SBS Priority Topic 04: Cybersecurity

Draft European and International standards linked with Cybersecurity and having a particular interest for SMEs


Technical committee



Related standards or drafts

Three-level approach for a set of cybersecurity requirements for cloud services

60.55 Ratification completed (DOR)

CEN/CLC/JTC 13

Three-level approach for a set of cybersecurity requirements for cloud services

60.55 Ratification completed (DOR)

CEN/CLC/JTC 13

Fixed-time cybersecurity evaluation methodology for ICT products

10.99 New project approved

CEN/CLC/JTC 13

Fixed-time cybersecurity evaluation methodology for ICT products

10.99 New project approved

CEN/CLC/JTC 13

Information security, cybersecurity and privacy protection - Information security management systems - Requirements - Amendment 1: Climate action changes (ISO/IEC 27001:2022/Amd 1:2024)

40.10 harmonizedStageCodeLabel.40.10

CEN/CLC/JTC 13

Information security, cybersecurity and privacy protection - Information security management systems - Requirements - Amendment 1: Climate action changes (ISO/IEC 27001:2022/Amd 1:2024)

40.10 harmonizedStageCodeLabel.40.10

CEN/CLC/JTC 13

<p>Local Charging station management systems and Local Energy Management Systems network connectivity and information exchange - Part 3 Communication Protocol and Cybersecurity Specific Aspects</p>

40.00 DIS registered

TC 69

Railway applications - Cybersecurity

30.99 CD approved for registration as DIS

TC 9

Nuclear Facilities - Instrumentation, control and electrical power systems - Cybersecurity risk management approaches

50.20 Proof sent to secretariat or FDIS ballot initiated: 8 weeks

TC 45/SC 45A

Agricultural Machinery and Tractors — Cybersecurity Engineering

20.00 New project registered in TC/SC work programme

ISO/TC 23/SC 19

Health informatics — Cybersecurity framework for telehealth environments — Part 2: Cybersecurity reference models of telehealth

20.00 New project registered in TC/SC work programme

ISO/TC 215

Guidance for developing cybersecurity requirements in anaesthetic and respiratory equipment standards

30.99 CD approved for registration as DIS

ISO/TC 121

Health informatics — Cybersecurity framework for telehealth environments — Part 1: Overview and Concepts

30.60 Close of voting/ comment period

ISO/TC 215

Space systems — Cybersecurity management requirements and recommendations

50.00 Final text received or FDIS registered for formal approval

ISO/TC 20/SC 14

Information security, cybersecurity and privacy protection — Guidance on the integrated implementation of ISO/IEC 27001 and ISO/IEC 20000-1 — Amendment 1

40.60 Close of voting

ISO/IEC JTC 1/SC 27

Cybersecurity education and training

20.00 New project registered in TC/SC work programme

ISO/IEC JTC 1/SC 27

Information security, cybersecurity and privacy protection — General principles of security evaluation of biometric systems

30.60 Close of voting/ comment period

ISO/IEC JTC 1/SC 27

Information security, cybersecurity and privacy protection — Requirements for the competence of IT security conformance assessment body personnel — Part 1: Introduction, concepts and general requirements

30.60 Close of voting/ comment period

ISO/IEC JTC 1/SC 27

Information security, cybersecurity and privacy protection — Requirements for the competence of IT security conformance assessment body personnel — Part 2: Knowledge and skills requirements for ISO/IEC 19790 testers and validators

30.60 Close of voting/ comment period

ISO/IEC JTC 1/SC 27

Cybersecurity — Artificial Intelligence — Guidance for addressing security threats and failures in artificial intelligence systems

30.60 Close of voting/ comment period

ISO/IEC JTC 1/SC 27

Cybersecurity — IoT security and privacy — Cybersecurity labelling framework for consumer IoT

30.20 CD study/ballot initiated

ISO/IEC JTC 1/SC 27

Information security, cybersecurity and privacy protection — Security and privacy requirements for authentication using biometrics on mobile devices — Part 2: Remote modes

30.00 Committee draft (CD) registered

ISO/IEC JTC 1/SC 27

Cybersecurity — Information and communication technology readiness for business continuity

50.00 Final text received or FDIS registered for formal approval

ISO/IEC JTC 1/SC 27

Cybersecurity – IoT security and privacy – Guidelines for IoT-domotics

50.20 Proof sent to secretariat or FDIS ballot initiated: 8 weeks

ISO/IEC JTC 1/SC 27

Cybersecurity — Confidential computing — Part 1: Overview and concepts

10.20 New project ballot initiated

ISO/IEC JTC 1/SC 27

Information security, cybersecurity and privacy protection — Application of ISO 31000 for assessment of identity-related risk

50.00 Final text received or FDIS registered for formal approval

ISO/IEC JTC 1/SC 27

Guidance on civil uncrewed aircraft systems (UAS) cybersecurity

00.00 Proposal for new project received

ISO/IEC JTC 1/SC 27

Information security, cybersecurity and privacy protection — Hardware monitoring technology for hardware security assessment

60.00 Standard under publication

ISO/IEC JTC 1/SC 27

Information security, cybersecurity and privacy protection — Evaluation criteria for IT security — Part 1: Introduction and general model

20.20 Working draft (WD) study initiated

ISO/IEC JTC 1/SC 27

Information security, cybersecurity and privacy protection — Evaluation criteria for IT security — Part 2: Security functional components

20.20 Working draft (WD) study initiated

ISO/IEC JTC 1/SC 27

Information security, cybersecurity and privacy protection — Evaluation criteria for IT security — Part 3: Security assurance components

20.20 Working draft (WD) study initiated

ISO/IEC JTC 1/SC 27

Information security, cybersecurity and privacy protection — Evaluation criteria for IT security — Part 4: Framework for the specification of evaluation methods and activities

20.20 Working draft (WD) study initiated

ISO/IEC JTC 1/SC 27

Information security, cybersecurity and privacy protection — Evaluation criteria for IT security — Part 5: Pre-defined packages of security requirements

20.20 Working draft (WD) study initiated

ISO/IEC JTC 1/SC 27

Information security, cybersecurity and privacy protection — Evaluation criteria for IT security — Methodology for IT security evaluation

20.20 Working draft (WD) study initiated

ISO/IEC JTC 1/SC 27

Information security, cybersecurity and privacy protection — Requirements for the competence of IT security conformance assessment body personnel — Part 3: Knowledge and skills requirements for ISO/IEC 15408 evaluators and certifiers

20.60 Close of comment period

ISO/IEC JTC 1/SC 27

Cybersecurity and Privacy — Artificial Intelligence — Privacy protection

20.60 Close of comment period

ISO/IEC JTC 1/SC 27

Information security, cybersecurity and privacy protection — Age assurance systems — Framework — Part 1: Framework

