Search Serbian, European and international standards. Identify the standard organization, select the standard number or keyword, and complete the search you want. You can also add a standard drafting stage or a committee / national committee that drafted the standard
Information technology — Electronic discovery — Part 3: Code of practice for electronic discovery
90.60 Close of review
Information technology — Electronic discovery — Part 4: Technical readiness
90.20 Standard under periodical review
Information technology — Security techniques — Requirements for establishing virtualized roots of trust
60.60 Standard published
Cybersecurity — Security recommendations for establishing trusted connections between devices and services
60.60 Standard published
Information technology — Public key infrastructure — Practices and policy framework
60.60 Standard published
Information technology — Cybersecurity — Overview and concepts
90.93 Standard confirmed
Information security, cybersecurity and privacy protection — Guidelines for applying ISO/IEC 27001 and related standards in support of cyber insurance
90.92 Standard to be revised
Cybersecurity — Guidance on using ISO and IEC standards in a cybersecurity framework
60.60 Standard published
Information technology, cybersecurity and privacy protection — Cybersecurity framework development guidelines
90.93 Standard confirmed
Cybersecurity — IoT security and privacy — Device baseline requirements
60.60 Standard published
Cybersecurity – IoT security and privacy – Guidelines for IoT-domotics
60.60 Standard published
Cybersecurity — IoT security and privacy — Cybersecurity labelling framework for consumer IoT
60.60 Standard published
Information technology — Security techniques — Privacy engineering for system life cycle processes
60.60 Standard published
Information security, cybersecurity and privacy protection — Requirements for attribute-based unlinkable entity authentication
60.60 Standard published
Information security, cybersecurity and privacy protection — Security and privacy requirements for authentication using biometrics on mobile devices — Part 1: Local modes
60.60 Standard published
Information security, cybersecurity and privacy protection — Security and privacy requirements for authentication using biometrics on mobile devices — Part 2: Remote modes
60.60 Standard published
Information security, cybersecurity and privacy protection — Application of ISO 31000 for assessment of identity-related risk
60.60 Standard published