This document provides guidance on concepts, objectives and processes for the governance of information security, by which organizations can evaluate, direct, monitor and communicate the information security-related processes within the organization. The intended audience for this document is: — governing body and top management; — those who are responsible for evaluating, directing and monitoring an information security management system (ISMS) based on ISO/IEC 27001; — those responsible for in...view more

    • sale 15% off
    • Standard
      16 pages
      English language
    • sale 15% off
    • Draft
      16 pages
      English language
    • sale 15% off
    • Draft
      15 pages
      English language

This document discusses the threats, risks, and controls related to: — systems that provide digital asset custodian services and/or exchange services to their customers (consumers and businesses) and management of security when an incident occurs; — asset information (including the signature key of the digital asset) that a custodian of digital assets manages. This document is addressed to digital asset custodians that manage signature keys associated with digital asset accounts. In such a case,...view more

    • sale 15% off
    • Draft
      35 pages
      English language
    • sale 15% off
    • Technical report
      35 pages
      English language

This document specifies the security requirements for physically unclonable functions (PUFs). Specified security requirements concern the output properties, tamper-resistance and unclonability of a single and a batch of PUFs. Since it depends on the application which security requirements a PUF needs to meet, this documents also describes the typical use cases of a PUF. Amongst PUF use cases, random number generation is out of scope in this document.

    • sale 15% off
    • Draft
      16 pages
      English language
    • sale 15% off
    • Standard
      16 pages
      English language
    • sale 15% off
    • Draft
      16 pages
      English language

This document specifies methods for generating and testing prime numbers as required in cryptographic protocols and algorithms. Firstly, this document specifies methods for testing whether a given number is prime. The testing methods included in this document are divided into two groups: — probabilistic primality tests, which have a small error probability. All probabilistic tests described here can declare a composite to be a prime; — deterministic methods, which are guaranteed to give the righ...view more

    • sale 15% off
    • Standard
      33 pages
      English language
    • sale 15% off
    • Draft
      33 pages
      English language
    • sale 15% off
    • Draft
      36 pages
      English language

This document specifies five methods for authenticated encryption, i.e. defined ways of processing a data string with the following security objectives: — data confidentiality, i.e. protection against unauthorized disclosure of data; — data integrity, i.e. protection that enables the recipient of data to verify that it has not been modified; — data origin authentication, i.e. protection that enables the recipient of data to verify the identity of the data originator. All five methods specified i...view more

    • sale 15% off
    • Standard
      26 pages
      English language
    • sale 15% off
    • Draft
      25 pages
      English language

This document specifies mechanisms to establish shared symmetric keys between groups of entities. It defines: — symmetric key-based key establishment mechanisms for multiple entities with a key distribution centre (KDC); and — symmetric key establishment mechanisms based on a general tree-based logical key structure with both individual rekeying and batch rekeying. It also defines key establishment mechanisms based on a key chain with group forward secrecy, group backward secrecy or both group f...view more

    • sale 15% off
    • Draft
      18 pages
      English language
    • sale 15% off
    • Standard
      18 pages
      English language
    • sale 15% off
    • Draft
      18 pages
      English language

This part of IEC 62443 establishes requirements for:
• defining a system under consideration (SUC) for an industrial automation and control
system (IACS);
• partitioning the SUC into zones and conduits;
• assessing risk for each zone and conduit;
• establishing the target security level (SL-T) for each zone and conduit; and
• documenting the security requirements.

    • sale 10% off
    • Standard
      34 pages
      English language
    • e-Library read for
      1 day

This document describes test methods for determining the conformance of security crypto suites defined in ISO/IEC 29167-16. This document contains conformance tests for all mandatory and applicable optional functions. The conformance parameters are the following: — parameters that apply directly affecting system functionality and inter-operability; — protocol including commands and replies; — nominal values and tolerances. Unless otherwise specified, the tests in this document are to be applied ...view more

    • sale 15% off
    • Standard
      21 pages
      English language
    • sale 15% off
    • Draft
      21 pages
      English language

For security evaluation of biometric verification systems and biometric identification systems, this document is dedicated to the security evaluation of biometric recognition performance applying the ISO/IEC 15408 series. It provides requirements and recommendations to the developer and the evaluator for the supplementary activities on biometric recognition performance specified in ISO/IEC 19989-1. The evaluation of presentation attack detection techniques is out of the scope of this document ex...view more

    • sale 15% off
    • Standard
      33 pages
      English language
    • sale 15% off
    • Draft
      42 pages
      English language

