SBS Priority Topic 04: Cybersecurity
Draft European and International standards linked with Cybersecurity and having a particular interest for SMEs
Draft European and International standards linked with Cybersecurity and having a particular interest for SMEs
Artificial intelligence — Cybersecurity specifications for AI Systems
10.99 New project approved
Artificial intelligence — Cybersecurity specifications for AI Systems
10.99 New project approved
Electrical requirements for lifts, escalators and moving walks -- Part 20: Cybersecurity
10.99 New project approved
Fixed-time cybersecurity evaluation methodology for ICT products
10.99 New project approved
Fixed-time cybersecurity evaluation methodology for ICT products
10.99 New project approved
Information technology, cybersecurity and privacy protection - Requirements for bodies providing audit and certification of privacy information management systems (ISO/IEC FDIS 27706:2024)
50.20 Proof sent to secretariat or FDIS ballot initiated: 8 weeks
Information technology, cybersecurity and privacy protection - Requirements for bodies providing audit and certification of privacy information management systems (ISO/IEC FDIS 27706:2024)
50.20 Proof sent to secretariat or FDIS ballot initiated: 8 weeks
<p>Standard Interface for Connecting Charging stations to Local Energy Management Systems - Part 3 Communication Protocol and Cybersecurity Specific Aspects</p>
40.60 Close of voting
Electrical requirements for lifts, escalators and moving walks — Part 20: Cybersecurity
20.00 New project registered in TC/SC work programme
Health informatics — Cybersecurity framework for telehealth environments — Part 2: Cybersecurity reference models of telehealth
30.99 CD approved for registration as DIS
Health informatics — Cybersecurity framework for telehealth environments — Part 3: Cybersecurity requirements of telehealth
30.00 Committee draft (CD) registered
Health informatics — Cybersecurity framework for telehealth environments — Part 1: Overview and concepts
50.20 Proof sent to secretariat or FDIS ballot initiated: 8 weeks
Cybersecurity — Information and communication technology readiness for business continuity
60.00 Standard under publication
Cybersecurity — Confidential computing — Part 1: Overview and concepts
20.00 New project registered in TC/SC work programme
Information security, cybersecurity and privacy protection — Government and regulatory use of ISO/IEC 27001, ISO/IEC 27002 and other information security standards
20.00 New project registered in TC/SC work programme
Cybersecurity education and training
20.00 New project registered in TC/SC work programme
Cybersecurity – Security frameworks and use cases for cyber physical systems
20.00 New project registered in TC/SC work programme
Cybersecurity — Artificial Intelligence — Guidance for addressing security threats and failures in artificial intelligence systems
30.60 Close of voting/ comment period
Information technology — Security techniques — Cybersecurity and ISO and IEC Standards
30.99 CD approved for registration as DIS
Information security, cybersecurity and privacy protection — Evaluation criteria for IT security — Part 1: Introduction and general model
40.60 Close of voting
Information security, cybersecurity and privacy protection — Evaluation criteria for IT security — Part 2: Security functional components
40.60 Close of voting
Information security, cybersecurity and privacy protection — Evaluation criteria for IT security — Part 3: Security assurance components
40.60 Close of voting
Information security, cybersecurity and privacy protection — Evaluation criteria for IT security — Part 4: Framework for the specification of evaluation methods and activities
40.60 Close of voting
Information security, cybersecurity and privacy protection — Evaluation criteria for IT security — Part 5: Pre-defined packages of security requirements
40.60 Close of voting
Information security, cybersecurity and privacy protection — Evaluation criteria for IT security — Methodology for IT security evaluation
40.60 Close of voting
Information security, cybersecurity and privacy protection — General principles of security evaluation of biometric systems
40.60 Close of voting
Information security, cybersecurity and privacy protection — Requirements for the competence of IT security conformance assessment body personnel — Part 1: Overview and concepts
40.60 Close of voting
Information security, cybersecurity and privacy protection — Requirements for the competence of IT security conformance assessment body personnel — Part 2: Knowledge and skills requirements for ISO/IEC 19790 testers and validators
40.20 DIS ballot initiated: 12 weeks
Information security, cybersecurity and privacy protection — Requirements for the competence of IT security conformance assessment body personnel — Part 3: Knowledge and skills requirements for ISO/IEC 15408 evaluators and certifiers
40.20 DIS ballot initiated: 12 weeks
Information security, cybersecurity and privacy protection — Information security controls based on ISO/IEC 27002 for cloud services
40.00 DIS registered
Information security, cybersecurity and privacy protection – Guidelines for protection of personally identifiable information (PII) in public clouds acting as PII processors
40.60 Close of voting
Cybersecurity — IoT security and privacy — Cybersecurity labelling framework for consumer IoT
40.20 DIS ballot initiated: 12 weeks
Information security, cybersecurity and privacy protection — Security and privacy requirements for authentication using biometrics on mobile devices — Part 2: Remote modes
40.60 Close of voting
Information security, cybersecurity and privacy protection — Guidelines on privacy preservation based on zero knowledge proofs
40.20 DIS ballot initiated: 12 weeks
Information technology, cybersecurity and privacy protection — Age assurance systems — Part 1: Framework
40.20 DIS ballot initiated: 12 weeks
Information security, cybersecurity and privacy protection – Controls and guidance for personally identifiable information protection
40.20 DIS ballot initiated: 12 weeks
Information security, cybersecurity and privacy protection — Testing cryptographic modules in their field
50.00 Final text received or FDIS registered for formal approval
Information security, cybersecurity and privacy protection — Security requirements for cryptographic modules
50.20 Proof sent to secretariat or FDIS ballot initiated: 8 weeks
Information security, cybersecurity and privacy protection — Test requirements for cryptographic modules
50.20 Proof sent to secretariat or FDIS ballot initiated: 8 weeks
Information security, cybersecurity and privacy protection — Privacy information management systems — Requirements and guidance
50.00 Final text received or FDIS registered for formal approval
Information technology, cybersecurity and privacy protection — Requirements for bodies providing audit and certification of privacy information management systems
50.00 Final text received or FDIS registered for formal approval
Guidance on civil uncrewed aircraft systems (UAS) cybersecurity
00.00 Proposal for new project received
Information security, cybersecurity and privacy protection — Requirements for bodies providing audit and certification of information security management systems — Part 1: General
00.00 Proposal for new project received
Information technology, cybersecurity and privacy protection — Age assurance systems — Part 2: Technical approaches and guidance for implementation
00.00 Proposal for new project received
Cybersecurity and Privacy — Artificial Intelligence — Privacy protection
20.20 Working draft (WD) study initiated
Information technology, cybersecurity and privacy protection — Age assurance systems — Part 3: Benchmarks for benchmarking analysis
20.60 Close of comment period
Information security, cybersecurity and privacy protection – Entity authentication assurance framework
20.20 Working draft (WD) study initiated
Information security, cybersecurity and privacy protection — Verification of Cryptographic Protocols — Part 2: Evaluation Methods and Activities for Cryptographic Protocols
20.60 Close of comment period
Cybersecurity evaluation of complex systems — Introduction and framework overview
20.20 Working draft (WD) study initiated
Tractors and machinery for agriculture and forestry — Cybersecurity Management
10.20 New project ballot initiated
Intelligent transport systems — Management of electronic traffic regulations (METR) — Part 10: Cybersecurity
00.00 Proposal for new project received
Road vehicles — Cybersecurity verification and validation
20.00 New project registered in TC/SC work programme
Road vehicles — Cybersecurity Assurance Levels (CAL) and Targeted Attack Feasibility (TAF)
30.60 Close of voting/ comment period
Agricultural Machinery and Tractors — Cybersecurity Engineering
20.99 WD approved for registration as CD
EN 5XXXX Cybersecurity requirements for tamper-resistant microprocessors and microcontrollers
10.00 Proposal for new project registered
EN 5XXXX Cybersecurity requirements for microprocessors and microcontrollers with security- related functionalities.
