150-4-1 ERM TGUWB
REN/ERM-TGUWB-150-2-2 ERM TGUWB
REN/ERM-TGUWB-150-2-1 ERM TGUWB
REN/ERM-TGUWB-150-1-3 ERM TGUWB
REN/ERM-TGUWB-150-1-2 ERM TGUWB
REN/ERM-TGUWB-150-1-1 ERM TGUWB
REN/ERM-TG17-160 ERM TG17
REN/MSG-TFES-15-3 MSG TFES
DEN/MSG-TFES-15-25 MSG TFES
DEN/MSG-TFES-15-24 MSG TFES
DEN/MSG-TFES-13-23 MSG TFES
REN/MSG-TFES-15-18 MSG TFES
REN/MSG-TFES-15-14 MSG TFES
REN/MSG-TFES-1137 MSG TFES
REN/DECT-00313 DECT
REN/MSG-TFES-15-1 MSG TFES
REN/BRAN-230016 BRAN
DEN/ERM-EMC-396 ERM WGEMC
REN/ERM-TGAERO-57 ERM TGAERO
REN/SES-00418 SES HARM
REN/BRAN-230019 BRAN
REN/MSG-001126 MSG
DEN/ERM-EMC-408 ERM WGEMC
DEN/ERM-EMC-401 ERM WGEMC
REN/ERM-EMC-395 ERM WGEMC
REN/ERM-EMC-394 ERM WGEMC
REN/SES-00417 SES HARM
REN/SES-00428 SES HARM
REN/SES-00415 SES HARM
DEN/DECT-00359-2 DECT
REN/DECT-00359-1 DECT
REN/ERM-TGSRR-578 ERM TGSRR
REN/ERM-TGSRR-580 ERM TGSRR
REN/ERM-TGSRR-579 ERM TGSRR
REN/ERM-TG37-271 ERM TG37
REN/SES-00412 SES HARM
DEN/ERM-TG28-568 ERM TG28
REN/ERM-TG28-563 ERM TG28
REN/ERM-TG28-562 ERM TG28
REN/ERM-TG17-158 ERM TG17
REN/ERM-TG17-157 ERM TG17
REN/ERM-TG30-324 ERM TG30
REN/ERM-TG28-566 ERM TG28
DEN/ERM-TG34-269 ERM TG34
DEN/ERM-TGUWB-609 ERM TGUWB
DEN/ERM-TGUWB-610 ERM TGUWB
RGR/IPE-008 IPE
RGR/NFV-TST007ed311 NFV TST
RGS/NFV-SOL014ed361 NFV SOL
RGS/NFV-SOL013ed361 NFV SOL
RGS/NFV-SOL009ed361 NFV SOL
RGS/NFV-SOL007ed361 NFV SOL
RGS/NFV-SOL006ed361 NFV SOL
DGS/NFV-SOL005ed361 NFV SOL
RGS/NFV-SOL004ed361 NFV SOL
RGS/NFV-SOL003ed361 NFV SOL
RGS/NFV-SOL002ed361 NFV SOL
RGS/NFV-SOL001ed361 NFV SOL
DGS/NFV-IFA040ed431 NFV IFA
RGS/NFV-IFA032ed361 NFV IFA
RGS/NFV-IFA032ed431 NFV IFA
RGS/NFV-IFA031ed361 NFV IFA
RGS/NFV-IFA031ed431 NFV IFA
RGS/NFV-IFA030ed361 NFV IFA
RGS/NFV-IFA030ed431 NFV IFA
RGS/NFV-IFA027ed361 NFV IFA
RGS/NFV-IFA027ed431 NFV IFA
RGR/NFV-IFA024ed431 NFV IFA
RGS/NFV-IFA014ed361 NFV IFA
RGS/NFV-IFA014ed431 NFV IFA
RGS/NFV-IFA013ed361 NFV IFA
RGS/NFV-IFA013ed431 NFV IFA
RGS/NFV-IFA011ed361 NFV IFA
RGS/NFV-IFA011ed431 NFV IFA
RGS/NFV-IFA010ed361 NFV IFA
RGS/NFV-IFA010ed431 NFV IFA
RGS/NFV-IFA008ed361 NFV IFA
RGS/NFV-IFA008ed431 NFV IFA
RGS/NFV-IFA007ed361 NFV IFA
RGS/NFV-IFA007ed431 NFV IFA
RGS/NFV-IFA006ed361 NFV IFA
RGS/NFV-IFA006ed431 NFV IFA
RGS/NFV-IFA005ed361 NFV IFA
RGS/NFV-IFA005ed431 NFV IFA
RGR/NFV-MAN001ed121 NFV EVE
DGS/NFV-006ed361 NFV
RGR/NFV-003ed171 NFV
DGR/MEC-0041 MECSecurity MEC
DGS/MEC-0040 FederationAPI MEC
RGR/ENI-0010v121_AI_App_Net ENI
RGR/ENI-009v121_Data_Proc_Mech ENI
RGR/ARF-007 ARF
REN/ERM-TG28-570 ERM TG28
DES/CABLE-0029-6 CABLE WG1
DES/CABLE-0029-5 CABLE WG1
DES/CABLE-0029-4 CABLE WG1
DES/CABLE-0029-3 CABLE WG1
DES/CABLE-0029-2 CABLE WG1
DES/CABLE-0029-1 CABLE WG1
RTS/TSGS-0223167vg40 3GPP SA 2
DTS/EMTEL-0062 EMTEL
RTR/ERM-600(TR 103 450) ERM
RTR/ERM-TGUWB-611 ERM TGUWB
RTR/EMTEL-0061 EMTEL
RTR/ERM-TGDMR-383 ERM TGDMR
DGS/ZSM-014_SecAspects ZSM
DEN/ERM-TGUWB-599EN 305 550-4 ERM TGUWB
REN/ERM-TG28-552 ERM TG28
DEN/ERM-TGAERO-37-5-2 ERM TGAERO
REN/ERM-TGUWB-590 ERM TGUWB
DEN/ERM-TGUWB-601302 065-4-4 ERM TGUWB
REN/ERM-TGUWB-150-3-1 ERM TGUWB
RTR/TSGS-0021916vg00 3GPP SA
DGR/IPE-006 IPE
DGR/IPE-007 IPE
DGS/F5G-0011Telemetry F5G
DGS/F5G-009 F5G
DTR/INT-00900 INT AFI
Signalling on low-voltage electrical installations in the frequency range 3 kHz to 148,5 kHz - Part 2-3: Immunity requirements for mains communicating equipment operating in the range of frequencies 3 kHz to 95 kHz and intended for use by electricity suppliers and distributors
60.60 Standard published
Signalling on low-voltage electrical installations in the frequency range 3 kHz to 148,5 kHz - Part 4-1: Low voltage decoupling filters - Generic specification
60.60 Standard published
Signalling on low-voltage electrical installations in the frequency range 3 kHz to 148,5 kHz - Part 4-3: Low voltage decoupling filter - Incoming filter
60.60 Standard published
Signalling on low-voltage electrical installations in the frequency range 3 kHz to 148,5 kHz - Part 4-4: Low voltage decoupling filter - Impedance filter
60.60 Standard published
Signalling on low-voltage electrical installations in the frequency range 3 kHz to 148,5 kHz Part 4-5: Low voltage decoupling filter - Segmentation filter
