SBS Priority Topic 04: Cybersecurity

Draft European and International standards linked with Cybersecurity and having a particular interest for SMEs


Technical committee



Related standards or drafts

Artificial intelligence — Cybersecurity specifications for AI Systems

10.99 New project approved

CEN/CLC/JTC 21

Artificial intelligence — Cybersecurity specifications for AI Systems

10.99 New project approved

CEN/CLC/JTC 21

Electrical requirements for lifts, escalators and moving walks -- Part 20: Cybersecurity

10.99 New project approved

CEN/TC 10

Fixed-time cybersecurity evaluation methodology for ICT products

10.99 New project approved

CEN/CLC/JTC 13

Fixed-time cybersecurity evaluation methodology for ICT products

10.99 New project approved

CEN/CLC/JTC 13
CEN/CENELEC

Guidelines on a sectoral cybersecurity assessment

50.60 Close of voting. Proof returned by secretariat

CEN/CLC/JTC 13
CEN/CENELEC

Guidelines on a sectoral cybersecurity assessment

50.60 Close of voting. Proof returned by secretariat

CEN/CLC/JTC 13

<p>Standard Interface for Connecting Charging stations to Local Energy Management Systems - Part 3 Communication Protocol and Cybersecurity Specific Aspects</p>

40.60 Close of voting

TC 69

Railway applications - Cybersecurity

30.99 CD approved for registration as DIS

TC 9

Electrical requirements for lifts, escalators and moving walks — Part 20: Cybersecurity

20.00 New project registered in TC/SC work programme

ISO/TC 178

Health informatics — Cybersecurity framework for telehealth environments — Part 3: Cybersecurity requirements of telehealth

20.00 New project registered in TC/SC work programme

ISO/TC 215

Health informatics — Cybersecurity framework for telehealth environments — Part 2: Cybersecurity reference models of telehealth

30.60 Close of voting/ comment period

ISO/TC 215

Health informatics — Cybersecurity framework for telehealth environments — Part 1: Overview and concepts

50.00 Final text received or FDIS registered for formal approval

ISO/TC 215

Information security, cybersecurity and privacy protection — Guidance on the integrated implementation of ISO/IEC 27001 and ISO/IEC 20000-1 — Amendment 1

60.00 Standard under publication

ISO/IEC JTC 1/SC 27

Cybersecurity — Information and communication technology readiness for business continuity

60.00 Standard under publication

ISO/IEC JTC 1/SC 27

Cybersecurity — Confidential computing — Part 1: Overview and concepts

20.00 New project registered in TC/SC work programme

ISO/IEC JTC 1/SC 27

Information security, cybersecurity and privacy protection — Government and regulatory use of ISO/IEC 27001, ISO/IEC 27002 and other information security standards

20.00 New project registered in TC/SC work programme

ISO/IEC JTC 1/SC 27

Cybersecurity education and training

20.00 New project registered in TC/SC work programme

ISO/IEC JTC 1/SC 27

Cybersecurity – Security frameworks and use cases for cyber physical systems

20.00 New project registered in TC/SC work programme

ISO/IEC JTC 1/SC 27

Information security, cybersecurity and privacy protection — Information security controls based on ISO/IEC 27002 for cloud services

30.60 Close of voting/ comment period

ISO/IEC JTC 1/SC 27

Cybersecurity — Artificial Intelligence — Guidance for addressing security threats and failures in artificial intelligence systems

30.60 Close of voting/ comment period

ISO/IEC JTC 1/SC 27

Information security, cybersecurity and privacy protection — Testing cryptographic modules in their field

30.99 CD approved for registration as DIS

ISO/IEC JTC 1/SC 27

Information technology — Security techniques — Cybersecurity and ISO and IEC Standards

30.99 CD approved for registration as DIS

ISO/IEC JTC 1/SC 27

Information security, cybersecurity and privacy protection — Evaluation criteria for IT security — Part 1: Introduction and general model

40.60 Close of voting

ISO/IEC JTC 1/SC 27

Information security, cybersecurity and privacy protection — Evaluation criteria for IT security — Part 2: Security functional components

40.60 Close of voting

ISO/IEC JTC 1/SC 27

Information security, cybersecurity and privacy protection — Evaluation criteria for IT security — Part 3: Security assurance components

40.60 Close of voting

ISO/IEC JTC 1/SC 27

Information security, cybersecurity and privacy protection — Evaluation criteria for IT security — Part 4: Framework for the specification of evaluation methods and activities

40.60 Close of voting

ISO/IEC JTC 1/SC 27

Information security, cybersecurity and privacy protection — Evaluation criteria for IT security — Part 5: Pre-defined packages of security requirements

40.60 Close of voting

ISO/IEC JTC 1/SC 27

Information security, cybersecurity and privacy protection — Evaluation criteria for IT security — Methodology for IT security evaluation

40.60 Close of voting

ISO/IEC JTC 1/SC 27

Information security, cybersecurity and privacy protection — General principles of security evaluation of biometric systems

40.60 Close of voting

ISO/IEC JTC 1/SC 27

Information security, cybersecurity and privacy protection — Requirements for the competence of IT security conformance assessment body personnel — Part 1: Overview and concepts

40.20 DIS ballot initiated: 12 weeks

ISO/IEC JTC 1/SC 27

Information security, cybersecurity and privacy protection — Requirements for the competence of IT security conformance assessment body personnel — Part 2: Knowledge and skills requirements for ISO/IEC 19790 testers and validators

40.20 DIS ballot initiated: 12 weeks

ISO/IEC JTC 1/SC 27

Information security, cybersecurity and privacy protection — Requirements for the competence of IT security conformance assessment body personnel — Part 3: Knowledge and skills requirements for ISO/IEC 15408 evaluators and certifiers

40.00 DIS registered

ISO/IEC JTC 1/SC 27

Information security, cybersecurity and privacy protection – Guidelines for protection of personally identifiable information (PII) in public clouds acting as PII processors

40.60 Close of voting

ISO/IEC JTC 1/SC 27

Cybersecurity — IoT security and privacy — Cybersecurity labelling framework for consumer IoT

40.00 DIS registered

ISO/IEC JTC 1/SC 27

Information security, cybersecurity and privacy protection — Security and privacy requirements for authentication using biometrics on mobile devices — Part 2: Remote modes

40.60 Close of voting

ISO/IEC JTC 1/SC 27

Information security, cybersecurity and privacy protection — Guidelines on privacy preservation based on zero knowledge proofs

40.00 DIS registered

ISO/IEC JTC 1/SC 27

Information technology, cybersecurity and privacy protection — Age assurance systems — Part 1: Framework

40.00 DIS registered

ISO/IEC JTC 1/SC 27

Information security, cybersecurity and privacy protection — Privacy information management systems — Requirements and guidance

40.60 Close of voting

ISO/IEC JTC 1/SC 27

Information security, cybersecurity and privacy protection – Controls and guidance for personally identifiable information protection

40.00 DIS registered

ISO/IEC JTC 1/SC 27

Information security, cybersecurity and privacy protection — Security requirements for cryptographic modules

50.00 Final text received or FDIS registered for formal approval

ISO/IEC JTC 1/SC 27

Information security, cybersecurity and privacy protection — Test requirements for cryptographic modules