10.00 Proposal for new project registered
Information exchange for Electric Vehicle charging roaming service - Part 4: Cybersecurity and information privacy
10.99 New project approved
Local charging station management systems and local energy management systems network connectivity and information exchange - Part 3: Communication protocol and cybersecurity specific aspects
40.60 Close of voting
Agricultural Machinery & Tractors -- Cybersecurity Engineering
10.99 New project approved
Information security, cybersecurity and privacy protection - Evaluation criteria for IT security - Part 1: Introduction and general model (ISO/IEC DIS 15408-1:2024)
40.60 Close of voting
Information security, cybersecurity and privacy protection - Evaluation criteria for IT security - Part 1: Introduction and general model (ISO/IEC DIS 15408-1:2024)
40.60 Close of voting
Information security, cybersecurity and privacy protection - Evaluation criteria for IT security - Part 2: Security functional components (ISO/IEC DIS 15408-2:2024)
40.60 Close of voting
Information security, cybersecurity and privacy protection - Evaluation criteria for IT security - Part 2: Security functional components (ISO/IEC DIS 15408-2:2024)
40.60 Close of voting
Information security, cybersecurity and privacy protection - Evaluation criteria for IT security - Part 3: Security assurance components (ISO/IEC DIS 15408-3:2024)
40.60 Close of voting
Information security, cybersecurity and privacy protection - Evaluation criteria for IT security - Part 3: Security assurance components (ISO/IEC DIS 15408-3:2024)
40.60 Close of voting
Information security, cybersecurity and privacy protection - Evaluation criteria for IT security - Part 4: Framework for the specification of evaluation methods and activities (ISO/IEC DIS 15408-4:2024)
40.60 Close of voting
Information security, cybersecurity and privacy protection - Evaluation criteria for IT security - Part 4: Framework for the specification of evaluation methods and activities (ISO/IEC DIS 15408-4:2024)
40.60 Close of voting
Information security, cybersecurity and privacy protection - Evaluation criteria for IT security - Part 5: Pre-defined packages of security requirements (ISO/IEC DIS 15408-5:2024)
40.60 Close of voting
Information security, cybersecurity and privacy protection - Evaluation criteria for IT security - Part 5: Pre-defined packages of security requirements (ISO/IEC DIS 15408-5:2024)
40.60 Close of voting
Information security, cybersecurity and privacy protection - Evaluation criteria for IT security - Methodology for IT security evaluation (ISO/IEC DIS 18045:2024)
40.60 Close of voting
Information security, cybersecurity and privacy protection - Evaluation criteria for IT security - Methodology for IT security evaluation (ISO/IEC DIS 18045:2024)
40.60 Close of voting
Information security, cybersecurity and privacy protection - Requirements for the competence of IT security conformance assessment body personnel - Part 1: Overview and concepts (ISO/IEC DIS 19896-1:2024)
40.60 Close of voting
Information security, cybersecurity and privacy protection - Requirements for the competence of IT security conformance assessment body personnel - Part 1: Overview and concepts (ISO/IEC DIS 19896-1:2024)
40.60 Close of voting
Information security, cybersecurity and privacy protection - Requirements for the competence of IT security conformance assessment body personnel - Part 2: Knowledge and skills requirements for ISO/IEC 19790 testers and validators (ISO/IEC DIS 19896-2:2024)
40.20 DIS ballot initiated: 12 weeks
Information security, cybersecurity and privacy protection - Requirements for the competence of IT security conformance assessment body personnel - Part 2: Knowledge and skills requirements for ISO/IEC 19790 testers and validators (ISO/IEC DIS 19896-2:2024)
40.20 DIS ballot initiated: 12 weeks
Information security, cybersecurity and privacy protection - Requirements for the competence of IT security conformance assessment body personnel - Part 3: Knowledge and skills requirements for ISO/IEC 15408 evaluators and certifiers (ISO/IEC DIS 19896-3:2024)
40.20 DIS ballot initiated: 12 weeks
Information security, cybersecurity and privacy protection - Requirements for the competence of IT security conformance assessment body personnel - Part 3: Knowledge and skills requirements for ISO/IEC 15408 evaluators and certifiers (ISO/IEC DIS 19896-3:2024)
40.20 DIS ballot initiated: 12 weeks
Information security, cybersecurity and privacy protection - Guidelines on personally identifiable information deletion (ISO/IEC 27555:2021)
40.20 DIS ballot initiated: 12 weeks
Information security, cybersecurity and privacy protection - Guidelines on personally identifiable information deletion (ISO/IEC 27555:2021)
40.20 DIS ballot initiated: 12 weeks
Information security, cybersecurity and privacy protection - Privacy information management systems - Requirements and guidance (ISO/IEC DIS 27701:2024)
45.99 Dispatch of FV draft to CCMC
Information security, cybersecurity and privacy protection - Privacy information management systems - Requirements and guidance (ISO/IEC DIS 27701:2024)
45.99 Dispatch of FV draft to CCMC
Information security, cybersecurity and privacy protection - Controls and guidance for personally identifiable information protection (ISO/IEC DIS 29151:2024)
40.20 DIS ballot initiated: 12 weeks
Information security, cybersecurity and privacy protection - Controls and guidance for personally identifiable information protection (ISO/IEC DIS 29151:2024)
40.20 DIS ballot initiated: 12 weeks
Power systems management and associated information exchange - Data and communications security - Part 14: Cyber security event logging
10.99 New project approved
Three-level approach for a set of cybersecurity requirements for cloud services
60.60 Standard published
Requirements for Conformity Assessment Bodies certifying Cloud Services
60.55 Ratification completed (DOR)
Three-level approach for a set of cybersecurity requirements for cloud services
60.60 Standard published
Requirements for Conformity Assessment Bodies certifying Cloud Services
60.55 Ratification completed (DOR)
Information technology — Processes supporting Information security management – Guidelines for cyber insurance
00.98 Proposal for new project abandoned
Ships and marine technology — Assessment of onboard cyber safety
60.60 Standard published
Ships and marine technology — Crew training cyber safety
00.98 Proposal for new project abandoned
Requirements for the competence of ICT products cybersecurity conformity assessment body personnel – Knowledge, skills and effectiveness for ISO/IEC 15408 and ISO/IEC 19790 validators
00.98 Proposal for new project abandoned
Help us improve the information on European and International standards we give you through this website. Give your opinion on the information we give to you this the information website: https://survey.zohopublic.eu/zs/iECGbL
Small Business Standards (SBS), the SME representing the voice of Small and Medium Enterprises in European and international standardisation, is sponsoring this service.
