ISO 24760 PDF

ISO/IEC /FDAmd 1. Additional terminology and concepts. General information. Status: Deleted. Edition: 1. Number of pages: Technical. ISO/IEC •defines terms for identity management, and •specifies core concepts of identity and identity management and their relationships. Aug 1, ISO/IEC consists of the following parts, under the general title Information technology — Security techniques — A framework for identity.

Author: Arashishura JoJolmaran
Country: Mozambique
Language: English (Spanish)
Genre: Art
Published (Last): 9 June 2015
Pages: 239
PDF File Size: 20.96 Mb
ePub File Size: 10.43 Mb
ISBN: 282-3-44288-567-9
Downloads: 19694
Price: Free* [*Free Regsitration Required]
Uploader: Yogor

This includes generic methods, techniques and guidelines to address both security and privacy aspects, such as: There are other ones out there which do a better job of describing the key concepts of identity and identity management.

Create a free website or blog at WordPress. They are inconsistent in their use of other terms defined in the standard.

Email required Address never made public. I’ve seen this scenario play out more times than I have seen it work correctly. Describes the oso and vocabulary of ISMS [15]. Retrieved from ” https: The concepts slip from being descriptive this is what the concept means to being normative this is how a system should behave.

In many cases they use sio that are just as unclear as the one they are trying to define e. Information technology — Security techniques — Information security management systems — Overview and vocabulary.

You are commenting using your WordPress. Unfortunately it was adopted.


Provides guidelines for 244760 implementation of systems for the management of identity information and specifies requirements for the implementation and operation of a framework for identity management. Synonyms are given for terms that are clearly incorrect e. Standardization activity by this subcommittee includes general methods, management system requirements, techniques and guidelines to address both information security and privacy.


Information technology — Security techniques — Guidelines for identification, collection, acquisition and preservation of digital evidence. This site uses cookies. Describes the concepts and principles of ICT readiness for business continuity and the method and framework needed to identify aspects in which to improve it. Applicable to entities involved in specifying, procuring, designing, testing, maintaining, administering and operating ICT systems that process PII.

Hi Doug, I was wondering whether you ever got around to sharing other standards and resources that do a better job of describing the concepts and terminology around identity. It is entirely ICT focused though at other times it claims otherwise which is unhelpful in the context of a general framework for identity. Leave a Iao Cancel reply Enter your comment here Specifies the subjects to be addressed during the security evaluation of a biometric system [23].

To find out more, including how to control cookies, see here: Latest Tweets Nice article on practical concerns with modelling. Views Read Edit View history. Provides guidance for the handling of digital evidence that could be of evidential value [27].

Introduction and general model. Security controls and services. Posted on February 10, at 9: Information technology — Security techniques — Requirements for bodies providing audit and certification of information security management systems.

Hi Doug, funny that I should come across your blog first when looking into advice onto adhering to this standard. Provides a privacy framework that: Fill in your details below or click an icon to log in: The only place I see is reference to it from other standards. We are looking for an experienced Director of Finance for our head quarters in Noumea.


They redefine commonly used terms in the industry authentication is redefined to mean a form of verification. Information technology — Security techniques — Code of practice for information security controls. Information technology — Security techniques — A framework for identity management — Part 1: My view is that it should be avoided.

ISO/IEC JTC 1/SC 27 – Wikipedia

In short, avoid this standard. This standard is supposed to define key terms for identity management and specify core concepts in identity and identity management. I couldn’t agree more with everything in it! Information technology — Security techniques — Guidelines for information and communication technology readiness for business continuity.

Identity Standards: ISO | Doug Newdick’s Blog

Specifies six methods for authenticated encryption with the security objectives of: This page was last edited on 6 Marchat Shane Day July jso, at 4: The focus of each working group is described in the group’s terms of reference.

Addresses the management jso for ensuring the security of applications [5] and presents an overview of application security through the introduction of definitions, concepts, principles and processes [25]. Countries pay a fee to ISO to be members of subcommittees. Identity management and privacy technologies.

The definitions are mostly unclear and imprecise: Information technology — Security techniques — Application security — Part 1: Notify me of new posts via email. Notify me of new comments via email. Specifies the requirements for establishing, implementing, monitoring, and maintaining documented a documented ISMS within an organization.