Information security, cybersecurity and privacy protection — Security requirements for cryptographic...
This document specifies the security requirements for a cryptographic module utilized within a security system protecting sensitive information in Information and Communication Technologies (ICT). It defines four security levels for cryptographic modules to provide for a wide spectrum of data sensitivity and a diversity of application environments. This document specifies up to four security…
Information security, cybersecurity and privacy protection — Test requirements for cryptographic mod...
This document specifies the methods to be used by testing laboratories to test whether the cryptographic module conforms to the requirements specified in ISO/IEC 19790:2025. The methods are developed to provide a high degree of objectivity during the testing process and to ensure consistency across the testing laboratories.
This document also specifies the information that vendors are required to…
Information security, cybersecurity and privacy protection - Security requirements for cryptographic...
This document specifies the security requirements for a cryptographic module utilized within a security system protecting sensitive information in Information and Communication Technologies (ICT). It defines four security levels for cryptographic modules to provide for a wide spectrum of data sensitivity and a diversity of application environments. This document specifies up to four security…
Information security, cybersecurity and privacy protection - Test requirements for cryptographic mod...
This document specifies the methods to be used by testing laboratories to test whether the cryptographic module conforms to the requirements specified in ISO/IEC 19790:2025. The methods are developed to provide a high degree of objectivity during the testing process and to ensure consistency across the testing laboratories.
This document also specifies the information that vendors are required to…
Information technology — Business operational view — Part 1: Operational aspects of open-edi for imp...
This document addresses the fundamental requirements of the commercial and legal frameworks and their environments on business transactions. It also integrates the requirements of the information technology and telecommunications environments.
In addition to the existing strategic directions of "portability" and "interoperability", the added strategic direction of ISO/IEC JTC …
Information technology - Business operational view - Part 1: Operational aspects of open-edi for imp...
This document addresses the fundamental requirements of the commercial and legal frameworks and their environments on business transactions. It also integrates the requirements of the information technology and telecommunications environments.
In addition to the existing strategic directions of "portability" and "interoperability", the added strategic direction of ISO/IEC JTC…
Information technology — Security techniques — Privacy guidelines for fintech services
This document provides guidelines on privacy for fintech services.
It identifies all relevant business models and roles in consumer-to-business relations and business-to-business relations, as well as privacy risks and privacy requirements, which are related to fintech services. It provides specific privacy controls for fintech services to address privacy risks.
This document is based on the…
Information technology - Security techniques - Privacy guidelines for fintech services
This document provides guidelines on privacy for fintech services.
It identifies all relevant business models and roles in consumer-to-business relations and business-to-business relations, as well as privacy risks and privacy requirements, which are related to fintech services. It provides specific privacy controls for fintech services to address privacy risks.
This document is based on the…