Information technology — Security techniques — Application security — Part 5: Protocols and application security controls data structure
Document status: Active
Information technology - Security techniques - Application security - Part 6: Case studies
Document status: Active
Information technology — Application security — Part 7: Assurance prediction framework
Document status: Active
Information technology - Security techniques - Information security incident management - Part 1: Principles of incident management
Document status: Active
Information technology — Security techniques — Information security incident management — Part 2: Guidelines to plan and prepare for incident response
Document status: Active
Information technology - Security techniques - Information security for supplier relationships - Part 1: Overview and concepts
Document status: Active
Cybersecurity - Supplier relationships - Part 1: Overview and concepts
Document status: Active
Information technology — Security techniques — Information security for supplier relationships — Part 2: Requirements
Document status: Active
Cybersecurity - Supplier relationships - Part 2: Requirements
Document status: Active
Information technology - Security techniques - Information security for supplier relationships - Part 3: Guidelines for information and communication technology supply chain security
Document status: Active