20.60 Close of comment period

ISO/IEC JTC 1/SC 27

Information security, cybersecurity and privacy protection — Verification of Cryptographic Protocols — Part 2: Evaluation Methods and Activities for Cryptographic Protocols

20.60 Close of comment period

ISO/IEC JTC 1/SC 27

Information technology — Security techniques — Cybersecurity and ISO and IEC Standards

20.20 Working draft (WD) study initiated

ISO/IEC JTC 1/SC 27

Information security, cybersecurity and privacy protection — Testing cryptographic modules in their field

20.60 Close of comment period

ISO/IEC JTC 1/SC 27

Cybersecurity evaluation of complex systems — Introduction and framework overview

20.60 Close of comment period

ISO/IEC JTC 1/SC 27

Tractors and machinery for agriculture and forestry — Cybersecurity Management

10.20 New project ballot initiated

ISO/TC 23/SC 19

Health informatics — Cybersecurity framework for telehealth environments — Part 3: Cybersecurity requirements of telehealth

00.00 Proposal for new project received

ISO/TC 215

Road vehicles — Cybersecurity verification and validation

20.00 New project registered in TC/SC work programme

ISO/TC 22/SC 32

Road vehicles — Cybersecurity Assurance Levels (CAL) and Targeted Attack Feasibility (TAF)

30.20 CD study/ballot initiated

ISO/TC 22/SC 32

Information security, cybersecurity and privacy protection - Requirements for the competence of IT security testing and evaluation laboratories - Part 1: Evaluation for ISO/IEC 15408

10.00 Proposal for new project registered

CEN/CLC/JTC 13

Information security, cybersecurity and privacy protection - Requirements for the competence of IT security testing and evaluation laboratories - Part 1: Evaluation for ISO/IEC 15408

10.00 Proposal for new project registered

CEN/CLC/JTC 13

Information security, cybersecurity and privacy protection — Requirements for the competence of IT security testing and evaluation laboratories — Part 2: Testing for ISO/IEC 19790

10.00 Proposal for new project registered

CEN/CLC/JTC 13

Information security, cybersecurity and privacy protection — Requirements for the competence of IT security testing and evaluation laboratories — Part 2: Testing for ISO/IEC 19790

10.00 Proposal for new project registered

CEN/CLC/JTC 13
CEN/CENELEC

Guidelines on a sectoral cybersecurity assessment

40.60 Close of voting

CEN/CLC/JTC 13
CEN/CENELEC

Guidelines on a sectoral cybersecurity assessment

40.60 Close of voting

CEN/CLC/JTC 13

Information exchange for Electric Vehicle charging roaming service - Part 4: Cybersecurity and information privacy

10.99 New project approved

CLC/TC 69X

Local charging station management systems and local energy management systems network connectivity and information exchange - Part 3: Communication protocol and cybersecurity specific aspects

10.99 New project approved

CLC/TC 69X

Information security, cybersecurity and privacy protection - Guidance on managing information security risks (ISO/IEC 27005:2022)

40.10 harmonizedStageCodeLabel.40.10

CEN/CLC/JTC 13

Information security, cybersecurity and privacy protection - Guidance on managing information security risks (ISO/IEC 27005:2022)

40.10 harmonizedStageCodeLabel.40.10

CEN/CLC/JTC 13



Project

Cyber Security and Privacy

30.98 Project deleted

CEN/CLC/ETSI/SEG-CG

Three-level approach for a set of cybersecurity requirements for cloud services

60.55 Ratification completed (DOR)

CEN/CLC/JTC 13

Requirements for Conformity Assessment Bodies certifying Cloud Services

30.99 CD approved for registration as DIS

CEN/CLC/JTC 13

Power systems management and associated information exchange - Data and communications security - Part 14: Cyber security event logging

10.99 New project approved

CLC/TC 57

Three-level approach for a set of cybersecurity requirements for cloud services

60.55 Ratification completed (DOR)

CEN/CLC/JTC 13

Requirements for Conformity Assessment Bodies certifying Cloud Services

30.99 CD approved for registration as DIS

CEN/CLC/JTC 13

Road vehicles — Vehicle cybersecurity engineering

10.98 New project rejected

ISO/TC 22

Information technology — Processes supporting Information security management – Guidelines for cyber insurance

00.98 Proposal for new project abandoned

ISO/IEC JTC 1/SC 27

Ships and marine technology — Assessment of onboard cyber safety

60.60 Standard published

ISO/TC 8

Ships and marine technology — Crew training cyber safety

00.98 Proposal for new project abandoned

ISO/TC 8

Space systems — Cybersecurity management guidelines

10.98 New project rejected

ISO/TC 20/SC 14

Requirements for the competence of ICT products cybersecurity conformity assessment body personnel – Knowledge, skills and effectiveness for ISO/IEC 15408 and ISO/IEC 19790 validators

00.98 Proposal for new project abandoned

ISO/IEC JTC 1/SC 27

The Internet of Everything opens a new world of possibilities. Connected products, Intelligent Transport Systems, Smart cities and IT-based shared services are creating new business opportunities for SMEs.

Securing this environment and ensuring the protection of citizens, products, services and companies is of utmost importance. Cyber risks need to be kept below an acceptable level if SMEs want consumers of their products or users of their services.

ISO and IEC, as well as CEN, CENELEC and ETSI are developing market-relevant standards supporting cybersecurity.

Here we provide the principal Technical Committees that are currently publishing proyects related to cyber security:

INT AFI -> produce test purposes, test descriptions, and TTCN-3 test cases to enable interoperability testing of the core network elements and covering the single-network, interconnect and roaming scenarios. Use Cases and requirements specified by ETSI for Automated and Autonomic Management and Control (self- management) of Networks and Services are tested via “industry standards-anchored” Proof of Concepts (PoC) events.

SAI -> Artificial Intelligence impacts our lives every day, from local AI systems on our mobile phones suggesting the next word in our sentences to large manufacturers using AI to improve industrial processes. AI has the potential to revolutionize our interactions with technology, improve our quality of life and enrich security – but without high quality technical standards, AI has the potential to create new attacks and worsen security.

CYBER -> The rapid evolution and growth in the complexity of new systems and networks, coupled with the sophistication of changing threats, present demanding challenges for maintaining the security of Information and Communications Technologies (ICT) systems and networks. Security solutions must include a reliable and secure network infrastructure, but they must also protect the privacy of individuals and organizations. Security standardization, sometimes in support of legislative actions, has a key role to play in protecting the Internet and the communications and business it carries. We offer market-driven cybersecurity standardization solutions, along with advice and guidance to users, manufacturers, network, infrastructure and service operators and regulators.

