Cybersecurity

Related standards or drafts

Three-level approach for a set of cybersecurity requirements for cloud services

60.60 Standard published

CEN/CLC/JTC 13

Three-level approach for a set of cybersecurity requirements for cloud services

60.60 Standard published

CEN/CLC/JTC 13

Railway applications - Cybersecurity

60.60 Standard published

CLC/TC 9X
CEN/CENELEC

Fixed-time cybersecurity evaluation methodology for ICT products

60.60 Standard published

CEN/CLC/JTC 13
CEN/CENELEC

Fixed-time cybersecurity evaluation methodology for ICT products

60.60 Standard published

CEN/CLC/JTC 13
CEN/CENELEC

Security Evaluation Standard for IoT Platforms (SESIP). An effective methodology for applying cybersecurity assessment and re-use for connected products.

60.60 Standard published

CEN/CLC/JTC 13
CEN/CENELEC

Security Evaluation Standard for IoT Platforms (SESIP). An effective methodology for applying cybersecurity assessment and re-use for connected products.

60.60 Standard published

CEN/CLC/JTC 13

Nuclear power plants - Instrumentation, control and electrical power systems - Cybersecurity requirements

60.60 Standard published

CLC/TC 45AX

Nuclear power plants - Instrumentation and control systems - Requirements for coordinating safety and cybersecurity

60.60 Standard published

CLC/TC 45AX

Maritime navigation and radiocommunication equipment and systems - Cybersecurity - General requirements, methods of testing and required test results

60.60 Standard published

CLC/SR 80

Information security, cybersecurity and privacy protection - Evaluation criteria for IT security - Part 1: Introduction and general model (ISO/IEC 15408-1:2022)

60.60 Standard published

CEN/CLC/JTC 13

Information security, cybersecurity and privacy protection - Evaluation criteria for IT security - Part 1: Introduction and general model (ISO/IEC 15408-1:2022)

60.60 Standard published

CEN/CLC/JTC 13

Information security, cybersecurity and privacy protection - Evaluation criteria for IT security - Part 2: Security functional components (ISO/IEC 15408-2:2022)

60.60 Standard published

CEN/CLC/JTC 13

Information security, cybersecurity and privacy protection - Evaluation criteria for IT security - Part 2: Security functional components (ISO/IEC 15408-2:2022)

60.60 Standard published

CEN/CLC/JTC 13

Information security, cybersecurity and privacy protection - Evaluation criteria for IT security - Part 3: Security assurance components (ISO/IEC 15408-3:2022)

60.60 Standard published

CEN/CLC/JTC 13

Information security, cybersecurity and privacy protection - Evaluation criteria for IT security - Part 3: Security assurance components (ISO/IEC 15408-3:2022)

60.60 Standard published

CEN/CLC/JTC 13

Information security, cybersecurity and privacy protection - Evaluation criteria for IT security - Part 4: Framework for the specification of evaluation methods and activities (ISO/IEC 15408-4:2022)

60.60 Standard published

CEN/CLC/JTC 13

Information security, cybersecurity and privacy protection - Evaluation criteria for IT security - Part 4: Framework for the specification of evaluation methods and activities (ISO/IEC 15408-4:2022)

60.60 Standard published

CEN/CLC/JTC 13

Information security, cybersecurity and privacy protection - Evaluation criteria for IT security - Part 5: Pre-defined packages of security requirements (ISO/IEC 15408-5:2022)

60.60 Standard published

CEN/CLC/JTC 13

Information security, cybersecurity and privacy protection - Evaluation criteria for IT security - Part 5: Pre-defined packages of security requirements (ISO/IEC 15408-5:2022)

60.60 Standard published

CEN/CLC/JTC 13

Information security, cybersecurity and privacy protection - Evaluation criteria for IT security - Methodology for IT security evaluation (ISO/IEC 18045:2022)