50.00 Final text received or FDIS registered for formal approval

ISO/IEC JTC 1/SC 27

Guidance on civil uncrewed aircraft systems (UAS) cybersecurity

00.00 Proposal for new project received

ISO/IEC JTC 1/SC 27

Cybersecurity framework for smart cities

00.00 Proposal for new project received

ISO/IEC JTC 1/SC 27

Information security, cybersecurity and privacy protection — Requirements for bodies providing audit and certification of information security management systems — Part 1: General

00.00 Proposal for new project received

ISO/IEC JTC 1/SC 27

Information technology, cybersecurity and privacy protection — Age assurance systems — Part 2: Technical approaches and guidance for implementation

00.00 Proposal for new project received

ISO/IEC JTC 1/SC 27

Cybersecurity and Privacy — Artificial Intelligence — Privacy protection

20.60 Close of comment period

ISO/IEC JTC 1/SC 27

Information technology, cybersecurity and privacy protection — Age assurance systems — Part 3: Benchmarks for benchmarking analysis

20.60 Close of comment period

ISO/IEC JTC 1/SC 27

Information security, cybersecurity and privacy protection – Entity authentication assurance framework

20.20 Working draft (WD) study initiated

ISO/IEC JTC 1/SC 27

Information security, cybersecurity and privacy protection — Verification of Cryptographic Protocols — Part 2: Evaluation Methods and Activities for Cryptographic Protocols

20.60 Close of comment period

ISO/IEC JTC 1/SC 27

Cybersecurity evaluation of complex systems — Introduction and framework overview

20.60 Close of comment period

ISO/IEC JTC 1/SC 27

Tractors and machinery for agriculture and forestry — Cybersecurity Management

10.20 New project ballot initiated

ISO/TC 23/SC 19

Intelligent transport systems — Management of electronic traffic regulations (METR) — Part 10: Cybersecurity

00.00 Proposal for new project received

ISO/TC 204

Road vehicles — Cybersecurity verification and validation

20.00 New project registered in TC/SC work programme

ISO/TC 22/SC 32

Road vehicles — Cybersecurity Assurance Levels (CAL) and Targeted Attack Feasibility (TAF)

30.60 Close of voting/ comment period

ISO/TC 22/SC 32

Agricultural Machinery and Tractors — Cybersecurity Engineering

20.99 WD approved for registration as CD

ISO/TC 23/SC 19

EN 5XXXX Cybersecurity requirements for tamper-resistant microprocessors and microcontrollers

10.00 Proposal for new project registered

CLC/TC 47X

EN 5XXXX Cybersecurity requirements for microprocessors and microcontrollers with security- related functionalities.

10.00 Proposal for new project registered

CLC/TC 47X

Information exchange for Electric Vehicle charging roaming service - Part 4: Cybersecurity and information privacy

10.99 New project approved

CLC/TC 69X

Local charging station management systems and local energy management systems network connectivity and information exchange - Part 3: Communication protocol and cybersecurity specific aspects

40.60 Close of voting

CLC/TC 69X

Agricultural Machinery & Tractors -- Cybersecurity Engineering

10.99 New project approved

CEN/TC 144

Information security, cybersecurity and privacy protection - Evaluation criteria for IT security - Part 1: Introduction and general model (ISO/IEC DIS 15408-1:2024)

40.60 Close of voting

CEN/CLC/JTC 13

Information security, cybersecurity and privacy protection - Evaluation criteria for IT security - Part 1: Introduction and general model (ISO/IEC DIS 15408-1:2024)

40.60 Close of voting

CEN/CLC/JTC 13

Information security, cybersecurity and privacy protection - Evaluation criteria for IT security - Part 2: Security functional components (ISO/IEC DIS 15408-2:2024)

40.60 Close of voting

CEN/CLC/JTC 13

Information security, cybersecurity and privacy protection - Evaluation criteria for IT security - Part 2: Security functional components (ISO/IEC DIS 15408-2:2024)

40.60 Close of voting

CEN/CLC/JTC 13

Information security, cybersecurity and privacy protection - Evaluation criteria for IT security - Part 3: Security assurance components (ISO/IEC DIS 15408-3:2024)

40.60 Close of voting

CEN/CLC/JTC 13

Information security, cybersecurity and privacy protection - Evaluation criteria for IT security - Part 3: Security assurance components (ISO/IEC DIS 15408-3:2024)

40.60 Close of voting

CEN/CLC/JTC 13

Information security, cybersecurity and privacy protection - Evaluation criteria for IT security - Part 4: Framework for the specification of evaluation methods and activities (ISO/IEC DIS 15408-4:2024)

40.60 Close of voting

CEN/CLC/JTC 13

Information security, cybersecurity and privacy protection - Evaluation criteria for IT security - Part 4: Framework for the specification of evaluation methods and activities (ISO/IEC DIS 15408-4:2024)

40.60 Close of voting

CEN/CLC/JTC 13

Information security, cybersecurity and privacy protection - Evaluation criteria for IT security - Part 5: Pre-defined packages of security requirements (ISO/IEC DIS 15408-5:2024)

40.60 Close of voting

CEN/CLC/JTC 13

Information security, cybersecurity and privacy protection - Evaluation criteria for IT security - Part 5: Pre-defined packages of security requirements (ISO/IEC DIS 15408-5:2024)

40.60 Close of voting

CEN/CLC/JTC 13

Information security, cybersecurity and privacy protection - Evaluation criteria for IT security - Methodology for IT security evaluation (ISO/IEC DIS 18045:2024)

40.60 Close of voting

CEN/CLC/JTC 13

Information security, cybersecurity and privacy protection - Evaluation criteria for IT security - Methodology for IT security evaluation (ISO/IEC DIS 18045:2024)

40.60 Close of voting

CEN/CLC/JTC 13

Information security, cybersecurity and privacy protection - Requirements for the competence of IT security conformance assessment body personnel - Part 1: Overview and concepts (ISO/IEC DIS 19896-1:2024)

40.20 DIS ballot initiated: 12 weeks

CEN/CLC/JTC 13

Information security, cybersecurity and privacy protection - Requirements for the competence of IT security conformance assessment body personnel - Part 1: Overview and concepts (ISO/IEC DIS 19896-1:2024)

40.20 DIS ballot initiated: 12 weeks

CEN/CLC/JTC 13

Information security, cybersecurity and privacy protection - Requirements for the competence of IT security conformance assessment body personnel - Part 2: Knowledge and skills requirements for ISO/IEC 19790 testers and validators (ISO/IEC DIS 19896-2:2024)

40.20 DIS ballot initiated: 12 weeks

CEN/CLC/JTC 13

Information security, cybersecurity and privacy protection - Requirements for the competence of IT security conformance assessment body personnel - Part 2: Knowledge and skills requirements for ISO/IEC 19790 testers and validators (ISO/IEC DIS 19896-2:2024)

40.20 DIS ballot initiated: 12 weeks

CEN/CLC/JTC 13

Information security, cybersecurity and privacy protection — Requirements for the competence of IT security conformance assessment body personnel — Part 3: Knowledge and skills requirements for ISO/IEC 15408 evaluators and certifiers

30.99 CD approved for registration as DIS

CEN/CLC/JTC 13

Information security, cybersecurity and privacy protection — Requirements for the competence of IT security conformance assessment body personnel — Part 3: Knowledge and skills requirements for ISO/IEC 15408 evaluators and certifiers

