Information technology — DevOps — Building reliable and secure systems including application build, ...
1.1 Scope
This document provides requirements and guidance on the implementation of DevOps to define, control,
and improve software life cycle processes. It applies within an organization or a project to build, package,
and deploy software and systems in a secure and reliable way. This document specifies practices to
collaborate and communicate effectively in groups including development,…
Intelligent transport systems — Mobility integration — Enterprise view
This document describes the enterprise view (see ISO/TS 14812:2022, 3.1.4.3) of integrated mobility based on the role and responsibility models in the mobility as a service (MaaS) and mobility on demand (MOD) ecosystems as described in ISO/TR 4447. Other ISO documents (e.g. ISO 24014-1, ISO 17573-1 and ISO/TR 21724-1) have been reviewed in order to enhance and merge the MaaS and MOD role models.…
Maritime navigation and radiocommunication equipment and systems - Global navigation satellite syste...
IEC 61108-6:2023 specifies the minimum performance requirements, methods of testing and required test results for the Indian regional satellite system (IRNSS) shipborne receiver equipment, based on IMO resolution MSC.449(99), which uses the signals from IRNSS in order to determine position.
This document takes account of the general requirements given in IMO resolution A.694(17) and is…
Public information guidance systems — Part 4: Installation and assessment
This document specifies principles, requirements and methods for the installation of public information guidance systems. It also provides guidelines on the assessments of the outcomes of public information guidance systems.
It is intended for use by organizations providing design and installation services in the field of public information guidance systems and organizations selecting, using or…
Information technology — Automatic identification and data capture techniques — Part 11: Crypto suit...
This document defines the crypto suite for PRESENT-80 for the ISO/IEC 18000 series of air interfaces standards for radio frequency identification (RFID) devices. This document provides a common crypto suite for security for RFID devices for air interface standards and application standards. The crypto suite is defined in alignment with existing air interfaces.
This document specifies basic…
Information technology - Automatic identification and data capture techniques - Part 11: Crypto suit...
This document defines the crypto suite for PRESENT-80 for the ISO/IEC 18000 series of air interfaces standards for radio frequency identification (RFID) devices. This document provides a common crypto suite for security for RFID devices for air interface standards and application standards. The crypto suite is defined in alignment with existing air interfaces.
This document specifies basic…
This document describes the management of symmetric and asymmetric cryptographic keys that can be used to protect sensitive information in financial services related to retail payments. The document covers all aspects of retail financial services, including connections between a card-accepting device and an Acquirer, between an Acquirer and a card Issuer, and between an ICC and a card-accepting…
Information technology — Information security incident management — Part 2: Guidelines to plan and p...
This document provides guidelines to plan and prepare for incident response and to learn lessons from incident response. The guidelines are based on the “plan and prepare” and “learn lessons” phases of the information security incident management phases model presented in ISO/IEC 27035-1:2023, 5.2 and 5.6.
The major points within the “plan and prepare” phase include:
— information security…
Information technology — Information security incident management — Part 1: Principles and process
This document is the foundation of the ISO/IEC 27035 series. It presents basic concepts, principles and process with key activities of information security incident management, which provide a structured approach to preparing for, detecting, reporting, assessing, and responding to incidents, and applying lessons learned.
The guidance on the information security incident management process and its…
Information technology - Information security incident management - Part 2: Guidelines to plan and p...
This document provides guidelines to plan and prepare for incident response and to learn lessons from incident response. The guidelines are based on the “plan and prepare” and “learn lessons” phases of the information security incident management phases model presented in ISO/IEC 27035-1:2023, 5.2 and 5.6.
The major points within the “plan and prepare” phase include:
— information security…