IPE -> The ISG continues to gain momentum in the IP industry, bypassing the 100 supporters including 23 operators, interested in sharing their experiences and defining the future strategies.
Leveraging on the published Group Reports and aiming to stimulate further evolutions, two PoC proposals were adopted:
"SRv6 based 5G Non-Terrestrial Network to provide services with granted SLA, like V2X communication” by CNR-ISTI
“Demonstration of deterministic networking in the Industrial Internet scenario” by China Telecom

CYBER QSC -> The primary responsibilities of ETSI TC Cyber WG-QSC are to make assessments and recommendations on the various proposals from industry and academia regarding real-world deployments of quantum-safe cryptography, including practical properties, (such as efficiency, functionality, agility, etc.), security properties, appropriateness of certain quantum-safe cryptographic primitives to various application domains (Internet protocols, wireless systems, resource constrained environments, cloud deployments, big data, etc.)

And here we have the proyects published by these committees above:

DGR/QKD-019_AUTH Quantum Key Distribution (QKD); Design of QKD interfaces with Authentication Stable draft (2023-08-01) QKD authenticationCybersecurityquantum cryptographyQuantum Key DistributionSession Initiation Protocol Quantum https://portal.etsi.org/webapp/WorkProgram/Report_WorkItem.asp?WKI_ID=61394

DTR/CYBER-QSC-0021 Stable draft (2023-05-23) CYBER QSC CybersecurityHYBRIDQuantum Safe Cryptography Quantum https://portal.etsi.org/webapp/WorkProgram/Report_WorkItem.asp?WKI_ID=64284

DTR/CYBER-QSC-0022 Start of work (2022-07-19) CYBER QSC Cyber SecurityQuantum Safe Cryptography Quantum https://portal.etsi.org/webapp/WorkProgram/Report_WorkItem.asp?WKI_ID=64860

PWI_CYBERQSC_2303_v1 Quantum-Safe Cryptography (CYBER); A Repeatable Framework for Quantum-safe Migrations WI proposed to WG (2023-08-18) CYBER QSC CybersecurityFrameworkMIGRATIONQuantum Safe Cryptography Quantum https://portal.etsi.org/webapp/WorkProgram/Report_WorkItem.asp?WKI_ID=68629

PWI_CYBERQSC_2305_v1 Quantum-Safe Cryptography (CYBER); QSC Protocol InventoryQSC Protocol Inventory WI proposed to WG (2023-08-22) CYBER QSC Cyber SecurityQuantum Safe Cryptography Quantum https://portal.etsi.org/webapp/WorkProgram/Report_WorkItem.asp?WKI_ID=69122

DTR/INT-009001 Stable draft (2022-07-30) INT AFI 5Gartificial intelligenceAutonomic NetworkingCyber SecurityEnhanced Mobile BroadbandIPv6SECURITYSelf-Management Artificial Intelligence https://portal.etsi.org/webapp/WorkProgram/Report_WorkItem.asp?WKI_ID=63527

DGR/SAI-0010 Final draft for approval (2023-08-25) SAI artificial intelligenceCyber Security Artificial Intelligence https://portal.etsi.org/webapp/WorkProgram/Report_WorkItem.asp?WKI_ID=63960

DGR/QKD-019_AUTH Quantum Key Distribution (QKD); Design of QKD interfaces with Authentication Stable draft (2023-08-01) QKD authenticationCybersecurityquantum cryptographyQuantum Key DistributionSession Initiation Protocol Cybersecurity https://portal.etsi.org/webapp/WorkProgram/Report_WorkItem.asp?WKI_ID=61394

DTR/CYBER-0067 TB adoption of WI (2021-04-07) CYBER CybersecurityIoTThreat Analysis Cybersecurity https://portal.etsi.org/webapp/WorkProgram/Report_WorkItem.asp?WKI_ID=62613

DGR/IPE-003 Early draft (2021-12-07) IPE CybersecurityDNSIoTIPv6SECURITY Cybersecurity https://portal.etsi.org/webapp/WorkProgram/Report_WorkItem.asp?WKI_ID=62482

DGR/IPE-004 Final draft for approval (2023-01-16) IPE ANCLOUDCore NetworkCustomer Premises NetworksCybersecurityData CentresINTERWORKINGIoTIPIPv4IPv6LANMANManufacturingNAT64SDNSMEWANWLAN Cybersecurity https://portal.etsi.org/webapp/WorkProgram/Report_WorkItem.asp?WKI_ID=62483

DTS/CYBER-0081 Stable draft (2023-05-22) CYBER Cybersecurityrouter Cybersecurity https://portal.etsi.org/webapp/WorkProgram/Report_WorkItem.asp?WKI_ID=64275

DTR/CYBER-QSC-0021 Stable draft (2023-05-23) CYBER QSC CybersecurityHYBRIDQuantum Safe Cryptography Cybersecurity https://portal.etsi.org/webapp/WorkProgram/Report_WorkItem.asp?WKI_ID=64284

DTS/CYBER-0083-2 CYBER; Consumer Mobile Device; Part 2: Biometric Authentication Protection Profile Module Stable draft (2023-07-21) CYBER CybersecurityMOBILEprivacyTERMINAL Cybersecurity https://portal.etsi.org/webapp/WorkProgram/Report_WorkItem.asp?WKI_ID=67439

DTS/CYBER-0083-3 CYBER; Consumer Mobile Device; Part 3: Multi-user Protection Profile Module TB approval (2023-03-29) CYBER CybersecurityMOBILEprivacyTERMINAL Cybersecurity https://portal.etsi.org/webapp/WorkProgram/Report_WorkItem.asp?WKI_ID=67440

RTS/CYBER-0083-1 CYBER; Consumer Mobile Device; Part 1: Base Protection Profile Stable draft (2023-07-21) CYBER CybersecurityMOBILEprivacyTERMINAL Cybersecurity https://portal.etsi.org/webapp/WorkProgram/Report_WorkItem.asp?WKI_ID=65551

DTR/CYBER-0087 Cyber Security (CYBER); Open Security Controls Assessment Language Use Guidelines Stable draft (2023-03-04) CYBER Cybersecurity Cybersecurity https://portal.etsi.org/webapp/WorkProgram/Report_WorkItem.asp?WKI_ID=66528

RTS/CYBER-0089 CYBER; Consumer Mobile Device Protection Profile Stable draft (2022-09-14) CYBER CybersecurityMOBILEprivacyTERMINAL Cybersecurity https://portal.etsi.org/webapp/WorkProgram/Report_WorkItem.asp?WKI_ID=66855