30.99 CD approved for registration as DIS

CEN/CLC/JTC 13

Information security, cybersecurity and privacy protection - Guidelines on personally identifiable information deletion (ISO/IEC 27555:2021)

40.20 DIS ballot initiated: 12 weeks

CEN/CLC/JTC 13

Information security, cybersecurity and privacy protection - Guidelines on personally identifiable information deletion (ISO/IEC 27555:2021)

40.20 DIS ballot initiated: 12 weeks

CEN/CLC/JTC 13

Information security, cybersecurity and privacy protection - Privacy information management systems - Requirements and guidance (ISO/IEC DIS 27701:2024)

40.60 Close of voting

CEN/CLC/JTC 13

Information security, cybersecurity and privacy protection - Privacy information management systems - Requirements and guidance (ISO/IEC DIS 27701:2024)

40.60 Close of voting

CEN/CLC/JTC 13



Project

Cyber Security and Privacy

30.98 Project deleted

CEN/CLC/ETSI/SEG-CG

Three-level approach for a set of cybersecurity requirements for cloud services

60.60 Standard published

CEN/CLC/JTC 13

Requirements for Conformity Assessment Bodies certifying Cloud Services

60.55 Ratification completed (DOR)

CEN/CLC/JTC 13

Power systems management and associated information exchange - Data and communications security - Part 14: Cyber security event logging

10.99 New project approved

CLC/TC 57

Three-level approach for a set of cybersecurity requirements for cloud services

60.60 Standard published

CEN/CLC/JTC 13

Requirements for Conformity Assessment Bodies certifying Cloud Services

60.55 Ratification completed (DOR)

CEN/CLC/JTC 13

Road vehicles — Vehicle cybersecurity engineering

10.98 New project rejected

ISO/TC 22

Information technology — Processes supporting Information security management – Guidelines for cyber insurance

00.98 Proposal for new project abandoned

ISO/IEC JTC 1/SC 27

Ships and marine technology — Assessment of onboard cyber safety

60.60 Standard published

ISO/TC 8

Ships and marine technology — Crew training cyber safety

00.98 Proposal for new project abandoned

ISO/TC 8

Space systems — Cybersecurity management guidelines

10.98 New project rejected

ISO/TC 20/SC 14

Requirements for the competence of ICT products cybersecurity conformity assessment body personnel – Knowledge, skills and effectiveness for ISO/IEC 15408 and ISO/IEC 19790 validators

00.98 Proposal for new project abandoned

ISO/IEC JTC 1/SC 27

Help us improve the information on European and International standards we give you through this website. Give your opinion on the information we give to you this the information website: https://survey.zohopublic.eu/zs/iECGbL

Small Business Standards (SBS), the SME representing the voice of Small and Medium Enterprises in European and international standardisation, is sponsoring this service.

The Internet of Everything opens a new world of possibilities. Connected products, Intelligent Transport Systems, Smart cities and IT-based shared services are creating new business opportunities for SMEs.

Securing this environment and ensuring the protection of citizens, products, services and companies is of utmost importance. Cyber risks need to be kept below an acceptable level if SMEs want consumers of their products or users of their services.

ISO and IEC, as well as CEN, CENELEC and ETSI are developing market-relevant standards supporting cybersecurity.

Here we provide the principal Technical Committees that are currently publishing proyects related to cyber security:

INT AFI -> produce test purposes, test descriptions, and TTCN-3 test cases to enable interoperability testing of the core network elements and covering the single-network, interconnect and roaming scenarios. Use Cases and requirements specified by ETSI for Automated and Autonomic Management and Control (self- management) of Networks and Services are tested via “industry standards-anchored” Proof of Concepts (PoC) events.

SAI -> Artificial Intelligence impacts our lives every day, from local AI systems on our mobile phones suggesting the next word in our sentences to large manufacturers using AI to improve industrial processes. AI has the potential to revolutionize our interactions with technology, improve our quality of life and enrich security – but without high quality technical standards, AI has the potential to create new attacks and worsen security.

CYBER -> The rapid evolution and growth in the complexity of new systems and networks, coupled with the sophistication of changing threats, present demanding challenges for maintaining the security of Information and Communications Technologies (ICT) systems and networks. Security solutions must include a reliable and secure network infrastructure, but they must also protect the privacy of individuals and organizations. Security standardization, sometimes in support of legislative actions, has a key role to play in protecting the Internet and the communications and business it carries. We offer market-driven cybersecurity standardization solutions, along with advice and guidance to users, manufacturers, network, infrastructure and service operators and regulators.

IPE -> The ISG continues to gain momentum in the IP industry, bypassing the 100 supporters including 23 operators, interested in sharing their experiences and defining the future strategies.
Leveraging on the published Group Reports and aiming to stimulate further evolutions, two PoC proposals were adopted:
"SRv6 based 5G Non-Terrestrial Network to provide services with granted SLA, like V2X communication” by CNR-ISTI
“Demonstration of deterministic networking in the Industrial Internet scenario” by China Telecom

CYBER QSC -> The primary responsibilities of ETSI TC Cyber WG-QSC are to make assessments and recommendations on the various proposals from industry and academia regarding real-world deployments of quantum-safe cryptography, including practical properties, (such as efficiency, functionality, agility, etc.), security properties, appropriateness of certain quantum-safe cryptographic primitives to various application domains (Internet protocols, wireless systems, resource constrained environments, cloud deployments, big data, etc.)

And here we have the proyects published by these committees above:

DGR/QKD-019_AUTH Quantum Key Distribution (QKD); Design of QKD interfaces with Authentication Stable draft (2023-08-01) QKD authenticationCybersecurityquantum cryptographyQuantum Key DistributionSession Initiation Protocol Quantum https://portal.etsi.org/webapp/WorkProgram/Report_WorkItem.asp?WKI_ID=61394

DTR/CYBER-QSC-0021 Stable draft (2023-05-23) CYBER QSC CybersecurityHYBRIDQuantum Safe Cryptography Quantum https://portal.etsi.org/webapp/WorkProgram/Report_WorkItem.asp?WKI_ID=64284

DTR/CYBER-QSC-0022 Start of work (2022-07-19) CYBER QSC Cyber SecurityQuantum Safe Cryptography Quantum https://portal.etsi.org/webapp/WorkProgram/Report_WorkItem.asp?WKI_ID=64860

PWI_CYBERQSC_2303_v1 Quantum-Safe Cryptography (CYBER); A Repeatable Framework for Quantum-safe Migrations WI proposed to WG (2023-08-18) CYBER QSC CybersecurityFrameworkMIGRATIONQuantum Safe Cryptography Quantum https://portal.etsi.org/webapp/WorkProgram/Report_WorkItem.asp?WKI_ID=68629

PWI_CYBERQSC_2305_v1 Quantum-Safe Cryptography (CYBER); QSC Protocol InventoryQSC Protocol Inventory WI proposed to WG (2023-08-22) CYBER QSC Cyber SecurityQuantum Safe Cryptography Quantum https://portal.etsi.org/webapp/WorkProgram/Report_WorkItem.asp?WKI_ID=69122

DTR/INT-009001 Stable draft (2022-07-30) INT AFI 5Gartificial intelligenceAutonomic NetworkingCyber SecurityEnhanced Mobile BroadbandIPv6SECURITYSelf-Management Artificial Intelligence https://portal.etsi.org/webapp/WorkProgram/Report_WorkItem.asp?WKI_ID=63527