For security evaluation of biometric recognition performance and presentation attack detection for biometric verification systems and biometric identification systemsthis document specifies: — extended security functional components to SFR Classes in ISO/IEC 15408-2; — supplementary activities to methodology specified in ISO/IEC 18045 for SAR Classes of ISO/IEC 15408-3. This document introduces the general framework for the security evaluation of biometric systems, including extended security fu...view more

    • sale 15% off
    • Standard
      62 pages
      English language
    • sale 15% off
    • Draft
      83 pages
      English language

For security evaluation of biometric verification systems and biometric identification systems, this document is dedicated to security evaluation of presentation attack detection applying the ISO/IEC 15408 series. It provides recommendations and requirements to the developer and the evaluator for the supplementary activities on presentation attack detection specified in ISO/IEC 19989-1. This document is applicable only to TOEs for single biometric characteristic type but for the selection of a c...view more

    • sale 15% off
    • Standard
      18 pages
      English language
    • sale 15% off
    • Draft
      25 pages
      English language

This document gives guidelines for information security incident response in ICT security operations. This document does this by firstly covering the operational aspects in ICT security operations from a people, processes and technology perspective. It then further focuses on information security incident response in ICT security operations including information security incident detection, reporting, triage, analysis, response, containment, eradication, recovery and conclusion. This document is...view more

    • sale 15% off
    • Standard
      31 pages
      English language
    • sale 15% off
    • Draft
      32 pages
      English language

This document serves as a general model for subsequent parts specifying non-repudiation mechanisms using cryptographic techniques. The ISO/IEC 13888 series provides non-repudiation mechanisms for the following phases of non-repudiation: — evidence generation; — evidence transfer, storage and retrieval; and — evidence verification. Dispute arbitration is outside the scope of the ISO/IEC 13888 series.

    • sale 15% off
    • Standard
      20 pages
      English language
    • sale 15% off
    • Draft
      20 pages
      English language

This document specifies mechanisms for the provision of specific, communication-related, non‑repudiation services using asymmetric cryptographic techniques.

    • sale 15% off
    • Standard
      13 pages
      English language
    • sale 15% off
    • Draft
      14 pages
      English language
    • sale 15% off
    • Standard
      12 pages
      English language
    • sale 15% off
    • Draft
      11 pages
      English language

The scope of this Recommendation | International Standard is to define guidelines supporting the implementation of
information security controls in telecommunications organizations.
The adoption of this Recommendation | International Standard will allow telecommunications organizations to meet
baseline information security management requirements of confidentiality, integrity, availability and any other relevant
security property.

    • sale 10% off
    • Standard
      41 pages
      English language
    • e-Library read for
      1 day
    • sale 10% off
    • Draft
      37 pages
      English language
    • e-Library read for
      1 day

This document provides requirements and recommendations to vendors on the disclosure of
vulnerabilities in products and services. Vulnerability disclosure enables users to perform technical
vulnerability management as specified in ISO/IEC 27002:2013, 12.6.1[1]. Vulnerability disclosure helps
users protect their systems and data, prioritize defensive investments, and better assess risk. The goal
of vulnerability disclosure is to reduce the risk associated with exploiting vulnerabilities. Coor...
view more

    • sale 10% off
    • Standard
      42 pages
      English language
    • e-Library read for
      1 day
    • sale 10% off
    • Draft
      39 pages
      English language
    • e-Library read for
      1 day

This document provides requirements and recommendations for how to process and remediate reported potential vulnerabilities in a product or service.
This document is applicable to vendors involved in handling vulnerabilities.

    • sale 10% off
    • Standard
      21 pages
      English language
    • e-Library read for
      1 day
    • sale 10% off
    • Draft
      18 pages
      English language
    • e-Library read for
      1 day

This International Standard provides a privacy framework which
- specifies a common privacy terminology;
- defines the actors and their roles in processing personally identifiable information (PII);
- describes privacy safeguarding considerations; and
- provides references to known privacy principles for information technology.
This International Standard is applicable to natural persons and organizations involved in specifying,
procuring, architecting, designing, developing, testing, main...
view more

    • sale 10% off
    • Standard
      37 pages
      English language
    • e-Library read for
      1 day
    • sale 10% off
    • Standard
      37 pages
      English language
    • e-Library read for
      1 day
    • sale 10% off
    • Draft
      34 pages
      English language
    • e-Library read for
      1 day