Standard
Available Standards (251)
Showing standards 1 - 200
Working group
OASIS Common Security Advisory Framework (CSAF) TC
The OASIS CSAF Technical Committee is chartered to make a major revision to the Common ...Working group
OASIS Web Services Secure Exchange (WS-SX) TC
The purpose of the OASIS WS-SX TC is to define extensions to OASIS Web Services Securit...Standard
Air Traffic Management - Specification for software assurance levels
This Technical Specification specifies the technical, operational and maintenance requi... Thu, Apr 1 2010Working group
Standard
Application of risk management for IT-networks incorporating medical devices — Part 2-2: Guidance for the communication of medical device security needs, risks and controls
This part of IEC 80001 creates a framework for the disclosure of security-related capab... Sun, Jul 1 2012Standard
Authenticated encryption
This International Standard specifies six methods for authenticated encryption, i.e. de... Sun, Feb 1 2009Standard
Authentication Step-Up Protocol and Metadata Version 1.0
The OASIS Trust Elevation TC works to define a set of standardized protocols that servi... Mon, May 1 2017Working group
Automotive Working Group
The mission of the Automotive Working Group is to develop Open Web Platform specificati...Standard
Blind digital signatures -- Part 1: General
This document specifies principles, including a general model, a set of entities, a num... Tue, Nov 1 2016Standard
Blind digital signatures -- Part 2: Discrete logarithm based mechanisms
This part of ISO/IEC 18370 specifies blind digital signature mechanisms, together with ... Fri, Jul 1 2016Standard
CACAO Security Playbooks Version 1.0
/*-->*/ /*-->*/ Tue, Jan 12 2021Working group
Cards and security devices for personal identification
SC 17 continues to deliver card standards that are ubiquitous in their use by the world... Mon, Oct 3 2016Standard
Catalogue of architectural and design principles for secure products, systems and applications
This document provides a catalogue of architectural and design principles that can be u... Fri, Oct 1 2010Working group
CEN-CENELEC Focus Group on Cybersecurity
The Focus Group on Cybersecurity (CSCG) will support CEN and CENELEC to explore ways an...Working group
Chairman advisory group
Preparation of a first draft business plan - Review the task list ( N08) provided by th...Standard
Check character systems
This International Standard specifies a set of check character systems capable of prote... Sat, Feb 1 2003Standard
Clear Site Data
This document defines an imperative mechanism which allows web developers to instruc... Thu, Nov 30 2017Standard
Cloud computing -- Service level agreement (SLA) framework -- Part 4: Components of security and of protection of PII
This document specifies security and protection of personally identifiable information ... Tue, Jan 1 2019Standard
Cloud Control Matrix
The Cloud Security Alliance Cloud Controls Matrix (CCM) is specifically designed to pro... Tue, Oct 3 2017Working group
Cloud Controls Matrix Working Group
The Cloud Security Alliance Cloud Controls Matrix (CCM) is specifically designed to pro...Standard
Cloud Customer Architecture for Securing Workloads on Cloud Services
Cloud Customer Architecture for Securing Workloads on Cloud Services was written as pra... Sat, Apr 1 2017Standard
Cloud Customer Architecture for Securing Workloads on Cloud Services
Cloud Customer Architecture for Securing Workloads on Cloud Services was written as pra... Mon, Apr 3 2017Working group
Cloud Incident Response
With today’s fast-evolving threat landscape, a holistic cloud incident response framewo...Working group
Cloud Security Services Management
Collaboration and coordination among all stakeholders are critical to secure the cloud ...Standard
Cloud Security Standards: What to Expect and What to Negotiate V2.0
Cloud Security Standards: What to Expect and What to Negotiate is a guide to security s... Mon, Aug 1 2016Standard
Cloud Trust Protocol Data Model and API
The Cloud Trust Protocol (CTP) is designed to be a mechanism by which cloud service cus... Fri, Oct 9 2015CloudAudit
The goal of CloudAudit is to provide a common interface and namespace that allows cloud...Standard
Competence requirements for information security testers and evaluators -- Part 1: Introduction, concepts and general requirements
This document defines terms and establishes an organized set of concepts and relationsh... Thu, Feb 1 2018Standard
Competence requirements for information security testers and evaluators -- Part 2: Knowledge, skills and effectiveness requirements for ISO/IEC 19790 testers
This document provides the minimum requirements for the knowledge, skills and effective... Wed, Aug 1 2018Standard
Competence requirements for information security testers and evaluators — Part 3: Knowledge, skills and effectiveness requirements for ISO/IEC 15408 evaluators.