PWI_CYBER_2237_v1 CYBER; Cyber Security for Consumer Internet of Things: Baseline Requirements WI noted by TB (2022-08-29) CYBER CybersecurityIoTprivacy Cybersecurity https://portal.etsi.org/webapp/WorkProgram/Report_WorkItem.asp?WKI_ID=66916

RTS/CYBER-0090 CYBER; Cyber Security for Consumer Internet of Things: Baseline Requirements Start of work (2022-09-12) CYBER CybersecurityIoTprivacy Cybersecurity https://portal.etsi.org/webapp/WorkProgram/Report_WorkItem.asp?WKI_ID=66926

DTS/CYBER-0092 Optical Network and Device Security Access Network Device Security Requirements TB approval (2023-06-01) CYBER CybersecurityOptical Access NetworkSecurity requirements Cybersecurity https://portal.etsi.org/webapp/WorkProgram/Report_WorkItem.asp?WKI_ID=67082

DTS/CYBER-0097-1 CYBER; Consumer Mobile Devices Base PP-Configuration; Part 1: CMD and Biometric Verification Stable draft (2023-07-21) CYBER CybersecurityMOBILEprivacyTERMINAL Cybersecurity https://portal.etsi.org/webapp/WorkProgram/Report_WorkItem.asp?WKI_ID=67441

DTR/CYBER-00105 Cyber Security (CYBER); Studey the Implementation of the Critical Entities Resilience Directive Early draft (2023-05-18) CYBER Cybersecurityresiliencerisk management Cybersecurity https://portal.etsi.org/webapp/WorkProgram/Report_WorkItem.asp?WKI_ID=67972

DTR/ESI-0019411-7 Electronic Signatures and Infrastructures (ESI); Policy and security requirements for Trust Service Providers issuing certificates; Part 7 Security Considerations on use of QWACsSecurity Considerations on use of QWACs TB adoption of WI (2023-05-05) ESI CybersecurityINTERNETtrust services Cybersecurity https://portal.etsi.org/webapp/WorkProgram/Report_WorkItem.asp?WKI_ID=68492

DTS/CYBER-00113 Cyber Security (CYBER); Conversion of TR on "Implementation of the Revised Network and Information Security (NIS2) Directive" into a TSReview of TR 103 866 to create a related Technical Specification. Early draft (2023-07-18) CYBER Cyber SecurityCyber-defenceCybersecurity Cybersecurity https://portal.etsi.org/webapp/WorkProgram/Report_WorkItem.asp?WKI_ID=68504

DTS/CYBER-00114 Cyber Security (CYBER); ONDS Test Suite Structure and Test PurposesONDS Test Suite Structure and Test Purposes TB adoption of WI (2023-06-09) CYBER CybersecuritydeviceOPTICALTSS&TP Cybersecurity https://portal.etsi.org/webapp/WorkProgram/Report_WorkItem.asp?WKI_ID=68553

DTS/CYBER-00117 Cyber Security (CYBER); ONDS Protection profile - Test casesONDS - Protection Profile - Test cases TB adoption of WI (2023-06-14) CYBER CybersecurityEvaluationTESTING Cybersecurity https://portal.etsi.org/webapp/WorkProgram/Report_WorkItem.asp?WKI_ID=68554

DTR/CYBER-00118 Cyber Security (CYBER); The vulnerability disclosure ecosystemVulnerability Disclosure Ecosystem Early draft (2023-08-09) CYBER Cybersecurityresilience Cybersecurity https://portal.etsi.org/webapp/WorkProgram/Report_WorkItem.asp?WKI_ID=68614

DTR/CYBER-00115 Cyber Security (CYBER); Privileged Access Workstation GuidancePrivileged Access Workstation Guidance TB adoption of WI (2023-06-09) CYBER Cybersecurity Cybersecurity https://portal.etsi.org/webapp/WorkProgram/Report_WorkItem.asp?WKI_ID=68592

PWI_CYBERQSC_2303_v1 Quantum-Safe Cryptography (CYBER); A Repeatable Framework for Quantum-safe Migrations WI proposed to WG (2023-08-18) CYBER QSC CybersecurityFrameworkMIGRATIONQuantum Safe Cryptography Cybersecurity https://portal.etsi.org/webapp/WorkProgram/Report_WorkItem.asp?WKI_ID=68629

DTS/CYBER-00119 Cyber Security (CYBER); Security Evaluation Standard for IoT Platforms (SESIP) Profile for Secure Consumer IoT DevicesSESIP profile for EN 303 645 TB adoption of WI (2023-07-27) CYBER CybersecurityIoT Cybersecurity https://portal.etsi.org/webapp/WorkProgram/Report_WorkItem.asp?WKI_ID=69057

DTR/INT-00900 Stable draft (2022-09-14) INT AFI 5GAutonomic NetworkingCyber SecuritySECURITYSecurity by defaultSelf-Management 5G https://portal.etsi.org/webapp/WorkProgram/Report_WorkItem.asp?WKI_ID=63106

DTR/INT-009001 Stable draft (2022-07-30) INT AFI 5Gartificial intelligenceAutonomic NetworkingCyber SecurityEnhanced Mobile BroadbandIPv6SECURITYSelf-Management 5G https://portal.etsi.org/webapp/WorkProgram/Report_WorkItem.asp?WKI_ID=63527

DGR/IPE-004 Final draft for approval (2023-01-16) IPE ANCLOUDCore NetworkCustomer Premises NetworksCybersecurityData CentresINTERWORKINGIoTIPIPv4IPv6LANMANManufacturingNAT64SDNSMEWANWLAN Cloud https://portal.etsi.org/webapp/WorkProgram/Report_WorkItem.asp?WKI_ID=62483

DTR/INT-009001 Stable draft (2022-07-30) INT AFI 5Gartificial intelligenceAutonomic NetworkingCyber SecurityEnhanced Mobile BroadbandIPv6SECURITYSelf-Management Artificial https://portal.etsi.org/webapp/WorkProgram/Report_WorkItem.asp?WKI_ID=63527

DGR/SAI-0010 Final draft for approval (2023-08-25) SAI artificial intelligenceCyber Security Artificial https://portal.etsi.org/webapp/WorkProgram/Report_WorkItem.asp?WKI_ID=63960

DTR/INT-009001 Stable draft (2022-07-30) INT AFI 5Gartificial intelligenceAutonomic NetworkingCyber SecurityEnhanced Mobile BroadbandIPv6SECURITYSelf-Management Intellige https://portal.etsi.org/webapp/WorkProgram/Report_WorkItem.asp?WKI_ID=63527