60.60 Standard published

CEN/CLC/JTC 13

Information security, cybersecurity and privacy protection - Evaluation criteria for IT security - Methodology for IT security evaluation (ISO/IEC 18045:2022)

60.60 Standard published

CEN/CLC/JTC 13

Information security, cybersecurity and privacy protection - Information security management systems - Requirements (ISO/IEC 27001:2022)

60.60 Standard published

CEN/CLC/JTC 13

Information security, cybersecurity and privacy protection - Information security management systems - Requirements (ISO/IEC 27001:2022)

60.60 Standard published

CEN/CLC/JTC 13

Information security, cybersecurity and privacy protection - Information security controls (ISO/IEC 27002:2022)

60.60 Standard published

CEN/CLC/JTC 13

Information security, cybersecurity and privacy protection - Information security controls (ISO/IEC 27002:2022)

60.60 Standard published

CEN/CLC/JTC 13

Information security, cybersecurity and privacy protection - Requirements for bodies providing audit and certification of information security management systems - Part 1: General (ISO/IEC 27006-1:2024)

60.60 Standard published

CEN/CLC/JTC 13

Information security, cybersecurity and privacy protection - Requirements for bodies providing audit and certification of information security management systems - Part 1: General (ISO/IEC 27006-1:2024)

60.60 Standard published

CEN/CLC/JTC 13

Information security, cybersecurity and privacy protection - Guidelines for information security management systems auditing (ISO/IEC 27007:2020)

60.60 Standard published

CEN/CLC/JTC 13

Information security, cybersecurity and privacy protection - Guidelines for information security management systems auditing (ISO/IEC 27007:2020)

60.60 Standard published

CEN/CLC/JTC 13

Health informatics - Device interoperability - Part 40101: Foundational - Cybersecurity - Processes for vulnerability assessment (ISO/IEEE 11073-40101:2022)

60.60 Standard published

CEN/TC 251

Health informatics - Device interoperability - Part 40102: Foundational - Cybersecurity - Capabilities for mitigation (ISO/IEEE 11073-40102:2022)

60.60 Standard published

CEN/TC 251

Nuclear power plants - Instrumentation, control and electrical power systems - Cybersecurity requirements

60.60 Standard published

TC 45/SC 45A

Amendment 1 - Nuclear power plants - Instrumentation and control systems - Requirements for coordinating safety and cybersecurity

60.60 Standard published

TC 45/SC 45A

Nuclear power plants - Instrumentation and control systems - Requirements for coordinating safety and cybersecurity

60.60 Standard published

TC 45/SC 45A

Maritime navigation and radiocommunication equipment and systems - Cybersecurity - General requirements, methods of testing and required test results

60.60 Standard published

TC 80

Industrial-process measurement, control and automation - Smart manufacturing - Part 3: Challenges for cybersecurity

60.60 Standard published

TC 65

Power systems management and associated information exchange - Data and communication security - Part 100-4: Cybersecurity conformance testing for IEC 62351-4

60.60 Standard published

TC 57

Power systems management and associated information exchange - Data and communication security - Part 100-6: Cybersecurity conformance testing for IEC 61850-8-1 and IEC 61850-9-2

60.60 Standard published

TC 57

Cybersecurity aspects of devices used for power metering and monitoring, power quality monitoring, data collection and analysis

60.60 Standard published

TC 85

Electrical requirements for lifts, escalators and moving walks — Part 20: Cybersecurity

60.60 Standard published

ISO/TC 178

Information security, cybersecurity and privacy protection — Evaluation criteria for IT security — Part 1: Introduction and general model

90.92 Standard to be revised

ISO/IEC JTC 1/SC 27

Information security, cybersecurity and privacy protection — Evaluation criteria for IT security — Part 2: Security functional components

90.92 Standard to be revised

ISO/IEC JTC 1/SC 27

Information security, cybersecurity and privacy protection — Evaluation criteria for IT security — Part 3: Security assurance components