The Internet of Everything opens a new world of possibilities. Connected products, Intelligent Transport Systems, Smart cities and IT-based shared services are creating new business opportunities for SMEs.
Securing this environment and ensuring the protection of citizens, products, services and companies is of utmost importance. Cyber risks need to be kept below an acceptable level if SMEs want consumers of their products or users of their services.
ISO and IEC, as well as CEN, CENELEC and ETSI are developing market-relevant standards supporting cybersecurity.
Here we provide the principal Technical Committees that are currently publishing proyects related to cyber security:
INT AFI -> produce test purposes, test descriptions, and TTCN-3 test cases to enable interoperability testing of the core network elements and covering the single-network, interconnect and roaming scenarios. Use Cases and requirements specified by ETSI for Automated and Autonomic Management and Control (self- management) of Networks and Services are tested via “industry standards-anchored” Proof of Concepts (PoC) events.
SAI -> Artificial Intelligence impacts our lives every day, from local AI systems on our mobile phones suggesting the next word in our sentences to large manufacturers using AI to improve industrial processes. AI has the potential to revolutionize our interactions with technology, improve our quality of life and enrich security – but without high quality technical standards, AI has the potential to create new attacks and worsen security.
CYBER -> The rapid evolution and growth in the complexity of new systems and networks, coupled with the sophistication of changing threats, present demanding challenges for maintaining the security of Information and Communications Technologies (ICT) systems and networks. Security solutions must include a reliable and secure network infrastructure, but they must also protect the privacy of individuals and organizations. Security standardization, sometimes in support of legislative actions, has a key role to play in protecting the Internet and the communications and business it carries. We offer market-driven cybersecurity standardization solutions, along with advice and guidance to users, manufacturers, network, infrastructure and service operators and regulators.
IPE -> The ISG continues to gain momentum in the IP industry, bypassing the 100 supporters including 23 operators, interested in sharing their experiences and defining the future strategies.
Leveraging on the published Group Reports and aiming to stimulate further evolutions, two PoC proposals were adopted:
"SRv6 based 5G Non-Terrestrial Network to provide services with granted SLA, like V2X communication” by CNR-ISTI
“Demonstration of deterministic networking in the Industrial Internet scenario” by China Telecom
CYBER QSC -> The primary responsibilities of ETSI TC Cyber WG-QSC are to make assessments and recommendations on the various proposals from industry and academia regarding real-world deployments of quantum-safe cryptography, including practical properties, (such as efficiency, functionality, agility, etc.), security properties, appropriateness of certain quantum-safe cryptographic primitives to various application domains (Internet protocols, wireless systems, resource constrained environments, cloud deployments, big data, etc.)
And here we have the proyects published by these committees above:
DGR/QKD-019_AUTH Quantum Key Distribution (QKD); Design of QKD interfaces with Authentication Stable draft (2023-08-01) QKD authenticationCybersecurityquantum cryptographyQuantum Key DistributionSession Initiation Protocol Quantum https://portal.etsi.org/webapp/WorkProgram/Report_WorkItem.asp?WKI_ID=61394
DTR/CYBER-QSC-0021 Stable draft (2023-05-23) CYBER QSC CybersecurityHYBRIDQuantum Safe Cryptography Quantum https://portal.etsi.org/webapp/WorkProgram/Report_WorkItem.asp?WKI_ID=64284
DTR/CYBER-QSC-0022 Start of work (2022-07-19) CYBER QSC Cyber SecurityQuantum Safe Cryptography Quantum https://portal.etsi.org/webapp/WorkProgram/Report_WorkItem.asp?WKI_ID=64860
PWI_CYBERQSC_2303_v1 Quantum-Safe Cryptography (CYBER); A Repeatable Framework for Quantum-safe Migrations WI proposed to WG (2023-08-18) CYBER QSC CybersecurityFrameworkMIGRATIONQuantum Safe Cryptography Quantum https://portal.etsi.org/webapp/WorkProgram/Report_WorkItem.asp?WKI_ID=68629
PWI_CYBERQSC_2305_v1 Quantum-Safe Cryptography (CYBER); QSC Protocol InventoryQSC Protocol Inventory WI proposed to WG (2023-08-22) CYBER QSC Cyber SecurityQuantum Safe Cryptography Quantum https://portal.etsi.org/webapp/WorkProgram/Report_WorkItem.asp?WKI_ID=69122
DTR/INT-009001 Stable draft (2022-07-30) INT AFI 5Gartificial intelligenceAutonomic NetworkingCyber SecurityEnhanced Mobile BroadbandIPv6SECURITYSelf-Management Artificial Intelligence https://portal.etsi.org/webapp/WorkProgram/Report_WorkItem.asp?WKI_ID=63527
DGR/SAI-0010 Final draft for approval (2023-08-25) SAI artificial intelligenceCyber Security Artificial Intelligence https://portal.etsi.org/webapp/WorkProgram/Report_WorkItem.asp?WKI_ID=63960
DGR/QKD-019_AUTH Quantum Key Distribution (QKD); Design of QKD interfaces with Authentication Stable draft (2023-08-01) QKD authenticationCybersecurityquantum cryptographyQuantum Key DistributionSession Initiation Protocol Cybersecurity https://portal.etsi.org/webapp/WorkProgram/Report_WorkItem.asp?WKI_ID=61394
DTR/CYBER-0067 TB adoption of WI (2021-04-07) CYBER CybersecurityIoTThreat Analysis Cybersecurity https://portal.etsi.org/webapp/WorkProgram/Report_WorkItem.asp?WKI_ID=62613