DGR/SAI-0010 Final draft for approval (2023-08-25) SAI artificial intelligenceCyber Security Intellige https://portal.etsi.org/webapp/WorkProgram/Report_WorkItem.asp?WKI_ID=63960

DGR/QKD-019_AUTH Quantum Key Distribution (QKD); Design of QKD interfaces with Authentication Stable draft (2023-08-01) QKD authenticationCybersecurityquantum cryptographyQuantum Key DistributionSession Initiation Protocol cyber https://portal.etsi.org/webapp/WorkProgram/Report_WorkItem.asp?WKI_ID=61394

DTS/ESI-001194115 ESI Policy and security requirements for Trust Service Providers issuing certificates; Part 5: Policy Requirements for trust service providers issuing website authentication certificatesPart 5: Policy Requirements for trust service providers issuing webs Early draft (2020-10-26) ESI Cyber Securitytrust services cyber https://portal.etsi.org/webapp/WorkProgram/Report_WorkItem.asp?WKI_ID=61442

RTS/ESI-00119612329 ESI Sector Specific Requirements; Qualified Certificate Profiles and TSP Policy Requirements for open bankingQualified Certificate Profiles and TSP Policy Requirements for open banking TB adoption of WI (2020-10-02) ESI Cyber Securitytrust services cyber https://portal.etsi.org/webapp/WorkProgram/Report_WorkItem.asp?WKI_ID=61444

DTR/CYBER-0067 TB adoption of WI (2021-04-07) CYBER CybersecurityIoTThreat Analysis cyber https://portal.etsi.org/webapp/WorkProgram/Report_WorkItem.asp?WKI_ID=62613

DTR/CYBER-0070 Early draft (2021-10-08) CYBER Cyber SecurityRADIO cyber https://portal.etsi.org/webapp/WorkProgram/Report_WorkItem.asp?WKI_ID=63021

DGR/IPE-003 Early draft (2021-12-07) IPE CybersecurityDNSIoTIPv6SECURITY cyber https://portal.etsi.org/webapp/WorkProgram/Report_WorkItem.asp?WKI_ID=62482

DGR/IPE-004 Final draft for approval (2023-01-16) IPE ANCLOUDCore NetworkCustomer Premises NetworksCybersecurityData CentresINTERWORKINGIoTIPIPv4IPv6LANMANManufacturingNAT64SDNSMEWANWLAN cyber https://portal.etsi.org/webapp/WorkProgram/Report_WorkItem.asp?WKI_ID=62483

DTR/INT-00900 Stable draft (2022-09-14) INT AFI 5GAutonomic NetworkingCyber SecuritySECURITYSecurity by defaultSelf-Management cyber https://portal.etsi.org/webapp/WorkProgram/Report_WorkItem.asp?WKI_ID=63106

DTR/INT-009001 Stable draft (2022-07-30) INT AFI 5Gartificial intelligenceAutonomic NetworkingCyber SecurityEnhanced Mobile BroadbandIPv6SECURITYSelf-Management cyber https://portal.etsi.org/webapp/WorkProgram/Report_WorkItem.asp?WKI_ID=63527

DGR/SAI-0010 Final draft for approval (2023-08-25) SAI artificial intelligenceCyber Security cyber https://portal.etsi.org/webapp/WorkProgram/Report_WorkItem.asp?WKI_ID=63960

DTS/CYBER-0081 Stable draft (2023-05-22) CYBER Cybersecurityrouter cyber https://portal.etsi.org/webapp/WorkProgram/Report_WorkItem.asp?WKI_ID=64275

DTR/CYBER-QSC-0021 Stable draft (2023-05-23) CYBER QSC CybersecurityHYBRIDQuantum Safe Cryptography cyber https://portal.etsi.org/webapp/WorkProgram/Report_WorkItem.asp?WKI_ID=64284

DTS/CYBER-0083-2 CYBER; Consumer Mobile Device; Part 2: Biometric Authentication Protection Profile Module Stable draft (2023-07-21) CYBER CybersecurityMOBILEprivacyTERMINAL cyber https://portal.etsi.org/webapp/WorkProgram/Report_WorkItem.asp?WKI_ID=67439

DTS/CYBER-0083-3 CYBER; Consumer Mobile Device; Part 3: Multi-user Protection Profile Module TB approval (2023-03-29) CYBER CybersecurityMOBILEprivacyTERMINAL cyber https://portal.etsi.org/webapp/WorkProgram/Report_WorkItem.asp?WKI_ID=67440

DTR/CYBER-QSC-0022 Start of work (2022-07-19) CYBER QSC Cyber SecurityQuantum Safe Cryptography cyber https://portal.etsi.org/webapp/WorkProgram/Report_WorkItem.asp?WKI_ID=64860

RTS/CYBER-0083-1 CYBER; Consumer Mobile Device; Part 1: Base Protection Profile Stable draft (2023-07-21) CYBER CybersecurityMOBILEprivacyTERMINAL cyber https://portal.etsi.org/webapp/WorkProgram/Report_WorkItem.asp?WKI_ID=65551

DGS/NFV-IFA033ed451 Network Functions Virtualisation (NFV) Release 4; Management and Orchestration; Reference points related to Security Management and Certificate Management Functions - Interface and Information Model Specification Final draft for approval (2023-08-11) NFV IFA Cyber SecurityINTERFACEMANAGEMENTMANONFVorchestrationSECURITYVirtualisation cyber https://portal.etsi.org/webapp/WorkProgram/Report_WorkItem.asp?WKI_ID=66417

DTR/CYBER-0087 Cyber Security (CYBER); Open Security Controls Assessment Language Use Guidelines Stable draft (2023-03-04) CYBER Cybersecurity cyber https://portal.etsi.org/webapp/WorkProgram/Report_WorkItem.asp?WKI_ID=66528

RTS/CYBER-0089 CYBER; Consumer Mobile Device Protection Profile Stable draft (2022-09-14) CYBER CybersecurityMOBILEprivacyTERMINAL cyber https://portal.etsi.org/webapp/WorkProgram/Report_WorkItem.asp?WKI_ID=66855

PWI_CYBER_2237_v1 CYBER; Cyber Security for Consumer Internet of Things: Baseline Requirements WI noted by TB (2022-08-29) CYBER CybersecurityIoTprivacy cyber https://portal.etsi.org/webapp/WorkProgram/Report_WorkItem.asp?WKI_ID=66916

RTS/CYBER-0090 CYBER; Cyber Security for Consumer Internet of Things: Baseline Requirements Start of work (2022-09-12) CYBER CybersecurityIoTprivacy cyber https://portal.etsi.org/webapp/WorkProgram/Report_WorkItem.asp?WKI_ID=66926

