Security techniques

Related standards or drafts

Information technology - Security techniques - Security requirements for cryptographic modules (ISO/IEC 19790:2012, including corrected version 2015-12)

60.60 Standard published

CEN/CLC/JTC 13

Information technology - Security techniques - Security requirements for cryptographic modules (ISO/IEC 19790:2012, including corrected version 2015-12)

60.60 Standard published

CEN/CLC/JTC 13

IT security techniques - Competence requirements for information security testers and evaluators - Part 1: Introduction, concepts and general requirements (ISO/IEC 19896-1:2018)

60.60 Standard published

CEN/CLC/JTC 13

IT security techniques - Competence requirements for information security testers and evaluators - Part 1: Introduction, concepts and general requirements (ISO/IEC 19896-1:2018)

60.60 Standard published

CEN/CLC/JTC 13

IT security techniques - Competence requirements for information security testers and evaluators - Part 2: Knowledge, skills and effectiveness requirements for ISO/IEC 19790 testers (ISO/IEC 19896-2:2018)

60.60 Standard published

CEN/CLC/JTC 13

IT security techniques - Competence requirements for information security testers and evaluators - Part 2: Knowledge, skills and effectiveness requirements for ISO/IEC 19790 testers (ISO/IEC 19896-2:2018)

60.60 Standard published

CEN/CLC/JTC 13

IT security techniques - Competence requirements for information security testers and evaluators - Part 3: Knowledge, skills and effectiveness requirements for ISO/IEC 15408 evaluators (ISO/IEC 19896-3:2018)

60.60 Standard published

CEN/CLC/JTC 13

IT security techniques - Competence requirements for information security testers and evaluators - Part 3: Knowledge, skills and effectiveness requirements for ISO/IEC 15408 evaluators (ISO/IEC 19896-3:2018)

60.60 Standard published

CEN/CLC/JTC 13

Information technology - Security techniques - A framework for identity management - Part 2: Reference architecture and requirements (ISO/IEC 24760-2:2015)

60.60 Standard published

CEN/CLC/JTC 13

Information technology - Security techniques - A framework for identity management - Part 2: Reference architecture and requirements (ISO/IEC 24760-2:2015)

60.60 Standard published

CEN/CLC/JTC 13

Information technology - Security techniques - A framework for identity management - Part 3: Practice (ISO/IEC 24760-3:2016)

60.60 Standard published

CEN/CLC/JTC 13

Information technology - Security techniques - A framework for identity management - Part 3: Practice (ISO/IEC 24760-3:2016)

60.60 Standard published

CEN/CLC/JTC 13

Information technology - Security techniques - Information security management systems - Overview and vocabulary (ISO/IEC 27000:2018)

60.60 Standard published

CEN/CLC/JTC 13

Information technology - Security techniques - Information security management systems - Overview and vocabulary (ISO/IEC 27000:2018)

60.60 Standard published

CEN/CLC/JTC 13

Information technology - Security techniques - Code of practice for Information security controls based on ISO/IEC 27002 for telecommunications organizations (ISO/IEC 27011:2016)

60.60 Standard published

CEN/CLC/JTC 13

Information technology - Security techniques - Code of practice for Information security controls based on ISO/IEC 27002 for telecommunications organizations (ISO/IEC 27011:2016)

60.60 Standard published

CEN/CLC/JTC 13

Information technology - Security techniques - Code of practice for information security controls based on ISO/IEC 27002 for cloud services (ISO/IEC 27017:2015)

60.60 Standard published

CEN/CLC/JTC 13

Information technology - Security techniques - Code of practice for information security controls based on ISO/IEC 27002 for cloud services (ISO/IEC 27017:2015)

60.60 Standard published

CEN/CLC/JTC 13

Information technology - Security techniques - Code of practice for protection of personally identifiable information (PII) in public clouds acting as PII processors (ISO/IEC 27018:2019)

60.60 Standard published

CEN/CLC/JTC 13

Information technology - Security techniques - Code of practice for protection of personally identifiable information (PII) in public clouds acting as PII processors (ISO/IEC 27018:2019)

