1. ISO/IEC NP 20008 Anonymous digital signatures
ISO/IEC FCD 24745 Biometric information protection ISO/IEC WD 20008-1 Anonymous digital signatures
ISO/IEC CD 27032 Guidelines for cybersecurity ISO/IEC WD 20008-2 Anonymous digital
signature -- Part 2: Mechanisms using a
ISO/IEC FCD 27035 Information security group public key
incident management ISO/IEC WD 20009-1 Anonymous entity
Digital Signature authentication -- Part 1: General
ISO/IEC NP 27036 Guidelines for security of outsourcing
ISO/IEC WD 20009-2 Anonymous entity
ISO/IEC CD 27037 Guidelines for
authentication -- Part 2: Mechanisms
identification, collection, acquisition and
based on anonymous digital signature
preservation of digital evidence
schemes
ISO/IEC WD 27038 Specification for ISO/IEC 14888-3:2006/PDAM 2
Digital Redaction
ISO/IEC NP 18033-1 Encryption
ISO/IEC FCD 29100 Privacy framework algorithms -- Part 1: General
ISO/IEC CD 29101 Privacy reference architecture ISO/IEC FCD 18033-4 Encryption
Encryption
algorithms -- Part 4: Stream ciphers
ISO/IEC CD 29147 Vulnerability disclosure
ISO/IEC PDTR 29149 Best Practices on ISO/IEC FDIS 9791-1 Message
stamping services Authentication Codes (MACs) -- Part 1:
Mechanisms using a block cipher
ISO/IEC WD 29190 Proposal on Privacy ISO/IEC 9797-2 Message Authentication
capability assessment model Codes (MACs) -- Part 2: Mechanisms
ISO/IEC WD TR 30104 Physical Security using a dedicated hash-function
Attacks, Mitigation Techniques and Message Authentication Codes ISO/IEC FCD 9797-3 Message
Security Requirements Authentication Codes (MACs) -- Part 3:
Mechanisms using a universal
hash-function
ISO/IEC FCD 27034-1 Application
security -- Part 1: Overview and concepts ISO/IEC FCD 11770-5 Key management
-- Part 5: Group key management
ISO/IEC WD 27034-2 Application security Key Management
-- Part 2: Organization normative
framework ISO/IEC CD 29192-1 Lightweight
cryptography -- Part 1: General
ISO/IEC NP 27034-3 Application security
-- Part 3: Application security ISO/IEC FCD 29192-2 Lightweight
management process cryptography -- Part 2: Block ciphers
ISO/IEC CD 29192-3 Lightweight
ISO/IEC NP 27034-4 Application security Lightweight cryptography cryptography -- Part 3: Stream ciphers
-- Part 4: Application security validation
ISO/IEC CD 29192-4 Lightweight
ISO/IEC NP 27034-5 Application security cryptography -- Part 4: Mechanisms using
-- Part 5: Protocols and application asymmetric techniques
security controls data structure
ISO/IEC FCD 18031.2 Random bit generation
ISO/IEC WD 19790 Security requirements
ISO/IEC FCD 27033-2 Network security --
for cryptographic modules
Part 2: Guidelines for the design and
implementation of network security ISO/IEC NP 24759 Test requirements for
ISO cryptographic modules
ISO/IEC WD 27033-4 Network security --
Part 4: Securing communications 27) ISO/IEC FCD 29128 Verification of
between networks using security cryptographic protocols
gateways -- Threats, design techniques
and control issues ISO/IEC DIS 29150.2 Signcryption
ISO/IEC WD 27033-5 Network security --
Part 5: Securing communications across ISO/IEC WD 27000 Information security
networks using Virtual Private Network management systems -- Overview and
(VPNs) - Threats, design techniques and vocabulary
control issues
ISO/IEC WD 27001 Information security
ISO/IEC NP 27033-6 Network security -- management systems -- Requirements
Part 6: Wireless - Threats, design
techniques and control issues ISO/IEC WD 27002 Code of practice for
information security management
ISO/IEC NP 27033-7 Network security -- Part 7: Wireless
ISO/IEC FDIS 27005 Information security
management -- Measurement
ISO/IEC NP 20009 Anonymous entity authentication
ISO/IEC NP 27006 Requirements for
ISO/IEC FCD 24760-1 A Framework for bodies providing audit and certification of
Identity Management information security management
systems
ISO/IEC AWI 24760-2 A Framework for
Identity Management -- Part 2: Reference ISO/IEC FCD 27007 Guidelines for
architecture and requirements information security management
systems auditing
ISO/IEC AWI 24760-3 A Framework for
Identity Management -- Part 3: Practice ISO/IEC PDTR 27008 Guidance for
AAA auditors on ISMS controls
ISO/IEC CD 29115 Entity authentication
assurance framework ISO/IEC CD 27010 Information security
management for inter-sector and
ISO/IEC WD 29146 A framework for inter-organizational communications
access management
ISO/IEC WD 27013 Guidance on the
ISO/IEC CD 29191 Proposal on integrated implementation of ISO/IEC
requirements on relative anonymity with 20000-1 and ISO/IEC 27001
identity escrow model for authentication
and authorization using group signatures ISO/IEC CD 27014 Proposal on
Governance of information security
ISO/IEC WD 27015 Proposal on an
ISO/IEC WD TR 15443-1 A framework for
Information security management
IT security assurance -- Part 1: Overview
guidelines for financial and insurance
and framework
services
ISO/IEC AWI TR 15443-2 A framework
ISO/IEC WD TR 27016 Information
for IT security assurance -- Part 2:
security management -- Organizational
Assurance methods
economics
ISO/IEC WD 20004 Secure software
ISO/IEC FDIS 27031 Guidelines for
development and evaluation under
information and communication
ISO/IEC 15408 and ISO/IEC 18405
technology readiness for business
continuity
ISO.mmap - 30.01.2011 - (Cisco)