| BSI |
BS ISO/IEC 18367 |
Information technology. Security techniques. Cryptographic algorithms and security mechanisms conformance testing |
|
| ISO |
ISO/IEC 18367 |
Information technology - Security techniques - Cryptographic algorithms and security mechanisms conformance testing |
|
| CSA |
CAN/CSA-ISO/IEC 19762:18 (R2022) |
Information technology — Automatic identification and data capture (AIDC) techniques — Harmonized vocabulary (Adopted ISO/IEC 19762:2016, first edition, 2016-02-01) | Technologies de l'information — Technique automatiques d'identification et de saisie de données (AIDC) — Vocabulaire harmonisé (norme ISO/IEC 19762:2016 adoptée, première édition, 2016-02-01) |
|
| CSA |
CAN/CSA-ISO/IEC 27036-4:18 (R2022) |
Information technology — Security techniques — Information security for supplier relationships — Part 4: Guidelines for security of cloud services (Adopted ISO/IEC 27036-4:2016, first edition, 2016-10-01) |
|
| CSA |
CAN/CSA-ISO/IEC 27033-6:18 (R2022) |
Information technology — Security techniques — Network security — Part 6: Securing wireless IP network access (Adopted ISO/IEC 27033-6:2016, first edition, 2016-06-01) |
|
| CSA |
CAN/CSA-ISO/IEC 27034-6:18 (R2022) |
Information technology — Security techniques — Application security — Part 6: Case studies (Adopted ISO/IEC 27034-6:2016, first edition, 2016-10-01) |
|
| CSA |
CAN/CSA-ISO/IEC 27004:18 (R2022) |
Information technology — Security techniques — Information security management — Monitoring, measurement, analysis and evaluation (Adopted ISO/IEC 27004:2016, second edition, 2016-12-15) |
|
| CSA |
CAN/CSA-ISO/IEC 15816:F04 (C2022) |
Information technology - Security techniques - Security information objects for access control (Adopted ISO/IEC 15816:2002, first edition, 2002-02-01) |
|
| CSA |
CSA ISO/IEC TS 20540:19 |
Information technology — Security techniques — Testing cryptographic modules in their operational environment (Adopted ISO/IEC TS 20540:2018, first edition, 2018-05) |
|
| CSA |
CAN/CSA-ISO/IEC 27040:F18 (C2023) |
Information technology — Security techniques — Storage security (Adopted ISO/IEC 27040:2015, first edition, 2015-01-15) |
|
| CSA |
CAN/CSA-ISO/IEC 24759:18 (R2023) |
Information technology — Security techniques — Test requirements for cryptographic modules (Adopted ISO/IEC 24759:2017, third edition, 2017-03) |
|
| CSA |
CAN/CSA-ISO/IEC 15946-1:18 (R2022) |
Information technology - Security techniques - Cryptographic techniques based on elliptic curves - Part 1: General (Adopted ISO/IEC 15946-1:2016, third edition, 2016-07-01) |
|
| CSA |
CSA ISO/IEC 18370-2:20 |
Information technology — Security techniques — Blind digital signatures — Part 2: Discrete logarithm based mechanisms (Adopted ISO/IEC 18370-2:2016, first edition, 2016-07-01) |
|
| CSA |
CAN/CSA-ISO/IEC TS 33072:18 (R2022) |
Information technology — Process assessment — Process capability assessment model for information security management (Adopted ISO/IEC TS 33072:2016, first edition, 2016-07-15, corrected version 2016-09-01) |
|
| CSA |
CAN/CSA-ISO/IEC TS 33052:18 (R2022) |
Information technology — Process reference model (PRM) for information security management (Adopted ISO/IEC TS 33052:2016, first edition, 2016-06-15) |
|
| CSA |
CSA IEC 61000-4-9:22 |
Electromagnetic compatibility (EMC) — Part 4-9: Testing and measurement techniques — Impulse magnetic field immunity test (Adopted IEC 61000-4-9:2016, second edition, 2016-07) | Compatibilité électromagnétique (CEM) - Partie 4-9: Techniques d'essai et de mesure - Essai d'immunité au champ magnétique impulsionnel (norme IEC 61000-4-9:2016 adoptée, deuxième édition, 2016-07) |
|
| CSA |
CAN/CSA-ISO/IEC 27021:18 (R2023) |
Information technology — Security techniques — Competence requirements for information security management systems professionals (Adopted ISO/IEC 27021:2017, first edition, 2017-10) |
|
| CSA |
CSA ISO/IEC 20085-1:20 |
IT Security techniques — Test tool requirements and test tool calibration methods for use in testing non-invasive attack mitigation techniques in cryptographic modules — Part 1: Test tools and techniques (Adopted ISO/IEC 20085-1:2019, first edition, 2019-10) |
|
| CSA |
IEC 61215-1 |
Terrestrial photovoltaic (PV) modules - Design qualification and type approval - Part 1: Test requirements (Adopted IEC 61215-1:2016, first edition, 2016-03) | Modules photovoltaïques (PV) pour applications terrestres - Qualification de la conception et homologation - Partie 1 : Exigences d’essai. (norme IEC 61215-1:2016 adoptée, première édition, 2016-03) |
|
| CSA |
IEC 61215-2 |
Terrestrial photovoltaic (PV) modules - Design qualification and type approval - Part 2: Test procedures (Adopted IEC 61215-2:2016, first edition, 2016-03) | Modules photovoltaïques (PV) pour applications terrestres - Qualification de la conception et homologation - Partie 2 : Procédures d'essai (norme IEC 61215-2:2016 adoptée, première édition, 2016-03) |
|
| CSA |
CAN/CSA-ISO/IEC 27003:18 (R2023) |
Information technology - Security techniques - Information security management systems - Guidance (Adopted ISO/IEC 27003:2017, second edition, 2017-03) |
|
| BSI |
BS ISO/IEC 27036-3 |
Information technology. Security techniques. Information security for supplier relationships. Guidelines for information and communication technology supply chain security |
|
| CSA |
CSA ISO/IEC TS 27008:20 |
Information technology — Security techniques — Guidelines for the assessment of information security controls (Adopted ISO/IEC TS 27008:2019, first edition, 2019-01) |
|
| CSA |
CSA ISO/IEC 19592-1:20 |
Information technology — Security techniques — Secret sharing — Part 1: General (Adopted ISO/IEC 19592-1:2016, first edition, 2016-11-15) |
|
| CSA |
CAN/CSA-ISO/IEC 27033-4:18 (R2023) |
Information technology — Security techniques — Network security — Part 4: Securing communications between networks using security gateways (Adopted ISO/IEC 27033-4:2014, first edition, 2014-03-01) |
|