| ISO |
ISO/IEC 10116 |
Information technology - Security techniques - Modes of operation for an n-bit block cipher |
|
| BSI |
BS ISO/IEC 10116 |
Information technology. Security techniques. Modes of operation for an n-bit cipher |
|
| CSA |
CAN/CSA-ISO/IEC 27003:18 (R2023) |
Information technology - Security techniques - Information security management systems - Guidance (Adopted ISO/IEC 27003:2017, second edition, 2017-03) |
|
| CSA |
CAN/CSA-ISO/IEC 27021:18 (R2023) |
Information technology — Security techniques — Competence requirements for information security management systems professionals (Adopted ISO/IEC 27021:2017, first edition, 2017-10) |
|
| CSA |
CAN/CSA-ISO/IEC 10118-2:12 (R2021) |
Information technology - Security techniques - Hash-functions - Part 2: Hash-functions using an n-bit block cipher (Adopted ISO/IEC 10118-2:2010, third edition, 2010-10-15) |
|
| CSA |
C22.2 NO. 60079-15 |
Explosive atmospheres - Part 15: Equipment protection by type of protection "n” (Adopted IEC 60079-15:2017, fifth edition, 2017-12, with Canadian deviations) | Atmosphères explosives - Partie 15 : Protection du matériel par mode de protection « n » (norme IEC 60079-15:2017 adoptée, cinquième édition, 2017-12, avec exigences propres au Canada) |
|
| CSA |
CAN/CSA-C22.2 NO. 60079-15:18 (R2023) |
Explosive atmospheres — Part 15: Equipment protection by type of protection "n” (Adopted IEC 60079-15:2017, fifth edition, 2017-12, with Canadian deviations) | Atmosphères explosives — Partie 15 : Protection du matériel par mode de protection « n » (norme IEC 60079-15:2017 adoptée, cinquième édition, 2017-12, avec exigences propres au Canada) |
|
| BSI |
BS ISO/IEC 27036-3 |
Information technology. Security techniques. Information security for supplier relationships. Guidelines for information and communication technology supply chain security |
|
| CSA |
CSA ISO/IEC 18033-3:12 (R2021) |
Information technology - Security techniques - Encryption algorithms - Part 3: Block ciphers (Adopted ISO/IEC 18033-3:2010, second edition, 2010-12-15) |
|
| CSA |
CAN/CSA-ISO/IEC 15816:F04 (C2022) |
Information technology - Security techniques - Security information objects for access control (Adopted ISO/IEC 15816:2002, first edition, 2002-02-01) |
|
| CSA |
CAN/CSA-ISO/IEC 18031:13/A1:18 (R2022) |
Amendment 1:2018 to CAN/CSA-ISO/IEC 18031:13, Information technology - Security techniques - Random bit generation (Adopted amendment 1:2017 to ISO/IEC 18031:2011 |
|
| CSA |
CAN/CSA-ISO/IEC 27034-5:18 (R2023) |
Information technology — Security techniques — Application security — Part 5: Protocols and application security controls data structure (Adopted ISO/IEC 27034-5:2017, first edition, 2017-10) |
|
| CSA |
CAN/CSA-ISO/IEC 29151:F18 (R2023) |
Information technology — Security techniques — Code of practice for personally identifiable information protection (Adopted ISO/IEC 29151:2017, first edition, 2017-08) |
|
| CSA |
CSA ISO/IEC 27000:F19 |
Information technology - Security techniques - Information security management systems - Overview and vocabulary (Adopted ISO/IEC 27000:2018, fifth edition, 2018-02) |
|
| CSA |
CAN/CSA-ISO/IEC 17922:18 (R2023) |
Information technology — Security techniques — Telebiometric authentication framework using biometric hardware security module (Adopted ISO/IEC 17922:2017, first edition, 2017-09) |
|
| CSA |
CAN/CSA-ISO/IEC 18031:13 (R2022) |
Information technology - Security techniques - Random bit generation (Adopted ISO/IEC 18031:2011, second edition, 2011-11-15) |
|
| CSA |
CAN/CSA-ISO/IEC 27040:F18 (C2023) |
Information technology — Security techniques — Storage security (Adopted ISO/IEC 27040:2015, first edition, 2015-01-15) |
|
| CSA |
CAN/CSA-ISO/IEC 27004:18 (R2022) |
Information technology — Security techniques — Information security management — Monitoring, measurement, analysis and evaluation (Adopted ISO/IEC 27004:2016, second edition, 2016-12-15) |
|
| CSA |
CAN/CSA-ISO/IEC 27036-4:18 (R2022) |
Information technology — Security techniques — Information security for supplier relationships — Part 4: Guidelines for security of cloud services (Adopted ISO/IEC 27036-4:2016, first edition, 2016-10-01) |
|
| CSA |
CSA ISO/IEC TS 27008:20 |
Information technology — Security techniques — Guidelines for the assessment of information security controls (Adopted ISO/IEC TS 27008:2019, first edition, 2019-01) |
|
| CSA |
CAN/CSA-ISO/IEC 27033-4:18 (R2023) |
Information technology — Security techniques — Network security — Part 4: Securing communications between networks using security gateways (Adopted ISO/IEC 27033-4:2014, first edition, 2014-03-01) |
|
| CSA |
CAN/CSA-ISO/IEC 24759:18 (R2023) |
Information technology — Security techniques — Test requirements for cryptographic modules (Adopted ISO/IEC 24759:2017, third edition, 2017-03) |
|
| CSA |
CAN/CSA-ISO/IEC 27031:13 (R2022) |
Information technology - Security techniques - Guidelines for information and communication technology readiness for business continuity (Adopted ISO/IEC 27031:2011, first edition, 2011-03-01) |
|
| CSA |
CSA ISO/IEC 18033-3:12 (R2021)/A1:22 |
Amendment 1:2022 to CSA ISO/IEC 18033-3:12, Information technology - Security techniques - Encryption algorithms - Part 3: Block ciphers - Amendment 1: SM4 (Adopted amendment 1:2021 to ISO/IEC 18033-3:2010) |
|
| CSA |
ISO/IEC TR 15446 |
Information technology - Security techniques - Guidance for the production of protection profiles and security targets (Adopted ISO/IEC TR 15446:2017, third edition, 2017-10) |
|