90.92 Standard to be revised

ISO/IEC JTC 1/SC 27

Information security, cybersecurity and privacy protection — Evaluation criteria for IT security — Part 4: Framework for the specification of evaluation methods and activities

90.92 Standard to be revised

ISO/IEC JTC 1/SC 27

Information security, cybersecurity and privacy protection — Evaluation criteria for IT security — Part 5: Pre-defined packages of security requirements

90.92 Standard to be revised

ISO/IEC JTC 1/SC 27

Information security, cybersecurity and privacy protection — Evaluation criteria for IT security — Methodology for IT security evaluation

90.92 Standard to be revised

ISO/IEC JTC 1/SC 27

Information security, cybersecurity and privacy protection — Physically unclonable functions — Part 1: Security requirements

60.60 Standard published

ISO/IEC JTC 1/SC 27

Information security, cybersecurity and privacy protection — Physically unclonable functions — Part 2: Test and evaluation methods

60.60 Standard published

ISO/IEC JTC 1/SC 27

Cybersecurity — Security reference model for industrial internet platform (SRM- IIP)

60.60 Standard published

ISO/IEC JTC 1/SC 27

Information security, cybersecurity and privacy protection — Biometric information protection

60.60 Standard published

ISO/IEC JTC 1/SC 27

Information security, cybersecurity and privacy protection — Information security management systems — Requirements

60.60 Standard published

ISO/IEC JTC 1/SC 27

Information security, cybersecurity and privacy protection — Information security management systems — Requirements — Amendment 1: Climate action changes

60.60 Standard published

ISO/IEC JTC 1/SC 27

Information security, cybersecurity and privacy protection — Information security controls

60.60 Standard published

ISO/IEC JTC 1/SC 27

Information security, cybersecurity and privacy protection — Guidance on managing information security risks

60.60 Standard published

ISO/IEC JTC 1/SC 27

Information security, cybersecurity and privacy protection — Requirements for bodies providing audit and certification of information security management systems — Part 1: General

90.92 Standard to be revised

ISO/IEC JTC 1/SC 27

Information security, cybersecurity and privacy protection — Guidelines for information security management systems auditing

60.60 Standard published

ISO/IEC JTC 1/SC 27

Information security, cybersecurity and privacy protection — Information security controls based on ISO/IEC 27002 for telecommunications organizations

60.60 Standard published

ISO/IEC JTC 1/SC 27

Information security, cybersecurity and privacy protection — Guidance on the integrated implementation of ISO/IEC 27001 and ISO/IEC 20000-1

60.60 Standard published

ISO/IEC JTC 1/SC 27

Information security, cybersecurity and privacy protection — Governance of information security

60.60 Standard published

ISO/IEC JTC 1/SC 27

Cybersecurity — Guidelines for Internet security

60.60 Standard published

ISO/IEC JTC 1/SC 27

Cybersecurity — Supplier relationships — Part 1: Overview and concepts

60.60 Standard published

ISO/IEC JTC 1/SC 27

Cybersecurity — Supplier relationships — Part 2: Requirements

60.60 Standard published

ISO/IEC JTC 1/SC 27

Cybersecurity — Supplier relationships — Part 3: Guidelines for hardware, software, and services supply chain security

60.60 Standard published

ISO/IEC JTC 1/SC 27

Cybersecurity — Security recommendations for establishing trusted connections between devices and services

60.60 Standard published

ISO/IEC JTC 1/SC 27

Cybersecurity — IoT security and privacy — Guidelines

60.60 Standard published

ISO/IEC JTC 1/SC 27

Cybersecurity — IoT security and privacy — Device baseline requirements

60.60 Standard published

ISO/IEC JTC 1/SC 27

Information security, cybersecurity and privacy protection — Requirements for attribute-based unlinkable entity authentication

