Search Serbian, European and international standards. Identify the standard organization, select the standard number or keyword, and complete the search you want. You can also add a standard drafting stage or a committee / national committee that drafted the standard
Information technology – Network security — Part 7: Guidelines for network virtualization security
60.60 Standard published
Information technology — Security techniques — Application security — Part 1: Overview and concepts
90.93 Standard confirmed
Information technology — Security techniques — Application security — Part 1: Overview and concepts — Technical Corrigendum 1
60.60 Standard published
Information technology — Security techniques — Application security — Part 2: Organization normative framework
90.93 Standard confirmed
Information technology — Application security — Part 3: Application security management process
90.93 Standard confirmed
Information technology — Security techniques — Application security — Part 5: Protocols and application security controls data structure
90.93 Standard confirmed
Information technology — Application security — Part 5-1: Protocols and application security controls data structure, XML schemas
90.60 Close of review
Information technology — Security techniques — Application security — Part 6: Case studies
90.93 Standard confirmed
Information technology — Application security — Part 7: Assurance prediction framework
90.93 Standard confirmed
Information technology — Information security incident management — Part 1: Principles and process
60.60 Standard published
Information technology — Information security incident management — Part 2: Guidelines to plan and prepare for incident response
60.60 Standard published
Information technology — Information security incident management — Part 3: Guidelines for ICT incident response operations
90.60 Close of review
Information technology — Information security incident management — Part 4: Coordination
60.60 Standard published
Cybersecurity — Supplier relationships — Part 1: Overview and concepts
60.60 Standard published
Cybersecurity — Supplier relationships — Part 2: Requirements
60.60 Standard published
Cybersecurity — Supplier relationships — Part 3: Guidelines for hardware, software, and services supply chain security
60.60 Standard published
Information technology — Security techniques — Information security for supplier relationships — Part 4: Guidelines for security of cloud services
90.93 Standard confirmed
Information technology — Security techniques — Guidelines for identification, collection, acquisition and preservation of digital evidence
90.60 Close of review