60.60 Standard published
Signalling on low-voltage electrical installations in the frequency range 3 kHz to 148,5 kHz Part 4-6: Low voltage decoupling filters - Phase coupler
60.60 Standard published
Coaxial cables - Part 9-1: Sectional specification for coaxial cables for analogue and digital signal transmission - Indoor drop cables for systems operating at 5 MHz - 1 000 MHz
60.55 Ratification completed (DOR)
Series capacitors for power systems - Part 2: Protective equipment for series capacitor banks
60.55 Ratification completed (DOR)
Cable networks for television signals, sound signals and interactive services - Part 11: Safety
60.60 Standard published
Safety of laser products - Part 4: Laser guards
60.55 Ratification completed (DOR)
Safety requirements for electrical equipment for measurement, control, and laboratory use - Part 2-201: Particular requirements for control equipment
50.60 Close of voting. Proof returned by secretariat
Industrial communication networks - Fieldbus specifications - Part 2: Physical layer specification and service definition
60.60 Standard published
Application integration at electric utilities - System interfaces for distribution management - Part 100: IEC Implementation profiles for application integration
60.60 Standard published
Enterprise business function interfaces for utility operations - Part 9: Interfaces for meter reading and control
60.60 Standard published
Energy management system application program interface (EMS-API) - Part 301: Common information model (CIM) base
60.60 Standard published
Energy management system application program interface (EMS-API) - Part 302: Common information model (CIM) dynamics
60.60 Standard published
Energy management system application program interface (EMS-API) - Part 456: Solved power system state profiles
60.60 Standard published
Power systems management and associated information exchange - Data and communications security - Part 9: Cyber security key management for power system equipment
60.60 Standard published
Audio/video, information and communication technology equipment - Part 1: Safety requirements
30.98 Project deleted
Semiconductor devices - Semiconductor devices for IoT system - Part 1: Test method of sound variation detection
60.60 Standard published
Signalling on low voltage electrical installations in the frequency range 3 kHz to 148,5 kHz Part 4-2: Low voltage decoupling filters - Safety requirements
45.99 Dispatch of FV draft to CCMC
Signalling on low-voltage electrical installations in the frequency range 3 kHz to 148,5 kHz Part 4-7: Portable low voltage decoupling filters - Safety requirements
45.99 Dispatch of FV draft to CCMC
Capacitors for power electronics
50.60 Close of voting. Proof returned by secretariat
Power capacitors - Low-voltage power factor correction banks
50.60 Close of voting. Proof returned by secretariat
Energy management system application program interface (EMS-API) - Part 555: CIM based efficient model exchange format (CIM/E)
40.98 Project deleted
Safety of laser products - Part 12: Safety of free space optical communication systems used for transmission of information
10.99 New project approved
Safety of laser products - Part 2: Safety of optical fibre communication systems (OFCSs)
60.55 Ratification completed (DOR)
Blockchain and distributed ledger technologies — Reference architecture
60.60 Standard published
Blockchain and Distributed Ledger Technology — Interoperability Framework
30.20 CD study/ballot initiated
Blockchain and distributed ledger technologies — Legally binding smart contracts
30.98 Project deleted
Information security, cybersecurity and privacy protection — Evaluation criteria for IT security — Part 1: Introduction and general model
90.92 Standard to be revised
Information security, cybersecurity and privacy protection — Evaluation criteria for IT security — Part 2: Security functional components
90.92 Standard to be revised
Information security, cybersecurity and privacy protection — Evaluation criteria for IT security — Part 3: Security assurance components