This document provides the specialized requirements to demonstrate competence of indivi... Wed, Aug 1 2018Standard
Content Security Policy Level 3
This document defines a mechanism by which web developers can control the resources whi... Mon, Oct 15 2018Standard
Credential Management Level 1
This specification describes an imperative API enabling a website to request a user’s c... Thu, Jan 17 2019Standard
Cryptographic algorithms and security mechanisms conformance testing
This document gives guidelines for cryptographic algorithms and security mechanisms con... Thu, Dec 1 2016Standard
Cryptographic techniques based on elliptic curves -- Part 1: General
This part of ISO/IEC 15946 describes the mathematical background and general techniques... Sat, Jul 1 2006Standard
Cryptographic techniques based on elliptic curves -- Part 5: Elliptic curve generation
The ISO/IEC 15946 series specifies public-key cryptographic techniques based on ellipti... Tue, Aug 1 2017Standard
CSAF Common Vulnerability Reporting Framework (CVRF) Version 1.2
The OASIS CSAF Technical Committee is chartered to make a major revision to the Common ... Fri, Sep 1 2017Standard
Cyber Security for Consumer Internet of Things
The present document specifies high-level provisions for the security of consumer devic... Fri, Feb 1 2019Standard
Cyber Security for Consumer Internet of Things: Conformance Assessment of Baseline Requirements
The present document specifies a conformance assessment methodology for consumer IoT de... Thu, Dec 10 2020 (Fri, Dec 11 2020)Standard
Cybersecurity and ISO and IEC Standards
This document provides guidance on how to leverage existing standards in a cybersecurit... Thu, Feb 1 2018Working group
Data Protection, Privacy and Identity Management
Data Protection, Privacy and Identity ManagementStandard
Data Residency Challenges
As data is increasingly accessed and shared across geographic boundaries, a growing web... Mon, May 1 2017Standard
Data security requirements for the monitoring service of cloud computing
Recommendation ITU-T X.1603 analyses data security requirements for the monitoring serv... Thu, Mar 1 2018DevSecOps
Businesses are now requiring a stronger collaboration between the development, security...Standard
Digital signature schemes giving message recovery -- Part 2: Integer factorization based mechanisms
This part of ISO/IEC 9796 specifies three digital signature schemes giving message reco... Wed, Dec 1 2010Standard
Digital signature schemes giving message recovery -- Part 3: Discrete logarithm based mechanisms
This part of ISO/IEC 9796 specifies six digital signature schemes giving message recove... Sun, Oct 1 2006Standard
Digital signatures with appendix -- Part 1: General
ISO/IEC 14888 specifies several digital signature mechanisms with appendix for messages... Tue, Apr 1 2008Standard
Digital signatures with appendix -- Part 2: Integer factorization based mechanisms
This part of ISO/IEC 14888 specifies digital signatures with appendix whose security is... Tue, Apr 1 2008Standard
Digital signatures with appendix -- Part 3: Discrete logarithm based mechanisms
This document specifies digital signature mechanisms with appendix whose security is ba... Sun, Apr 1 2018Working group
DNS PRIVate Exchange
The initial focus of this Working Group was the development of mechanisms that provide ...Standard
Electronic Identity Credential Trust Elevation Framework Version 1.0
The OASIS Trust Elevation TC works to define a set of standardized protocols that servi... Thu, May 1 2014Standard
Encryption algorithms -- Part 1: General
This part of ISO/IEC 18033 is general in nature, and provides definitions that apply in... Sat, Aug 1 2015Standard
Encryption algorithms -- Part 2: Asymmetric ciphers
ISO/IEC 18033-2:2006 specifies encryption systems (ciphers) for the purpose of data con... Mon, May 1 2006Standard
Encryption algorithms -- Part 3: Block ciphers
This part of ISO/IEC 18033 specifies block ciphers. A block cipher maps blocks of n bit... Tue, Jun 1 2010Standard
Encryption algorithms -- Part 4: Stream ciphers
This part of ISO/IEC 18033 specifies a) output functions to combine a keystream with pl... Thu, Dec 1 2011Standard
Encryption algorithms -- Part 5: Identity-based ciphers
