Cybersecurity


Technical committee




Cybersecurity

Railway applications - Cybersecurity

60.60 Standard published

CLC/TC 9X
CEN/CENELEC

Fixed-time cybersecurity evaluation methodology for ICT products

60.60 Standard published

CEN/CLC/JTC 13
CEN/CENELEC

Fixed-time cybersecurity evaluation methodology for ICT products

60.60 Standard published

CEN/CLC/JTC 13

Nuclear power plants - Instrumentation, control and electrical power systems - Cybersecurity requirements

60.60 Standard published

CLC/TC 45AX

Nuclear power plants - Instrumentation and control systems - Requirements for coordinating safety and cybersecurity

60.60 Standard published

CLC/TC 45AX

Maritime navigation and radiocommunication equipment and systems - Cybersecurity - General requirements, methods of testing and required test results

60.60 Standard published

CLC/SR 80

Information security, cybersecurity and privacy protection - Information security controls (ISO/IEC 27002:2022)

60.60 Standard published

CEN/CLC/JTC 13

Information security, cybersecurity and privacy protection - Information security controls (ISO/IEC 27002:2022)

60.60 Standard published

CEN/CLC/JTC 13

Information security, cybersecurity and privacy protection - Guidelines for information security management systems auditing (ISO/IEC 27007:2020)

60.60 Standard published

CEN/CLC/JTC 13

Information security, cybersecurity and privacy protection - Guidelines for information security management systems auditing (ISO/IEC 27007:2020)

60.60 Standard published

CEN/CLC/JTC 13

Health informatics - Device interoperability - Part 40101: Foundational - Cybersecurity - Processes for vulnerability assessment (ISO/IEEE 11073-40101:2022)

60.60 Standard published

CEN/TC 251

Health informatics - Device interoperability - Part 40102: Foundational - Cybersecurity - Capabilities for mitigation (ISO/IEEE 11073-40102:2022)

60.60 Standard published

CEN/TC 251

Nuclear power plants - Instrumentation, control and electrical power systems - Cybersecurity requirements

60.60 Standard published

TC 45/SC 45A

Nuclear power plants - Instrumentation and control systems - Requirements for coordinating safety and cybersecurity

60.60 Standard published

TC 45/SC 45A

Amendment 1 - Nuclear power plants - Instrumentation and control systems - Requirements for coordinating safety and cybersecurity

60.60 Standard published

TC 45/SC 45A

Maritime navigation and radiocommunication equipment and systems - Cybersecurity - General requirements, methods of testing and required test results

60.60 Standard published

TC 80

Industrial-process measurement, control and automation - Smart manufacturing - Part 3: Challenges for cybersecurity

60.60 Standard published

TC 65

Power systems management and associated information exchange - Data and communication security - Part 100-6: Cybersecurity conformance testing for IEC 61850-8-1 and IEC 61850-9-2

60.60 Standard published

TC 57

Cybersecurity aspects of devices used for power metering and monitoring, power quality monitoring, data collection and analysis

60.60 Standard published

TC 85

Electrical requirements for lifts, escalators and moving walks — Part 20: Cybersecurity

60.60 Standard published

ISO/TC 178

Information security, cybersecurity and privacy protection — Evaluation criteria for IT security — Part 1: Introduction and general model

60.60 Standard published

ISO/IEC JTC 1/SC 27

Information security, cybersecurity and privacy protection — Evaluation criteria for IT security — Part 2: Security functional components

60.60 Standard published

ISO/IEC JTC 1/SC 27

Information security, cybersecurity and privacy protection — Evaluation criteria for IT security — Part 3: Security assurance components

60.60 Standard published

ISO/IEC JTC 1/SC 27

Information security, cybersecurity and privacy protection — Evaluation criteria for IT security — Part 4: Framework for the specification of evaluation methods and activities

60.60 Standard published

ISO/IEC JTC 1/SC 27

Information security, cybersecurity and privacy protection — Evaluation criteria for IT security — Part 5: Pre-defined packages of security requirements

60.60 Standard published

ISO/IEC JTC 1/SC 27

Information security, cybersecurity and privacy protection — Evaluation criteria for IT security — Methodology for IT security evaluation

60.60 Standard published

ISO/IEC JTC 1/SC 27

Information security, cybersecurity and privacy protection — Physically unclonable functions — Part 1: Security requirements

60.60 Standard published

ISO/IEC JTC 1/SC 27

Information security, cybersecurity and privacy protection — Physically unclonable functions — Part 2: Test and evaluation methods

60.60 Standard published

ISO/IEC JTC 1/SC 27

Information security, cybersecurity and privacy protection — Biometric information protection