60.60 Standard published

ISO/IEC JTC 1/SC 27

Information security, cybersecurity and privacy protection — Security and privacy requirements for authentication using biometrics on mobile devices — Part 1: Local modes

60.60 Standard published

ISO/IEC JTC 1/SC 27

Information security, cybersecurity and privacy protection — Guidelines on personally identifiable information deletion

60.60 Standard published

ISO/IEC JTC 1/SC 27

Information security, cybersecurity and privacy protection — User-centric privacy preferences management framework

60.60 Standard published

ISO/IEC JTC 1/SC 27

Information security, cybersecurity and privacy protection — Application of ISO 31000:2018 for organizational privacy risk management

60.60 Standard published

ISO/IEC JTC 1/SC 27

Information security, cybersecurity and privacy protection – Privacy enhancing data de-identification framework

60.60 Standard published

ISO/IEC JTC 1/SC 27

Information security, cybersecurity and privacy protection — Privacy operationalisation model and method for engineering (POMME)

60.60 Standard published

ISO/IEC JTC 1/SC 27

Information security, cybersecurity and privacy protection — Verification of cryptographic protocols — Part 1: Framework

60.60 Standard published

ISO/IEC JTC 1/SC 27

Information security, cybersecurity and privacy protection — New concepts and changes in ISO/IEC 15408:2022 and ISO/IEC 18045:2022

60.60 Standard published

ISO/IEC JTC 1/SC 27

Information security, cybersecurity and privacy protection — Security techniques — Security properties and best practices for test and evaluation of white box cryptography

60.60 Standard published

ISO/IEC JTC 1/SC 27

Information technology — Security techniques — Cybersecurity and ISO and IEC Standards

90.92 Standard to be revised

ISO/IEC JTC 1/SC 27

Information security, cybersecurity and privacy protection — Hardware monitoring technology for hardware security assessment

60.60 Standard published

ISO/IEC JTC 1/SC 27

Cybersecurity — Multi-party coordinated vulnerability disclosure and handling

60.60 Standard published

ISO/IEC JTC 1/SC 27

Cybersecurity — Security considerations throughout the product life cycle

60.60 Standard published

ISO/IEC JTC 1/SC 27

Information security, cybersecurity and privacy protection — Requirements for the competence of IT security testing and evaluation laboratories — Part 1: Evaluation for ISO/IEC 15408

60.60 Standard published

ISO/IEC JTC 1/SC 27

Information security, cybersecurity and privacy protection — Requirements for the competence of IT security testing and evaluation laboratories — Part 2: Testing for ISO/IEC 19790

60.60 Standard published

ISO/IEC JTC 1/SC 27

Information security, cybersecurity and privacy protection — Ontology building blocks for security and risk assessment

60.60 Standard published

ISO/IEC JTC 1/SC 27

Information technology — Cybersecurity — Overview and concepts

90.60 Close of review

ISO/IEC JTC 1/SC 27

Information technology, cybersecurity and privacy protection — Cybersecurity framework development guidelines

90.20 Standard under periodical review

ISO/IEC JTC 1/SC 27

Information security, cybersecurity and privacy protection — Evaluation criteria for IT security — Patch Management Extension for the ISO/IEC 15408 series and ISO/IEC 18045

60.60 Standard published

ISO/IEC JTC 1/SC 27

Health informatics — Device interoperability — Part 40101: Foundational — Cybersecurity — Processes for vulnerability assessment

60.60 Standard published

ISO/TC 215

Health informatics — Device interoperability — Part 40102: Foundational — Cybersecurity — Capabilities for mitigation

60.60 Standard published

ISO/TC 215

Road vehicles — Guidelines for auditing cybersecurity engineering

60.60 Standard published

ISO/TC 22/SC 32

Road vehicles — Cybersecurity engineering

60.60 Standard published

ISO/TC 22/SC 32

Road vehicles — Safety and cybersecurity for automated driving systems — Design, verification and validation

90.92 Standard to be revised

ISO/TC 22