DTS/CYBER-0095 Cyber Security (CYBER); Cyber Security for Consumer Internet of Things; Requirements for Smart Voice-Controlled Devices Stable draft (2023-07-17) CYBER Cyber SecurityIoTprivacy cyber https://portal.etsi.org/webapp/WorkProgram/Report_WorkItem.asp?WKI_ID=67020

DTS/CYBER-0092 Optical Network and Device Security Access Network Device Security Requirements TB approval (2023-06-01) CYBER CybersecurityOptical Access NetworkSecurity requirements cyber https://portal.etsi.org/webapp/WorkProgram/Report_WorkItem.asp?WKI_ID=67082

DTS/CYBER-0097-1 CYBER; Consumer Mobile Devices Base PP-Configuration; Part 1: CMD and Biometric Verification Stable draft (2023-07-21) CYBER CybersecurityMOBILEprivacyTERMINAL cyber https://portal.etsi.org/webapp/WorkProgram/Report_WorkItem.asp?WKI_ID=67441

DTR/CYBER-00105 Cyber Security (CYBER); Studey the Implementation of the Critical Entities Resilience Directive Early draft (2023-05-18) CYBER Cybersecurityresiliencerisk management cyber https://portal.etsi.org/webapp/WorkProgram/Report_WorkItem.asp?WKI_ID=67972

DTR/ESI-0019411-7 Electronic Signatures and Infrastructures (ESI); Policy and security requirements for Trust Service Providers issuing certificates; Part 7 Security Considerations on use of QWACsSecurity Considerations on use of QWACs TB adoption of WI (2023-05-05) ESI CybersecurityINTERNETtrust services cyber https://portal.etsi.org/webapp/WorkProgram/Report_WorkItem.asp?WKI_ID=68492

DTS/CYBER-00113 Cyber Security (CYBER); Conversion of TR on "Implementation of the Revised Network and Information Security (NIS2) Directive" into a TSReview of TR 103 866 to create a related Technical Specification. Early draft (2023-07-18) CYBER Cyber SecurityCyber-defenceCybersecurity cyber https://portal.etsi.org/webapp/WorkProgram/Report_WorkItem.asp?WKI_ID=68504

DTS/CYBER-00114 Cyber Security (CYBER); ONDS Test Suite Structure and Test PurposesONDS Test Suite Structure and Test Purposes TB adoption of WI (2023-06-09) CYBER CybersecuritydeviceOPTICALTSS&TP cyber https://portal.etsi.org/webapp/WorkProgram/Report_WorkItem.asp?WKI_ID=68553

DTS/CYBER-00117 Cyber Security (CYBER); ONDS Protection profile - Test casesONDS - Protection Profile - Test cases TB adoption of WI (2023-06-14) CYBER CybersecurityEvaluationTESTING cyber https://portal.etsi.org/webapp/WorkProgram/Report_WorkItem.asp?WKI_ID=68554

DTR/CYBER-00118 Cyber Security (CYBER); The vulnerability disclosure ecosystemVulnerability Disclosure Ecosystem Early draft (2023-08-09) CYBER Cybersecurityresilience cyber https://portal.etsi.org/webapp/WorkProgram/Report_WorkItem.asp?WKI_ID=68614

PWI_RIS_2308_v1 Reconfigurable Intelligent Surfaces (RIS); Security and Privacy challenges, and potential recommendations WI noted by TB (2023-06-19) RIS Cyber SecurityRADIO cyber https://portal.etsi.org/webapp/WorkProgram/Report_WorkItem.asp?WKI_ID=68580

DTR/CYBER-00115 Cyber Security (CYBER); Privileged Access Workstation GuidancePrivileged Access Workstation Guidance TB adoption of WI (2023-06-09) CYBER Cybersecurity cyber https://portal.etsi.org/webapp/WorkProgram/Report_WorkItem.asp?WKI_ID=68592

PWI_CYBERQSC_2303_v1 Quantum-Safe Cryptography (CYBER); A Repeatable Framework for Quantum-safe Migrations WI proposed to WG (2023-08-18) CYBER QSC CybersecurityFrameworkMIGRATIONQuantum Safe Cryptography cyber https://portal.etsi.org/webapp/WorkProgram/Report_WorkItem.asp?WKI_ID=68629

DTS/CYBER-00119 Cyber Security (CYBER); Security Evaluation Standard for IoT Platforms (SESIP) Profile for Secure Consumer IoT DevicesSESIP profile for EN 303 645 TB adoption of WI (2023-07-27) CYBER CybersecurityIoT cyber https://portal.etsi.org/webapp/WorkProgram/Report_WorkItem.asp?WKI_ID=69057

PWI_CYBER_2344_v1 CYBER; Security Aspects for LI and RD InterfacesSecurity Aspects for LI and RD Interfaces WI proposed to TB (2023-08-21) CYBER Cyber SecurityLawful InterceptionRetained Data cyber https://portal.etsi.org/webapp/WorkProgram/Report_WorkItem.asp?WKI_ID=69118

PWI_CYBERQSC_2305_v1 Quantum-Safe Cryptography (CYBER); QSC Protocol InventoryQSC Protocol Inventory WI proposed to WG (2023-08-22) CYBER QSC Cyber SecurityQuantum Safe Cryptography cyber https://portal.etsi.org/webapp/WorkProgram/Report_WorkItem.asp?WKI_ID=69122

DTR/CYBER-0070 Early draft (2021-10-08) CYBER Cyber SecurityRADIO radio https://portal.etsi.org/webapp/WorkProgram/Report_WorkItem.asp?WKI_ID=63021

PWI_RIS_2308_v1 Reconfigurable Intelligent Surfaces (RIS); Security and Privacy challenges, and potential recommendations WI noted by TB (2023-06-19) RIS Cyber SecurityRADIO radio https://portal.etsi.org/webapp/WorkProgram/Report_WorkItem.asp?WKI_ID=68580

DTR/CYBER-0067 TB adoption of WI (2021-04-07) CYBER CybersecurityIoTThreat Analysis IoT https://portal.etsi.org/webapp/WorkProgram/Report_WorkItem.asp?WKI_ID=62613

DGR/IPE-003 Early draft (2021-12-07) IPE CybersecurityDNSIoTIPv6SECURITY IoT https://portal.etsi.org/webapp/WorkProgram/Report_WorkItem.asp?WKI_ID=62482

DGR/IPE-004 Final draft for approval (2023-01-16) IPE ANCLOUDCore NetworkCustomer Premises NetworksCybersecurityData CentresINTERWORKINGIoTIPIPv4IPv6LANMANManufacturingNAT64SDNSMEWANWLAN IoT https://portal.etsi.org/webapp/WorkProgram/Report_WorkItem.asp?WKI_ID=62483