60.60 Standard published

CEN/CLC/JTC 13

Information technology - Security techniques - Information security controls for the energy utility industry (ISO/IEC 27019:2017, Corrected version 2019-08)

60.60 Standard published

CEN/CLC/JTC 13

Information technology - Security techniques - Information security controls for the energy utility industry (ISO/IEC 27019:2017, Corrected version 2019-08)

60.60 Standard published

CEN/CLC/JTC 13

Information technology - Security techniques - Guidelines for identification, collection, acquisition and preservation of digital evidence (ISO/IEC 27037:2012)

60.60 Standard published

CEN/CLC/JTC 13

Information technology - Security techniques - Guidelines for identification, collection, acquisition and preservation of digital evidence (ISO/IEC 27037:2012)

60.60 Standard published

CEN/CLC/JTC 13

Information technology - Security techniques - Specification for digital redaction (ISO/IEC 27038:2014)

60.60 Standard published

CEN/CLC/JTC 13

Information technology - Security techniques - Specification for digital redaction (ISO/IEC 27038:2014)

60.60 Standard published

CEN/CLC/JTC 13

Information technology - Security techniques - Storage security (ISO/IEC 27040:2015)

60.60 Standard published

CEN/BT

Information technology - Security techniques - Storage security (ISO/IEC 27040:2015)

60.60 Standard published

CEN/BT

Information technology - Security techniques - Guidance on assuring suitability and adequacy of incident investigative method (ISO/IEC 27041:2015)

60.60 Standard published

CEN/CLC/JTC 13

Information technology - Security techniques - Guidance on assuring suitability and adequacy of incident investigative method (ISO/IEC 27041:2015)

60.60 Standard published

CEN/CLC/JTC 13

Information technology - Security techniques - Guidelines for the analysis and interpretation of digital evidence (ISO/IEC 27042:2015)

60.60 Standard published

CEN/CLC/JTC 13

Information technology - Security techniques - Guidelines for the analysis and interpretation of digital evidence (ISO/IEC 27042:2015)

60.60 Standard published

CEN/CLC/JTC 13

Information technology - Security techniques - Incident investigation principles and processes (ISO/IEC 27043:2015)

60.60 Standard published

CEN/CLC/JTC 13

Information technology - Security techniques - Incident investigation principles and processes (ISO/IEC 27043:2015)

60.60 Standard published

CEN/CLC/JTC 13

Security techniques - Extension to ISO/IEC 27001 and ISO/IEC 27002 for privacy information management - Requirements and guidelines (ISO/IEC 27701:2019)

60.60 Standard published

CEN/CLC/JTC 13

Security techniques - Extension to ISO/IEC 27001 and ISO/IEC 27002 for privacy information management - Requirements and guidelines (ISO/IEC 27701:2019)

60.60 Standard published

CEN/CLC/JTC 13

Information technology - Security techniques - Privacy framework (ISO/IEC 29100:2011, including Amd 1:2018)

60.60 Standard published

CEN/CLC/JTC 13

Information technology - Security techniques - Privacy framework (ISO/IEC 29100:2011, including Amd 1:2018)

60.60 Standard published

CEN/CLC/JTC 13

Information technology - Security techniques - Privacy architecture framework (ISO/IEC 29101:2018)

60.60 Standard published

CEN/CLC/JTC 13

Information technology - Security techniques - Privacy architecture framework (ISO/IEC 29101:2018)

60.60 Standard published

CEN/CLC/JTC 13

Information technology - Security techniques - Guidelines for privacy impact assessment (ISO/IEC 29134:2017)

60.60 Standard published

CEN/CLC/JTC 13

Information technology - Security techniques - Guidelines for privacy impact assessment (ISO/IEC 29134:2017)

60.60 Standard published

CEN/CLC/JTC 13

Information technology - Security techniques - A framework for access management (ISO/IEC 29146:2016, including Amd 1:2022)

60.60 Standard published

CEN/CLC/JTC 13

Information technology - Security techniques - A framework for access management (ISO/IEC 29146:2016, including Amd 1:2022)

60.60 Standard published

CEN/CLC/JTC 13

Information technology - Security techniques - Vulnerability disclosure (ISO/IEC 29147:2018)

