Information security, cybersecurity and privacy protection — Evaluation criteria for IT security — R...
This document defines the minimum actions to be performed by an evaluator in order to conduct an ISO/IEC 15408 series evaluation, using the criteria and evaluation evidence defined in the ISO/IEC 15408 series.
Security and resilience — Authenticity, integrity and trust for products and documents — Framework f...
This document provides an approach that support stakeholders in a supply chain to accomplish a chain of trust regarding properties of identifiable material goods along a supply chain. This document gives guidance on the identification of trust domains and their corresponding trustworthiness attributes, and the measures to achieve the targeted trustworthiness attributes.
As a supply chain…
Information technology — Business operational view — Part 12: Privacy protection requirements (PPR) ...
This document:
— provides method(s) for identifying, in Open-edi modelling technologies and development of scenarios, the additional requirements in business operational view (BOV) specifications for identifying the additional external constraints to be applied to recorded information in business transactions relating to personal information of an individual, as required by legal and regulatory…
Information security, cybersecurity and privacy protection — Guidelines on privacy preservation base...
This document provides guidelines on using zero knowledge proofs (ZKP) to improve privacy
by reducing the risks associated with the sharing or transmission of personal data between
organisations and users by minimizing the information shared. It will include several ZKP
functional requirements relevant to a range of different business use cases, then describes
how different ZKP models can be used…
Information security, cybersecurity and privacy protection – Controls and guidance for personally id...
ISO/IEC 29151:2017 establishes control objectives, controls and guidelines for implementing controls, to meet the requirements identified by a risk and impact assessment related to the protection of personally identifiable information (PII).
In particular, this Recommendation | International Standard specifies guidelines based on ISO/IEC 27002, taking into consideration the requirements for…
Cybersecurity — IoT security and privacy — Cybersecurity labelling framework for consumer IoT
This document defines a Universal Cybersecurity Labelling Framework for the development and implementation of cybersecurity labelling programmes for consumer IoT products and includes guidance on the following topics:
• Risks and threats associated with consumer IoT products;
• Stakeholders, roles and responsibilities;
• Relevant standards and guidance documents;
• Conformity assessment options…
Information security, cybersecurity and privacy protection — A framework for identity management — P...
This document:
• provides guidelines for the implementation of systems for the management of identity information, and
• specifies requirements for the implementation and operation of a framework for identity management.
This document is applicable to any information system where information relating to identity is processed or stored."
to
“This document:
· provides…
Information security, cybersecurity and privacy protection — Requirements for the competence of IT s...
This document provides the specialized requirements to demonstrate the competence of individuals in performing IT product security evaluations and certifications in accordance with the ISO/IEC 15408 series and ISO/IEC 18045.