Application Security - Security Standards and Regulations

Security Standards and Regulations

  • Sarbanes-Oxley Act (SOX)
  • Health Insurance Portability and Accountability Act (HIPAA)
  • IEEE P1074
  • ISO/IEC 7064:2003 Information technology -- Security techniques -- Check character systems
  • ISO/IEC 9796-2:2002 Information technology -- Security techniques -- Digital signature schemes giving message recovery -- Part 2: Integer factorization based mechanisms
  • ISO/IEC 9796-3:2006 Information technology -- Security techniques -- Digital signature schemes giving message recovery -- Part 3: Discrete logarithm based mechanisms
  • ISO/IEC 9797-1:1999 Information technology -- Security techniques -- Message Authentication Codes (MACs) -- Part 1: Mechanisms using a block cipher
  • ISO/IEC 9797-2:2002 Information technology -- Security techniques -- Message Authentication Codes (MACs) -- Part 2: Mechanisms using a dedicated hash-function
  • ISO/IEC 9798-1:1997 Information technology -- Security techniques -- Entity authentication -- Part 1: General
  • ISO/IEC 9798-2:1999 Information technology -- Security techniques -- Entity authentication -- Part 2: Mechanisms using symmetric encipherment algorithms
  • ISO/IEC 9798-3:1998 Information technology -- Security techniques -- Entity authentication -- Part 3: Mechanisms using digital signature techniques
  • ISO/IEC 9798-4:1999 Information technology -- Security techniques -- Entity authentication -- Part 4: Mechanisms using a cryptographic check function
  • ISO/IEC 9798-5:2004 Information technology -- Security techniques -- Entity authentication -- Part 5: Mechanisms using zero-knowledge techniques
  • ISO/IEC 9798-6:2005 Information technology -- Security techniques -- Entity authentication -- Part 6: Mechanisms using manual data transfer
  • ISO/IEC 14888-1:1998 Information technology -- Security techniques -- Digital signatures with appendix -- Part 1: General
  • ISO/IEC 14888-2:1999 Information technology -- Security techniques -- Digital signatures with appendix -- Part 2: Identity-based mechanisms
  • ISO/IEC 14888-3:2006 Information technology -- Security techniques -- Digital signatures with appendix -- Part 3: Discrete logarithm based mechanisms


  • ISO/IEC 27001:2005 Information technology -- Security techniques -- Information security management systems -- Requirements
  • ISO/IEC 27002:2005 Information technology -- Security techniques -- Code of practice for information security management
  • ISO/IEC 24762:2008 Information technology -- Security techniques -- Guidelines for information and communications technology disaster recovery services
  • ISO/IEC 27006:2007 Information technology -- Security techniques -- Requirements for bodies providing audit and certification of information security management systems
  • ISO/IEC 270034-1:2011 Information technology — Security techniques — Application security -- Part 1: Overview and concepts
  • Gramm-Leach-Bliley Act
  • PCI Data Security Standarded (PCI DSS)

Read more about this topic:  Application Security

Famous quotes containing the words security, standards and/or regulations:

    The horror of class stratification, racism, and prejudice is that some people begin to believe that the security of their families and communities depends on the oppression of others, that for some to have good lives there must be others whose lives are truncated and brutal.
    Dorothy Allison (b. 1949)

    The technologist was the final guise of the white missionary, industrialization the last gospel of a dying race and living standards a substitute for a purpose in living.
    Max Frisch (1911–1991)

    If it were possible to make an accurate calculation of the evils which police regulations occasion, and of those which they prevent, the number of the former would, in all cases, exceed that of the latter.
    Karl Wilhelm Von Humboldt (1767–1835)