DGR/IPE-003 Early draft (2021-12-07) IPE CybersecurityDNSIoTIPv6SECURITY Cybersecurity https://portal.etsi.org/webapp/WorkProgram/Report_WorkItem.asp?WKI_ID=62482
DGR/IPE-004 Final draft for approval (2023-01-16) IPE ANCLOUDCore NetworkCustomer Premises NetworksCybersecurityData CentresINTERWORKINGIoTIPIPv4IPv6LANMANManufacturingNAT64SDNSMEWANWLAN Cybersecurity https://portal.etsi.org/webapp/WorkProgram/Report_WorkItem.asp?WKI_ID=62483
DTS/CYBER-0081 Stable draft (2023-05-22) CYBER Cybersecurityrouter Cybersecurity https://portal.etsi.org/webapp/WorkProgram/Report_WorkItem.asp?WKI_ID=64275
DTR/CYBER-QSC-0021 Stable draft (2023-05-23) CYBER QSC CybersecurityHYBRIDQuantum Safe Cryptography Cybersecurity https://portal.etsi.org/webapp/WorkProgram/Report_WorkItem.asp?WKI_ID=64284
DTS/CYBER-0083-2 CYBER; Consumer Mobile Device; Part 2: Biometric Authentication Protection Profile Module Stable draft (2023-07-21) CYBER CybersecurityMOBILEprivacyTERMINAL Cybersecurity https://portal.etsi.org/webapp/WorkProgram/Report_WorkItem.asp?WKI_ID=67439
DTS/CYBER-0083-3 CYBER; Consumer Mobile Device; Part 3: Multi-user Protection Profile Module TB approval (2023-03-29) CYBER CybersecurityMOBILEprivacyTERMINAL Cybersecurity https://portal.etsi.org/webapp/WorkProgram/Report_WorkItem.asp?WKI_ID=67440
RTS/CYBER-0083-1 CYBER; Consumer Mobile Device; Part 1: Base Protection Profile Stable draft (2023-07-21) CYBER CybersecurityMOBILEprivacyTERMINAL Cybersecurity https://portal.etsi.org/webapp/WorkProgram/Report_WorkItem.asp?WKI_ID=65551
DTR/CYBER-0087 Cyber Security (CYBER); Open Security Controls Assessment Language Use Guidelines Stable draft (2023-03-04) CYBER Cybersecurity Cybersecurity https://portal.etsi.org/webapp/WorkProgram/Report_WorkItem.asp?WKI_ID=66528
RTS/CYBER-0089 CYBER; Consumer Mobile Device Protection Profile Stable draft (2022-09-14) CYBER CybersecurityMOBILEprivacyTERMINAL Cybersecurity https://portal.etsi.org/webapp/WorkProgram/Report_WorkItem.asp?WKI_ID=66855
PWI_CYBER_2237_v1 CYBER; Cyber Security for Consumer Internet of Things: Baseline Requirements WI noted by TB (2022-08-29) CYBER CybersecurityIoTprivacy Cybersecurity https://portal.etsi.org/webapp/WorkProgram/Report_WorkItem.asp?WKI_ID=66916
RTS/CYBER-0090 CYBER; Cyber Security for Consumer Internet of Things: Baseline Requirements Start of work (2022-09-12) CYBER CybersecurityIoTprivacy Cybersecurity https://portal.etsi.org/webapp/WorkProgram/Report_WorkItem.asp?WKI_ID=66926
DTS/CYBER-0092 Optical Network and Device Security Access Network Device Security Requirements TB approval (2023-06-01) CYBER CybersecurityOptical Access NetworkSecurity requirements Cybersecurity https://portal.etsi.org/webapp/WorkProgram/Report_WorkItem.asp?WKI_ID=67082
DTS/CYBER-0097-1 CYBER; Consumer Mobile Devices Base PP-Configuration; Part 1: CMD and Biometric Verification Stable draft (2023-07-21) CYBER CybersecurityMOBILEprivacyTERMINAL Cybersecurity https://portal.etsi.org/webapp/WorkProgram/Report_WorkItem.asp?WKI_ID=67441
DTR/CYBER-00105 Cyber Security (CYBER); Studey the Implementation of the Critical Entities Resilience Directive Early draft (2023-05-18) CYBER Cybersecurityresiliencerisk management Cybersecurity https://portal.etsi.org/webapp/WorkProgram/Report_WorkItem.asp?WKI_ID=67972
DTR/ESI-0019411-7 Electronic Signatures and Infrastructures (ESI); Policy and security requirements for Trust Service Providers issuing certificates; Part 7 Security Considerations on use of QWACsSecurity Considerations on use of QWACs TB adoption of WI (2023-05-05) ESI CybersecurityINTERNETtrust services Cybersecurity https://portal.etsi.org/webapp/WorkProgram/Report_WorkItem.asp?WKI_ID=68492
DTS/CYBER-00113 Cyber Security (CYBER); Conversion of TR on "Implementation of the Revised Network and Information Security (NIS2) Directive" into a TSReview of TR 103 866 to create a related Technical Specification. Early draft (2023-07-18) CYBER Cyber SecurityCyber-defenceCybersecurity Cybersecurity https://portal.etsi.org/webapp/WorkProgram/Report_WorkItem.asp?WKI_ID=68504
DTS/CYBER-00114 Cyber Security (CYBER); ONDS Test Suite Structure and Test PurposesONDS Test Suite Structure and Test Purposes TB adoption of WI (2023-06-09) CYBER CybersecuritydeviceOPTICALTSS&TP Cybersecurity https://portal.etsi.org/webapp/WorkProgram/Report_WorkItem.asp?WKI_ID=68553
DTS/CYBER-00117 Cyber Security (CYBER); ONDS Protection profile - Test casesONDS - Protection Profile - Test cases TB adoption of WI (2023-06-14) CYBER CybersecurityEvaluationTESTING Cybersecurity https://portal.etsi.org/webapp/WorkProgram/Report_WorkItem.asp?WKI_ID=68554
DTR/CYBER-00118 Cyber Security (CYBER); The vulnerability disclosure ecosystemVulnerability Disclosure Ecosystem Early draft (2023-08-09) CYBER Cybersecurityresilience Cybersecurity https://portal.etsi.org/webapp/WorkProgram/Report_WorkItem.asp?WKI_ID=68614
DTR/CYBER-00115 Cyber Security (CYBER); Privileged Access Workstation GuidancePrivileged Access Workstation Guidance TB adoption of WI (2023-06-09) CYBER Cybersecurity Cybersecurity https://portal.etsi.org/webapp/WorkProgram/Report_WorkItem.asp?WKI_ID=68592
PWI_CYBERQSC_2303_v1 Quantum-Safe Cryptography (CYBER); A Repeatable Framework for Quantum-safe Migrations WI proposed to WG (2023-08-18) CYBER QSC CybersecurityFrameworkMIGRATIONQuantum Safe Cryptography Cybersecurity https://portal.etsi.org/webapp/WorkProgram/Report_WorkItem.asp?WKI_ID=68629
