Каталог стандартов

+7 (495) 223-46-76 +7 (812) 309-78-59
inform@normdocs.ru
Корзина
Все разработчики
1 2
Information technology - Security techniques - Information security management systems - Overview and vocabulary (ISO/IEC 27000:2016)
ÖNORM EN 419241-1:2019-03
Действует
Trustworthy Systems Supporting Server Signing - Part 1: General System Security Requirements
ÖNORM EN 419241-2:2019-06
Действует
Trustworthy Systems Supporting Server Signing - Part 2: Protection profile for QSCD for Server Signing
Information technology - Security techniques - Code of practice for information security controls (ISO/IEC 27002:2013 including Cor 1:2014 and Cor 2:2015)
ÖNORM EN 419231:2019-11
Действует
Protection profile for trustworthy systems supporting time stamping
Information technology - Security techniques - Information security management systems - Overview and vocabulary (ISO/IEC 27000:2018)
Information technology - Security techniques - Vulnerability disclosure (ISO/IEC 29147:2018)
Information technology - Security techniques - Vulnerability handling processes (ISO/IEC 30111:2019)
Intelligent transport systems - ITS station security services for secure session establishment and authentication between trusted devices (ISO/TS 21177:2019)
Information technology - Security techniques - Code of practice for protection of personally identifiable information (PII) in public clouds acting as PII processors (ISO/IEC 27018:2019)
Information technology - Security techniques - Security requirements for cryptographic modules (ISO/IEC 19790:2012, Corrected version 2015-12)
Information technology - Security techniques - Privacy framework (ISO/IEC 29100:2011, including Amd 1:2018) (consolidated version)
Information technology - Security techniques - Guidelines for privacy impact assessment (ISO/IEC 29134:2017)
Information technology - Security techniques - Code of practice for Information security controls based on ISO/IEC 27002 for telecommunications organizations (ISO/IEC 27011:2016 + Cor.1:2018)
Information technology - Security techniques - Evaluation criteria for IT security - Part 2: Security functional components (ISO/IEC 15408-2:2008, Corrected version 2011-06)
Information technology - Security techniques - Evaluation criteria for IT security - Part 1: Introduction and general model (ISO/IEC 15408-1:2009, Corrected version 2014-01-15)
Information technology - Security techniques - Methodology for IT security evaluation (ISO/IEC 18045:2008, Corrected version 2014-01-15)
Information technology - Security techniques - Requirements for bodies providing audit and certification of information security management systems (ISO/IEC 27006:2015, including Amd. 1:2020)
Information technology - Security techniques - Evaluation criteria for IT security - Part 3: Security assurance components (ISO/IEC 15408-3:2008, corrected version 2011-06)
Security techniques - Extension to ISO/IEC 27001 and ISO/IEC 27002 for privacy information management - Requirements and guidelines (ISO/IEC 27701:2019)
1 2