This part of ISO/IEC 18033 specifies identity-based encryption mechanisms. For each mec... Tue, Dec 1 2015Standard
Encryption algorithms -- Part 6: Homomorphic encryption
This document specifies the following mechanisms for homomorphic encryption. — Exponent... Wed, May 1 2019Working group
ETSI TC CYBER
TC CYBER is recognized as a major trusted centre of expertise offering market-driven cy...Standard
ETSI TR 103 570 V1.1.1
The present document compares a selection of proposals for quantum-safe key exchanges t... Mon, Jan 9 2017 (Tue, Jan 10 2017)Standard
Evaluation criteria for IT security -- Part 1: Introduction and general model
This part of ISO/IEC 15408 establishes the general concepts and principles of IT securi... Tue, Dec 1 2009Standard
Evaluation criteria for IT security -- Part 2: Security functional components
This part of ISO/IEC 15408 defines the required structure and content of security funct... Fri, Aug 1 2008Standard
Evaluation criteria for IT security -- Part 3: Security assurance components
This part of ISO/IEC 15408 defines the assurance requirements of ISO/IEC 15408. It incl... Fri, Aug 1 2008Standard
Feature Policy
This specification defines a mechanism that allows developers to selectively enable and... Tue, Apr 16 2019Standard
Fetch Metadata Request Headers
This document defines a set of Fetch metadata request headers that aim to provide serve... Sat, Jul 27 2019Working group
Focus Group on Digital Currency including Digital Fiat Currency
The main objectives of the Focus Group are:Standard
Guidance for developing security and privacy functional requirements based on ISO/IEC 15408
This document provides guidance for: — selecting and specifying security functional req... Mon, Oct 1 2018Standard
Guidance for signature creation and other related devices
The present Technical Report provides guidance on the selection of standards and option... Mon, May 1 2017Standard
Guidance for the production of protection profiles and security targets
This document provides guidance relating to the construction of Protection Profiles (PP... Sun, Oct 1 2017Standard
Guide to Security for Full Virtualization Technologies
The purpose of the guide is to discuss the security concerns associated with full virtu... Mon, Jan 3 2011Standard
Guidelines for cybersecurity
This International Standard provides guidance for improving the state of Cybersecurity.... Sat, Jul 1 2017Standard
Guidelines for the operational security of cloud computing
Recommendation ITU-T X.1642 provides generic operational security guidelines for cloud ... Tue, Mar 1 2016Standard
Guidelines for the use and management of Trusted Third Party services
Associated with the provision and operation of a Trusted Third Party (TTP) are a number... Sat, Jun 1 2002Standard
Guidelines on Security and Privacy in Public Cloud Computing
Cloud computing can and does mean different things to different people. The common char... Tue, Jan 31 2012Working group
High Performance Computing
‘Vanilla’ cloud environments were typically not made to handle harsh environments like ...Working group
Hybrid Cloud Security Services
As businesses are developing rapidly, and IT infrastructures are constantly diversified...Standard
IEEE - P7002 - Data Privacy Process
This standard defines requirements for a systems/software engineering process for priva...Standard
IEEE - P7004 - Standard on Child and Student Data Governance
The standard defines specific methodologies to help users certify how they approach acc...Working group
IEEE - WG-PDAI - Personal Data AI Agent Working Group
With the advent and rise of AI there is a risk that machine-to-machine decisions will b...Standard
IEEE 1619-2018 - C/CPSC - IEEE Standard for Cryptographic Protection of Data on Block-Oriented Storage Devices
In this standards are defined cryptographic transform for protection of data in sector-...Standard
IEEE 1619.1-2007 - C/CPSC - IEEE Standard for Authenticated Encryption with Length Expansion for Storage Devices
This standard specifies cryptographic and data authentication procedures for storage de...Standard
IEEE 1667-2006 - C/CPSC - IEEE Standard Protocol for Authentication in Host Attachments of Transient Storage Devices
Cryptographic and data authentication procedures for storage devices that support lengt...Standard
