Information technology - Home Electronic System (HES) gateway - Part 3-2: Privacy, security, and saf...
ISO/IEC 15045-3-2:2024 specifies cybersecurity requirements for protecting the privacy of premises and personally identifiable information through the use of the HES gateway and related HES standards. This document applies a set of principles including those specified in ISO/IEC 29100 that are applicable to the HES gateway such as consent, purpose legitimacy, collection limitation, data…
Information security, cybersecurity and privacy protection — Information security controls for the e...
This document provides information security controls for the energy utility industry, based on ISO/IEC 27002:2022, for controlling and monitoring the production or generation, transmission, storage and distribution of electric power, gas, oil and heat, and for the control of associated supporting processes. This includes in particular the following:
— central and distributed process control,…
Information security, cybersecurity and privacy protection - Information security controls for the e...
This document provides information security controls for the energy utility industry, based on ISO/IEC 27002:2022, for controlling and monitoring the production or generation, transmission, storage and distribution of electric power, gas, oil and heat, and for the control of associated supporting processes. This includes in particular the following:
— central and distributed process control,…
Personal identification — ISO-compliant driving licence — Considerations for early adopters of ISO/I...
This document specifies considerations that can be of use to implementers and developers that elect to participate in work around updates to ISO/IEC TS 18013-7. These considerations are intended to support the improvements, to maximize backward compatibility and to, at minimum, maintain the security and privacy properties already embodied in ISO/IEC TS 18013-7.
Personal identification - ISO-compliant driving licence - Considerations for early adopters of ISO/I...
This document specifies considerations that can be of use to implementers and developers that elect to participate in work around updates to ISO/IEC TS 18013-7. These considerations are intended to support the improvements, to maximize backward compatibility and to, at minimum, maintain the security and privacy properties already embodied in ISO/IEC TS 18013-7.
Information technology — OpenID connect — OpenID connect core 1.0 incorporating errata set 2
OpenID Connect 1.0 is a simple identity layer on top of the OAuth 2.0 protocol. It enables Clients to verify the identity of the End-User based on the authentication performed by an Authorization Server, as well as to obtain basic profile information about the End-User in an interoperable and REST-like manner.
This document defines the core OpenID Connect functionality: authentication built on…
Information technology - OpenID connect - OpenID connect core 1.0 incorporating errata set 2
OpenID Connect 1.0 is a simple identity layer on top of the OAuth 2.0 protocol. It enables Clients to verify the identity of the End-User based on the authentication performed by an Authorization Server, as well as to obtain basic profile information about the End-User in an interoperable and REST-like manner.
This document defines the core OpenID Connect functionality: authentication built on…
Information security, cybersecurity and privacy protection — Application of ISO 31000 for assessment...
This document provides guidelines for identity-related risk, as an extension of ISO 31000:2018. More specifically, it uses the process outlined in ISO 31000 to guide users in establishing context and assessing risk, including providing risk scenarios for processes and implementations that are exposed to identity-related risk.
This document is applicable to the risk assessment of processes and…
Information security, cybersecurity and privacy protection - Application of ISO 31000 for assessment...
This document provides guidelines for identity-related risk, as an extension of ISO 31000:2018. More specifically, it uses the process outlined in ISO 31000 to guide users in establishing context and assessing risk, including providing risk scenarios for processes and implementations that are exposed to identity-related risk.
This document is applicable to the risk assessment of processes and…