Information technology

Key standards:

StandardsDescription
BS ISO/IEC 27004:2016 Information technology. Security techniques. Information security management. Monitoring, measurement, analysis and evaluation
BS ISO/IEC 27013:2015 Information technology. Security techniques. Guidance on the integrated implementation of ISO/IEC 27001 and ISO/IEC 20000-1
BS ISO/IEC 27018:2019 Information technology. Security techniques. Code of practice for protection of personally identifiable information (PII) in public clouds acting as PII processors
BS ISO/IEC 27033-1:2015 Information technology. Security techniques. Network security
BS ISO/IEC 9798-2:2019 IT Security techniques. Entity authentication
BS ISO/IEC 27003:2017 Information technology. Security techniques. Information security management systems. Guidance
BS ISO/IEC 27006:2015 Information technology. Security techniques. Requirements for bodies providing audit and certification of information security management systems
BS ISO/IEC 27007:2017 Information technology. Security techniques. Guidelines for information security management systems auditing
BS EN 419241-1:2018 Trustworthy Systems Supporting Server Signing
BS ISO/IEC 27010:2015 Information technology. Security techniques. Information security management for inter-sector and inter-organizational communications
BS ISO/IEC 29101:2018 Information technology. Security techniques. Privacy architecture framework
BS ISO/IEC 29147:2018 Information technology. Security techniques. Vulnerability disclosure
BS ISO/IEC 10116:2017 Information technology. Security techniques. Modes of operation for an $in-bit block cipher
BS ISO/IEC 10118-1:2016 Information technology. Security techniques. Hash-functions
BS ISO/IEC 10118-3:2018 IT Security techniques. Hash-functions
BS ISO/IEC 11889-2:2015 Information technology. Trusted Platform Module Library
BS ISO/IEC 11889-3:2015 Information technology. Trusted Platform Module Library
BS ISO/IEC 11889-4:2015 Information technology. Trusted Platform Module Library
BS ISO/IEC 15946-1:2016 Information technology. Security techniques. Cryptographic techniques based on elliptic curves
BS ISO/IEC 15946-5:2017 Information technology. Security techniques. Cryptographic techniques based on elliptic curves
BS ISO/IEC 20243-1:2018 Information technology. Open Trusted Technology Provider$uT$uM Standard (O-TTPS). Mitigating maliciously tainted and counterfeit products
PD ISO/IEC TR 20004:2015 Information technology. Security techniques. Refining software vulnerability analysis under ISO/IEC 15408 and ISO/IEC 18045
PD ISO/IEC TS 27008:2019 Information technology. Security techniques. Guidelines for the assessment of information security controls
PD ISO/IEC/TR 15446:2017 Information technology. Security techniques. Guidance for the production of protection profiles and security targets
BS ISO/IEC 15946-5:2017 Information technology. Security techniques. Cryptographic techniques based on elliptic curves
BS EN 419241-1:2018 Trustworthy Systems Supporting Server Signing
BS ISO/IEC 27018:2019 Information technology. Security techniques. Code of practice for protection of personally identifiable information (PII) in public clouds acting as PII processors
BS ISO/IEC 27013:2015 Information technology. Security techniques. Guidance on the integrated implementation of ISO/IEC 27001 and ISO/IEC 20000-1
BS ISO/IEC 20243-1:2018 Information technology. Open Trusted Technology Provider$uT$uM Standard (O-TTPS). Mitigating maliciously tainted and counterfeit products
BS ISO/IEC 27006:2015 Information technology. Security techniques. Requirements for bodies providing audit and certification of information security management systems
BS ISO/IEC 27007:2017 Information technology. Security techniques. Guidelines for information security management systems auditing
BS ISO/IEC 27004:2016 Information technology. Security techniques. Information security management. Monitoring, measurement, analysis and evaluation
BS ISO/IEC 27033-1:2015 Information technology. Security techniques. Network security
BS ISO/IEC 9798-2:2019 IT Security techniques. Entity authentication
BS ISO/IEC 27010:2015 Information technology. Security techniques. Information security management for inter-sector and inter-organizational communications
BS ISO/IEC 29101:2018 Information technology. Security techniques. Privacy architecture framework
BS ISO/IEC 29147:2018 Information technology. Security techniques. Vulnerability disclosure
BS ISO/IEC 10116:2017 Information technology. Security techniques. Modes of operation for an $in-bit block cipher
BS ISO/IEC 10118-1:2016 Information technology. Security techniques. Hash-functions
BS ISO/IEC 10118-3:2018 IT Security techniques. Hash-functions
BS ISO/IEC 11889-2:2015 Information technology. Trusted Platform Module Library
BS ISO/IEC 11889-3:2015 Information technology. Trusted Platform Module Library
BS ISO/IEC 11889-4:2015 Information technology. Trusted Platform Module Library
BS ISO/IEC 15946-1:2016 Information technology. Security techniques. Cryptographic techniques based on elliptic curves
PD ISO/IEC TR 20004:2015 Information technology. Security techniques. Refining software vulnerability analysis under ISO/IEC 15408 and ISO/IEC 18045
PD ISO/IEC/TR 15446:2017 Information technology. Security techniques. Guidance for the production of protection profiles and security targets
PD CLC/TR 50600-99-2:2019 Information technology. Data centre facilities and infrastructures
BS ISO/IEC 20000-3:2019 Information technology. Service management
BS ISO/IEC 2382-37:2017 Information technology. Vocabulary
BS ISO/IEC 19988:2017 Information technology. Core Business Vocabulary Standard
PD ISO/IEC TR 38502:2017 Information technology. Governance of IT. Framework and model
BS EN 50174-1:2018 Information technology. Cabling installation
BS EN 50173-1:2018 Information technology. Generic cabling systems
BS EN 50173-2:2018 Information technology. Generic cabling systems
BS EN 50173-4:2018 Information technology. Generic cabling systems
BS EN 50173-5:2018 Information technology. Generic cabling systems
 Your basket
Your basket is empty