90.92 Standard to be revised
Information security, cybersecurity and privacy protection — Evaluation criteria for IT security — Part 4: Framework for the specification of evaluation methods and activities
90.92 Standard to be revised
Information security, cybersecurity and privacy protection — Evaluation criteria for IT security — Part 5: Pre-defined packages of security requirements
90.92 Standard to be revised
Information security, cybersecurity and privacy protection — Evaluation criteria for IT security — Methodology for IT security evaluation
90.92 Standard to be revised
Information technology — IT asset management — Part 6: Hardware identification tag
60.60 Standard published
Information technology — Security techniques — Anonymous digital signatures — Part 2: Mechanisms using a group public key — Amendment 2
60.60 Standard published
Information security — Anonymous entity authentication — Part 3: Mechanisms based on blind signatures
60.60 Standard published
Information security, cybersecurity and privacy protection — Physically unclonable functions — Part 2: Test and evaluation methods
60.60 Standard published
Information technology — Artificial intelligence — Artificial intelligence concepts and terminology
60.60 Standard published
Framework for Artificial Intelligence (AI) Systems Using Machine Learning (ML)
60.60 Standard published
Information security — Redaction of authentic data — Part 2: Redactable signature schemes based on asymmetric mechanisms
60.60 Standard published
Information security — Security requirements, test and evaluation methods for quantum key distribution — Part 1: Requirements
60.60 Standard published
Information security — Security requirements, test and evaluation methods for quantum key distribution — Part 2: Evaluation and testing methods
60.60 Standard published
Information technology — Artificial intelligence — Guidance on risk management
60.60 Standard published
Artificial intelligence (AI) — Assessment of the robustness of neural networks — Part 2: Methodology for the use of formal methods
60.60 Standard published
Cybersecurity — Security reference model for industrial internet platform (SRM- IIP)
60.60 Standard published
Information technology — Artificial intelligence — Process management framework for big data analytics
60.60 Standard published
Information security, cybersecurity and privacy protection — Biometric information protection
60.60 Standard published
IT Security and Privacy — A framework for identity management — Part 1: Terminology and concepts — Amendment 1
60.60 Standard published
Information technology — Security techniques — A framework for identity management — Part 3: Practice — Amendment 1: Identity Information Lifecycle processes
60.60 Standard published
Software and systems engineering — Certification of software and systems engineering professionals — Part 2: Guidance regarding description of knowledge, skills, and competencies contained in schemes
60.60 Standard published
Software and systems engineering — Certification of software and systems engineering professionals — Part 4: Software engineering
60.60 Standard published
Systems and software engineering — Systems and software Quality Requirements and Evaluation (SQuaRE) — Quality model overview and usage
60.60 Standard published
Systems and software engineering — Systems and software Quality Requirements and Evaluation (SQuaRE) — Product quality model
60.60 Standard published
Systems and software engineering — Systems and software Quality Requirements and Evaluation (SQuaRE) — Quality-in-use model
60.60 Standard published
Systems and software engineering — Systems and software Quality Requirements and Evaluation (SQuaRE) — Quality evaluation framework
60.60 Standard published
Software engineering — Systems and software Quality Requirements and Evaluation (SQuaRE) — Quality model for AI systems
90.92 Standard to be revised
Software and systems engineering — Methods and tools for product line configuration management
60.60 Standard published
Software and systems engineering — Methods and tools for product line measurement