DTS/CYBER-00119 Cyber Security (CYBER); Security Evaluation Standard for IoT Platforms (SESIP) Profile for Secure Consumer IoT DevicesSESIP profile for EN 303 645 TB adoption of WI (2023-07-27) CYBER CybersecurityIoT Cybersecurity https://portal.etsi.org/webapp/WorkProgram/Report_WorkItem.asp?WKI_ID=69057
DTR/INT-00900 Stable draft (2022-09-14) INT AFI 5GAutonomic NetworkingCyber SecuritySECURITYSecurity by defaultSelf-Management 5G https://portal.etsi.org/webapp/WorkProgram/Report_WorkItem.asp?WKI_ID=63106
DTR/INT-009001 Stable draft (2022-07-30) INT AFI 5Gartificial intelligenceAutonomic NetworkingCyber SecurityEnhanced Mobile BroadbandIPv6SECURITYSelf-Management 5G https://portal.etsi.org/webapp/WorkProgram/Report_WorkItem.asp?WKI_ID=63527
DGR/IPE-004 Final draft for approval (2023-01-16) IPE ANCLOUDCore NetworkCustomer Premises NetworksCybersecurityData CentresINTERWORKINGIoTIPIPv4IPv6LANMANManufacturingNAT64SDNSMEWANWLAN Cloud https://portal.etsi.org/webapp/WorkProgram/Report_WorkItem.asp?WKI_ID=62483
DTR/INT-009001 Stable draft (2022-07-30) INT AFI 5Gartificial intelligenceAutonomic NetworkingCyber SecurityEnhanced Mobile BroadbandIPv6SECURITYSelf-Management Artificial https://portal.etsi.org/webapp/WorkProgram/Report_WorkItem.asp?WKI_ID=63527
DGR/SAI-0010 Final draft for approval (2023-08-25) SAI artificial intelligenceCyber Security Artificial https://portal.etsi.org/webapp/WorkProgram/Report_WorkItem.asp?WKI_ID=63960
DTR/INT-009001 Stable draft (2022-07-30) INT AFI 5Gartificial intelligenceAutonomic NetworkingCyber SecurityEnhanced Mobile BroadbandIPv6SECURITYSelf-Management Intellige https://portal.etsi.org/webapp/WorkProgram/Report_WorkItem.asp?WKI_ID=63527
DGR/SAI-0010 Final draft for approval (2023-08-25) SAI artificial intelligenceCyber Security Intellige https://portal.etsi.org/webapp/WorkProgram/Report_WorkItem.asp?WKI_ID=63960
DGR/QKD-019_AUTH Quantum Key Distribution (QKD); Design of QKD interfaces with Authentication Stable draft (2023-08-01) QKD authenticationCybersecurityquantum cryptographyQuantum Key DistributionSession Initiation Protocol cyber https://portal.etsi.org/webapp/WorkProgram/Report_WorkItem.asp?WKI_ID=61394
DTS/ESI-001194115 ESI Policy and security requirements for Trust Service Providers issuing certificates; Part 5: Policy Requirements for trust service providers issuing website authentication certificatesPart 5: Policy Requirements for trust service providers issuing webs Early draft (2020-10-26) ESI Cyber Securitytrust services cyber https://portal.etsi.org/webapp/WorkProgram/Report_WorkItem.asp?WKI_ID=61442
RTS/ESI-00119612329 ESI Sector Specific Requirements; Qualified Certificate Profiles and TSP Policy Requirements for open bankingQualified Certificate Profiles and TSP Policy Requirements for open banking TB adoption of WI (2020-10-02) ESI Cyber Securitytrust services cyber https://portal.etsi.org/webapp/WorkProgram/Report_WorkItem.asp?WKI_ID=61444
DTR/CYBER-0067 TB adoption of WI (2021-04-07) CYBER CybersecurityIoTThreat Analysis cyber https://portal.etsi.org/webapp/WorkProgram/Report_WorkItem.asp?WKI_ID=62613
DTR/CYBER-0070 Early draft (2021-10-08) CYBER Cyber SecurityRADIO cyber https://portal.etsi.org/webapp/WorkProgram/Report_WorkItem.asp?WKI_ID=63021
DGR/IPE-003 Early draft (2021-12-07) IPE CybersecurityDNSIoTIPv6SECURITY cyber https://portal.etsi.org/webapp/WorkProgram/Report_WorkItem.asp?WKI_ID=62482
DGR/IPE-004 Final draft for approval (2023-01-16) IPE ANCLOUDCore NetworkCustomer Premises NetworksCybersecurityData CentresINTERWORKINGIoTIPIPv4IPv6LANMANManufacturingNAT64SDNSMEWANWLAN cyber https://portal.etsi.org/webapp/WorkProgram/Report_WorkItem.asp?WKI_ID=62483
DTR/INT-00900 Stable draft (2022-09-14) INT AFI 5GAutonomic NetworkingCyber SecuritySECURITYSecurity by defaultSelf-Management cyber https://portal.etsi.org/webapp/WorkProgram/Report_WorkItem.asp?WKI_ID=63106
DTR/INT-009001 Stable draft (2022-07-30) INT AFI 5Gartificial intelligenceAutonomic NetworkingCyber SecurityEnhanced Mobile BroadbandIPv6SECURITYSelf-Management cyber https://portal.etsi.org/webapp/WorkProgram/Report_WorkItem.asp?WKI_ID=63527
DGR/SAI-0010 Final draft for approval (2023-08-25) SAI artificial intelligenceCyber Security cyber https://portal.etsi.org/webapp/WorkProgram/Report_WorkItem.asp?WKI_ID=63960
DTS/CYBER-0081 Stable draft (2023-05-22) CYBER Cybersecurityrouter cyber https://portal.etsi.org/webapp/WorkProgram/Report_WorkItem.asp?WKI_ID=64275
DTR/CYBER-QSC-0021 Stable draft (2023-05-23) CYBER QSC CybersecurityHYBRIDQuantum Safe Cryptography cyber https://portal.etsi.org/webapp/WorkProgram/Report_WorkItem.asp?WKI_ID=64284
DTS/CYBER-0083-2 CYBER; Consumer Mobile Device; Part 2: Biometric Authentication Protection Profile Module Stable draft (2023-07-21) CYBER CybersecurityMOBILEprivacyTERMINAL cyber https://portal.etsi.org/webapp/WorkProgram/Report_WorkItem.asp?WKI_ID=67439
DTS/CYBER-0083-3 CYBER; Consumer Mobile Device; Part 3: Multi-user Protection Profile Module TB approval (2023-03-29) CYBER CybersecurityMOBILEprivacyTERMINAL cyber https://portal.etsi.org/webapp/WorkProgram/Report_WorkItem.asp?WKI_ID=67440
DTR/CYBER-QSC-0022 Start of work (2022-07-19) CYBER QSC Cyber SecurityQuantum Safe Cryptography cyber https://portal.etsi.org/webapp/WorkProgram/Report_WorkItem.asp?WKI_ID=64860
RTS/CYBER-0083-1 CYBER; Consumer Mobile Device; Part 1: Base Protection Profile Stable draft (2023-07-21) CYBER CybersecurityMOBILEprivacyTERMINAL cyber https://portal.etsi.org/webapp/WorkProgram/Report_WorkItem.asp?WKI_ID=65551
