Standards on Security


Technical committee



Related standards or drafts

Postal Services - Hybrid Mail - Part 1: Secured electronic postal services (SePS) interface specification - Concepts, schemas and operations

90.93 Standard confirmed

CEN/TC 331

Postal Services - Hybrid Mail - Part 2: Secured electronic postal services (SePS) interface specification - EPCM Service

90.93 Standard confirmed

CEN/TC 331

Electronic fee collection - Secure monitoring for autonomous toll systems - Part 1: Compliance checking

90.60 Close of review

CEN/TC 278

Electronic fee collection - Secure monitoring for autonomous toll systems - Part 2: Trusted recorder

90.60 Close of review

CEN/TC 278

Personal identification - Secure and interoperable European Breeder Documents - Part 1: Framework overview

90.60 Close of review

CEN/TC 224

Secure storage units - Classification and methods of test for resistance to fire - Part 1: Data cabinets and data inserts

60.60 Standard published

CEN/TC 263

Secure storage units - Classification and methods of test for resistance to fire - Part 2: Data rooms and data container

60.60 Standard published

CEN/TC 263

Secure storage units - Requirements, classification and methods of test for resistance to burglary - Part 1: Safes, ATM safes, strongroom doors and strongrooms

60.60 Standard published

CEN/TC 263

Secure storage units - Requirements, classification and methods of tests for resistance to burglary - Part 2: Deposit systems

90.92 Standard to be revised

CEN/TC 263

Health informatics - Secure User Identification for Health Care - Management and Security of Authentication by Passwords

90.93 Standard confirmed

CEN/TC 251

Secure storage units - Classification for high security locks according to their resistance to unauthorized opening

60.60 Standard published

CEN/TC 263

Secure storage units - Requirements, classification and methods of test for resistance to burglary - Secure cabinets

60.60 Standard published

CEN/TC 263

Secure storage units - Classification and methods of test for resistance to fire - Light fire storage units

60.60 Standard published

CEN/TC 263

Secure destruction of confidential and sensitive material - Code of practice

60.60 Standard published

CEN/TC 263

Secure storage units - Classification for high security locks according to their resistance to unauthorized opening - Distributed systems

60.60 Standard published

CEN/TC 263

Protection profiles for secure signature creation device - Part 1: Overview

90.93 Standard confirmed

CEN/TC 224

Protection profiles for secure signature creation device - Part 2: Device with key generation

90.20 Standard under periodical review

CEN/TC 224

Protection profiles for secure signature creation device - Part 3: Device with key import

90.60 Close of review

CEN/TC 224

Protection profiles for secure signature creation device - Part 4: Extension for device with key generation and trusted channel to certificate generation application

90.60 Close of review

CEN/TC 224

Protection profiles for secure signature creation device - Part 5: Extension for device with key generation and trusted channel to signature creation application

90.60 Close of review

CEN/TC 224

Protection profiles for secure signature creation device - Part 6: Extension for device with key import and trusted channel to signature creation application

90.93 Standard confirmed

CEN/TC 224

Application Interface for Secure Elements for Electronic Identification, Authentication and Trusted Services - Part 1: Introduction and common definitions

90.60 Close of review

CEN/TC 224

Application Interface for Secure Elements for Electronic Identification, Authentication and Trusted Services - Part 2: Signature and Seal Services

90.60 Close of review

CEN/TC 224

Application Interface for Secure Elements for Electronic Identification, Authentication and Trusted Services - Part 3: Device authentication protocols

90.60 Close of review

CEN/TC 224

Application Interface for Secure Elements for Electronic Identification, Authentication and Trusted Services - Part 4: Privacy specific Protocols

90.60 Close of review

CEN/TC 224

Application Interface for Secure Elements for Electronic Identification, Authentication and Trusted Services - Part 5: Trusted eService

90.60 Close of review

CEN/TC 224

Home and Building Electronic Systems (HBES) - Part 3-4: Secure Application Layer, Secure Service, Secure configuration and security Resources

90.93 Standard confirmed

CLC/TC 205

Home and Building Electronic Systems (HBES) - Part 3-4: Secure Application Layer, Secure Service, Secure configuration and security Resources

60.60 Standard published

CLC/TC 205
CEN/CENELEC

Requirements for the provision of secure remote services for fire safety systems and security systems

60.60 Standard published

CEN/CLC/JTC 4
CEN/CENELEC

Requirements for the provision of secure remote services for fire safety systems and security systems

60.60 Standard published

CEN/CLC/JTC 4

Security for industrial automation and control systems - Part 4-1: Secure product development lifecycle requirements

60.60 Standard published

CLC/TC 65X

Intelligent transport systems - ITS station security services for secure session establishment and authentication between trusted devices (ISO 21177:2024)

