Postal services – Safe, secured and contactless delivery of postal items
60.60 Standard published
Postal Services - Hybrid Mail - Part 1: Secured electronic postal services (SePS) interface specification - Concepts, schemas and operations
90.93 Standard confirmed
Postal Services - Hybrid Mail - Part 2: Secured electronic postal services (SePS) interface specification - EPCM Service
90.93 Standard confirmed
Electronic fee collection - Secure monitoring for autonomous toll systems - Part 1: Compliance checking
90.60 Close of review
Electronic fee collection - Secure monitoring for autonomous toll systems - Part 2: Trusted recorder
90.60 Close of review
Personal identification - Secure and interoperable European Breeder Documents - Part 1: Framework overview
90.60 Close of review
Secure and interoperable European Breeder Documents — Part 2: Data model
60.60 Standard published
Secure storage units - Classification and methods of test for resistance to fire - Part 1: Data cabinets and data inserts
90.20 Standard under periodical review
Secure storage units - Classification and methods of test for resistance to fire - Part 2: Data rooms and data container
90.60 Close of review
Secure storage units - Requirements, classification and methods of test for resistance to burglary - Part 1: Safes, ATM safes, strongroom doors and strongrooms
90.60 Close of review
Secure storage units - Requirements, classification and methods of tests for resistance to burglary - Part 2: Deposit systems
60.60 Standard published
Health informatics - Secure User Identification for Health Care - Management and Security of Authentication by Passwords
90.93 Standard confirmed
Secure storage units - Classification for high security locks according to their resistance to unauthorized opening
60.60 Standard published
Secure storage units - Requirements, classification and methods of test for resistance to burglary - Secure cabinets
60.60 Standard published
Secure storage units - Classification and methods of test for resistance to fire - Light fire storage units
90.20 Standard under periodical review
Secure destruction of confidential and sensitive material - Code of practice
60.60 Standard published
Secure storage units - Classification for high security locks according to their resistance to unauthorized opening - Distributed systems
60.60 Standard published
Protection profiles for secure signature creation device - Part 1: Overview
90.93 Standard confirmed
Protection profiles for secure signature creation device - Part 2: Device with key generation
90.60 Close of review
Protection profiles for secure signature creation device - Part 3: Device with key import
90.60 Close of review
Protection profiles for secure signature creation device - Part 4: Extension for device with key generation and trusted channel to certificate generation application
90.60 Close of review
Protection profiles for secure signature creation device - Part 5: Extension for device with key generation and trusted channel to signature creation application
90.60 Close of review
Protection profiles for secure signature creation device - Part 6: Extension for device with key import and trusted channel to signature creation application
90.93 Standard confirmed
Application Interface for Secure Elements for Electronic Identification, Authentication and Trusted Services - Part 1: Introduction and common definitions
90.93 Standard confirmed
Application Interface for Secure Elements for Electronic Identification, Authentication and Trusted Services - Part 2: Signature and Seal Services
90.60 Close of review
Application Interface for Secure Elements for Electronic Identification, Authentication and Trusted Services - Part 3: Device authentication protocols
90.60 Close of review
Application Interface for Secure Elements for Electronic Identification, Authentication and Trusted Services - Part 4: Privacy specific Protocols
90.93 Standard confirmed
Application Interface for Secure Elements for Electronic Identification, Authentication and Trusted Services - Part 5: Trusted eService
90.93 Standard confirmed
Home and Building Electronic Systems (HBES) - Part 3-4: Secure Application Layer, Secure Service, Secure configuration and security Resources
90.93 Standard confirmed
Home and Building Electronic Systems (HBES) - Part 3-4: Secure Application Layer, Secure Service, Secure configuration and security Resources
60.60 Standard published
Requirements for the provision of secure remote services for fire safety systems and security systems
60.60 Standard published
Requirements for the provision of secure remote services for fire safety systems and security systems
60.60 Standard published
Security for industrial automation and control systems - Part 4-1: Secure product development lifecycle requirements
60.60 Standard published