DGS/NFV-IFA033ed451 Network Functions Virtualisation (NFV) Release 4; Management and Orchestration; Reference points related to Security Management and Certificate Management Functions - Interface and Information Model Specification Final draft for approval (2023-08-11) NFV IFA Cyber SecurityINTERFACEMANAGEMENTMANONFVorchestrationSECURITYVirtualisation cyber https://portal.etsi.org/webapp/WorkProgram/Report_WorkItem.asp?WKI_ID=66417
DTR/CYBER-0087 Cyber Security (CYBER); Open Security Controls Assessment Language Use Guidelines Stable draft (2023-03-04) CYBER Cybersecurity cyber https://portal.etsi.org/webapp/WorkProgram/Report_WorkItem.asp?WKI_ID=66528
RTS/CYBER-0089 CYBER; Consumer Mobile Device Protection Profile Stable draft (2022-09-14) CYBER CybersecurityMOBILEprivacyTERMINAL cyber https://portal.etsi.org/webapp/WorkProgram/Report_WorkItem.asp?WKI_ID=66855
PWI_CYBER_2237_v1 CYBER; Cyber Security for Consumer Internet of Things: Baseline Requirements WI noted by TB (2022-08-29) CYBER CybersecurityIoTprivacy cyber https://portal.etsi.org/webapp/WorkProgram/Report_WorkItem.asp?WKI_ID=66916
RTS/CYBER-0090 CYBER; Cyber Security for Consumer Internet of Things: Baseline Requirements Start of work (2022-09-12) CYBER CybersecurityIoTprivacy cyber https://portal.etsi.org/webapp/WorkProgram/Report_WorkItem.asp?WKI_ID=66926
DTS/CYBER-0095 Cyber Security (CYBER); Cyber Security for Consumer Internet of Things; Requirements for Smart Voice-Controlled Devices Stable draft (2023-07-17) CYBER Cyber SecurityIoTprivacy cyber https://portal.etsi.org/webapp/WorkProgram/Report_WorkItem.asp?WKI_ID=67020
DTS/CYBER-0092 Optical Network and Device Security Access Network Device Security Requirements TB approval (2023-06-01) CYBER CybersecurityOptical Access NetworkSecurity requirements cyber https://portal.etsi.org/webapp/WorkProgram/Report_WorkItem.asp?WKI_ID=67082
DTS/CYBER-0097-1 CYBER; Consumer Mobile Devices Base PP-Configuration; Part 1: CMD and Biometric Verification Stable draft (2023-07-21) CYBER CybersecurityMOBILEprivacyTERMINAL cyber https://portal.etsi.org/webapp/WorkProgram/Report_WorkItem.asp?WKI_ID=67441
DTR/CYBER-00105 Cyber Security (CYBER); Studey the Implementation of the Critical Entities Resilience Directive Early draft (2023-05-18) CYBER Cybersecurityresiliencerisk management cyber https://portal.etsi.org/webapp/WorkProgram/Report_WorkItem.asp?WKI_ID=67972
DTR/ESI-0019411-7 Electronic Signatures and Infrastructures (ESI); Policy and security requirements for Trust Service Providers issuing certificates; Part 7 Security Considerations on use of QWACsSecurity Considerations on use of QWACs TB adoption of WI (2023-05-05) ESI CybersecurityINTERNETtrust services cyber https://portal.etsi.org/webapp/WorkProgram/Report_WorkItem.asp?WKI_ID=68492
DTS/CYBER-00113 Cyber Security (CYBER); Conversion of TR on "Implementation of the Revised Network and Information Security (NIS2) Directive" into a TSReview of TR 103 866 to create a related Technical Specification. Early draft (2023-07-18) CYBER Cyber SecurityCyber-defenceCybersecurity cyber https://portal.etsi.org/webapp/WorkProgram/Report_WorkItem.asp?WKI_ID=68504
DTS/CYBER-00114 Cyber Security (CYBER); ONDS Test Suite Structure and Test PurposesONDS Test Suite Structure and Test Purposes TB adoption of WI (2023-06-09) CYBER CybersecuritydeviceOPTICALTSS&TP cyber https://portal.etsi.org/webapp/WorkProgram/Report_WorkItem.asp?WKI_ID=68553
DTS/CYBER-00117 Cyber Security (CYBER); ONDS Protection profile - Test casesONDS - Protection Profile - Test cases TB adoption of WI (2023-06-14) CYBER CybersecurityEvaluationTESTING cyber https://portal.etsi.org/webapp/WorkProgram/Report_WorkItem.asp?WKI_ID=68554
DTR/CYBER-00118 Cyber Security (CYBER); The vulnerability disclosure ecosystemVulnerability Disclosure Ecosystem Early draft (2023-08-09) CYBER Cybersecurityresilience cyber https://portal.etsi.org/webapp/WorkProgram/Report_WorkItem.asp?WKI_ID=68614
PWI_RIS_2308_v1 Reconfigurable Intelligent Surfaces (RIS); Security and Privacy challenges, and potential recommendations WI noted by TB (2023-06-19) RIS Cyber SecurityRADIO cyber https://portal.etsi.org/webapp/WorkProgram/Report_WorkItem.asp?WKI_ID=68580
DTR/CYBER-00115 Cyber Security (CYBER); Privileged Access Workstation GuidancePrivileged Access Workstation Guidance TB adoption of WI (2023-06-09) CYBER Cybersecurity cyber https://portal.etsi.org/webapp/WorkProgram/Report_WorkItem.asp?WKI_ID=68592
PWI_CYBERQSC_2303_v1 Quantum-Safe Cryptography (CYBER); A Repeatable Framework for Quantum-safe Migrations WI proposed to WG (2023-08-18) CYBER QSC CybersecurityFrameworkMIGRATIONQuantum Safe Cryptography cyber https://portal.etsi.org/webapp/WorkProgram/Report_WorkItem.asp?WKI_ID=68629
DTS/CYBER-00119 Cyber Security (CYBER); Security Evaluation Standard for IoT Platforms (SESIP) Profile for Secure Consumer IoT DevicesSESIP profile for EN 303 645 TB adoption of WI (2023-07-27) CYBER CybersecurityIoT cyber https://portal.etsi.org/webapp/WorkProgram/Report_WorkItem.asp?WKI_ID=69057
PWI_CYBER_2344_v1 CYBER; Security Aspects for LI and RD InterfacesSecurity Aspects for LI and RD Interfaces WI proposed to TB (2023-08-21) CYBER Cyber SecurityLawful InterceptionRetained Data cyber https://portal.etsi.org/webapp/WorkProgram/Report_WorkItem.asp?WKI_ID=69118
PWI_CYBERQSC_2305_v1 Quantum-Safe Cryptography (CYBER); QSC Protocol InventoryQSC Protocol Inventory WI proposed to WG (2023-08-22) CYBER QSC Cyber SecurityQuantum Safe Cryptography cyber https://portal.etsi.org/webapp/WorkProgram/Report_WorkItem.asp?WKI_ID=69122
DTR/CYBER-0070 Early draft (2021-10-08) CYBER Cyber SecurityRADIO radio https://portal.etsi.org/webapp/WorkProgram/Report_WorkItem.asp?WKI_ID=63021
