Standard ISO/IEC TS 27034-5-1 Information technology — Application security — Part 5-1: Protocols and application security controls data structure, XML schemas ISO/IEC TS 27034-5-1:2018 defines XML Schemas that implement the minimal set of informa...
Standard ISO/IEC 27050-2:2018 Information technology — Electronic discovery — Part 2: Guidance for governance and management of electronic discovery This document provides guidance for technical and non-technical personnel at senior man...
Standard ISO/IEC TR 27550:2019 Information technology — Security techniques — Privacy engineering for system life cycle processes This document provides privacy engineering guidelines that are intended to help organiz...
Standard ISO/IEC DIS 27551 Information technology — Requirements for attribute-based unlinkable entity authentication
Standard ISO/IEC 27552 Information technology — Security techniques — Extension to ISO/IEC 27001 and to ISO/IEC 27002 for privacy information management — Requirements and guidelines Although there is substantial overlap between information security and privacy manageme...
Standard ISO/IEC 29100 Information technology — Security techniques — Privacy framework ISO/IEC 29100:2011 provides a privacy framework which
Standard ISO/IEC 29101:2018 Information technology — Security techniques — Privacy architecture framework This document defines a privacy architecture framework that: — specifies concerns for I...
Standard ISO/IEC 29192-2:2019 Information security — Lightweight cryptography — Part 2: Block ciphers This document specifies three block ciphers suitable for applications requiring lightwe...
Working group ISO/IEC 29192-6:2019 Information technology — Lightweight cryptography — Part 6: Message authentication codes (MACs) This document specifies MAC algorithms suitable for applications requiring lightweight ...
Working group ISO/IEC 29192-7:2019 Information security — Lightweight cryptography — Part 7: Broadcast authentication protocols This document specifies broadcast authentication protocols, which are protocols that pr...
Standard ISO/IEC 30111 Information technology — Security techniques — Vulnerability handling processes ISO/IEC 30111 gives guidelines for how to process and resolve potential vulnerability i...