IT Security and Privacy — A framework for identity management — Part 2: Reference architecture and r...
This document:
• provides guidelines for the implementation of systems for the management of identity information, and
• specifies requirements for the implementation and operation of a framework for identity management.
This document is applicable to any information system where information relating to identity is processed or stored."
to
“This document:
· provides…
Cybersecurity — IoT security and privacy — Cybersecurity labelling framework for consumer IoT
This document defines a Universal Cybersecurity Labelling Framework for the development and implementation of cybersecurity labelling programmes for consumer IoT products and includes guidance on the following topics:
• Risks and threats associated with consumer IoT products;
• Stakeholders, roles and responsibilities;
• Relevant standards and guidance documents;
• Conformity assessment options…
Information security, cybersecurity and privacy protection — Guidelines on privacy preservation base...
This document provides guidelines on using zero knowledge proofs (ZKP) to improve privacy
by reducing the risks associated with the sharing or transmission of personal data between
organisations and users by minimizing the information shared. It will include several ZKP
functional requirements relevant to a range of different business use cases, then describes
how different ZKP models can be used…
Information security, cybersecurity and privacy protection – Controls and guidance for personally id...
ISO/IEC 29151:2017 establishes control objectives, controls and guidelines for implementing controls, to meet the requirements identified by a risk and impact assessment related to the protection of personally identifiable information (PII).
In particular, this Recommendation | International Standard specifies guidelines based on ISO/IEC 27002, taking into consideration the requirements for…
Electronic fee collection — Requirements for EFC application interfaces on common media
This document defines requirements to support information exchanges among related entities of a common payment scheme. It defines:
a) electronic fee collection (EFC) functional requirements for a common payment medium;
b) an application structure in a common payment medium;
c) EFC application data in a common payment medium.
The following are outside the scope of this document:
—…
Information security, cybersecurity and privacy protection – Guidelines for protection of personally...
This document establishes commonly accepted control objectives, controls and guidelines for implementing measures to protect Personally Identifiable Information (PII) in line with the privacy principles in ISO/IEC 29100 for the public cloud computing environment.
In particular, this document specifies guidelines based on ISO/IEC 27002, taking into consideration the regulatory requirements for the…
Information technology — Genomic information representation — Part 3: Metadata and application progr...
This document specifies information metadata, auxiliary fields, SAM interoperability, protection metadata and programming interfaces of genomic information. It defines:
— metadata storage and interpretation for the different encapsulation levels as specified in ISO/IEC 23092-1 (in Clause 6);
— protection elements providing confidentiality, integrity and privacy rules at the different…
Security and resilience — Authenticity, integrity and trust for products and documents — Framework f...
This document provides an approach that support stakeholders in a supply chain to accomplish a chain of trust regarding properties of identifiable material goods along a supply chain. This document gives guidance on the identification of trust domains and their corresponding trustworthiness attributes, and the measures to achieve the targeted trustworthiness attributes.
As a supply chain…
Information security, cybersecurity and privacy protection — Requirements for the competence of IT s...
This document provides the specialized requirements to demonstrate the competence of individuals in performing IT product security evaluations and certifications in accordance with the ISO/IEC 15408 series and ISO/IEC 18045.