IEEE 1667-2018 - C/CPSC - IEEE Standard for Discovery, Authentication, and Authorization in Host Attachments of Storage Devices
Discovery, authentication, and authorization protocols between hosts and storage device...Standard
IEEE 1686-2007 - PE/PSCC - IEEE Standard for Substation Intelligent Electronic Devices (IEDs) Cyber Security Capabilities
In this standards are defined the functions and features to be provided in substation i...Standard
IEEE 1686-2013 - PE/PSCC - IEEE Standard for Intelligent Electronic Devices Cyber Security Capabilities
In this standards are defined the functions and features to be provided in intelligent ...Standard
IEEE 1711-2010 - PE/PSCC - IEEE Trial-Use Standard for a Cryptographic Protocol for Cyber Security of Substation Serial Links
In this standards is defined a cryptographic protocol to provide integrity, and optiona...Standard
IEEE 1815.1-2015 - PE/PSCC - IEEE Standard for Exchanging Information Between Networks Implementing IEC 61850 and IEEE Std 1815(TM) [Distributed Network Protocol (DNP3)]
This document specifies the standard approach for mapping between IEEE Std 1815™ [Distr...Standard
IEEE 2600-2008 - C/CPSC - IEEE Standard for Information Technology: Hardcopy Device and System Security
This standard defines security requirements (all aspects of security including but not ...Standard
IEEE Standard Cybersecurity Requirements for Substation Automation, Protection, and Control Systems
The standard provides technical requirements for power system cybersecurity. Thu, May 2 2019Standard
Information security controls for the energy utility industry
Effective information security in the process control domain of the energy utility sect... Sun, Oct 1 2017Standard
Information security management guidelines for cyber insurance
This document provides guidelines for adopting cyber insurance as a risk treatment opti...Working group
Information security, cybersecurity and privacy protection
The development of standards for the protection of information and ICT. This includes g... Thu, Oct 10 2019Standard
Information security, cybersecurity and privacy protection — Governance of information security
This document provides guidance on concepts, objectives and processes for the governanc... Wed, Jan 1 2020Standard
Information security, cybersecurity and privacy protection — Guidelines for information security management systems auditing (Adopted ISO/IEC 27007:2020, third edition, 2020-01)
Standards development within the Information Technology sector is harmonized with inter... Wed, Jan 1 2020Standard
Information security, cybersecurity and privacy protection — Physically unclonable functions — Part 1: Security requirements
This document specifies the security requirements for physically unclonable functions (... Wed, Jan 1 2020Standard
Information security, cybersecurity and privacy protection — Sector-specific application of ISO/IEC 27001 — Requirements (Adopted ISO/IEC 27009:2020, second edition, 2020-04)
Standards development within the Information Technology sector is harmonized with inter... Wed, Apr 1 2020Standard
Information security, cybersecurity and privacy protection — Sector-specific application of ISO/IEC 27001 — Requirements (Adopted ISO/IEC 27009:2020, second edition, 2020-04)
Standards development within the Information Technology sector is harmonized with inter... Wed, Apr 1 2020Standard
Information technology - Security techniques - Code of practice for information security controls (ISO/IEC 27002:2013 including Cor 1:2014 and Cor 2:2015)
The standard provides guidelines for the security standards of organizational informati... Wed, Feb 1 2017Standard
Information technology - Security techniques - Guidance on assuring suitability and adequacy of incident investigative method (ISO/IEC 27041:2015)
The standard provides a guideline on the mechanisms to ensure that the methods and proc... Mon, Aug 1 2016Standard
Information technology - Security techniques - Guidelines for identification, collection, acquisition and preservation of digital evidence (ISO/IEC 27037:2012)
The standard defines the specific guidelines for the management of digital data which a... Tue, Aug 2 2016Standard