60.60 Standard published

CEN/CLC/JTC 13

Information technology - Security techniques - Vulnerability disclosure (ISO/IEC 29147:2018)

60.60 Standard published

CEN/CLC/JTC 13

Information technology - Security techniques - Code of practice for personally identifiable information protection (ISO/IEC 29151:2017)

60.60 Standard published

CEN/CLC/JTC 13

Information technology - Security techniques - Code of practice for personally identifiable information protection (ISO/IEC 29151:2017)

60.60 Standard published

CEN/CLC/JTC 13

Information technology - Security techniques - Vulnerability handling processes (ISO/IEC 30111:2019)

60.60 Standard published

CEN/CLC/JTC 13

Information technology - Security techniques - Vulnerability handling processes (ISO/IEC 30111:2019)

60.60 Standard published

CEN/CLC/JTC 13

Information technology — Security techniques — Modes of operation for an n-bit block cipher

90.93 Standard confirmed

ISO/IEC JTC 1/SC 27

Information technology — Security techniques — Modes of operation for an n-bit block cipher — Amendment 1: CTR-ACPKM mode of operation

60.60 Standard published

ISO/IEC JTC 1/SC 27

Information technology — Security techniques — Hash-functions — Part 1: General

90.93 Standard confirmed

ISO/IEC JTC 1/SC 27

Information technology — Security techniques — Hash-functions — Part 1: General — Amendment 1: Padding methods for sponge functions

60.60 Standard published

ISO/IEC JTC 1/SC 27

Information technology — Security techniques — Hash-functions — Part 2: Hash-functions using an n-bit block cipher

90.93 Standard confirmed

ISO/IEC JTC 1/SC 27

Information technology — Security techniques — Hash-functions — Part 2: Hash-functions using an n-bit block cipher — Technical Corrigendum 1

60.60 Standard published

ISO/IEC JTC 1/SC 27

IT Security techniques — Hash-functions — Part 3: Dedicated hash-functions

90.60 Close of review

ISO/IEC JTC 1/SC 27

Information technology — Security techniques — Hash-functions — Part 4: Hash-functions using modular arithmetic

90.93 Standard confirmed

ISO/IEC JTC 1/SC 27

Information technology — Security techniques — Hash-functions — Part 4: Hash-functions using modular arithmetic — Amendment 1: Object identifiers

60.60 Standard published

ISO/IEC JTC 1/SC 27

Information technology — Security techniques — Hash-functions — Part 4: Hash-functions using modular arithmetic — Technical Corrigendum 1

60.60 Standard published

ISO/IEC JTC 1/SC 27

Information technology — Security techniques — Key management — Part 1: Framework

90.93 Standard confirmed

ISO/IEC JTC 1/SC 27

IT Security techniques — Key management — Part 2: Mechanisms using symmetric techniques

90.60 Close of review

ISO/IEC JTC 1/SC 27

Information technology — Security techniques — Key management — Part 4: Mechanisms based on weak secrets

90.92 Standard to be revised

ISO/IEC JTC 1/SC 27

Information technology — Security techniques — Key management — Part 4: Mechanisms based on weak secrets — Amendment 1: Unbalanced Password-Authenticated Key Agreement with Identity-Based Cryptosystems (UPAKA-IBC)

60.60 Standard published

ISO/IEC JTC 1/SC 27

Information technology — Security techniques — Key management — Part 4: Mechanisms based on weak secrets — Amendment 2: Leakage-resilient password-authenticated key agreement with additional stored secrets

60.60 Standard published

ISO/IEC JTC 1/SC 27

Information technology — Security techniques — Key management — Part 6: Key derivation

90.93 Standard confirmed

ISO/IEC JTC 1/SC 27

Information technology — Security techniques — Non-repudiation — Part 2: Mechanisms using symmetric techniques

90.93 Standard confirmed

ISO/IEC JTC 1/SC 27

Information technology — Security techniques — Non-repudiation — Part 2: Mechanisms using symmetric techniques — Technical Corrigendum 1

60.60 Standard published

ISO/IEC JTC 1/SC 27

Information technology — Security techniques — Digital signatures with appendix — Part 1: General

