Search
Drupal Primary tabs
You may search by ICS code, document number, title, or keyword.
Search results
Showing items 1 through 10 of 1127.
-
ISO/IEC 27001:2022/AMD1:2024
Amendement 1 - Sécurité de l'information, cybersécurité et protection de la vie privée - Systèmes de management de la sécurité de l'information - Exigences - Actions relatives aux changements climatiquesiec (not verified)
-
ISO/IEC 29146:2016/AMD1:2022
Amendement 1 - Technologies de l'information - Techniques de sécurité - Cadre pour la gestion de l'accèsiec (not verified)
-
ISO/IEC 27006:2015/AMD1:2020
Amendement 1 - Technologies de l'information - Techniques de sécurité - Exigences pour les organismes procédant à l'audit et à la certification des systèmes de management de la sécurité de l'informationiec (not verified)
-
ISO/IEC 24760-1:2019/AMD1:2023
Amendment 1 - IT Security and Privacy - A framework for identity management - Part 1: Terminology and conceptsiec (not verified)
-
ISO/IEC 27001:2022/AMD1:2024
Amendment 1 - Information security, cybersecurity and privacy protection - Information security management systems - Requirements - Climate action changesiec (not verified)
-
ISO/IEC 29146:2016/AMD1:2022
Amendment 1 - Information technology - Security techniques - A framework for access managementiec (not verified)
-
ISO/IEC 24760-3:2016/AMD1:2023
Amendment 1 - Information technology - Security techniques - A framework for identity management - Part 3: Practice - Identity Information Lifecycle processesiec (not verified)
-
ISO/IEC 20008-2:2013/AMD1:2021
Amendment 1 - Information technology - Security techniques - Anonymous digital signatures - Part 2: Mechanisms using a group public keyiec (not verified)
-
ISO/IEC 27021:2017/AMD1:2021
Amendment 1 - Information technology - Security techniques - Competence requirements for information security management systems professionals - Addition of ISO/IEC 27001:2013 clauses or subclauses to competence requirementsiec (not verified)
-
ISO/IEC 18033-2:2006/AMD1:2017
Amendment 1 - Information technology - Security techniques - Encryption algorithms - Part 2: Asymmetric ciphers - FACEiec (not verified)