Information technology - Security techniques - Guidelines for the analysis and interpretation of digital evidence (ISO/IEC 27042:2015)
This standard provides a guide for the analysis and interpretation of digital data in a... Mon, Aug 1 2016Standard
Information technology - Security techniques - Incident investigation principles and processes (ISO/IEC 27043:2015)
Describes guidelines based on idealized models for common incident investigation proces... Mon, Aug 1 2016Standard
Information technology - Security techniques - Information security management systems - Overview and vocabulary (ISO/IEC 27000:2016)
This document provides a standardized IoT Reference Architecture using a common vocabul... Wed, Aug 1 2018Standard
Information technology - Security techniques - Specification for digital redaction (ISO/IEC 27038:2014)
The international standard specifies the technical characteristics for the preparation ... Mon, Aug 1 2016Standard
Information technology - Security techniques - Specification for digital redaction (ISO/IEC 27038:2014)
The international standard specifies the technical characteristics for the preparation ... Mon, Aug 1 2016Standard
Information technology -- Biometric presentation attack detection -- Part 1: Framework
The purpose of ISO/IEC 30107-1 is to provide a foundation for PAD through defining term... Fri, Jan 1 2016Standard
Information technology -- Security techniques -- Code of practice for information security controls based on ISO/IEC 27002 for cloud services
ISO/IEC 27017 gives guidelines for information security controls applicable to the prov... Tue, Dec 1 2015Standard
Information technology -- Security techniques -- Code of practice for protection of personally identifiable information (PII) in public clouds acting as PII processors
This document establishes commonly accepted control objectives, controls and guidelines... Tue, Jan 1 2019Standard
Information technology -- Security techniques -- Information security for supplier relationships -- Part 4: Guidelines for security of cloud services
ISO/IEC 27036-4 provides cloud service customers and cloud service providers with guida... Sat, Oct 1 2016Standard
Information technology — Cybersecurity — Overview and concepts
This document provides the overview of cybersecurity. The terms and definitions provide... Wed, Dec 30 2020Standard
Interoperability of Flight Data Processing (Air Traffic Control - Air Traffic Control) for application under the Single European Sky - Interoperability Regulation EC 552/2004
This Technical Specification is for the production of conformity evidence for FDP-FDP g... Wed, Sep 1 2010Standard
ISO/IEC JTC 1/SC 27/WG1 27000:2018 - Information security management systems - Overview and vocabulary
This document provides the overview of information security management systems (ISMS)....Standard
ISO/IEC 27017: Information technology - Security techniques - Code of practice for information security controls based on ISO/IEC 27002 for cloud services
Recommendation ITU-T X.1631 | ISO/IEC 27017 provides guidelines for information securit... Wed, Jul 1 2015Standard
ISO/IEC 9797-3:2011 Message Authentication Codes (MACs) - Part 3: Mechanisms using a universal hash-function
This part of ISO/IEC 9797 specifies the following MAC algorithms that use a secret key ...Standard
ISO/IEC CD 23837-1.2
Information technology security techniques — Security requirements, test and evaluation...Standard
ISO/IEC CD 23837-2.2
Information technology security techniques — Security requirements, test and evaluation...Standard
ISO/IEC JTC 1/SC 27 11770-3:2015 - Key management - Part 3: Mechanisms using asymmetric techniques
This part of ISO/IEC 11770 defines key management mechanisms based on asymmetric crypto...Standard
ISO/IEC JTC 1/SC 27 9798-4:1999 Entity authentication - Part 4: Mechanisms using a cryptographic check function
This part of ISO/IEC 9798 specifies entity authentication mechanisms using a cryptograp...Standard
ISO/IEC JTC 1/SC 27 10118-1:2016 - Hash-functions - Part 1: General
ISO/IEC 10118 specifies hash-functions and is therefore applicable to the provision of ...Standard
ISO/IEC JTC 1/SC 27 10118-2:2010 - Hash-functions - Part 2: Hash-functions using an n-bit block cipher
This part of ISO/IEC 10118 specifies hash-functions which make use of an n-bit block ci...Standard