60.60 Standard published

CEN/TC 278

Automatic vehicle and equipment identification - Electronic Registration Identification (ERI) for vehicles - Part 4: Secure communications using asymmetrical techniques (ISO 24534-4:2010)

60.60 Standard published

CEN/TC 278

Automatic vehicle and equipment identification - Electronic registration identification (ERI) for vehicles - Part 4: Secure communications using asymmetrical techniques - Amendment 1 (ISO 24534-4:2010/Amd 1:2019)

60.60 Standard published

CEN/TC 278

Security for industrial automation and control systems - Part 4-1: Secure product development lifecycle requirements

60.60 Standard published

TC 65

Maritime navigation and radiocommunication equipment and systems - Data interfaces - Part 2: Secure communication between ship and shore (SECOM)

60.60 Standard published

TC 80

Power systems management and associated information exchange - Data and communications security - Part 100-3: Conformance test cases for the IEC 62351-3, the secure communication extension for profiles including TCP/IP

60.60 Standard published

TC 57

Financial services — Secure cryptographic devices (retail) — Part 1: Concepts, requirements and evaluation methods

90.92 Standard to be revised

ISO/TC 68/SC 2

Financial services — Secure cryptographic devices (retail) — Part 2: Security compliance checklists for devices used in financial transactions

60.60 Standard published

ISO/TC 68/SC 2

Intelligent transport systems — ITS station security services for secure session establishment and authentication between trusted devices

60.60 Standard published

ISO/TC 204

Automatic vehicle and equipment identification — Electronic registration identification (ERI) for vehicles — Part 4: Secure communications using asymmetrical techniques

90.60 Close of review

ISO/TC 204

Automatic vehicle and equipment identification — Electronic registration identification (ERI) for vehicles — Part 4: Secure communications using asymmetrical techniques — Amendment 1

60.60 Standard published

ISO/TC 204

Intelligent transport systems — Automatic vehicle and equipment identification — Electronic Registration Identification (ERI) for vehicles — Part 5: Secure communications using symmetrical techniques

90.60 Close of review

ISO/TC 204

Intelligent transport systems — Automatic vehicle and equipment identification — Electronic Registration Identification (ERI) for vehicles — Part 5: Secure communications using symmetrical techniques — Amendment 1

60.60 Standard published

ISO/TC 204

Steel wire ropes — Ferrule-secured eye terminations

90.93 Standard confirmed

ISO/TC 105

Electronic data interchange for administration, commerce and transport (EDIFACT) — Application level syntax rules (Syntax version number: 4, Syntax release number: 1) — Part 6: Secure authentication and acknowledgement message (message type - AUTACK)

90.20 Standard under periodical review

ISO/TC 154

Information technology — JPEG 2000 image coding system — Part 8: Secure JPEG 2000

60.60 Standard published

ISO/IEC JTC 1/SC 29

Information technology — Home network security — Part 2: Internal security services: Secure Communication Protocol for Middleware (SCPM)

90.93 Standard confirmed

ISO/IEC JTC 1/SC 25

Information technology - Home network security - Part 2: Internal security services - Secure communication protocol for middleware (SCPM)

60.60 Standard published

ISO/IEC JTC 1/SC 25

Information security — Secure multiparty computation — Part 1: General

60.60 Standard published

ISO/IEC JTC 1/SC 27

Information security — Secure multiparty computation — Part 2: Mechanisms based on secret sharing

60.60 Standard published

ISO/IEC JTC 1/SC 27

Information technology — Open systems interconnection directory — Part 11: Protocol specifications for secure operations

60.60 Standard published

ISO/IEC JTC 1/SC 6

Information technology — DevOps — Building reliable and secure systems including application build, package and deployment

60.60 Standard published

ISO/IEC JTC 1/SC 7

Telecommunications and exchange between information technology systems — Requirements for local and metropolitan area networks — Part 1AR: Secure device identity

60.60 Standard published

ISO/IEC JTC 1/SC 6

Information technology — Programming languages, their environments and system software interfaces — C secure coding rules

90.20 Standard under periodical review

ISO/IEC JTC 1/SC 22

Information technology — Programming languages, their environments and system software interfaces — C secure coding rules — Technical Corrigendum 1

60.60 Standard published

ISO/IEC JTC 1/SC 22

Information technology — Security techniques — Catalogue of architectural and design principles for secure products, systems and applications

90.20 Standard under periodical review

ISO/IEC JTC 1/SC 27

Intelligent transport systems — Communication profiles for secure connections between trusted devices

90.93 Standard confirmed

ISO/TC 204

Safety, security and sustainability of cannabis facilities and operations — Part 2: Requirements for the secure handling of cannabis and cannabis products

60.60 Standard published

ISO/TMBG