PWI_CYBER_2237_v1 CYBER; Cyber Security for Consumer Internet of Things: Baseline Requirements WI noted by TB (2022-08-29) CYBER CybersecurityIoTprivacy IoT https://portal.etsi.org/webapp/WorkProgram/Report_WorkItem.asp?WKI_ID=66916

RTS/CYBER-0090 CYBER; Cyber Security for Consumer Internet of Things: Baseline Requirements Start of work (2022-09-12) CYBER CybersecurityIoTprivacy IoT https://portal.etsi.org/webapp/WorkProgram/Report_WorkItem.asp?WKI_ID=66926

DTS/CYBER-0095 Cyber Security (CYBER); Cyber Security for Consumer Internet of Things; Requirements for Smart Voice-Controlled Devices Stable draft (2023-07-17) CYBER Cyber SecurityIoTprivacy IoT https://portal.etsi.org/webapp/WorkProgram/Report_WorkItem.asp?WKI_ID=67020

DTS/CYBER-00119 Cyber Security (CYBER); Security Evaluation Standard for IoT Platforms (SESIP) Profile for Secure Consumer IoT DevicesSESIP profile for EN 303 645 TB adoption of WI (2023-07-27) CYBER CybersecurityIoT IoT https://portal.etsi.org/webapp/WorkProgram/Report_WorkItem.asp?WKI_ID=69057

DGR/QKD-019_AUTH Quantum Key Distribution (QKD); Design of QKD interfaces with Authentication Stable draft (2023-08-01) QKD authenticationCybersecurityquantum cryptographyQuantum Key DistributionSession Initiation Protocol Cyber https://portal.etsi.org/webapp/WorkProgram/Report_WorkItem.asp?WKI_ID=61394

DTS/ESI-001194115 ESI Policy and security requirements for Trust Service Providers issuing certificates; Part 5: Policy Requirements for trust service providers issuing website authentication certificatesPart 5: Policy Requirements for trust service providers issuing webs Early draft (2020-10-26) ESI Cyber Securitytrust services Cyber https://portal.etsi.org/webapp/WorkProgram/Report_WorkItem.asp?WKI_ID=61442

RTS/ESI-00119612329 ESI Sector Specific Requirements; Qualified Certificate Profiles and TSP Policy Requirements for open bankingQualified Certificate Profiles and TSP Policy Requirements for open banking TB adoption of WI (2020-10-02) ESI Cyber Securitytrust services Cyber https://portal.etsi.org/webapp/WorkProgram/Report_WorkItem.asp?WKI_ID=61444

DTR/CYBER-0067 TB adoption of WI (2021-04-07) CYBER CybersecurityIoTThreat Analysis Cyber https://portal.etsi.org/webapp/WorkProgram/Report_WorkItem.asp?WKI_ID=62613

DTR/CYBER-0070 Early draft (2021-10-08) CYBER Cyber SecurityRADIO Cyber https://portal.etsi.org/webapp/WorkProgram/Report_WorkItem.asp?WKI_ID=63021

DGR/IPE-003 Early draft (2021-12-07) IPE CybersecurityDNSIoTIPv6SECURITY Cyber https://portal.etsi.org/webapp/WorkProgram/Report_WorkItem.asp?WKI_ID=62482

DGR/IPE-004 Final draft for approval (2023-01-16) IPE ANCLOUDCore NetworkCustomer Premises NetworksCybersecurityData CentresINTERWORKINGIoTIPIPv4IPv6LANMANManufacturingNAT64SDNSMEWANWLAN Cyber https://portal.etsi.org/webapp/WorkProgram/Report_WorkItem.asp?WKI_ID=62483

DTR/INT-00900 Stable draft (2022-09-14) INT AFI 5GAutonomic NetworkingCyber SecuritySECURITYSecurity by defaultSelf-Management Cyber https://portal.etsi.org/webapp/WorkProgram/Report_WorkItem.asp?WKI_ID=63106

DTR/INT-009001 Stable draft (2022-07-30) INT AFI 5Gartificial intelligenceAutonomic NetworkingCyber SecurityEnhanced Mobile BroadbandIPv6SECURITYSelf-Management Cyber https://portal.etsi.org/webapp/WorkProgram/Report_WorkItem.asp?WKI_ID=63527

DGR/SAI-0010 Final draft for approval (2023-08-25) SAI artificial intelligenceCyber Security Cyber https://portal.etsi.org/webapp/WorkProgram/Report_WorkItem.asp?WKI_ID=63960

DTS/CYBER-0081 Stable draft (2023-05-22) CYBER Cybersecurityrouter Cyber https://portal.etsi.org/webapp/WorkProgram/Report_WorkItem.asp?WKI_ID=64275

DTR/CYBER-QSC-0021 Stable draft (2023-05-23) CYBER QSC CybersecurityHYBRIDQuantum Safe Cryptography Cyber https://portal.etsi.org/webapp/WorkProgram/Report_WorkItem.asp?WKI_ID=64284

DTS/CYBER-0083-2 CYBER; Consumer Mobile Device; Part 2: Biometric Authentication Protection Profile Module Stable draft (2023-07-21) CYBER CybersecurityMOBILEprivacyTERMINAL Cyber https://portal.etsi.org/webapp/WorkProgram/Report_WorkItem.asp?WKI_ID=67439

DTS/CYBER-0083-3 CYBER; Consumer Mobile Device; Part 3: Multi-user Protection Profile Module TB approval (2023-03-29) CYBER CybersecurityMOBILEprivacyTERMINAL Cyber https://portal.etsi.org/webapp/WorkProgram/Report_WorkItem.asp?WKI_ID=67440

DTR/CYBER-QSC-0022 Start of work (2022-07-19) CYBER QSC Cyber SecurityQuantum Safe Cryptography Cyber https://portal.etsi.org/webapp/WorkProgram/Report_WorkItem.asp?WKI_ID=64860

RTS/CYBER-0083-1 CYBER; Consumer Mobile Device; Part 1: Base Protection Profile Stable draft (2023-07-21) CYBER CybersecurityMOBILEprivacyTERMINAL Cyber https://portal.etsi.org/webapp/WorkProgram/Report_WorkItem.asp?WKI_ID=65551

DGS/NFV-IFA033ed451 Network Functions Virtualisation (NFV) Release 4; Management and Orchestration; Reference points related to Security Management and Certificate Management Functions - Interface and Information Model Specification Final draft for approval (2023-08-11) NFV IFA Cyber SecurityINTERFACEMANAGEMENTMANONFVorchestrationSECURITYVirtualisation Cyber https://portal.etsi.org/webapp/WorkProgram/Report_WorkItem.asp?WKI_ID=66417