DGR/SAI-0010 Final draft for approval (2023-08-25) SAI artificial intelligenceCyber Security Artificial Intelligence https://portal.etsi.org/webapp/WorkProgram/Report_WorkItem.asp?WKI_ID=63960

DGR/QKD-019_AUTH Quantum Key Distribution (QKD); Design of QKD interfaces with Authentication Stable draft (2023-08-01) QKD authenticationCybersecurityquantum cryptographyQuantum Key DistributionSession Initiation Protocol Cybersecurity https://portal.etsi.org/webapp/WorkProgram/Report_WorkItem.asp?WKI_ID=61394

DTR/CYBER-0067 TB adoption of WI (2021-04-07) CYBER CybersecurityIoTThreat Analysis Cybersecurity https://portal.etsi.org/webapp/WorkProgram/Report_WorkItem.asp?WKI_ID=62613

DGR/IPE-003 Early draft (2021-12-07) IPE CybersecurityDNSIoTIPv6SECURITY Cybersecurity https://portal.etsi.org/webapp/WorkProgram/Report_WorkItem.asp?WKI_ID=62482

DGR/IPE-004 Final draft for approval (2023-01-16) IPE ANCLOUDCore NetworkCustomer Premises NetworksCybersecurityData CentresINTERWORKINGIoTIPIPv4IPv6LANMANManufacturingNAT64SDNSMEWANWLAN Cybersecurity https://portal.etsi.org/webapp/WorkProgram/Report_WorkItem.asp?WKI_ID=62483

DTS/CYBER-0081 Stable draft (2023-05-22) CYBER Cybersecurityrouter Cybersecurity https://portal.etsi.org/webapp/WorkProgram/Report_WorkItem.asp?WKI_ID=64275

DTR/CYBER-QSC-0021 Stable draft (2023-05-23) CYBER QSC CybersecurityHYBRIDQuantum Safe Cryptography Cybersecurity https://portal.etsi.org/webapp/WorkProgram/Report_WorkItem.asp?WKI_ID=64284

DTS/CYBER-0083-2 CYBER; Consumer Mobile Device; Part 2: Biometric Authentication Protection Profile Module Stable draft (2023-07-21) CYBER CybersecurityMOBILEprivacyTERMINAL Cybersecurity https://portal.etsi.org/webapp/WorkProgram/Report_WorkItem.asp?WKI_ID=67439

DTS/CYBER-0083-3 CYBER; Consumer Mobile Device; Part 3: Multi-user Protection Profile Module TB approval (2023-03-29) CYBER CybersecurityMOBILEprivacyTERMINAL Cybersecurity https://portal.etsi.org/webapp/WorkProgram/Report_WorkItem.asp?WKI_ID=67440

RTS/CYBER-0083-1 CYBER; Consumer Mobile Device; Part 1: Base Protection Profile Stable draft (2023-07-21) CYBER CybersecurityMOBILEprivacyTERMINAL Cybersecurity https://portal.etsi.org/webapp/WorkProgram/Report_WorkItem.asp?WKI_ID=65551

DTR/CYBER-0087 Cyber Security (CYBER); Open Security Controls Assessment Language Use Guidelines Stable draft (2023-03-04) CYBER Cybersecurity Cybersecurity https://portal.etsi.org/webapp/WorkProgram/Report_WorkItem.asp?WKI_ID=66528

RTS/CYBER-0089 CYBER; Consumer Mobile Device Protection Profile Stable draft (2022-09-14) CYBER CybersecurityMOBILEprivacyTERMINAL Cybersecurity https://portal.etsi.org/webapp/WorkProgram/Report_WorkItem.asp?WKI_ID=66855

PWI_CYBER_2237_v1 CYBER; Cyber Security for Consumer Internet of Things: Baseline Requirements WI noted by TB (2022-08-29) CYBER CybersecurityIoTprivacy Cybersecurity https://portal.etsi.org/webapp/WorkProgram/Report_WorkItem.asp?WKI_ID=66916

RTS/CYBER-0090 CYBER; Cyber Security for Consumer Internet of Things: Baseline Requirements Start of work (2022-09-12) CYBER CybersecurityIoTprivacy Cybersecurity https://portal.etsi.org/webapp/WorkProgram/Report_WorkItem.asp?WKI_ID=66926

DTS/CYBER-0092 Optical Network and Device Security Access Network Device Security Requirements TB approval (2023-06-01) CYBER CybersecurityOptical Access NetworkSecurity requirements Cybersecurity https://portal.etsi.org/webapp/WorkProgram/Report_WorkItem.asp?WKI_ID=67082

DTS/CYBER-0097-1 CYBER; Consumer Mobile Devices Base PP-Configuration; Part 1: CMD and Biometric Verification Stable draft (2023-07-21) CYBER CybersecurityMOBILEprivacyTERMINAL Cybersecurity https://portal.etsi.org/webapp/WorkProgram/Report_WorkItem.asp?WKI_ID=67441

DTR/CYBER-00105 Cyber Security (CYBER); Studey the Implementation of the Critical Entities Resilience Directive Early draft (2023-05-18) CYBER Cybersecurityresiliencerisk management Cybersecurity https://portal.etsi.org/webapp/WorkProgram/Report_WorkItem.asp?WKI_ID=67972

DTR/ESI-0019411-7 Electronic Signatures and Infrastructures (ESI); Policy and security requirements for Trust Service Providers issuing certificates; Part 7 Security Considerations on use of QWACsSecurity Considerations on use of QWACs TB adoption of WI (2023-05-05) ESI CybersecurityINTERNETtrust services Cybersecurity https://portal.etsi.org/webapp/WorkProgram/Report_WorkItem.asp?WKI_ID=68492

DTS/CYBER-00113 Cyber Security (CYBER); Conversion of TR on "Implementation of the Revised Network and Information Security (NIS2) Directive" into a TSReview of TR 103 866 to create a related Technical Specification. Early draft (2023-07-18) CYBER Cyber SecurityCyber-defenceCybersecurity Cybersecurity https://portal.etsi.org/webapp/WorkProgram/Report_WorkItem.asp?WKI_ID=68504

DTS/CYBER-00114 Cyber Security (CYBER); ONDS Test Suite Structure and Test PurposesONDS Test Suite Structure and Test Purposes TB adoption of WI (2023-06-09) CYBER CybersecuritydeviceOPTICALTSS&TP Cybersecurity https://portal.etsi.org/webapp/WorkProgram/Report_WorkItem.asp?WKI_ID=68553

DTS/CYBER-00117 Cyber Security (CYBER); ONDS Protection profile - Test casesONDS - Protection Profile - Test cases TB adoption of WI (2023-06-14) CYBER CybersecurityEvaluationTESTING Cybersecurity https://portal.etsi.org/webapp/WorkProgram/Report_WorkItem.asp?WKI_ID=68554

DTR/CYBER-00118 Cyber Security (CYBER); The vulnerability disclosure ecosystemVulnerability Disclosure Ecosystem Early draft (2023-08-09) CYBER Cybersecurityresilience Cybersecurity https://portal.etsi.org/webapp/WorkProgram/Report_WorkItem.asp?WKI_ID=68614

DTR/CYBER-00115 Cyber Security (CYBER); Privileged Access Workstation GuidancePrivileged Access Workstation Guidance TB adoption of WI (2023-06-09) CYBER Cybersecurity Cybersecurity https://portal.etsi.org/webapp/WorkProgram/Report_WorkItem.asp?WKI_ID=68592

