• Guidance
  • Interesting shortcuts
  • EFFRA Members' Perspectives
  • News Dashboard
  • Structured Wiki
    • Search
    • FoF and Made in Europe Partnership
    • Demonstrators, pilots, prototypes
    • Exploitable result(s)
    • Significant innovations and lessons learned, training aspects
    • Report - Video - Presentation - Publication....?
    • Project clusters
    • EFFRA member perspectives
    • Manufacturing future products
    • Manufacturing performance characteristics
    • Technologies and enablers
    • ICT performance characteristics
    • Standards, technical committees and working groups
    • Contribution of R&I projects to standardisation
    • Regulatory and policy aspects
    • Standards - other classifications
    • Business model aspects
    • Pathways
    • MiE SRIA R&I Priorities
    • MiE WP26-27 Consultation - Potential Research Topics only
    • MiE WP26-27 Consultation and context pointers
    • MiE WP26-27 Consultation with pointers to WP25-27 consultation
    • MiE KPIs
    • Relevant (future) calls
    • EU-Programme-Call
    • NACE code
    • EFFRA Organisations - members
    • EFFRA WG pointers
  • Pathways
    • Pathways
  • Projects
    • Projects
  • Resources
    • Resources
  • Project ideas
    • Project ideas
  • People & organisations
    • People
    • Organisations
  • portal@effra.eu
  • Visit the EFFRA website
    • Login
  • Structured Wiki
  • Standards, technical committees and working groups
  • Standards
  • Standards according to SDOs
  • ISO/IEC
  • ISO/IEC JTC 1
  • ISO/IEC JTC 1/SC 27 Information security, cybersecurity and privacy

ISO/IEC JTC 1/SC 27 Information security, cybersecurity and privacy

Mapped projects (4)
Mapped results (13)
  • ISO/IEC 27000:2018 - Information technology -Security techniques -Information security management systems -Overview and vocabulary
    (2)
    (1)
  • ISO/IEC 27001:2013 - Information technology -Security techniques -Information security management systems -Requirements
    (2)
    (1)
  • ISO/IEC 27002:2013 - Information technology -Security techniques -Code of practice for information security controls
    (1)
    (1)
  • ISO/IEC 27005:2018 - Information technology -Security techniques -Information security risk management
    (2)
    (1)
  • ISO/IEC 27009:2020 - Information technology -Security techniques -Sector-specific application of ISO/IEC 27001 -Requirements
    (2)
    (1)
  • ISO/IEC TS 27100 - Information technology -- Cybersecurity -- Overview and concepts
    (2)
    (1)
  • ISO/IEC 27017:2015 - Information technology — Security techniques — Code of practice for information security controls based on ISO/IEC 27002 for cloud services
    (3)
    (1)
  • ISO/IEC 27019:2017 - Information technology — Security techniques — Information security controls for the energy utility industry
    (1)
  • ISO/IEC 27005:2018 - Information technology -Security techniques -Information security risk management
    (2)
    (1)
  • ISO/IEC 27002:2013 - Information technology -Security techniques -Code of practice for information security controls
    (1)
    (1)
  • ISO/IEC 27001:2013 - Information technology -Security techniques -Information security management systems -Requirements
    (2)
    (1)
  • ISO/IEC 27701:2019 - extension to privacy information management requirements and guidelines
    (1)
  • ISO/IEC 27019:2017 - Information technology — Security techniques — Information security controls for the energy utility industry
    (1)
  • ISO/IEC 27001 (ISMS) - Information Security Management (ISMS)
    (1)
  • ISO/IEC NP 24392 - Information technology -- Security techniques --Security reference model for Industrial Internet Platform (IIP)
    (1)
    (1)
  • ISO/IEC 15408 series - Information technology -Security techniques -Evaluation criteria for IT security
    (3)
    (2)
Powered by Chris Decubber BV