60.60 Standard published
Information technology — Security techniques — Information security management systems — Requirements — Amendment 1
40.98 Project deleted
Information security, cybersecurity and privacy protection — Information security management systems — Requirements
60.60 Standard published
Information security, cybersecurity and privacy protection — Information security controls
60.60 Standard published
Information security, cybersecurity and privacy protection — Guidance on managing information security risks
60.60 Standard published
Information security, cybersecurity and privacy protection — Requirements for bodies providing audit and certification of information security management systems — Part 1: General
60.60 Standard published
Information security, cybersecurity and privacy protection — Information security controls based on ISO/IEC 27002 for telecommunications organizations
60.60 Standard published
Information technology — Information security incident management — Part 1: Principles and process
60.60 Standard published
Information technology — Information security incident management — Part 2: Guidelines to plan and prepare for incident response
60.60 Standard published
Cybersecurity — Supplier relationships — Part 2: Requirements
60.60 Standard published
Cybersecurity — Supplier relationships — Part 3: Guidelines for hardware, software, and services supply chain security
60.60 Standard published
Cybersecurity — Security recommendations for establishing trusted connections between devices and services
60.60 Standard published
Information technology — Public key infrastructure — Practices and policy framework
60.60 Standard published
Cybersecurity — IoT security and privacy — Device baseline requirements
60.60 Standard published
Information security, cybersecurity and privacy protection — Security and privacy requirements for authentication using biometrics on mobile devices — Part 1: Local modes
60.60 Standard published
Information security, cybersecurity and privacy protection — Application of ISO 31000 for assessment of identity-related risk
60.60 Standard published
Information security, cybersecurity and privacy protection — User-centric privacy preferences management framework
60.60 Standard published
Information security, cybersecurity and privacy protection — Application of ISO 31000:2018 for organizational privacy risk management
60.60 Standard published
Information security, cybersecurity and privacy protection – Privacy enhancing data de-identification framework
60.60 Standard published
Information security, cybersecurity and privacy protection — Verification of cryptographic protocols — Part 1: Framework
60.60 Standard published
Information technology — Security techniques — Guidelines for privacy impact assessment — Amendment 1
40.98 Project deleted
Information technology — Security techniques — A framework for access management — Amendment 1
95.99 Withdrawal of Standard
Information security — Lightweight cryptography — Part 8: Authenticated encryption
60.60 Standard published
Information technology — Governance of IT — Governance implications of the use of artificial intelligence by organizations
60.60 Standard published
Information technology — Artificial intelligence — Management system
60.60 Standard published
Information security — Secure multiparty computation — Part 1: General
60.60 Standard published
Artificial intelligence — Data quality for analytics and machine learning (ML) — Part 1: Overview, terminology, and examples
60.60 Standard published
Artificial intelligence — Data quality for analytics and machine learning (ML) — Part 2: Data quality measures
60.60 Standard published
Artificial intelligence — Data quality for analytics and machine learning (ML) — Part 3: Data quality management requirements and guidelines
60.60 Standard published
Artificial intelligence — Data quality for analytics and machine learning (ML) — Part 4: Data quality process framework
60.60 Standard published
Information technology — Artificial intelligence — AI system life cycle processes