90.93 Standard confirmed

ISO/IEC JTC 1/SC 27

Information technology — Security techniques — Digital signatures with appendix — Part 2: Integer factorization based mechanisms

90.93 Standard confirmed

ISO/IEC JTC 1/SC 27

Information technology — Security techniques — Digital signatures with appendix — Part 2: Integer factorization based mechanisms — Technical Corrigendum 1: To ISO/IEC 14888-2:2008

60.60 Standard published

ISO/IEC JTC 1/SC 27

IT Security techniques — Digital signatures with appendix — Part 3: Discrete logarithm based mechanisms

90.60 Close of review

ISO/IEC JTC 1/SC 27

Information technology — Security techniques — Security information objects for access control

90.60 Close of review

ISO/IEC JTC 1/SC 27

Information technology — Security techniques — Specification of TTP services to support the application of digital signatures

90.60 Close of review

ISO/IEC JTC 1/SC 27

Information technology — Security techniques — Cryptographic techniques based on elliptic curves — Part 1: General

90.93 Standard confirmed

ISO/IEC JTC 1/SC 27

Information technology — Security techniques — Testing methods for the mitigation of non-invasive attack classes against cryptographic modules

60.60 Standard published

ISO/IEC JTC 1/SC 27

Information technology — Security techniques — Telebiometric authentication framework using biometric hardware security module

90.60 Close of review

ISO/IEC JTC 1/SC 27

Information technology — Security techniques — Time-stamping services — Part 1: Framework

90.93 Standard confirmed

ISO/IEC JTC 1/SC 27

Information technology — Security techniques — Time-stamping services — Part 3: Mechanisms producing linked tokens

90.93 Standard confirmed

ISO/IEC JTC 1/SC 27

Information technology — Security techniques — Time-stamping services — Part 4: Traceability of time sources

90.93 Standard confirmed

ISO/IEC JTC 1/SC 27

Information technology — Security techniques — Random bit generation

90.92 Standard to be revised

ISO/IEC JTC 1/SC 27

Information technology — Security techniques — Random bit generation — Amendment 1: Deterministic random bit generation

60.60 Standard published

ISO/IEC JTC 1/SC 27

Information technology — Security techniques — Random bit generation — Technical Corrigendum 1

60.60 Standard published

ISO/IEC JTC 1/SC 27

Information technology — Security techniques — Encryption algorithms — Part 2: Asymmetric ciphers

90.60 Close of review

ISO/IEC JTC 1/SC 27

Information technology — Security techniques — Encryption algorithms — Part 2: Asymmetric ciphers — Amendment 1: FACE

60.60 Standard published

ISO/IEC JTC 1/SC 27

Information technology — Security techniques — Encryption algorithms — Part 3: Block ciphers

90.93 Standard confirmed

ISO/IEC JTC 1/SC 27

Information technology — Security techniques — Encryption algorithms — Part 3: Block ciphers — Amendment 1: SM4

60.60 Standard published

ISO/IEC JTC 1/SC 27

Information technology — Security techniques — Encryption algorithms — Part 4: Stream ciphers

90.93 Standard confirmed

ISO/IEC JTC 1/SC 27

Information technology — Security techniques — Encryption algorithms — Part 4: Stream ciphers — Amendment 1: ZUC

60.60 Standard published

ISO/IEC JTC 1/SC 27

Information technology — Security techniques — Encryption algorithms — Part 5: Identity-based ciphers

90.93 Standard confirmed

ISO/IEC JTC 1/SC 27

Information technology — Security techniques — Encryption algorithms — Part 5: Identity-based ciphers — Amendment 1: SM9 mechanism

60.60 Standard published

ISO/IEC JTC 1/SC 27

IT Security techniques — Encryption algorithms — Part 6: Homomorphic encryption

60.60 Standard published

ISO/IEC JTC 1/SC 27

Information technology — Security techniques — Cryptographic algorithms and security mechanisms conformance testing

90.93 Standard confirmed

ISO/IEC JTC 1/SC 27

Information technology — Security techniques — Blind digital signatures — Part 1: General

90.93 Standard confirmed

ISO/IEC JTC 1/SC 27

Information technology — Security techniques — Blind digital signatures — Part 2: Discrete logarithm based mechanisms