PWI_RIS_2308_v1 Reconfigurable Intelligent Surfaces (RIS); Security and Privacy challenges, and potential recommendations WI noted by TB (2023-06-19) RIS Cyber SecurityRADIO radio https://portal.etsi.org/webapp/WorkProgram/Report_WorkItem.asp?WKI_ID=68580
DTR/CYBER-0067 TB adoption of WI (2021-04-07) CYBER CybersecurityIoTThreat Analysis IoT https://portal.etsi.org/webapp/WorkProgram/Report_WorkItem.asp?WKI_ID=62613
DGR/IPE-003 Early draft (2021-12-07) IPE CybersecurityDNSIoTIPv6SECURITY IoT https://portal.etsi.org/webapp/WorkProgram/Report_WorkItem.asp?WKI_ID=62482
DGR/IPE-004 Final draft for approval (2023-01-16) IPE ANCLOUDCore NetworkCustomer Premises NetworksCybersecurityData CentresINTERWORKINGIoTIPIPv4IPv6LANMANManufacturingNAT64SDNSMEWANWLAN IoT https://portal.etsi.org/webapp/WorkProgram/Report_WorkItem.asp?WKI_ID=62483
PWI_CYBER_2237_v1 CYBER; Cyber Security for Consumer Internet of Things: Baseline Requirements WI noted by TB (2022-08-29) CYBER CybersecurityIoTprivacy IoT https://portal.etsi.org/webapp/WorkProgram/Report_WorkItem.asp?WKI_ID=66916
RTS/CYBER-0090 CYBER; Cyber Security for Consumer Internet of Things: Baseline Requirements Start of work (2022-09-12) CYBER CybersecurityIoTprivacy IoT https://portal.etsi.org/webapp/WorkProgram/Report_WorkItem.asp?WKI_ID=66926
DTS/CYBER-0095 Cyber Security (CYBER); Cyber Security for Consumer Internet of Things; Requirements for Smart Voice-Controlled Devices Stable draft (2023-07-17) CYBER Cyber SecurityIoTprivacy IoT https://portal.etsi.org/webapp/WorkProgram/Report_WorkItem.asp?WKI_ID=67020
DTS/CYBER-00119 Cyber Security (CYBER); Security Evaluation Standard for IoT Platforms (SESIP) Profile for Secure Consumer IoT DevicesSESIP profile for EN 303 645 TB adoption of WI (2023-07-27) CYBER CybersecurityIoT IoT https://portal.etsi.org/webapp/WorkProgram/Report_WorkItem.asp?WKI_ID=69057
DGR/QKD-019_AUTH Quantum Key Distribution (QKD); Design of QKD interfaces with Authentication Stable draft (2023-08-01) QKD authenticationCybersecurityquantum cryptographyQuantum Key DistributionSession Initiation Protocol Cyber https://portal.etsi.org/webapp/WorkProgram/Report_WorkItem.asp?WKI_ID=61394
DTS/ESI-001194115 ESI Policy and security requirements for Trust Service Providers issuing certificates; Part 5: Policy Requirements for trust service providers issuing website authentication certificatesPart 5: Policy Requirements for trust service providers issuing webs Early draft (2020-10-26) ESI Cyber Securitytrust services Cyber https://portal.etsi.org/webapp/WorkProgram/Report_WorkItem.asp?WKI_ID=61442
RTS/ESI-00119612329 ESI Sector Specific Requirements; Qualified Certificate Profiles and TSP Policy Requirements for open bankingQualified Certificate Profiles and TSP Policy Requirements for open banking TB adoption of WI (2020-10-02) ESI Cyber Securitytrust services Cyber https://portal.etsi.org/webapp/WorkProgram/Report_WorkItem.asp?WKI_ID=61444
DTR/CYBER-0067 TB adoption of WI (2021-04-07) CYBER CybersecurityIoTThreat Analysis Cyber https://portal.etsi.org/webapp/WorkProgram/Report_WorkItem.asp?WKI_ID=62613
DTR/CYBER-0070 Early draft (2021-10-08) CYBER Cyber SecurityRADIO Cyber https://portal.etsi.org/webapp/WorkProgram/Report_WorkItem.asp?WKI_ID=63021
DGR/IPE-003 Early draft (2021-12-07) IPE CybersecurityDNSIoTIPv6SECURITY Cyber https://portal.etsi.org/webapp/WorkProgram/Report_WorkItem.asp?WKI_ID=62482
DGR/IPE-004 Final draft for approval (2023-01-16) IPE ANCLOUDCore NetworkCustomer Premises NetworksCybersecurityData CentresINTERWORKINGIoTIPIPv4IPv6LANMANManufacturingNAT64SDNSMEWANWLAN Cyber https://portal.etsi.org/webapp/WorkProgram/Report_WorkItem.asp?WKI_ID=62483
DTR/INT-00900 Stable draft (2022-09-14) INT AFI 5GAutonomic NetworkingCyber SecuritySECURITYSecurity by defaultSelf-Management Cyber https://portal.etsi.org/webapp/WorkProgram/Report_WorkItem.asp?WKI_ID=63106
DTR/INT-009001 Stable draft (2022-07-30) INT AFI 5Gartificial intelligenceAutonomic NetworkingCyber SecurityEnhanced Mobile BroadbandIPv6SECURITYSelf-Management Cyber https://portal.etsi.org/webapp/WorkProgram/Report_WorkItem.asp?WKI_ID=63527
DGR/SAI-0010 Final draft for approval (2023-08-25) SAI artificial intelligenceCyber Security Cyber https://portal.etsi.org/webapp/WorkProgram/Report_WorkItem.asp?WKI_ID=63960
DTS/CYBER-0081 Stable draft (2023-05-22) CYBER Cybersecurityrouter Cyber https://portal.etsi.org/webapp/WorkProgram/Report_WorkItem.asp?WKI_ID=64275
DTR/CYBER-QSC-0021 Stable draft (2023-05-23) CYBER QSC CybersecurityHYBRIDQuantum Safe Cryptography Cyber https://portal.etsi.org/webapp/WorkProgram/Report_WorkItem.asp?WKI_ID=64284
DTS/CYBER-0083-2 CYBER; Consumer Mobile Device; Part 2: Biometric Authentication Protection Profile Module Stable draft (2023-07-21) CYBER CybersecurityMOBILEprivacyTERMINAL Cyber https://portal.etsi.org/webapp/WorkProgram/Report_WorkItem.asp?WKI_ID=67439
DTS/CYBER-0083-3 CYBER; Consumer Mobile Device; Part 3: Multi-user Protection Profile Module TB approval (2023-03-29) CYBER CybersecurityMOBILEprivacyTERMINAL Cyber https://portal.etsi.org/webapp/WorkProgram/Report_WorkItem.asp?WKI_ID=67440
DTR/CYBER-QSC-0022 Start of work (2022-07-19) CYBER QSC Cyber SecurityQuantum Safe Cryptography Cyber https://portal.etsi.org/webapp/WorkProgram/Report_WorkItem.asp?WKI_ID=64860
RTS/CYBER-0083-1 CYBER; Consumer Mobile Device; Part 1: Base Protection Profile Stable draft (2023-07-21) CYBER CybersecurityMOBILEprivacyTERMINAL Cyber https://portal.etsi.org/webapp/WorkProgram/Report_WorkItem.asp?WKI_ID=65551