60.60 Standard published
Information technology — Artificial intelligence — Guidance for AI applications
60.60 Standard published
Information technology — Artificial intelligence — Reference architecture of knowledge engineering
60.60 Standard published
Information technology — Security techniques — Message Authentication Codes (MACs) — Part 1: Mechanisms using a block cipher — Amendment 1
60.60 Standard published
Cybersecurity education and training
20.00 New project registered in TC/SC work programme
Multi-party coordinated vulnerability disclosure and handling
20.00 New project registered in TC/SC work programme
Software and systems engineering — Methods and tools for product line maturity framework
30.60 Close of voting/ comment period
Software and systems engineering — Mehtods and tools for product line texture
30.60 Close of voting/ comment period
Information technology — Security techniques — Information security management systems — Overview and vocabulary
30.60 Close of voting/ comment period
Information security, cybersecurity and privacy protection — Information security controls based on ISO/IEC 27002 for cloud services
30.60 Close of voting/ comment period
Systems and software engineering — Lifecycle profiles for Very Small Entities (VSEs) — Part 1: Overview
30.98 Project deleted
Systems and software engineering — Life cycle profiles for Very Small Entities (VSEs) — Part 5-5: Agile/DevOps guidelines
30.99 CD approved for registration as DIS
Information technology — Security and privacy — Data provenance
30.20 CD study/ballot initiated
additional document for ISO/IEC 27002 and ISO and IEC standards
30.99 CD approved for registration as DIS
Software and systems engineering — Software testing — Part 8: Model-based testing
30.98 Project deleted
Information technology — Artificial intelligence — Transparency taxonomy of AI systems
40.60 Close of voting
Information security, cyber security and privacy protection — Guidance on ISO/IEC 27002 attributes
40.00 DIS registered
Cybersecurity — IoT security and privacy — Cybersecurity labelling framework for consumer IoT
40.00 DIS registered
Information security, cybersecurity and privacy protection — Guidelines on privacy preservation based on zero knowledge proofs
40.00 DIS registered
Systems and software engineering — Life cycle profiles for very small entities (VSEs) — Part 5-4: Agile software development guidelines
40.60 Close of voting
Systems and software engineering — Lifecycle profiles for Very Small Entities (VSEs) — Part 6-1: Software engineering — Specific Space Profile Specifications
40.98 Project deleted
Systems and Software Engineering — Systems resilience concepts
40.20 DIS ballot initiated: 12 weeks
Information technology — Artificial intelligence — Objectives and approaches for explainability and interpretability of ML models and AI systems
50.00 Final text received or FDIS registered for formal approval
IT Security and Privacy — A framework for identity management — Part 2: Reference architecture and requirements
50.00 Final text received or FDIS registered for formal approval
Systems and software engineering — Software engineering life cycle profiles for very small entities (VSEs) — Part 5-1-2: Management and engineering guidelines: Generic profile group: Basic profile
50.20 Proof sent to secretariat or FDIS ballot initiated: 8 weeks
Systems and software engineering — Life cycle profiles for very small entities (VSEs) — Part 5-6-4: Systems engineering management and engineering guidelines for the generic Advanced profile
50.00 Final text received or FDIS registered for formal approval
Artificial intelligence — Data quality for analytics and machine learning (ML) — Part 5: Data quality governance framework
50.20 Proof sent to secretariat or FDIS ballot initiated: 8 weeks
Software engineering — Software life cycle processes — Maintenance
60.60 Standard published
Systems and software engineering — Systems and software assurance — Part 2: Assurance case
60.60 Standard published
Systems and software engineering — System life cycle processes
