Search Serbian, European and international standards. Identify the standard organization, select the standard number or keyword, and complete the search you want. You can also add a standard drafting stage or a committee / national committee that drafted the standard
Information security, cybersecurity and privacy protection — Guidance on the integrated implementation of ISO/IEC 27001 and ISO/IEC 20000-1
60.60 Standard published
Information security, cybersecurity and privacy protection — Guidance on the integrated implementation of ISO/IEC 27001 and ISO/IEC 20000-1 — Amendment 1
60.60 Standard published
Information security, cybersecurity and privacy protection — Governance of information security
90.20 Standard under periodical review
Information technology — Security techniques — Information security management — Organizational economics
60.60 Standard published
Information technology — Security techniques — Code of practice for information security controls based on ISO/IEC 27002 for cloud services
90.92 Standard to be revised
Information security, cybersecurity and privacy protection — Guidelines for protection of personally identifiable information (PII) in public clouds acting as PII processors
60.60 Standard published
Information security, cybersecurity and privacy protection — Information security controls for the energy utility industry
60.60 Standard published
Information technology — Security techniques — Competence requirements for information security management systems professionals
90.60 Close of review
Information technology — Security techniques — Competence requirements for information security management systems professionals — Amendment 1: Addition of ISO/IEC 27001:2013 clauses or subclauses to competence requirements
60.60 Standard published
Information technology — Guidance on information security management system processes
90.60 Close of review
Cybersecurity — Information and communication technology readiness for business continuity
60.60 Standard published
Information technology — Security techniques — Network security — Part 1: Overview and concepts
90.93 Standard confirmed
Information technology — Security techniques — Network security — Part 2: Guidelines for the design and implementation of network security
90.60 Close of review
Information technology — Security techniques — Network security — Part 3: Reference networking scenarios — Threats, design techniques and control issues
90.60 Close of review
Information technology — Security techniques — Network security — Part 4: Securing communications between networks using security gateways
90.93 Standard confirmed
Information technology — Security techniques — Network security — Part 5: Securing communications across networks using Virtual Private Networks (VPNs)
90.93 Standard confirmed
Information technology — Security techniques — Network security — Part 6: Securing wireless IP network access
90.93 Standard confirmed