60.60 Standard published

ISO/IEC JTC 1/SC 27

Information security, cybersecurity and privacy protection — Information security management systems — Requirements

60.60 Standard published

ISO/IEC JTC 1/SC 27

Information security, cybersecurity and privacy protection — Information security controls

60.60 Standard published

ISO/IEC JTC 1/SC 27

Information security, cybersecurity and privacy protection — Guidance on managing information security risks

60.60 Standard published

ISO/IEC JTC 1/SC 27

Information security, cybersecurity and privacy protection — Guidelines for information security management systems auditing

60.60 Standard published

ISO/IEC JTC 1/SC 27

Information security, cybersecurity and privacy protection — Sector-specific application of ISO/IEC 27001 — Requirements

60.60 Standard published

ISO/IEC JTC 1/SC 27

Information security, cybersecurity and privacy protection — Guidance on the integrated implementation of ISO/IEC 27001 and ISO/IEC 20000-1

60.60 Standard published

ISO/IEC JTC 1/SC 27

Information security, cybersecurity and privacy protection — Governance of information security

60.60 Standard published

ISO/IEC JTC 1/SC 27

Information technology — Security techniques — Guidelines for cybersecurity

90.92 Standard to be revised

ISO/IEC JTC 1/SC 27

Cybersecurity — Supplier relationships — Part 1: Overview and concepts

60.60 Standard published

ISO/IEC JTC 1/SC 27

Cybersecurity — Supplier relationships — Part 2: Requirements

60.60 Standard published

ISO/IEC JTC 1/SC 27

Cybersecurity — IoT security and privacy — Guidelines

60.60 Standard published

ISO/IEC JTC 1/SC 27

Information security, cybersecurity and privacy protection — Requirements for attribute-based unlinkable entity authentication

60.60 Standard published

ISO/IEC JTC 1/SC 27

Information security, cybersecurity and privacy protection — Security and privacy requirements for authentication using biometrics on mobile devices — Part 1: Local modes

60.60 Standard published

ISO/IEC JTC 1/SC 27

Information security, cybersecurity and privacy protection — Guidelines on personally identifiable information deletion

60.60 Standard published

ISO/IEC JTC 1/SC 27

Information security, cybersecurity and privacy protection — User-centric privacy preferences management framework

60.60 Standard published

ISO/IEC JTC 1/SC 27

Information security, cybersecurity and privacy protection — Application of ISO 31000:2018 for organizational privacy risk management

60.60 Standard published

ISO/IEC JTC 1/SC 27

Information security, cybersecurity and privacy protection – Privacy enhancing data de-identification framework

60.60 Standard published

ISO/IEC JTC 1/SC 27

Information security, cybersecurity and privacy protection — New concepts and changes in ISO/IEC 15408:2022 and ISO/IEC 18045:2022

60.60 Standard published

ISO/IEC JTC 1/SC 27

Information security, cybersecurity and privacy protection — Security techniques — Security properties and best practices for test and evaluation of white box cryptography

60.60 Standard published

ISO/IEC JTC 1/SC 27

Information technology — Security techniques — Cybersecurity and ISO and IEC Standards

90.93 Standard confirmed

ISO/IEC JTC 1/SC 27

Cybersecurity — Multi-party coordinated vulnerability disclosure and handling

60.60 Standard published

ISO/IEC JTC 1/SC 27

Information security, cybersecurity and privacy protection — Requirements for the competence of IT security testing and evaluation laboratories — Part 1: Evaluation for ISO/IEC 15408

60.60 Standard published

ISO/IEC JTC 1/SC 27

Information security, cybersecurity and privacy protection — Requirements for the competence of IT security testing and evaluation laboratories — Part 2: Testing for ISO/IEC 19790

60.60 Standard published

ISO/IEC JTC 1/SC 27

Information technology — Cybersecurity — Overview and concepts

60.60 Standard published

ISO/IEC JTC 1/SC 27

Information technology, cybersecurity and privacy protection — Cybersecurity framework development guidelines

60.60 Standard published

ISO/IEC JTC 1/SC 27

Health informatics — Device interoperability — Part 40101: Foundational — Cybersecurity — Processes for vulnerability assessment

60.60 Standard published

ISO/TC 215

Health informatics — Device interoperability — Part 40102: Foundational — Cybersecurity — Capabilities for mitigation

60.60 Standard published

ISO/TC 215

Road vehicles — Guidelines for auditing cybersecurity engineering

60.60 Standard published

ISO/TC 22/SC 32

Road vehicles — Cybersecurity engineering

60.60 Standard published

ISO/TC 22/SC 32

Road vehicles — Safety and cybersecurity for automated driving systems — Design, verification and validation

90.92 Standard to be revised

ISO/TC 22