90.93 Standard confirmed

ISO/IEC JTC 1/SC 27

Information technology — Security techniques — Secret sharing — Part 1: General

90.93 Standard confirmed

ISO/IEC JTC 1/SC 27

Information technology — Security techniques — Secret sharing — Part 2: Fundamental mechanisms

90.93 Standard confirmed

ISO/IEC JTC 1/SC 27

Information technology — Security techniques — Security requirements for cryptographic modules

90.92 Standard to be revised

ISO/IEC JTC 1/SC 27

Information technology — Security techniques — Security evaluation of biometrics

90.92 Standard to be revised

ISO/IEC JTC 1/SC 27

IT security techniques — Competence requirements for information security testers and evaluators — Part 1: Introduction, concepts and general requirements

90.92 Standard to be revised

ISO/IEC JTC 1/SC 27

IT security techniques — Competence requirements for information security testers and evaluators — Part 2: Knowledge, skills and effectiveness requirements for ISO/IEC 19790 testers

90.92 Standard to be revised

ISO/IEC JTC 1/SC 27

IT security techniques — Competence requirements for information security testers and evaluators — Part 3: Knowledge, skills and effectiveness requirements for ISO/IEC 15408 evaluators

90.92 Standard to be revised

ISO/IEC JTC 1/SC 27

Information technology — Security techniques — Anonymous digital signatures — Part 1: General

90.93 Standard confirmed

ISO/IEC JTC 1/SC 27

Information technology — Security techniques — Anonymous digital signatures — Part 2: Mechanisms using a group public key

90.93 Standard confirmed

ISO/IEC JTC 1/SC 27

Information technology — Security techniques — Anonymous digital signatures — Part 2: Mechanisms using a group public key — Amendment 1

60.60 Standard published

ISO/IEC JTC 1/SC 27

Information technology — Security techniques — Anonymous digital signatures — Part 2: Mechanisms using a group public key — Amendment 2

60.60 Standard published

ISO/IEC JTC 1/SC 27

Information technology — Security techniques — Anonymous entity authentication — Part 1: General

90.93 Standard confirmed

ISO/IEC JTC 1/SC 27

Information technology — Security techniques — Anonymous entity authentication — Part 2: Mechanisms based on signatures using a group public key

90.93 Standard confirmed

ISO/IEC JTC 1/SC 27

Information technology — Security techniques — Anonymous entity authentication — Part 4: Mechanisms based on weak secrets

90.93 Standard confirmed

ISO/IEC JTC 1/SC 27

IT Security techniques — Test tool requirements and test tool calibration methods for use in testing non-invasive attack mitigation techniques in cryptographic modules — Part 1: Test tools and techniques

60.60 Standard published

ISO/IEC JTC 1/SC 27

IT Security techniques — Test tool requirements and test tool calibration methods for use in testing non-invasive attack mitigation techniques in cryptographic modules — Part 2: Test calibration methods and apparatus

60.60 Standard published

ISO/IEC JTC 1/SC 27

Information technology — Security techniques — Test and analysis methods for random bit generators within ISO/IEC 19790 and ISO/IEC 15408

60.60 Standard published

ISO/IEC JTC 1/SC 27

Information technology — Security techniques — Systems Security Engineering — Capability Maturity Model® (SSE-CMM®)

90.93 Standard confirmed

ISO/IEC JTC 1/SC 27

Information technology — Security techniques — Security guidelines for design and implementation of virtualized servers

90.60 Close of review

ISO/IEC JTC 1/SC 27

Information technology — Security techniques — Test requirements for cryptographic modules

90.92 Standard to be revised

ISO/IEC JTC 1/SC 27

Information technology — Security techniques — A framework for identity management — Part 2: Reference architecture and requirements

90.92 Standard to be revised

ISO/IEC JTC 1/SC 27

Information technology — Security techniques — A framework for identity management — Part 3: Practice

90.92 Standard to be revised

ISO/IEC JTC 1/SC 27

Information technology — Security techniques — A framework for identity management — Part 3: Practice — Amendment 1: Identity Information Lifecycle processes