DGS/NFV-IFA033ed451 Network Functions Virtualisation (NFV) Release 4; Management and Orchestration; Reference points related to Security Management and Certificate Management Functions - Interface and Information Model Specification Final draft for approval (2023-08-11) NFV IFA Cyber SecurityINTERFACEMANAGEMENTMANONFVorchestrationSECURITYVirtualisation Cyber https://portal.etsi.org/webapp/WorkProgram/Report_WorkItem.asp?WKI_ID=66417
DTR/CYBER-0087 Cyber Security (CYBER); Open Security Controls Assessment Language Use Guidelines Stable draft (2023-03-04) CYBER Cybersecurity Cyber https://portal.etsi.org/webapp/WorkProgram/Report_WorkItem.asp?WKI_ID=66528
RTS/CYBER-0089 CYBER; Consumer Mobile Device Protection Profile Stable draft (2022-09-14) CYBER CybersecurityMOBILEprivacyTERMINAL Cyber https://portal.etsi.org/webapp/WorkProgram/Report_WorkItem.asp?WKI_ID=66855
PWI_CYBER_2237_v1 CYBER; Cyber Security for Consumer Internet of Things: Baseline Requirements WI noted by TB (2022-08-29) CYBER CybersecurityIoTprivacy Cyber https://portal.etsi.org/webapp/WorkProgram/Report_WorkItem.asp?WKI_ID=66916
RTS/CYBER-0090 CYBER; Cyber Security for Consumer Internet of Things: Baseline Requirements Start of work (2022-09-12) CYBER CybersecurityIoTprivacy Cyber https://portal.etsi.org/webapp/WorkProgram/Report_WorkItem.asp?WKI_ID=66926
DTS/CYBER-0095 Cyber Security (CYBER); Cyber Security for Consumer Internet of Things; Requirements for Smart Voice-Controlled Devices Stable draft (2023-07-17) CYBER Cyber SecurityIoTprivacy Cyber https://portal.etsi.org/webapp/WorkProgram/Report_WorkItem.asp?WKI_ID=67020
DTS/CYBER-0092 Optical Network and Device Security Access Network Device Security Requirements TB approval (2023-06-01) CYBER CybersecurityOptical Access NetworkSecurity requirements Cyber https://portal.etsi.org/webapp/WorkProgram/Report_WorkItem.asp?WKI_ID=67082
DTS/CYBER-0097-1 CYBER; Consumer Mobile Devices Base PP-Configuration; Part 1: CMD and Biometric Verification Stable draft (2023-07-21) CYBER CybersecurityMOBILEprivacyTERMINAL Cyber https://portal.etsi.org/webapp/WorkProgram/Report_WorkItem.asp?WKI_ID=67441
DTR/CYBER-00105 Cyber Security (CYBER); Studey the Implementation of the Critical Entities Resilience Directive Early draft (2023-05-18) CYBER Cybersecurityresiliencerisk management Cyber https://portal.etsi.org/webapp/WorkProgram/Report_WorkItem.asp?WKI_ID=67972
DTR/ESI-0019411-7 Electronic Signatures and Infrastructures (ESI); Policy and security requirements for Trust Service Providers issuing certificates; Part 7 Security Considerations on use of QWACsSecurity Considerations on use of QWACs TB adoption of WI (2023-05-05) ESI CybersecurityINTERNETtrust services Cyber https://portal.etsi.org/webapp/WorkProgram/Report_WorkItem.asp?WKI_ID=68492
DTS/CYBER-00113 Cyber Security (CYBER); Conversion of TR on "Implementation of the Revised Network and Information Security (NIS2) Directive" into a TSReview of TR 103 866 to create a related Technical Specification. Early draft (2023-07-18) CYBER Cyber SecurityCyber-defenceCybersecurity Cyber https://portal.etsi.org/webapp/WorkProgram/Report_WorkItem.asp?WKI_ID=68504
DTS/CYBER-00114 Cyber Security (CYBER); ONDS Test Suite Structure and Test PurposesONDS Test Suite Structure and Test Purposes TB adoption of WI (2023-06-09) CYBER CybersecuritydeviceOPTICALTSS&TP Cyber https://portal.etsi.org/webapp/WorkProgram/Report_WorkItem.asp?WKI_ID=68553
DTS/CYBER-00117 Cyber Security (CYBER); ONDS Protection profile - Test casesONDS - Protection Profile - Test cases TB adoption of WI (2023-06-14) CYBER CybersecurityEvaluationTESTING Cyber https://portal.etsi.org/webapp/WorkProgram/Report_WorkItem.asp?WKI_ID=68554
DTR/CYBER-00118 Cyber Security (CYBER); The vulnerability disclosure ecosystemVulnerability Disclosure Ecosystem Early draft (2023-08-09) CYBER Cybersecurityresilience Cyber https://portal.etsi.org/webapp/WorkProgram/Report_WorkItem.asp?WKI_ID=68614
PWI_RIS_2308_v1 Reconfigurable Intelligent Surfaces (RIS); Security and Privacy challenges, and potential recommendations WI noted by TB (2023-06-19) RIS Cyber SecurityRADIO Cyber https://portal.etsi.org/webapp/WorkProgram/Report_WorkItem.asp?WKI_ID=68580
DTR/CYBER-00115 Cyber Security (CYBER); Privileged Access Workstation GuidancePrivileged Access Workstation Guidance TB adoption of WI (2023-06-09) CYBER Cybersecurity Cyber https://portal.etsi.org/webapp/WorkProgram/Report_WorkItem.asp?WKI_ID=68592
PWI_CYBERQSC_2303_v1 Quantum-Safe Cryptography (CYBER); A Repeatable Framework for Quantum-safe Migrations WI proposed to WG (2023-08-18) CYBER QSC CybersecurityFrameworkMIGRATIONQuantum Safe Cryptography Cyber https://portal.etsi.org/webapp/WorkProgram/Report_WorkItem.asp?WKI_ID=68629
DTS/CYBER-00119 Cyber Security (CYBER); Security Evaluation Standard for IoT Platforms (SESIP) Profile for Secure Consumer IoT DevicesSESIP profile for EN 303 645 TB adoption of WI (2023-07-27) CYBER CybersecurityIoT Cyber https://portal.etsi.org/webapp/WorkProgram/Report_WorkItem.asp?WKI_ID=69057
PWI_CYBER_2344_v1 CYBER; Security Aspects for LI and RD InterfacesSecurity Aspects for LI and RD Interfaces WI proposed to TB (2023-08-21) CYBER Cyber SecurityLawful InterceptionRetained Data Cyber https://portal.etsi.org/webapp/WorkProgram/Report_WorkItem.asp?WKI_ID=69118
PWI_CYBERQSC_2305_v1 Quantum-Safe Cryptography (CYBER); QSC Protocol InventoryQSC Protocol Inventory WI proposed to WG (2023-08-22) CYBER QSC Cyber SecurityQuantum Safe Cryptography Cyber https://portal.etsi.org/webapp/WorkProgram/Report_WorkItem.asp?WKI_ID=69122