PWI_CYBERQSC_2303_v1 Quantum-Safe Cryptography (CYBER); A Repeatable Framework for Quantum-safe Migrations WI proposed to WG (2023-08-18) CYBER QSC CybersecurityFrameworkMIGRATIONQuantum Safe Cryptography Cybersecurity https://portal.etsi.org/webapp/WorkProgram/Report_WorkItem.asp?WKI_ID=68629

DTS/CYBER-00119 Cyber Security (CYBER); Security Evaluation Standard for IoT Platforms (SESIP) Profile for Secure Consumer IoT DevicesSESIP profile for EN 303 645 TB adoption of WI (2023-07-27) CYBER CybersecurityIoT Cybersecurity https://portal.etsi.org/webapp/WorkProgram/Report_WorkItem.asp?WKI_ID=69057

DTR/INT-00900 Stable draft (2022-09-14) INT AFI 5GAutonomic NetworkingCyber SecuritySECURITYSecurity by defaultSelf-Management 5G https://portal.etsi.org/webapp/WorkProgram/Report_WorkItem.asp?WKI_ID=63106

DTR/INT-009001 Stable draft (2022-07-30) INT AFI 5Gartificial intelligenceAutonomic NetworkingCyber SecurityEnhanced Mobile BroadbandIPv6SECURITYSelf-Management 5G https://portal.etsi.org/webapp/WorkProgram/Report_WorkItem.asp?WKI_ID=63527

DGR/IPE-004 Final draft for approval (2023-01-16) IPE ANCLOUDCore NetworkCustomer Premises NetworksCybersecurityData CentresINTERWORKINGIoTIPIPv4IPv6LANMANManufacturingNAT64SDNSMEWANWLAN Cloud https://portal.etsi.org/webapp/WorkProgram/Report_WorkItem.asp?WKI_ID=62483

DTR/INT-009001 Stable draft (2022-07-30) INT AFI 5Gartificial intelligenceAutonomic NetworkingCyber SecurityEnhanced Mobile BroadbandIPv6SECURITYSelf-Management Artificial https://portal.etsi.org/webapp/WorkProgram/Report_WorkItem.asp?WKI_ID=63527

DGR/SAI-0010 Final draft for approval (2023-08-25) SAI artificial intelligenceCyber Security Artificial https://portal.etsi.org/webapp/WorkProgram/Report_WorkItem.asp?WKI_ID=63960

DTR/INT-009001 Stable draft (2022-07-30) INT AFI 5Gartificial intelligenceAutonomic NetworkingCyber SecurityEnhanced Mobile BroadbandIPv6SECURITYSelf-Management Intellige https://portal.etsi.org/webapp/WorkProgram/Report_WorkItem.asp?WKI_ID=63527

DGR/SAI-0010 Final draft for approval (2023-08-25) SAI artificial intelligenceCyber Security Intellige https://portal.etsi.org/webapp/WorkProgram/Report_WorkItem.asp?WKI_ID=63960

DGR/QKD-019_AUTH Quantum Key Distribution (QKD); Design of QKD interfaces with Authentication Stable draft (2023-08-01) QKD authenticationCybersecurityquantum cryptographyQuantum Key DistributionSession Initiation Protocol cyber https://portal.etsi.org/webapp/WorkProgram/Report_WorkItem.asp?WKI_ID=61394

DTS/ESI-001194115 ESI Policy and security requirements for Trust Service Providers issuing certificates; Part 5: Policy Requirements for trust service providers issuing website authentication certificatesPart 5: Policy Requirements for trust service providers issuing webs Early draft (2020-10-26) ESI Cyber Securitytrust services cyber https://portal.etsi.org/webapp/WorkProgram/Report_WorkItem.asp?WKI_ID=61442

RTS/ESI-00119612329 ESI Sector Specific Requirements; Qualified Certificate Profiles and TSP Policy Requirements for open bankingQualified Certificate Profiles and TSP Policy Requirements for open banking TB adoption of WI (2020-10-02) ESI Cyber Securitytrust services cyber https://portal.etsi.org/webapp/WorkProgram/Report_WorkItem.asp?WKI_ID=61444

DTR/CYBER-0067 TB adoption of WI (2021-04-07) CYBER CybersecurityIoTThreat Analysis cyber https://portal.etsi.org/webapp/WorkProgram/Report_WorkItem.asp?WKI_ID=62613

DTR/CYBER-0070 Early draft (2021-10-08) CYBER Cyber SecurityRADIO cyber https://portal.etsi.org/webapp/WorkProgram/Report_WorkItem.asp?WKI_ID=63021

DGR/IPE-003 Early draft (2021-12-07) IPE CybersecurityDNSIoTIPv6SECURITY cyber https://portal.etsi.org/webapp/WorkProgram/Report_WorkItem.asp?WKI_ID=62482

DGR/IPE-004 Final draft for approval (2023-01-16) IPE ANCLOUDCore NetworkCustomer Premises NetworksCybersecurityData CentresINTERWORKINGIoTIPIPv4IPv6LANMANManufacturingNAT64SDNSMEWANWLAN cyber https://portal.etsi.org/webapp/WorkProgram/Report_WorkItem.asp?WKI_ID=62483

DTR/INT-00900 Stable draft (2022-09-14) INT AFI 5GAutonomic NetworkingCyber SecuritySECURITYSecurity by defaultSelf-Management cyber https://portal.etsi.org/webapp/WorkProgram/Report_WorkItem.asp?WKI_ID=63106

DTR/INT-009001 Stable draft (2022-07-30) INT AFI 5Gartificial intelligenceAutonomic NetworkingCyber SecurityEnhanced Mobile BroadbandIPv6SECURITYSelf-Management cyber https://portal.etsi.org/webapp/WorkProgram/Report_WorkItem.asp?WKI_ID=63527

DGR/SAI-0010 Final draft for approval (2023-08-25) SAI artificial intelligenceCyber Security cyber https://portal.etsi.org/webapp/WorkProgram/Report_WorkItem.asp?WKI_ID=63960

DTS/CYBER-0081 Stable draft (2023-05-22) CYBER Cybersecurityrouter cyber https://portal.etsi.org/webapp/WorkProgram/Report_WorkItem.asp?WKI_ID=64275

DTR/CYBER-QSC-0021 Stable draft (2023-05-23) CYBER QSC CybersecurityHYBRIDQuantum Safe Cryptography cyber https://portal.etsi.org/webapp/WorkProgram/Report_WorkItem.asp?WKI_ID=64284

DTS/CYBER-0083-2 CYBER; Consumer Mobile Device; Part 2: Biometric Authentication Protection Profile Module Stable draft (2023-07-21) CYBER CybersecurityMOBILEprivacyTERMINAL cyber https://portal.etsi.org/webapp/WorkProgram/Report_WorkItem.asp?WKI_ID=67439

DTS/CYBER-0083-3 CYBER; Consumer Mobile Device; Part 3: Multi-user Protection Profile Module TB approval (2023-03-29) CYBER CybersecurityMOBILEprivacyTERMINAL cyber https://portal.etsi.org/webapp/WorkProgram/Report_WorkItem.asp?WKI_ID=67440