60.60 Standard published
Systems and software engineering — Engineering and management of websites for systems, software and services information
60.60 Standard published
Systems and Software engineering — Methods and tools for model-based systems and software engineering
60.60 Standard published
Systems and software engineering — Life cycle management — Part 6: System and software integration
60.60 Standard published
Systems and software engineering — Life cycle management — Part 9: Application of system and software life cycle processes in epidemic prevention and control systems
60.60 Standard published
Systems and software engineering — Design and development of information for users
60.60 Standard published
Systems and software engineering — Content management for product life cycle, user and service management information for users
60.60 Standard published
Information technology — DevOps — Building reliable and secure systems including application build, package and deployment
60.60 Standard published
Software engineering — Life cycle processes — Software acquisition
60.60 Standard published
Software, systems and enterprise — Architecture description
60.60 Standard published
Information technology — Security techniques — Anonymous digital signatures — Part 3: Mechanisms using multiple public keys
10.20 New project ballot initiated
Software and systems engineering — Methods and tools for configuration management in feature-based product line engineering
10.60 Close of voting
Software and systems engineering — Agile and DevOps principles and practices — Part 1: Agile principles and practices
10.98 New project rejected
Software and systems engineering — Agile and DevOps principles and practices — Part 2: DevOps principles and practices
10.98 New project rejected
IT Security Techniques — Requirements for the competence of IT security testing and evaluation laboratories — Part 2: Testing for ISO/IEC 19790
10.20 New project ballot initiated
IT Security Techniques — Requirements for the competence of IT security testing and evaluation laboratories — Part 2: Part 1: Testing and evaluation for ISO/IEC 15408Part 2: Testing for ISO/IEC 19790
10.98 New project rejected
Information technology — Process assessment — Process assessment model for safety processes
10.98 New project rejected
Information security, cybersecurity and privacy protection — Sector-specific application of ISO/IEC 27001 — Requirements
00.98 Proposal for new project abandoned
Information technology — Security techniques — Application security — Part 4: Verification and validation guidelines
00.98 Proposal for new project abandoned
Cybersecurity — Big data security and privacy — Guidelines for managing big data risks
00.98 Proposal for new project abandoned
Guidelines on Security Operations Center (SOC)
00.98 Proposal for new project abandoned
Cybersecurity assurance of systems and system of systems (SoS)
00.98 Proposal for new project abandoned
Digital authentication: Risks and mitigations
00.00 Proposal for new project received
Guidance on illustrative processes for a privacy information management system
00.98 Proposal for new project abandoned
Information technology – Security techniques – Security assurance throughout the life cycle
00.00 Proposal for new project received
Requirement standards for bodies providing audit and certification of sector-specific information security management systems
00.00 Proposal for new project received
Guidance for addressing security threats and failures in artificial intelligence
00.98 Proposal for new project abandoned
Information technology — Process assessment — Process maturity model for system and software lifecycle processes
00.98 Proposal for new project abandoned
Cybersecurity — Security frameworks based on the conceptual model of cyber-physical systems
00.98 Proposal for new project abandoned
Information security, cybersecurity and privacy protection — New concepts and changes in ISO/IEC 15408:2022 and ISO/IEC 18045:2022
60.60 Standard published
Information technology — Artificial intelligence (AI) — Use cases
