Standard

Available (2726)

Showing 265 - 276 per page



Information technology - Security techniques - Identity proofing

The ISO/IEC TS 29003:2018 standard:

- gives guidelines for the identity proofing of a person;

- specifies levels of identity proofing, and requirements to achieve these levels.

ISO/IEC TS 29003:2018 is applicable to identity management systems.
ISO/IEC TS 29003:2018

Information technology, cybersecurity and privacy protection - Cybersecurity framework development guidelines

This document specifies guidelines for developing a cybersecurity framework. It is applicable to cybersecurity framework creators regardless of their organizations' type, size or nature.
ISO/IEC TS 27110:2021

Information technology - Security techniques - A framework for access management

ISO/IEC 29146:2016 defines and establishes a framework for access management (AM) and the secure management of the process to access information and Information and Communications Technologies (ICT) resources, associated with the accountability of a subject within some context.

This International Standard provides concepts, terms and definitions applicable to distributed access management techniques in network environments.

This International Standard also provides explanations about related architecture, components and management functions.

The subjects involved in access management might be uniquely recognized to access information systems, as defined in ISO/IEC 24760.

The nature and qualities of physical access control involved in access management systems are outside the scope of this International Standard.
ISO/IEC 29146:2016

Information technology - Security techniques - Entity authentication assurance framework

ISO/IEC 29115:2013 provides a framework for managing entity authentication assurance in a given context. In particular, it:

- specifies four levels of entity authentication assurance;

- specifies criteria and guidelines for achieving each of the four levels of entity authentication assurance;

- provides guidance for mapping other authentication assurance schemes to the four LoAs;

- provides guidance for exchanging the results of authentication that are based on the four LoAs; and

- provides guidance concerning controls that should be used to mitigate authentication threats.
ISO/IEC 29115:2013

Information technology - Security techniques - A framework for identity management

ISO/IEC 24760-2:2015:

- provides guidelines for the implementation of systems for the management of identity information, and

- specifies requirements for the implementation and operation of a framework for identity management.

ISO/IEC 24760-2:2015 is applicable to any information system where information relating to identity is processed or stored.
ISO/IEC 24760-2:2015

IT Security and Privacy - A framework for identity management - Part 1: Terminology and concepts

This document defines terms for identity management, and specifies core concepts of identity and identity management and their relationships. It is applicable to any information system that processes identity information.
ISO/IEC 24760-1:2019

Standard for Big Data Business Security Risk Assessment

This standard can be applied to internet-based business scenarios, and can also be served serve as a practical guide to achieve help assess business security risk control through the big data technology. This standard can be applied in other types of organization, including public or privately-owned or state-owned enterprises, associations, or organizations, or by individuals, to improve assessment of their protection capability against business security risks based on big data technology.
IEEE 2813-2020

Standard for Fail-Safe Design of Autonomous and Semi-Autonomous Systems

This standard establishes a practical, technical baseline of specific methodologies and tools for the development, implementation, and use of effective fail-safe mechanisms in autonomous and semi-autonomous systems. The standard includes (but is not limited to): clear procedures for measuring, testing, and certifying a system's ability to fail safely on a scale from weak to strong, and instructions for improvement in the case of unsatisfactory performance. The standard serves as the basis for developers, as well as users and regulators, to design fail-safe mechanisms in a robust, transparent, and accountable manner.
IEEE P7009

Information security, cybersecurity and privacy protection - Requirements for attribute-based unlinkable entity authentication

This document provides a framework and establishes requirements for attribute-based unlinkable entity authentication (ABUEA).
ISO/IEC 27551:2021

Privacy enhancing data de-identification terminology and classification of techniques

This document provides a description of privacy-enhancing data de-identification techniques, to be used to describe and design de-identification measures in accordance with the privacy principles in ISO/IEC 29100.

In particular, this document specifies terminology, a classification of de-identification techniques according to their characteristics, and their applicability for reducing the risk of re-identification.

This document is applicable to all types and sizes of organizations, including public and private companies, government entities, and not-for-profit organizations, that are PII controllers or PII processors acting on a controller's behalf, implementing data de-identification processes for privacy enhancing purposes.
ISO/IEC 20889:2018

Consumer protection - Privacy by design for consumer goods and services - Part 1: High-level requirements

This document establishes high-level requirements for privacy by design to protect privacy throughout the lifecycle of a consumer product, including data processed by the consumer. This document does not contain specific requirements for the privacy assurances and commitments that organizations can offer consumers nor does it specify particular methodologies that an organization can adopt to design and-implement privacy controls, nor the technology that can be used to operate such controls.
ISO 31700-1:2023

Internet of Things (IoT) - Interoperability for IoT systems - Part 3: Semantic interoperability

ISO/IEC 21823-3:2021 provides the basic concepts for IoT systems semantic interoperability, as described in the facet model of ISO/IEC 21823-1, including:

(1) requirements of the core ontologies for semantic interoperability;

(2) best practices and guidance on how to use ontologies and to develop domain-specific applications, including the need to allow for extensibility and connection to external ontologies;

(3) cross-domain specification and formalization of ontologies to provide harmonized utilization of existing ontologies;

(4) relevant IoT ontologies along with comparative study of the characteristics and approaches in terms of modularity, extensibility, reusability, scalability, interoperability with upper ontologies, and so on; and

(5) use cases and service scenarios that exhibit necessities and requirements of semantic interoperability.
ISO/IEC 21823-3:2021