DTR/CYBER-QSC-0022 Start of work (2022-07-19) CYBER QSC Cyber SecurityQuantum Safe Cryptography cyber https://portal.etsi.org/webapp/WorkProgram/Report_WorkItem.asp?WKI_ID=64860

RTS/CYBER-0083-1 CYBER; Consumer Mobile Device; Part 1: Base Protection Profile Stable draft (2023-07-21) CYBER CybersecurityMOBILEprivacyTERMINAL cyber https://portal.etsi.org/webapp/WorkProgram/Report_WorkItem.asp?WKI_ID=65551

DGS/NFV-IFA033ed451 Network Functions Virtualisation (NFV) Release 4; Management and Orchestration; Reference points related to Security Management and Certificate Management Functions - Interface and Information Model Specification Final draft for approval (2023-08-11) NFV IFA Cyber SecurityINTERFACEMANAGEMENTMANONFVorchestrationSECURITYVirtualisation cyber https://portal.etsi.org/webapp/WorkProgram/Report_WorkItem.asp?WKI_ID=66417

DTR/CYBER-0087 Cyber Security (CYBER); Open Security Controls Assessment Language Use Guidelines Stable draft (2023-03-04) CYBER Cybersecurity cyber https://portal.etsi.org/webapp/WorkProgram/Report_WorkItem.asp?WKI_ID=66528

RTS/CYBER-0089 CYBER; Consumer Mobile Device Protection Profile Stable draft (2022-09-14) CYBER CybersecurityMOBILEprivacyTERMINAL cyber https://portal.etsi.org/webapp/WorkProgram/Report_WorkItem.asp?WKI_ID=66855

PWI_CYBER_2237_v1 CYBER; Cyber Security for Consumer Internet of Things: Baseline Requirements WI noted by TB (2022-08-29) CYBER CybersecurityIoTprivacy cyber https://portal.etsi.org/webapp/WorkProgram/Report_WorkItem.asp?WKI_ID=66916

RTS/CYBER-0090 CYBER; Cyber Security for Consumer Internet of Things: Baseline Requirements Start of work (2022-09-12) CYBER CybersecurityIoTprivacy cyber https://portal.etsi.org/webapp/WorkProgram/Report_WorkItem.asp?WKI_ID=66926

DTS/CYBER-0095 Cyber Security (CYBER); Cyber Security for Consumer Internet of Things; Requirements for Smart Voice-Controlled Devices Stable draft (2023-07-17) CYBER Cyber SecurityIoTprivacy cyber https://portal.etsi.org/webapp/WorkProgram/Report_WorkItem.asp?WKI_ID=67020

DTS/CYBER-0092 Optical Network and Device Security Access Network Device Security Requirements TB approval (2023-06-01) CYBER CybersecurityOptical Access NetworkSecurity requirements cyber https://portal.etsi.org/webapp/WorkProgram/Report_WorkItem.asp?WKI_ID=67082

DTS/CYBER-0097-1 CYBER; Consumer Mobile Devices Base PP-Configuration; Part 1: CMD and Biometric Verification Stable draft (2023-07-21) CYBER CybersecurityMOBILEprivacyTERMINAL cyber https://portal.etsi.org/webapp/WorkProgram/Report_WorkItem.asp?WKI_ID=67441

DTR/CYBER-00105 Cyber Security (CYBER); Studey the Implementation of the Critical Entities Resilience Directive Early draft (2023-05-18) CYBER Cybersecurityresiliencerisk management cyber https://portal.etsi.org/webapp/WorkProgram/Report_WorkItem.asp?WKI_ID=67972

DTR/ESI-0019411-7 Electronic Signatures and Infrastructures (ESI); Policy and security requirements for Trust Service Providers issuing certificates; Part 7 Security Considerations on use of QWACsSecurity Considerations on use of QWACs TB adoption of WI (2023-05-05) ESI CybersecurityINTERNETtrust services cyber https://portal.etsi.org/webapp/WorkProgram/Report_WorkItem.asp?WKI_ID=68492

DTS/CYBER-00113 Cyber Security (CYBER); Conversion of TR on "Implementation of the Revised Network and Information Security (NIS2) Directive" into a TSReview of TR 103 866 to create a related Technical Specification. Early draft (2023-07-18) CYBER Cyber SecurityCyber-defenceCybersecurity cyber https://portal.etsi.org/webapp/WorkProgram/Report_WorkItem.asp?WKI_ID=68504

DTS/CYBER-00114 Cyber Security (CYBER); ONDS Test Suite Structure and Test PurposesONDS Test Suite Structure and Test Purposes TB adoption of WI (2023-06-09) CYBER CybersecuritydeviceOPTICALTSS&TP cyber https://portal.etsi.org/webapp/WorkProgram/Report_WorkItem.asp?WKI_ID=68553

DTS/CYBER-00117 Cyber Security (CYBER); ONDS Protection profile - Test casesONDS - Protection Profile - Test cases TB adoption of WI (2023-06-14) CYBER CybersecurityEvaluationTESTING cyber https://portal.etsi.org/webapp/WorkProgram/Report_WorkItem.asp?WKI_ID=68554

DTR/CYBER-00118 Cyber Security (CYBER); The vulnerability disclosure ecosystemVulnerability Disclosure Ecosystem Early draft (2023-08-09) CYBER Cybersecurityresilience cyber https://portal.etsi.org/webapp/WorkProgram/Report_WorkItem.asp?WKI_ID=68614

PWI_RIS_2308_v1 Reconfigurable Intelligent Surfaces (RIS); Security and Privacy challenges, and potential recommendations WI noted by TB (2023-06-19) RIS Cyber SecurityRADIO cyber https://portal.etsi.org/webapp/WorkProgram/Report_WorkItem.asp?WKI_ID=68580

DTR/CYBER-00115 Cyber Security (CYBER); Privileged Access Workstation GuidancePrivileged Access Workstation Guidance TB adoption of WI (2023-06-09) CYBER Cybersecurity cyber https://portal.etsi.org/webapp/WorkProgram/Report_WorkItem.asp?WKI_ID=68592

PWI_CYBERQSC_2303_v1 Quantum-Safe Cryptography (CYBER); A Repeatable Framework for Quantum-safe Migrations WI proposed to WG (2023-08-18) CYBER QSC CybersecurityFrameworkMIGRATIONQuantum Safe Cryptography cyber https://portal.etsi.org/webapp/WorkProgram/Report_WorkItem.asp?WKI_ID=68629

DTS/CYBER-00119 Cyber Security (CYBER); Security Evaluation Standard for IoT Platforms (SESIP) Profile for Secure Consumer IoT DevicesSESIP profile for EN 303 645 TB adoption of WI (2023-07-27) CYBER CybersecurityIoT cyber https://portal.etsi.org/webapp/WorkProgram/Report_WorkItem.asp?WKI_ID=69057

PWI_CYBER_2344_v1 CYBER; Security Aspects for LI and RD InterfacesSecurity Aspects for LI and RD Interfaces WI proposed to TB (2023-08-21) CYBER Cyber SecurityLawful InterceptionRetained Data cyber https://portal.etsi.org/webapp/WorkProgram/Report_WorkItem.asp?WKI_ID=69118

PWI_CYBERQSC_2305_v1 Quantum-Safe Cryptography (CYBER); QSC Protocol InventoryQSC Protocol Inventory WI proposed to WG (2023-08-22) CYBER QSC Cyber SecurityQuantum Safe Cryptography cyber https://portal.etsi.org/webapp/WorkProgram/Report_WorkItem.asp?WKI_ID=69122