Intelligent transport systems - ITS station security services for secure session establishment and authentication between trusted devices (ISO 21177:2024)
60.60 Standard published
Automatic vehicle and equipment identification - Electronic Registration Identification (ERI) for vehicles - Part 4: Secure communications using asymmetrical techniques (ISO 24534-4:2010)
60.60 Standard published
Automatic vehicle and equipment identification - Electronic registration identification (ERI) for vehicles - Part 4: Secure communications using asymmetrical techniques - Amendment 1 (ISO 24534-4:2010/Amd 1:2019)
60.60 Standard published
Security for industrial automation and control systems - Part 4-1: Secure product development lifecycle requirements
60.60 Standard published
Maritime navigation and radiocommunication equipment and systems - Data interfaces - Part 2: Secure communication between ship and shore (SECOM)
60.60 Standard published
Power systems management and associated information exchange - Data and communications security - Part 100-3: Conformance test cases for the IEC 62351-3, the secure communication extension for profiles including TCP/IP
60.60 Standard published
Financial services — Secure cryptographic devices (retail) — Part 1: Concepts and requirements
60.60 Standard published
Financial services — Secure cryptographic devices (retail) — Part 2: Security compliance checklists for devices used in financial transactions
60.60 Standard published
Intelligent transport systems — ITS station security services for secure session establishment and authentication between trusted devices
60.60 Standard published
Automatic vehicle and equipment identification — Electronic registration identification (ERI) for vehicles — Part 4: Secure communications using asymmetrical techniques
90.60 Close of review
Automatic vehicle and equipment identification — Electronic registration identification (ERI) for vehicles — Part 4: Secure communications using asymmetrical techniques — Amendment 1
60.60 Standard published
Intelligent transport systems — Automatic vehicle and equipment identification — Electronic Registration Identification (ERI) for vehicles — Part 5: Secure communications using symmetrical techniques
90.60 Close of review
Intelligent transport systems — Automatic vehicle and equipment identification — Electronic Registration Identification (ERI) for vehicles — Part 5: Secure communications using symmetrical techniques — Amendment 1
60.60 Standard published
Electronic data interchange for administration, commerce and transport (EDIFACT) — Application level syntax rules (Syntax version number: 4, Syntax release number: 1) — Part 6: Secure authentication and acknowledgement message (message type - AUTACK)
90.93 Standard confirmed
Information technology — JPEG 2000 image coding system — Part 8: Secure JPEG 2000
60.60 Standard published
Information technology — Home network security — Part 2: Internal security services: Secure Communication Protocol for Middleware (SCPM)
90.93 Standard confirmed
Information technology - Home network security - Part 2: Internal security services - Secure communication protocol for middleware (SCPM)
60.60 Standard published
Information security — Secure multiparty computation — Part 1: General
60.60 Standard published
Information security — Secure multiparty computation — Part 2: Mechanisms based on secret sharing
60.60 Standard published
Information technology — Open systems interconnection directory — Part 11: Protocol specifications for secure operations
60.60 Standard published
Information technology — DevOps — Building reliable and secure systems including application build, package and deployment
60.60 Standard published
Telecommunications and exchange between information technology systems — Requirements for local and metropolitan area networks — Part 1AR: Secure device identity
60.60 Standard published
Information technology — Programming languages, their environments and system software interfaces — C secure coding rules
90.93 Standard confirmed
Information technology — Programming languages, their environments and system software interfaces — C secure coding rules — Technical Corrigendum 1
60.60 Standard published
Information technology — Security techniques — Catalogue of architectural and design principles for secure products, systems and applications
90.93 Standard confirmed
Intelligent transport systems — Communication profiles for secure connections between trusted devices
90.93 Standard confirmed
Intelligent transport systems — Secure interfaces governance — Minimum requirements and governance procedures
60.60 Standard published
Safety, security and sustainability of cannabis facilities and operations — Part 2: Requirements for the secure handling of cannabis and cannabis products
60.60 Standard published