60.60 Standard published

ISO/IEC JTC 1/SC 27

Information technology — Security techniques — Authentication context for biometrics

60.60 Standard published

ISO/IEC JTC 1/SC 27

Information technology — Security techniques — Information security management systems — Overview and vocabulary

90.92 Standard to be revised

ISO/IEC JTC 1/SC 27

Information technology — Security techniques — Information security management systems — Guidance

90.92 Standard to be revised

ISO/IEC JTC 1/SC 27

Information technology — Security techniques — Information security management — Monitoring, measurement, analysis and evaluation

90.60 Close of review

ISO/IEC JTC 1/SC 27

Information technology — Security techniques — Information security management for inter-sector and inter-organizational communications

90.93 Standard confirmed

ISO/IEC JTC 1/SC 27

Information technology — Security techniques — Code of practice for information security controls based on ISO/IEC 27002 for cloud services

90.92 Standard to be revised

ISO/IEC JTC 1/SC 27

Information technology — Security techniques — Code of practice for protection of personally identifiable information (PII) in public clouds acting as PII processors

90.92 Standard to be revised

ISO/IEC JTC 1/SC 27

Information technology — Security techniques — Information security controls for the energy utility industry

90.92 Standard to be revised

ISO/IEC JTC 1/SC 27

Information technology — Security techniques — Competence requirements for information security management systems professionals

90.60 Close of review

ISO/IEC JTC 1/SC 27

Information technology — Security techniques — Competence requirements for information security management systems professionals — Amendment 1: Addition of ISO/IEC 27001:2013 clauses or subclauses to competence requirements

60.60 Standard published

ISO/IEC JTC 1/SC 27

Information technology — Security techniques — Guidelines for information and communication technology readiness for business continuity

90.92 Standard to be revised

ISO/IEC JTC 1/SC 27

Information technology — Security techniques — Network security — Part 1: Overview and concepts

90.93 Standard confirmed

ISO/IEC JTC 1/SC 27

Information technology — Security techniques — Network security — Part 2: Guidelines for the design and implementation of network security

90.60 Close of review

ISO/IEC JTC 1/SC 27

Information technology — Security techniques — Network security — Part 3: Reference networking scenarios — Threats, design techniques and control issues

90.60 Close of review

ISO/IEC JTC 1/SC 27

Information technology — Security techniques — Network security — Part 4: Securing communications between networks using security gateways

90.93 Standard confirmed

ISO/IEC JTC 1/SC 27

Information technology — Security techniques — Network security — Part 5: Securing communications across networks using Virtual Private Networks (VPNs)

90.93 Standard confirmed

ISO/IEC JTC 1/SC 27

Information technology — Security techniques — Network security — Part 6: Securing wireless IP network access

90.93 Standard confirmed

ISO/IEC JTC 1/SC 27

Information technology — Security techniques — Application security — Part 1: Overview and concepts

90.93 Standard confirmed

ISO/IEC JTC 1/SC 27

Information technology — Security techniques — Application security — Part 1: Overview and concepts — Technical Corrigendum 1

60.60 Standard published

ISO/IEC JTC 1/SC 27

Information technology — Security techniques — Application security — Part 2: Organization normative framework

90.93 Standard confirmed

ISO/IEC JTC 1/SC 27

Information technology — Security techniques — Application security — Part 5: Protocols and application security controls data structure

90.93 Standard confirmed

ISO/IEC JTC 1/SC 27

Information technology — Security techniques — Application security — Part 6: Case studies

90.93 Standard confirmed

ISO/IEC JTC 1/SC 27

Information technology — Security techniques — Information security for supplier relationships — Part 4: Guidelines for security of cloud services

90.93 Standard confirmed

ISO/IEC JTC 1/SC 27

Information technology — Security techniques — Guidelines for identification, collection, acquisition and preservation of digital evidence

90.60 Close of review

ISO/IEC JTC 1/SC 27

Information technology — Security techniques — Specification for digital redaction

90.93 Standard confirmed

ISO/IEC JTC 1/SC 27

Information technology — Security techniques — Selection, deployment and operations of intrusion detection and prevention systems (IDPS)