DTR/CYBER-0070 Early draft (2021-10-08) CYBER Cyber SecurityRADIO radio https://portal.etsi.org/webapp/WorkProgram/Report_WorkItem.asp?WKI_ID=63021

PWI_RIS_2308_v1 Reconfigurable Intelligent Surfaces (RIS); Security and Privacy challenges, and potential recommendations WI noted by TB (2023-06-19) RIS Cyber SecurityRADIO radio https://portal.etsi.org/webapp/WorkProgram/Report_WorkItem.asp?WKI_ID=68580

DTR/CYBER-0067 TB adoption of WI (2021-04-07) CYBER CybersecurityIoTThreat Analysis IoT https://portal.etsi.org/webapp/WorkProgram/Report_WorkItem.asp?WKI_ID=62613

DGR/IPE-003 Early draft (2021-12-07) IPE CybersecurityDNSIoTIPv6SECURITY IoT https://portal.etsi.org/webapp/WorkProgram/Report_WorkItem.asp?WKI_ID=62482

DGR/IPE-004 Final draft for approval (2023-01-16) IPE ANCLOUDCore NetworkCustomer Premises NetworksCybersecurityData CentresINTERWORKINGIoTIPIPv4IPv6LANMANManufacturingNAT64SDNSMEWANWLAN IoT https://portal.etsi.org/webapp/WorkProgram/Report_WorkItem.asp?WKI_ID=62483

PWI_CYBER_2237_v1 CYBER; Cyber Security for Consumer Internet of Things: Baseline Requirements WI noted by TB (2022-08-29) CYBER CybersecurityIoTprivacy IoT https://portal.etsi.org/webapp/WorkProgram/Report_WorkItem.asp?WKI_ID=66916

RTS/CYBER-0090 CYBER; Cyber Security for Consumer Internet of Things: Baseline Requirements Start of work (2022-09-12) CYBER CybersecurityIoTprivacy IoT https://portal.etsi.org/webapp/WorkProgram/Report_WorkItem.asp?WKI_ID=66926

DTS/CYBER-0095 Cyber Security (CYBER); Cyber Security for Consumer Internet of Things; Requirements for Smart Voice-Controlled Devices Stable draft (2023-07-17) CYBER Cyber SecurityIoTprivacy IoT https://portal.etsi.org/webapp/WorkProgram/Report_WorkItem.asp?WKI_ID=67020

DTS/CYBER-00119 Cyber Security (CYBER); Security Evaluation Standard for IoT Platforms (SESIP) Profile for Secure Consumer IoT DevicesSESIP profile for EN 303 645 TB adoption of WI (2023-07-27) CYBER CybersecurityIoT IoT https://portal.etsi.org/webapp/WorkProgram/Report_WorkItem.asp?WKI_ID=69057

DGR/QKD-019_AUTH Quantum Key Distribution (QKD); Design of QKD interfaces with Authentication Stable draft (2023-08-01) QKD authenticationCybersecurityquantum cryptographyQuantum Key DistributionSession Initiation Protocol Cyber https://portal.etsi.org/webapp/WorkProgram/Report_WorkItem.asp?WKI_ID=61394

DTS/ESI-001194115 ESI Policy and security requirements for Trust Service Providers issuing certificates; Part 5: Policy Requirements for trust service providers issuing website authentication certificatesPart 5: Policy Requirements for trust service providers issuing webs Early draft (2020-10-26) ESI Cyber Securitytrust services Cyber https://portal.etsi.org/webapp/WorkProgram/Report_WorkItem.asp?WKI_ID=61442

RTS/ESI-00119612329 ESI Sector Specific Requirements; Qualified Certificate Profiles and TSP Policy Requirements for open bankingQualified Certificate Profiles and TSP Policy Requirements for open banking TB adoption of WI (2020-10-02) ESI Cyber Securitytrust services Cyber https://portal.etsi.org/webapp/WorkProgram/Report_WorkItem.asp?WKI_ID=61444

DTR/CYBER-0067 TB adoption of WI (2021-04-07) CYBER CybersecurityIoTThreat Analysis Cyber https://portal.etsi.org/webapp/WorkProgram/Report_WorkItem.asp?WKI_ID=62613

DTR/CYBER-0070 Early draft (2021-10-08) CYBER Cyber SecurityRADIO Cyber https://portal.etsi.org/webapp/WorkProgram/Report_WorkItem.asp?WKI_ID=63021

DGR/IPE-003 Early draft (2021-12-07) IPE CybersecurityDNSIoTIPv6SECURITY Cyber https://portal.etsi.org/webapp/WorkProgram/Report_WorkItem.asp?WKI_ID=62482

DGR/IPE-004 Final draft for approval (2023-01-16) IPE ANCLOUDCore NetworkCustomer Premises NetworksCybersecurityData CentresINTERWORKINGIoTIPIPv4IPv6LANMANManufacturingNAT64SDNSMEWANWLAN Cyber https://portal.etsi.org/webapp/WorkProgram/Report_WorkItem.asp?WKI_ID=62483

DTR/INT-00900 Stable draft (2022-09-14) INT AFI 5GAutonomic NetworkingCyber SecuritySECURITYSecurity by defaultSelf-Management Cyber https://portal.etsi.org/webapp/WorkProgram/Report_WorkItem.asp?WKI_ID=63106

DTR/INT-009001 Stable draft (2022-07-30) INT AFI 5Gartificial intelligenceAutonomic NetworkingCyber SecurityEnhanced Mobile BroadbandIPv6SECURITYSelf-Management Cyber https://portal.etsi.org/webapp/WorkProgram/Report_WorkItem.asp?WKI_ID=63527

DGR/SAI-0010 Final draft for approval (2023-08-25) SAI artificial intelligenceCyber Security Cyber https://portal.etsi.org/webapp/WorkProgram/Report_WorkItem.asp?WKI_ID=63960

DTS/CYBER-0081 Stable draft (2023-05-22) CYBER Cybersecurityrouter Cyber https://portal.etsi.org/webapp/WorkProgram/Report_WorkItem.asp?WKI_ID=64275

DTR/CYBER-QSC-0021 Stable draft (2023-05-23) CYBER QSC CybersecurityHYBRIDQuantum Safe Cryptography Cyber https://portal.etsi.org/webapp/WorkProgram/Report_WorkItem.asp?WKI_ID=64284

DTS/CYBER-0083-2 CYBER; Consumer Mobile Device; Part 2: Biometric Authentication Protection Profile Module Stable draft (2023-07-21) CYBER CybersecurityMOBILEprivacyTERMINAL Cyber https://portal.etsi.org/webapp/WorkProgram/Report_WorkItem.asp?WKI_ID=67439

DTS/CYBER-0083-3 CYBER; Consumer Mobile Device; Part 3: Multi-user Protection Profile Module TB approval (2023-03-29) CYBER CybersecurityMOBILEprivacyTERMINAL Cyber https://portal.etsi.org/webapp/WorkProgram/Report_WorkItem.asp?WKI_ID=67440

DTR/CYBER-QSC-0022 Start of work (2022-07-19) CYBER QSC Cyber SecurityQuantum Safe Cryptography Cyber https://portal.etsi.org/webapp/WorkProgram/Report_WorkItem.asp?WKI_ID=64860

