Standards Watch

  • Home
  • Standards Watch

Click on the interactive map below or utilise the filtering interface on the side to browse the items that are currently in our Standards Watch*.

IT_general it_security software networking cloud computing other iot big data ai cybersecurity data tecnologies iso iec 27005 5g communications iso iec etsi osi it terminal application information computer grafics information coding office machine interface interconnection equipment languages used in it microprocessor system data storage services

The Standards Watch of StandICT.eu monitors the status of ICT standards at international level, starting from the five priority areas of the Digital Single Market:

  • 5G communications,
  • cloud computing,
  • cybersecurity,
  • data technology, and
  • IoT – Internet of Things.

In particular, special attention is given to the rapidly evolving ICT topics of:

  • Artificial Intelligence,
  • Big Data,
  • IoT.
Gradually, the Standards Watch will be expanded to other ICT domains and topics, with the aim of better identifying gaps, needs & opportunities and consequently stimulating European Experts to pursue the openings granted by the StandICT.eu initiative.

ISO/IEC JTC 1/SC 27 27043:2015 - Incident investigation principles and processes

This International Standard provides guidelines based on idealized models for common incident investigation processes across various incident investigation scenarios involving digital evidence. This includes processes from pre-incident preparation through investigation closure, as well as any general advice and caveats on such processes.


Available in the insights page:

Go to the insights page

ISO/IEC JTC 1/SC 27 27042:2015 - Guidelines for the analysis and interpretation of digital evidence

This International Standard provides guidance on the conduct of the analysis and interpretation of potential digital evidence in order to identify and evaluate digital evidence which can be used to aid understanding of an incident. The exact nature of the data and information making up the potential digital evidence will depend on the nature of the incident and the digital evidence sources involved in that incident.


Available in the insights page:

Go to the insights page

ISO/IEC JTC 1/SC 27 27041:2015 - Guidance on assuring suitability and adequacy of incident investigative method

This International Standard provides guidance on mechanisms for ensuring that methods and processes used in the investigation of information security incidents are “fit for purpose”. It encapsulates best practice on defining requirements, describing methods, and providing evidence that implementations of methods can be shown to satisfy requirements.


Available in the insights page:

Go to the insights page

ISO/IEC JTC 1/SC 27 27038:2014 - Specification for digital redaction

Some documents can contain information that must not be disclosed to some communities. Modified documents can be released to these communities after an appropriate processing of the original document. This process is called the “redaction” of the document.


Available in the insights page:

Go to the insights page

ISO/IEC JTC 1/SC 27 27037:2012 Guidelines for identification, collection, acquisition and preservation of digital evidence

This International Standard provides guidelines for specific activities in handling digital evidence, which are identification, collection, acquisition and preservation of digital evidence that may be of evidential value.

Source:    https://www.iso.org/obp/ui/#iso:std:iso-iec:27037:ed-1:v1:en


Available in the insights page:

Go to the insights page

ISO/IEC JTC 1/SC 27 27002:2013 - Code of practice for information security controls

This International Standard gives guidelines for organizational information security standards and information security management practices including the selection, implementation and management of controls taking into consideration the organization’s information security risk environment(s).


Available in the insights page:

Go to the insights page

ISO/IEC JTC 1/SC 27/WG 1 27001:2013 - Information security management systems - Requirements

 

This International Standard specifies the requirements for establishing, implementing, maintaining and continually improving an information security management system within the context of the organization. This International Standard also includes requirements for the assessment and treatment of information security risks tailored to the needs of the organization.


Available in the insights page:

Go to the insights page

ISO/IEC JTC 1/SC 27/WG1 27000:2018 - Information security management systems - Overview and vocabulary

This document provides the overview of information security management systems (ISMS). It also provides terms and definitions commonly used in the ISMS family of standards.

Source: https://www.iso.org/obp/ui/#iso:std:iso-iec:27000:ed-5:v1:en


Available in the insights page:

Go to the insights page

ISO/IEC JTC 1/SC 27 13888-1:2009 - Non-repudiation - Part 1: General

The goal of a non-repudiation service is to generate, collect, maintain, make available and verify evi­dence concerning a claimed event or action in order to re­solve dis­putes about the occurrence or non occurrence of the event or action. 
Non-repudiation services establish evidence; evidence es­tablishes accountability regarding a particular event or action. The entity responsible for the action, or associated with the event, with regard to which evi­dence is generated, is known as the evidence subject.


Available in the insights page:

Go to the insights page

ISO/IEC JTC 1/SC 27 11770-6:2016 - Key management - Part 6: Key derivation

This document specifies key derivation functions, i.e. functions which take secret information and other (public) parameters as input and output one or more “derived” secret keys.

Source: https://www.iso.org/obp/ui/#iso:std:iso-iec:11770:-6:ed-1:v1:en


Available in the insights page:

Go to the insights page

Pages