| BSI |
BS ISO/IEC 27038 |
Information technology. Security techniques. Specification for digital redaction |
|
| ISO |
ISO/IEC 27038 |
Information technology - Security techniques - Specification for digital redaction |
|
| CSA |
CAN/CSA-ISO/IEC 27033-4:18 (R2023) |
Information technology — Security techniques — Network security — Part 4: Securing communications between networks using security gateways (Adopted ISO/IEC 27033-4:2014, first edition, 2014-03-01) |
|
| CSA |
CAN/CSA-ISO/IEC 15816:F04 (C2022) |
Information technology - Security techniques - Security information objects for access control (Adopted ISO/IEC 15816:2002, first edition, 2002-02-01) |
|
| CSA |
CAN/CSA-ISO/IEC 27040:F18 (C2023) |
Information technology — Security techniques — Storage security (Adopted ISO/IEC 27040:2015, first edition, 2015-01-15) |
|
| CSA |
CAN/CSA-ISO/IEC 27021:18 (R2023) |
Information technology — Security techniques — Competence requirements for information security management systems professionals (Adopted ISO/IEC 27021:2017, first edition, 2017-10) |
|
| CSA |
CAN/CSA-ISO/IEC 27003:18 (R2023) |
Information technology - Security techniques - Information security management systems - Guidance (Adopted ISO/IEC 27003:2017, second edition, 2017-03) |
|
| BSI |
BS ISO/IEC 27036-3 |
Information technology. Security techniques. Information security for supplier relationships. Guidelines for information and communication technology supply chain security |
|
| CSA |
CSA ISO/IEC TS 27008:20 |
Information technology — Security techniques — Guidelines for the assessment of information security controls (Adopted ISO/IEC TS 27008:2019, first edition, 2019-01) |
|
| CSA |
CAN/CSA-ISO/IEC 27036-4:18 (R2022) |
Information technology — Security techniques — Information security for supplier relationships — Part 4: Guidelines for security of cloud services (Adopted ISO/IEC 27036-4:2016, first edition, 2016-10-01) |
|
| CSA |
CAN/CSA-ISO/IEC 27031:13 (R2022) |
Information technology - Security techniques - Guidelines for information and communication technology readiness for business continuity (Adopted ISO/IEC 27031:2011, first edition, 2011-03-01) |
|
| CSA |
CAN/CSA-ISO/IEC 15945:04 (R2022) |
Information technology - Security techniques - Specification of TTP services to support the application of digital signatures (Adopted ISO/IEC 15945:2002, first edition, 2002-02-01) |
|
| CSA |
CSA ISO/IEC 27000:F19 |
Information technology - Security techniques - Information security management systems - Overview and vocabulary (Adopted ISO/IEC 27000:2018, fifth edition, 2018-02) |
|
| CSA |
CAN/CSA-ISO/IEC 19464:18 (R2022) |
Information technology — Advanced Message Queuing Protocol (AMQP) v1.0 specification (Adopted ISO/IEC 19464:2014, first edition, 2014-05-01) |
|
| CSA |
CAN/CSA-ISO/IEC 27033-6:18 (R2022) |
Information technology — Security techniques — Network security — Part 6: Securing wireless IP network access (Adopted ISO/IEC 27033-6:2016, first edition, 2016-06-01) |
|
| CSA |
CSA ISO/IEC 18370-1:20 |
Information technology — Security techniques — Blind digital signatures — Part 1: General (Adopted ISO/IEC 18370-1:16 first edition, 2016-11-15) |
|
| CSA |
CAN/CSA-ISO/IEC 27004:18 (R2022) |
Information technology — Security techniques — Information security management — Monitoring, measurement, analysis and evaluation (Adopted ISO/IEC 27004:2016, second edition, 2016-12-15) |
|
| CSA |
CAN/CSA-ISO/IEC 19762:18 (R2022) |
Information technology — Automatic identification and data capture (AIDC) techniques — Harmonized vocabulary (Adopted ISO/IEC 19762:2016, first edition, 2016-02-01) | Technologies de l'information — Technique automatiques d'identification et de saisie de données (AIDC) — Vocabulaire harmonisé (norme ISO/IEC 19762:2016 adoptée, première édition, 2016-02-01) |
|
| CSA |
CAN/CSA-ISO/IEC 27034-6:18 (R2022) |
Information technology — Security techniques — Application security — Part 6: Case studies (Adopted ISO/IEC 27034-6:2016, first edition, 2016-10-01) |
|
| CSA |
CAN/CSA-ISO/IEC 18367:18 (R2022) |
Information technology — Security techniques — Cryptographic algorithms and security mechanisms conformance testing (Adopted ISO/IEC 18367:2016, first edition, 2016-12-15) |
|
| CSA |
CSA C62817:15 (R2020) |
Photovoltaic systems — Design qualification of solar trackers (Adopted IEC 62817:2014, first edition, 2014-08,with Canadian deviations) | Systèmes photovoltaïques — Qualification de conception des suiveurs solaires (norme IEC 62817:2014 adoptée, première édition, 2014-08,avec exigences propres au Canada) |
|
| CSA |
CSA ISO/IEC 27017:F16 (C2021) |
Information technology — Security techniques — Code of practice for information security controls based on ISO/IEC 27002 for cloud services (Adopted ISO/IEC 27017:2015, first edition, 2015-12-15) |
|
| CSA |
CSA ISO 16559:15 (R2020) |
Solid biofuels - Terminology, definitions and descriptions (Adopted ISO 16559:2014, first edition, 2014-07-15) |
|
| CSA |
CAN/CSA-ISO/IEC 27034-5:18 (R2023) |
Information technology — Security techniques — Application security — Part 5: Protocols and application security controls data structure (Adopted ISO/IEC 27034-5:2017, first edition, 2017-10) |
|
| CSA |
CSA C22.2 NO. 62790:20 |
Junction boxes for photovoltaic modules — Safety requirements and tests (Adopted IEC 62790:2014, first edition, 2014-11, with Canadian deviations) | Boîtes de jonction pour modules photovoltaïques — Exigences de sécurité et essais (norme IEC 62790:2014 adoptée, première édition, 2014-11, avec exigences propres au Canada) |
|