ISO/IEC JTC 1/SC 27 10118-3:2018 Hash-functions - Part 3: Dedicated hash-functions
This document specifies dedicated hash-functions, i.e. specially designed hash-function...Standard
ISO/IEC JTC 1/SC 27 11770-1:2010 - Key management - Part 1: Framework
In information technology there is an ever-increasing need to use cryptographic mechani...Standard
ISO/IEC JTC 1/SC 27 11770-2:2018 - Key management - Part 2: Mechanisms using symmetric techniques
This document defines key establishment mechanisms using symmetric cryptographic techni...Standard
ISO/IEC JTC 1/SC 27 11770-4:2017 - Key management - Part 4: Mechanisms based on weak secrets
This document defines key establishment mechanisms based on weak secrets, i.e. secrets ...Standard
ISO/IEC JTC 1/SC 27 11770-5:2011 - Key management - Part 5: Group key management
This part of ISO/IEC 11770 specifies key establishment mechanisms for multiple entities...Standard
ISO/IEC JTC 1/SC 27 11770-6:2016 - Key management - Part 6: Key derivation
This document specifies key derivation functions, i.e. functions which take secret info...Standard
ISO/IEC JTC 1/SC 27 13888-1:2009 - Non-repudiation - Part 1: General
The goal of a non-repudiation service is to generate, collect, maintain, make available...Standard
ISO/IEC JTC 1/SC 27 27002:2013 - Code of practice for information security controls
This International Standard gives guidelines for organizational information security s...Standard
ISO/IEC JTC 1/SC 27 27037:2012 Guidelines for identification, collection, acquisition and preservation of digital evidence
This International Standard provides guidelines for specific activities in handling di...Standard
ISO/IEC JTC 1/SC 27 27042:2015 - Guidelines for the analysis and interpretation of digital evidence
This International Standard provides guidance on the conduct of the analysis and interp...Standard
ISO/IEC JTC 1/SC 27 27043:2015 - Incident investigation principles and processes
This International Standard provides guidelines based on idealized models for common i...Standard
ISO/IEC JTC 1/SC 27 9798-1:2010 Entity authentication - Part 1: General
This part of ISO/IEC 9798 specifies an authentication model and general requirements an...Standard
ISO/IEC JTC 1/SC 27 9798-2:2008 Entity authentication - Part 2: Mechanisms using symmetric encipherment algorithms
This part of ISO/IEC 9798 specifies entity authentication mechanisms using symmetric en...Standard
ISO/IEC JTC 1/SC 27 10116:2017 - Modes of operation for an n-bit block cipher
This document establishes five modes of operation for applications of an n-bit block ci...Standard
ISO/IEC JTC 1/SC 27 27038:2014 - Specification for digital redaction
Some documents can contain information that must not be disclosed to some communities. ...Standard
ISO/IEC JTC 1/SC 27 27041:2015 - Guidance on assuring suitability and adequacy of incident investigative method
This International Standard provides guidance on mechanisms for ensuring that methods ...Standard
ISO/IEC JTC 1/SC 27 9797-2:2011 Message Authentication Codes (MACs) - Part 2: Mechanisms using a dedicated hash-function
This part of ISO/IEC 9797 specifies three MAC algorithms that use a secret key and a ha...Standard
ISO/IEC JTC 1/SC 27 9798-5:2009 - Entity authentication - Part 5: Mechanisms using zero-knowledge techniques
This part of ISO/IEC 9798 specifies entity authentication mechanisms using zero-knowled...Standard
ISO/IEC JTC 1/SC 27 9798-6:2010 - Entity authentication - Part 6: Mechanisms using manual data transfer
This part of ISO/IEC 9798 specifies eight entity authentication mechanisms based on man...Working group
ISO/IEC JTC 1/SC 27 Information security, cybersecurity and privacy protection
The development of standards for the protection of information and ICT. This includes g...Standard
ISO/IEC JTC 1/SC 27/WG 1 27001:2013 - Information security management systems - Requirements
This International Standard specifies the requirements for establishing, implementin...Standard
ISO/IEC JTC 1/SC27 9798-3:2019 Entity authentication Part 3: Mechanisms using digital signature techniques
This document specifies entity authentication mechanisms using digital signatures based...Standard
ISO/IEC JTC 1/WG11 DIS 30146 - Smart city ICT indicators