90.93 Standard confirmed

ISO/IEC JTC 1/SC 27

Information technology — Security techniques — Storage security

60.60 Standard published

ISO/IEC JTC 1/SC 27

Information technology — Security techniques — Guidance on assuring suitability and adequacy of incident investigative method

90.93 Standard confirmed

ISO/IEC JTC 1/SC 27

Information technology — Security techniques — Guidelines for the analysis and interpretation of digital evidence

90.93 Standard confirmed

ISO/IEC JTC 1/SC 27

Information technology — Security techniques — Incident investigation principles and processes

90.93 Standard confirmed

ISO/IEC JTC 1/SC 27

Information technology — Security techniques — Requirements for establishing virtualized roots of trust

60.60 Standard published

ISO/IEC JTC 1/SC 27

Security techniques — Extension to ISO/IEC 27001 and ISO/IEC 27002 for privacy information management — Requirements and guidelines

90.92 Standard to be revised

ISO/IEC JTC 1/SC 27

Information technology — Security techniques — Privacy framework

60.60 Standard published

ISO/IEC JTC 1/SC 27

Information technology — Security techniques — Privacy architecture framework

90.60 Close of review

ISO/IEC JTC 1/SC 27

Information technology — Security techniques — Entity authentication assurance framework

90.93 Standard confirmed

ISO/IEC JTC 1/SC 27

Information technology — Security techniques — Guidelines for privacy impact assessment

60.60 Standard published

ISO/IEC JTC 1/SC 27

Information technology — Security techniques — A framework for access management

60.60 Standard published

ISO/IEC JTC 1/SC 27

Information technology — Security techniques — Vulnerability disclosure

90.60 Close of review

ISO/IEC JTC 1/SC 27

Information technology — Security techniques — Signcryption

90.93 Standard confirmed

ISO/IEC JTC 1/SC 27

Information technology — Security techniques — Signcryption — Technical Corrigendum 1

60.60 Standard published

ISO/IEC JTC 1/SC 27

Information technology — Security techniques — Code of practice for personally identifiable information protection

90.92 Standard to be revised

ISO/IEC JTC 1/SC 27

Information technology — Security techniques — Privacy capability assessment model

90.93 Standard confirmed

ISO/IEC JTC 1/SC 27

Information technology — Security techniques — Requirements for partially anonymous, partially unlinkable authentication.

90.60 Close of review

ISO/IEC JTC 1/SC 27

Information technology — Security techniques — Lightweight cryptography — Part 1: General

90.60 Close of review

ISO/IEC JTC 1/SC 27

Information technology — Security techniques — Lightweight cryptography — Part 3: Stream ciphers

90.60 Close of review

ISO/IEC JTC 1/SC 27

Information technology — Security techniques — Lightweight cryptography — Part 4: Mechanisms using asymmetric techniques

90.60 Close of review

ISO/IEC JTC 1/SC 27

Information technology — Security techniques — Lightweight cryptography — Part 4: Mechanisms using asymmetric techniques — Amendment 1

60.60 Standard published

ISO/IEC JTC 1/SC 27

Information technology — Security techniques — Lightweight cryptography — Part 5: Hash-functions

90.93 Standard confirmed

ISO/IEC JTC 1/SC 27

Information technology — Security techniques — Vulnerability handling processes

60.60 Standard published

ISO/IEC JTC 1/SC 27

Information technology — Security techniques — Check character systems

90.93 Standard confirmed

ISO/IEC JTC 1/SC 27

Information technology — Security techniques — Digital signature schemes giving message recovery — Part 2: Integer factorization based mechanisms

90.93 Standard confirmed

ISO/IEC JTC 1/SC 27

Information technology — Security techniques — Digital signature schemes giving message recovery — Part 3: Discrete logarithm based mechanisms

90.60 Close of review

ISO/IEC JTC 1/SC 27

Information technology — Security techniques — Message Authentication Codes (MACs) — Part 1: Mechanisms using a block cipher

90.93 Standard confirmed

ISO/IEC JTC 1/SC 27

Information technology — Security techniques — Message Authentication Codes (MACs) — Part 1: Mechanisms using a block cipher — Amendment 1