DTR/CYBER-0087 Cyber Security (CYBER); Open Security Controls Assessment Language Use Guidelines Stable draft (2023-03-04) CYBER Cybersecurity Cyber https://portal.etsi.org/webapp/WorkProgram/Report_WorkItem.asp?WKI_ID=66528

RTS/CYBER-0089 CYBER; Consumer Mobile Device Protection Profile Stable draft (2022-09-14) CYBER CybersecurityMOBILEprivacyTERMINAL Cyber https://portal.etsi.org/webapp/WorkProgram/Report_WorkItem.asp?WKI_ID=66855

PWI_CYBER_2237_v1 CYBER; Cyber Security for Consumer Internet of Things: Baseline Requirements WI noted by TB (2022-08-29) CYBER CybersecurityIoTprivacy Cyber https://portal.etsi.org/webapp/WorkProgram/Report_WorkItem.asp?WKI_ID=66916

RTS/CYBER-0090 CYBER; Cyber Security for Consumer Internet of Things: Baseline Requirements Start of work (2022-09-12) CYBER CybersecurityIoTprivacy Cyber https://portal.etsi.org/webapp/WorkProgram/Report_WorkItem.asp?WKI_ID=66926

DTS/CYBER-0095 Cyber Security (CYBER); Cyber Security for Consumer Internet of Things; Requirements for Smart Voice-Controlled Devices Stable draft (2023-07-17) CYBER Cyber SecurityIoTprivacy Cyber https://portal.etsi.org/webapp/WorkProgram/Report_WorkItem.asp?WKI_ID=67020

DTS/CYBER-0092 Optical Network and Device Security Access Network Device Security Requirements TB approval (2023-06-01) CYBER CybersecurityOptical Access NetworkSecurity requirements Cyber https://portal.etsi.org/webapp/WorkProgram/Report_WorkItem.asp?WKI_ID=67082

DTS/CYBER-0097-1 CYBER; Consumer Mobile Devices Base PP-Configuration; Part 1: CMD and Biometric Verification Stable draft (2023-07-21) CYBER CybersecurityMOBILEprivacyTERMINAL Cyber https://portal.etsi.org/webapp/WorkProgram/Report_WorkItem.asp?WKI_ID=67441

DTR/CYBER-00105 Cyber Security (CYBER); Studey the Implementation of the Critical Entities Resilience Directive Early draft (2023-05-18) CYBER Cybersecurityresiliencerisk management Cyber https://portal.etsi.org/webapp/WorkProgram/Report_WorkItem.asp?WKI_ID=67972

DTR/ESI-0019411-7 Electronic Signatures and Infrastructures (ESI); Policy and security requirements for Trust Service Providers issuing certificates; Part 7 Security Considerations on use of QWACsSecurity Considerations on use of QWACs TB adoption of WI (2023-05-05) ESI CybersecurityINTERNETtrust services Cyber https://portal.etsi.org/webapp/WorkProgram/Report_WorkItem.asp?WKI_ID=68492

DTS/CYBER-00113 Cyber Security (CYBER); Conversion of TR on "Implementation of the Revised Network and Information Security (NIS2) Directive" into a TSReview of TR 103 866 to create a related Technical Specification. Early draft (2023-07-18) CYBER Cyber SecurityCyber-defenceCybersecurity Cyber https://portal.etsi.org/webapp/WorkProgram/Report_WorkItem.asp?WKI_ID=68504

DTS/CYBER-00114 Cyber Security (CYBER); ONDS Test Suite Structure and Test PurposesONDS Test Suite Structure and Test Purposes TB adoption of WI (2023-06-09) CYBER CybersecuritydeviceOPTICALTSS&TP Cyber https://portal.etsi.org/webapp/WorkProgram/Report_WorkItem.asp?WKI_ID=68553

DTS/CYBER-00117 Cyber Security (CYBER); ONDS Protection profile - Test casesONDS - Protection Profile - Test cases TB adoption of WI (2023-06-14) CYBER CybersecurityEvaluationTESTING Cyber https://portal.etsi.org/webapp/WorkProgram/Report_WorkItem.asp?WKI_ID=68554

DTR/CYBER-00118 Cyber Security (CYBER); The vulnerability disclosure ecosystemVulnerability Disclosure Ecosystem Early draft (2023-08-09) CYBER Cybersecurityresilience Cyber https://portal.etsi.org/webapp/WorkProgram/Report_WorkItem.asp?WKI_ID=68614

PWI_RIS_2308_v1 Reconfigurable Intelligent Surfaces (RIS); Security and Privacy challenges, and potential recommendations WI noted by TB (2023-06-19) RIS Cyber SecurityRADIO Cyber https://portal.etsi.org/webapp/WorkProgram/Report_WorkItem.asp?WKI_ID=68580

DTR/CYBER-00115 Cyber Security (CYBER); Privileged Access Workstation GuidancePrivileged Access Workstation Guidance TB adoption of WI (2023-06-09) CYBER Cybersecurity Cyber https://portal.etsi.org/webapp/WorkProgram/Report_WorkItem.asp?WKI_ID=68592

PWI_CYBERQSC_2303_v1 Quantum-Safe Cryptography (CYBER); A Repeatable Framework for Quantum-safe Migrations WI proposed to WG (2023-08-18) CYBER QSC CybersecurityFrameworkMIGRATIONQuantum Safe Cryptography Cyber https://portal.etsi.org/webapp/WorkProgram/Report_WorkItem.asp?WKI_ID=68629

DTS/CYBER-00119 Cyber Security (CYBER); Security Evaluation Standard for IoT Platforms (SESIP) Profile for Secure Consumer IoT DevicesSESIP profile for EN 303 645 TB adoption of WI (2023-07-27) CYBER CybersecurityIoT Cyber https://portal.etsi.org/webapp/WorkProgram/Report_WorkItem.asp?WKI_ID=69057

PWI_CYBER_2344_v1 CYBER; Security Aspects for LI and RD InterfacesSecurity Aspects for LI and RD Interfaces WI proposed to TB (2023-08-21) CYBER Cyber SecurityLawful InterceptionRetained Data Cyber https://portal.etsi.org/webapp/WorkProgram/Report_WorkItem.asp?WKI_ID=69118

PWI_CYBERQSC_2305_v1 Quantum-Safe Cryptography (CYBER); QSC Protocol InventoryQSC Protocol Inventory WI proposed to WG (2023-08-22) CYBER QSC Cyber SecurityQuantum Safe Cryptography Cyber https://portal.etsi.org/webapp/WorkProgram/Report_WorkItem.asp?WKI_ID=69122