Standards Watch

  • Home
  • Standards Watch

Click on the interactive map below or utilise the filtering interface on the side to browse the items that are currently in our Standards Watch*.

IT_general it_security software networking cloud computing other iot big data ai cybersecurity data tecnologies iso iec 27005 5g communications iso iec etsi osi it terminal application information computer grafics information coding office machine interface interconnection equipment languages used in it microprocessor system data storage services

The Standards Watch of StandICT.eu monitors the status of ICT standards at international level, starting from the five priority areas of the Digital Single Market: 5G communications,cloud computing,cybersecurity,data technology, and IoT – Internet of Things.

In particular, special attention is given to the rapidly evolving ICT topics of: Artificial Intelligence, Big Data, IoT. Gradually, the Standards Watch will be expanded to other ICT domains and topics, with the aim of better identifying gaps, needs & opportunities and consequently stimulating European Experts to pursue the openings granted by the StandICT.eu initiative.

ISO 17839-2:2015 defines the following:
- Dimensions of a Biometric System-on-Card type S1 and type S2;
- Position and size of the biometric capture device;
- Minimum requirements to a Biometric System-on-Card with respect to

  • mechanical durability, and
  • man-machine interface and ergonomics.

The standardization of other on-card devices such as an electronic display or a keypad is outside the scope of this part of ISO/IEC 17839.

August 2015
Submit a comment here

Read more

ISO/IEC 7816-9:2017 specifies interindustry commands for card, file and other structure management, i.e. data object and security object. These commands cover the entire life cycle of the card and therefore some commands are used before the card has been issued to the cardholder or after the card has expired. For details on record life cycle status, refer to ISO/IEC 7816-4.

ISO/IEC 7816-9:2017 is not applicable to the internal implementation within the card and/or the outside world.

December 2017
Submit a comment here

Read more

The “Software Defined Perimeter (SDP) protocol,” is designed to provide on-demand, dynamically provisioned, air-gapped networks. Air-gapped networks are trusted networks that are isolated from all unsecured networks and this may allow them to mitigate network-based attacks. The SDP protocol is based on workflows invented by the Department of Defense (DoD) and used by some Federal Agencies. Networks based on these workflows provide a higher level of security, but are thought to be very difficult to use compared to traditional enterprise networks.
 

April 2014
Submit a comment here

Read more

The CSA Open Certification WG is an industry initiative to allow global, accredited, trusted certification of cloud providers. It is a program for flexible, incremental and multi-layered cloud provider certification according to the CSA’s industry leading security guidance and control objectives. The program will integrate with popular third-party assessment and attestation statements developed within the public accounting community to avoid duplication of effort and cost.

August 2012
Submit a comment here

Read more

The Trusted Cloud Initiative helps cloud providers develop industry-recommended, secure and interoperable identity, access and compliance management configurations, and practices. The Trusted Cloud Initiative will develop reference models and education in a vendor-neutral manner, inclusive of all CSA members and affiliates who wish to participate.

January 2013
Submit a comment here

Read more

Privacy Level Agreement - Version 2 is intended to be used as an appendix to a Cloud Services Agreement, and to describe the level of privacy protection that the CSP will provide. While Service Level Agreements (“SLA”) are generally used to provide metrics and other information on the performance of the services, PLAs will address information privacy and personal data protection practices.

June 2015
Submit a comment here

Read more

The goal of CloudAudit is to provide a common interface and namespace that allows cloud computing providers to automate the Audit, Assertion, Assessment, and Assurance (A6) of their infrastructure (IaaS), platform (PaaS), and application (SaaS) environments and allow authorized consumers of their services to do likewise via an open, extensible and secure interface and methodology. CloudAudit provides the technical foundation to enable transparency and trust in private and public cloud systems.

Submit a comment here

Read more

The Cloud Trust Protocol (CTP) is designed to be a mechanism by which cloud service customers can ask for and receive information related to the security of the services they use in the cloud, promoting transparency and trust.

The CTP document focuses on the definition of the CTP Data Model and Application Programming Interface (API), including:

October 2015
Submit a comment here

Read more

Pages