ISO/IEC JTC 1/SC 27
E565768
ISO/IEC JTC 1/SC 27 is the international standardization subcommittee responsible for developing standards in information security, cybersecurity, and privacy protection.
Statements (51)
| Predicate | Object |
|---|---|
| instanceOf |
ISO/IEC subcommittee
ⓘ
standardization body ⓘ |
| areaServed | worldwide ⓘ |
| collaboratesWith |
ISO/IEC JTC 1/SC 17
NERFINISHED
ⓘ
ISO/IEC JTC 1/SC 38 NERFINISHED ⓘ ISO/TC 215 NERFINISHED ⓘ ITU-T Study Groups NERFINISHED ⓘ |
| fieldOfWork |
cybersecurity
ⓘ
information security ⓘ privacy protection ⓘ |
| goal | to develop and maintain standards for information security, cybersecurity and privacy protection ⓘ |
| hasWorkingGroup |
ISO/IEC JTC 1/SC 27/WG 1
NERFINISHED
ⓘ
ISO/IEC JTC 1/SC 27/WG 2 NERFINISHED ⓘ ISO/IEC JTC 1/SC 27/WG 3 NERFINISHED ⓘ ISO/IEC JTC 1/SC 27/WG 4 NERFINISHED ⓘ ISO/IEC JTC 1/SC 27/WG 5 NERFINISHED ⓘ |
| outputLanguage | English ⓘ |
| parentOrganization |
ISO/IEC JTC 1
NERFINISHED
ⓘ
International Electrotechnical Commission NERFINISHED ⓘ International Organization for Standardization NERFINISHED ⓘ |
| responsibleForStandard |
ISO/IEC 27000
NERFINISHED
ⓘ
ISO/IEC 27001 NERFINISHED ⓘ ISO/IEC 27002 NERFINISHED ⓘ ISO/IEC 27005 NERFINISHED ⓘ ISO/IEC 27017 NERFINISHED ⓘ ISO/IEC 27018 NERFINISHED ⓘ ISO/IEC 27019 NERFINISHED ⓘ ISO/IEC 27035 NERFINISHED ⓘ ISO/IEC 27036 NERFINISHED ⓘ ISO/IEC 27037 NERFINISHED ⓘ ISO/IEC 27040 NERFINISHED ⓘ ISO/IEC 29100 NERFINISHED ⓘ ISO/IEC 29101 NERFINISHED ⓘ ISO/IEC 29134 NERFINISHED ⓘ ISO/IEC 29151 NERFINISHED ⓘ |
| scope |
IT security techniques
ⓘ
cryptographic and security mechanisms ⓘ information security management systems ⓘ privacy framework and privacy guidelines ⓘ security evaluation criteria and methodology ⓘ security management ⓘ security services ⓘ |
| standardPrefix | ISO/IEC 27000 series NERFINISHED ⓘ |
| standardType |
international standards
ⓘ
technical reports ⓘ technical specifications ⓘ |
| workingGroup1Scope | information security management systems and requirements ⓘ |
| workingGroup2Scope | cryptography and security mechanisms ⓘ |
| workingGroup3Scope | security evaluation, testing and specification ⓘ |
| workingGroup4Scope | security controls and services ⓘ |
| workingGroup5Scope | identity management and privacy technologies ⓘ |
Referenced by (2)
Full triples — surface form annotated when it differs from this entity's canonical label.