This document defines a comprehensive set of evaluation indicators specially related to...Standard
ITU-T X.1714
Recommendation ITU-T X.1714 describes key combination methods for quantum key distribut... Thu, Jan 9 2020 (Fri, Jan 10 2020)Standard
KMIP Additional Message Encodings v1.0
The OASIS KMIP TC works to define a single, comprehensive protocol for communication be... Fri, May 1 2015Standard
KMIP Asymmetric Key Lifecycle Profile v1.0
The OASIS KMIP TC works to define a single, comprehensive protocol for communication be... Fri, May 1 2015Standard
KMIP Cryptographic Services Profile v1.0
The OASIS KMIP TC works to define a single, comprehensive protocol for communication be... Fri, May 1 2015Standard
KMIP Opaque Managed Object Store Profile v1.0
The OASIS KMIP TC works to define a single, comprehensive protocol for communication be... Fri, May 1 2015Standard
KMIP Storage Array with Self-Encrypting Drives Profile v1.0
The OASIS KMIP TC works to define a single, comprehensive protocol for communication be... Fri, May 1 2015Standard
KMIP Suite B Profile v1.0
The OASIS KMIP TC works to define a single, comprehensive protocol for communication be... Fri, May 1 2015Standard
KMIP Symmetric Key Foundry for FIPS 140-2 Profile v1.0
The OASIS KMIP TC works to define a single, comprehensive protocol for communication be... Fri, May 1 2015Standard
KMIP Symmetric Key Lifecycle Profile v1.0
The OASIS KMIP TC works to define a single, comprehensive protocol for communication be... Fri, May 1 2015Standard
KMIP Tape Library Profile v1.0
The OASIS KMIP TC works to define a single, comprehensive protocol for communication be... Fri, May 1 2015Working group
Management systems and controls sets
The WG considers national and international standards for adoption in the domain of man...Standard
Methodology for IT security evaluation
This International Standard is a companion document to the evaluation criteria for IT s... Fri, Aug 1 2008Mobile Application Security Testing
The Mobile Application Security Testing (MAST) initiative aims to create a safer cloud ...Standard
NIST Cloud Computing Security Reference Architecture
The purpose of this document is to define a NIST Cloud Computing Security Reference Arc... Wed, May 1 2013Working group
OASIS Collaborative Automated Course of Action Operations (CACAO) for Cyber Security TC
CACAO TC members are developing a standard to implement the course of action playbook m...Working group
OASIS Collaborative Automated Course of Action Operations (CACAO) for Cyber Security TC
CACAO TC members are developing a standard to implement the course of action playbook m...Working group
OASIS Cross-Enterprise Security and Privacy Authorization (XSPA) TC
The OASIS XSPA TC works to standardize the way healthcare providers, hospitals, pharmac...Working group
OASIS Cyber Threat Intelligence (CTI) TC
The OASIS Cyber Threat Intelligence (CTI) TC was chartered to define a set of informati...Working group
OASIS Cyber Threat Intelligence (CTI) TC
The OASIS Cyber Threat Intelligence (CTI) TC was chartered to define a set of informati...Working group
OASIS Digital Signature Services eXtended (DSS-X) TC
The DSS-X TC is developing new profiles of the existing OASIS Digital Signature Service...Working group
OASIS Electronic Identity Credential Trust Elevation Methods (Trust Elevation) TC
The OASIS Trust Elevation TC works to define a set of standardized protocols that servi...Working group
OASIS eXtensible Access Control Markup Language (XACML) TC
The XACML Technical Committee defines a core XML schema for representing authorization ...Working group
OASIS Key Management Interoperability Protocol (KMIP) TC
The OASIS KMIP TC works to define a single, comprehensive protocol for communication be...Working group
OASIS Open Command and Control
The OpenC2 TC was chartered to draft documents, specifications, lexicons or other artif...Working group
OASIS Open Command and Control (OpenC2) TC
The OpenC2 TC was chartered to draft documents, specifications, lexicons or other artif...Working group
OASIS PKCS 11 TC
The OASIS PKCS 11 Technical Committee develops enhancements to improve the PKCS #11 sta...Working group
OASIS Privacy Management Reference Model (PMRM) TC