60.60 Standard published
Information technology — Artificial intelligence — Overview of ethical and societal concerns
60.60 Standard published
Security and privacy in artificial intelligence use cases — Best practices
60.60 Standard published
Software and systems engineering — Software testing — Part 13: Using the ISO/IEC/IEEE 29119 series in the testing of biometric systems
60.60 Standard published
Artificial intelligence — Functional safety and AI systems
60.60 Standard published
Information security, cybersecurity and privacy protection — Hardware monitoring technology for hardware security assessment
60.60 Standard published
Cybersecurity — Multi-party coordinated vulnerability disclosure and handling
60.60 Standard published
Software engineering — Controlling frequently occurring risks during development and maintenance of custom software
60.60 Standard published
Information security, cybersecurity and privacy protection — Ontology building blocks for security and risk assessment
60.60 Standard published
Systems and software engineering — Systems and software Quality Requirements and Evaluation (SQuaRE): cloud services — Part 1: Quality model
60.60 Standard published
Systems and software engineering — Systems and software Quality Requirements and Evaluation (SQuaRE) — Guidance for quality evaluation of artificial intelligence (AI) systems
60.60 Standard published
Information technology — Artificial intelligence — Controllability of automated artificial intelligence systems
60.60 Standard published
Information security, cybersecurity and privacy protection — Evaluation criteria for IT security — Patch Management Extension for the ISO/IEC 15408 series and ISO/IEC 18045
60.60 Standard published
Information security — Encryption algorithms — Part 8: Fully Homomorphic Encryption
20.98 Project deleted
Information security, cybersecurity and privacy protection — Security requirements and evaluation activities for connected vehicle devices
20.98 Project deleted
Towards creating an extension for patch management for ISO/IEC 15408 and ISO/IEC 18045
20.98 Project deleted
Re-identification and privacy vulnerabilities and mitigation methods in blockchain and distributed ledger technologies
10.20 New project ballot initiated
Representation of physical assets as non-fungible tokens(NFT) in DLT systems
00.00 Proposal for new project received
Blockchain and distributed ledger technologies – Overview of existing DLT systems for identity management
60.60 Standard published
Blockchain and distributed ledger technologies (DLTs) — Overview of trust anchors for DLT-based identity management
60.60 Standard published
Blockchain and distributed ledger technologies – Use cases
60.60 Standard published
Blockchain and distributed ledger technologies — Identifiers of subjects and objects for the design of blockchain systems
60.60 Standard published
Blockchain and distributed ledger technologies — Data flow models for blockchain and DLT use cases
90.92 Standard to be revised
Blockchain and distributed ledger technologies — Guidelines for governance
60.60 Standard published
Decentralized Identity standard for the identification of subjects and objects
20.98 Project deleted
Blockchain and distributed ledger technologies - Overview of smart contract security good practice and issues
20.98 Project deleted
Signalling on low-voltage electrical installations in the frequency range 3 kHz to 148,5 kHz - Part 2: Immunity requirements - Section 3: Mains communications equipment/systems operating in the range of frequencies 3 kHz to 95 kHz and intended for use by electricity suppliers and distributors
30.98 Project deleted
Multi-element metallic cables used in analogue and digital communication and control - Part 7: Sectional specification for instrumentation and control cables
40.98 Project deleted
Programmable controllers - Part 2: Equipment requirements and test
50.98 Project deleted
Application integration at electric utilities - System interfaces for distribution management - Part 11: Common information model (CIM) extensions for distribution
40.60 Close of voting