RTS/CYBER-0083-1 CYBER; Consumer Mobile Device; Part 1: Base Protection Profile Stable draft (2023-07-21) CYBER CybersecurityMOBILEprivacyTERMINAL Cyber https://portal.etsi.org/webapp/WorkProgram/Report_WorkItem.asp?WKI_ID=65551

DGS/NFV-IFA033ed451 Network Functions Virtualisation (NFV) Release 4; Management and Orchestration; Reference points related to Security Management and Certificate Management Functions - Interface and Information Model Specification Final draft for approval (2023-08-11) NFV IFA Cyber SecurityINTERFACEMANAGEMENTMANONFVorchestrationSECURITYVirtualisation Cyber https://portal.etsi.org/webapp/WorkProgram/Report_WorkItem.asp?WKI_ID=66417

DTR/CYBER-0087 Cyber Security (CYBER); Open Security Controls Assessment Language Use Guidelines Stable draft (2023-03-04) CYBER Cybersecurity Cyber https://portal.etsi.org/webapp/WorkProgram/Report_WorkItem.asp?WKI_ID=66528

RTS/CYBER-0089 CYBER; Consumer Mobile Device Protection Profile Stable draft (2022-09-14) CYBER CybersecurityMOBILEprivacyTERMINAL Cyber https://portal.etsi.org/webapp/WorkProgram/Report_WorkItem.asp?WKI_ID=66855

PWI_CYBER_2237_v1 CYBER; Cyber Security for Consumer Internet of Things: Baseline Requirements WI noted by TB (2022-08-29) CYBER CybersecurityIoTprivacy Cyber https://portal.etsi.org/webapp/WorkProgram/Report_WorkItem.asp?WKI_ID=66916

RTS/CYBER-0090 CYBER; Cyber Security for Consumer Internet of Things: Baseline Requirements Start of work (2022-09-12) CYBER CybersecurityIoTprivacy Cyber https://portal.etsi.org/webapp/WorkProgram/Report_WorkItem.asp?WKI_ID=66926

DTS/CYBER-0095 Cyber Security (CYBER); Cyber Security for Consumer Internet of Things; Requirements for Smart Voice-Controlled Devices Stable draft (2023-07-17) CYBER Cyber SecurityIoTprivacy Cyber https://portal.etsi.org/webapp/WorkProgram/Report_WorkItem.asp?WKI_ID=67020

DTS/CYBER-0092 Optical Network and Device Security Access Network Device Security Requirements TB approval (2023-06-01) CYBER CybersecurityOptical Access NetworkSecurity requirements Cyber https://portal.etsi.org/webapp/WorkProgram/Report_WorkItem.asp?WKI_ID=67082

DTS/CYBER-0097-1 CYBER; Consumer Mobile Devices Base PP-Configuration; Part 1: CMD and Biometric Verification Stable draft (2023-07-21) CYBER CybersecurityMOBILEprivacyTERMINAL Cyber https://portal.etsi.org/webapp/WorkProgram/Report_WorkItem.asp?WKI_ID=67441

DTR/CYBER-00105 Cyber Security (CYBER); Studey the Implementation of the Critical Entities Resilience Directive Early draft (2023-05-18) CYBER Cybersecurityresiliencerisk management Cyber https://portal.etsi.org/webapp/WorkProgram/Report_WorkItem.asp?WKI_ID=67972

DTR/ESI-0019411-7 Electronic Signatures and Infrastructures (ESI); Policy and security requirements for Trust Service Providers issuing certificates; Part 7 Security Considerations on use of QWACsSecurity Considerations on use of QWACs TB adoption of WI (2023-05-05) ESI CybersecurityINTERNETtrust services Cyber https://portal.etsi.org/webapp/WorkProgram/Report_WorkItem.asp?WKI_ID=68492

DTS/CYBER-00113 Cyber Security (CYBER); Conversion of TR on "Implementation of the Revised Network and Information Security (NIS2) Directive" into a TSReview of TR 103 866 to create a related Technical Specification. Early draft (2023-07-18) CYBER Cyber SecurityCyber-defenceCybersecurity Cyber https://portal.etsi.org/webapp/WorkProgram/Report_WorkItem.asp?WKI_ID=68504

DTS/CYBER-00114 Cyber Security (CYBER); ONDS Test Suite Structure and Test PurposesONDS Test Suite Structure and Test Purposes TB adoption of WI (2023-06-09) CYBER CybersecuritydeviceOPTICALTSS&TP Cyber https://portal.etsi.org/webapp/WorkProgram/Report_WorkItem.asp?WKI_ID=68553

DTS/CYBER-00117 Cyber Security (CYBER); ONDS Protection profile - Test casesONDS - Protection Profile - Test cases TB adoption of WI (2023-06-14) CYBER CybersecurityEvaluationTESTING Cyber https://portal.etsi.org/webapp/WorkProgram/Report_WorkItem.asp?WKI_ID=68554

DTR/CYBER-00118 Cyber Security (CYBER); The vulnerability disclosure ecosystemVulnerability Disclosure Ecosystem Early draft (2023-08-09) CYBER Cybersecurityresilience Cyber https://portal.etsi.org/webapp/WorkProgram/Report_WorkItem.asp?WKI_ID=68614

PWI_RIS_2308_v1 Reconfigurable Intelligent Surfaces (RIS); Security and Privacy challenges, and potential recommendations WI noted by TB (2023-06-19) RIS Cyber SecurityRADIO Cyber https://portal.etsi.org/webapp/WorkProgram/Report_WorkItem.asp?WKI_ID=68580

DTR/CYBER-00115 Cyber Security (CYBER); Privileged Access Workstation GuidancePrivileged Access Workstation Guidance TB adoption of WI (2023-06-09) CYBER Cybersecurity Cyber https://portal.etsi.org/webapp/WorkProgram/Report_WorkItem.asp?WKI_ID=68592

PWI_CYBERQSC_2303_v1 Quantum-Safe Cryptography (CYBER); A Repeatable Framework for Quantum-safe Migrations WI proposed to WG (2023-08-18) CYBER QSC CybersecurityFrameworkMIGRATIONQuantum Safe Cryptography Cyber https://portal.etsi.org/webapp/WorkProgram/Report_WorkItem.asp?WKI_ID=68629

DTS/CYBER-00119 Cyber Security (CYBER); Security Evaluation Standard for IoT Platforms (SESIP) Profile for Secure Consumer IoT DevicesSESIP profile for EN 303 645 TB adoption of WI (2023-07-27) CYBER CybersecurityIoT Cyber https://portal.etsi.org/webapp/WorkProgram/Report_WorkItem.asp?WKI_ID=69057

PWI_CYBER_2344_v1 CYBER; Security Aspects for LI and RD InterfacesSecurity Aspects for LI and RD Interfaces WI proposed to TB (2023-08-21) CYBER Cyber SecurityLawful InterceptionRetained Data Cyber https://portal.etsi.org/webapp/WorkProgram/Report_WorkItem.asp?WKI_ID=69118

PWI_CYBERQSC_2305_v1 Quantum-Safe Cryptography (CYBER); QSC Protocol InventoryQSC Protocol Inventory WI proposed to WG (2023-08-22) CYBER QSC Cyber SecurityQuantum Safe Cryptography Cyber https://portal.etsi.org/webapp/WorkProgram/Report_WorkItem.asp?WKI_ID=69122