The OASIS PMRM TC works to provide a standards-based framework that will help business ...Working group
OASIS Security Services (SAML) TC
The Security Assertion Markup Language (SAML), developed by the Security Services Techn...Working group
OASIS Static Analysis Results Interchange Format (SARIF) TC
SARIF TC members are developing an interoperability standard for detecting software def...Open Certification Framework
The CSA Open Certification WG is an industry initiative to allow global, accredited, tr... Fri, Aug 17 2012Working group
Open Certification Framework Working Group
The CSA Open Certification WG is an industry initiative to allow global, accredited, tr...Standard
Permissions
The Permissions Standard defines common infrastructure for other specifications that ne... Mon, Sep 25 2017Standard
PKCS #11 Cryptographic Token Interface Base Specification Version 2.40
The OASIS PKCS 11 Technical Committee develops enhancements to improve the PKCS #11 sta... Sun, Mar 1 2015Standard
PKCS #11 Cryptographic Token Interface Current Mechanisms Specification Version 2.40
The OASIS PKCS 11 Technical Committee develops enhancements to improve the PKCS #11 sta... Sun, Mar 1 2015Standard
PKCS #11 Cryptographic Token Interface Historical Mechanisms Specification Version 2.40
The OASIS PKCS 11 Technical Committee develops enhancements to improve the PKCS #11 sta... Sun, Mar 1 2015Standard
PKCS #11 Cryptographic Token Interface Profiles Version 2.40
The OASIS PKCS 11 Technical Committee develops enhancements to improve the PKCS #11 sta... Sun, Mar 1 2015Standard
Power systems management and associated information exchange - Data and communications security - Part 9: Cyber security key management for power system equipment
IEC 62351-9:2017 specifies cryptographic key management, namely how to generate, distri... Thu, May 18 2017Standard
Prime number generation
This International Standard specifies methods for generating and testing prime numbers ... Sat, Jan 1 2005Standard
Privacy Level Agreement V2
Privacy Level Agreement - Version 2 is intended to be used as an appendix to a Cloud Se... Tue, Jun 2 2015Working group
Privacy Level Agreement Working Group
This working group aims at creating PLA templates that can be a powerful self-regulator...Standard
Proof-of-concept for data service using information centric networking in IMT-2020
This Supplement specifies a proof-of-concept for a service that provides named data suc... Fri, Jul 27 2018Working group
Quantum-safe Security
The CSA Quantum Safe Security Working Group's goal is to address key generation and tra...Standard
Random bit generation
This International Standard specifies a conceptual model for a random bit generator for... Tue, Nov 1 2011Standard
Rationalized structure for electronic signature standardization - Best practices for SMEs
This Technical Report aims to be the entry point in relation to electronic signatures f... Tue, May 1 2018Standard
Rationalized structure for electronic signature standardization - Guidelines for citizens
This Technical Report aims to help citizens to understand the relevance of using electr... Tue, May 1 2018Standard
Reference Architecture - Trusted Cloud Initiative
The Trusted Cloud Initiative helps cloud providers develop industry-recommended, secure... Mon, Jan 28 2013Standard
Referrer Policy
This document describes how an author can set a referrer policy for documents they crea... Thu, Jan 26 2017Standard
Relationship with ISO 12100 — Part 4: Guidance to machinery manufacturers for consideration of related IT-security (cyber security) aspects.
This document gives machine manufacturers guidance on potential security aspects in rel... Sat, Dec 1 2018Standard
Secret sharing -- Part 1: General
ISO/IEC 19592 (all parts) specifies cryptographic secret sharing schemes and their prop... Tue, Nov 1 2016Standard
Secret sharing -- Part 2: Fundamental mechanisms
This document specifies cryptographic secret sharing schemes. Sun, Oct 1 2017Standard
Security and Privacy Controls for Federal Information Systems and Organizations
This publication provides a catalog of security and privacy controls for federal inform... Mon, Apr 1 2013Security as a Service
The purpose of this research will be to identify consensus definitions of what Security...Standard