60.60 Standard published

ISO/IEC JTC 1/SC 27

Information technology — Security techniques — Message Authentication Codes (MACs) — Part 3: Mechanisms using a universal hash-function

90.93 Standard confirmed

ISO/IEC JTC 1/SC 27

Information technology — Security techniques — Message Authentication Codes (MACs) — Part 3: Mechanisms using a universal hash-function — Amendment 1

60.60 Standard published

ISO/IEC JTC 1/SC 27

Information technology — Security techniques — Entity authentication — Part 1: General

90.93 Standard confirmed

ISO/IEC JTC 1/SC 27

IT Security techniques — Entity authentication — Part 2: Mechanisms using authenticated encryption

60.60 Standard published

ISO/IEC JTC 1/SC 27

IT Security techniques — Entity authentication — Part 3: Mechanisms using digital signature techniques

90.20 Standard under periodical review

ISO/IEC JTC 1/SC 27

Information technology — Security techniques — Entity authentication — Part 4: Mechanisms using a cryptographic check function

90.93 Standard confirmed

ISO/IEC JTC 1/SC 27

Information technology — Security techniques — Entity authentication — Part 4: Mechanisms using a cryptographic check function — Technical Corrigendum 1

60.60 Standard published

ISO/IEC JTC 1/SC 27

Information technology — Security techniques — Entity authentication — Part 4: Mechanisms using a cryptographic check function — Technical Corrigendum 2

60.60 Standard published

ISO/IEC JTC 1/SC 27

Information technology — Security techniques — Entity authentication — Part 5: Mechanisms using zero-knowledge techniques

90.60 Close of review

ISO/IEC JTC 1/SC 27

Information technology — Security techniques — Entity authentication — Part 6: Mechanisms using manual data transfer

90.93 Standard confirmed

ISO/IEC JTC 1/SC 27

Information technology — Security techniques — Guidelines for the use and management of Trusted Third Party services

90.93 Standard confirmed

ISO/IEC JTC 1/SC 27

Information technology — Security techniques — Security assurance framework — Part 1: Introduction and concepts

90.93 Standard confirmed

ISO/IEC JTC 1/SC 27

Information technology — Security techniques — Security assurance framework — Part 2: Analysis

90.93 Standard confirmed

ISO/IEC JTC 1/SC 27

Information technology — Security techniques — Guidance for the production of protection profiles and security targets

60.60 Standard published

ISO/IEC JTC 1/SC 27

Information technology — Security techniques — Security assessment of operational systems

90.93 Standard confirmed

ISO/IEC JTC 1/SC 27

Information technology — Security techniques — Refining software vulnerability analysis under ISO/IEC 15408 and ISO/IEC 18045

60.60 Standard published

ISO/IEC JTC 1/SC 27

Information security, cybersecurity and privacy protection — Security techniques — Security properties and best practices for test and evaluation of white box cryptography

60.60 Standard published

ISO/IEC JTC 1/SC 27

Information technology — Security techniques — Information security management — Organizational economics

60.60 Standard published

ISO/IEC JTC 1/SC 27

Information technology — Security techniques — Cybersecurity and ISO and IEC Standards

90.92 Standard to be revised

ISO/IEC JTC 1/SC 27

Information technology — Security techniques — Privacy engineering for system life cycle processes

60.60 Standard published

ISO/IEC JTC 1/SC 27

Information technology — Security techniques — Best practices for the provision and use of time-stamping services

90.93 Standard confirmed

ISO/IEC JTC 1/SC 27

Information technology — Security techniques — Catalogue of architectural and design principles for secure products, systems and applications

90.93 Standard confirmed

ISO/IEC JTC 1/SC 27

Information technology — Security techniques — Testing cryptographic modules in their operational environment

90.92 Standard to be revised

ISO/IEC JTC 1/SC 27

Information technology — Security techniques — Guidelines for the assessment of information security controls

90.60 Close of review

ISO/IEC JTC 1/SC 27

Information technology — Security techniques — Identity proofing

90.93 Standard confirmed

ISO/IEC JTC 1/SC 27

Information Technology — Security Techniques — Physical Security Attacks, Mitigation Techniques and Security Requirements

90.93 Standard confirmed

ISO/IEC JTC 1/SC 27