The committee's charter is defined in its Terms Of Reference [PDF].
Terms of Reference is subject to change

Active Projects0
Constitution0
International Relationships0
Published Standards0
Sub Committees0
Active Projects 4
Constitution 38
International Relationships 1
Published Standards 34
Sub Committees 3
  • This is a list of projects currently being worked on by Standards Australia's Standards Development Team.

    Project Code
    Project Title
    • AS ISO/IEC 27004

      Information technology - Security techniques - Information security management systems - Monitoring, measurement, analysis and evaluation

    • AS ISO/IEC 27011

      Information technology - Security techniques –Information security control guidelines based on ISO/IEC 27002 for telecommunications organizations

    • AS ISO/IEC 27035.1

      Information technology -- Security techniques -- Information security incident management -- Part 1: Principles of incident management

    • AS ISO/IEC 27035.2

      Information technology - Security techniques - Information security incident management - Part 2: Guidelines to plan and prepare for incident response

  • The constitution of a Technical Committee consists of the Nominating Organisations that represent various interest groups across the industries. These Nominating Organisations are currently participating in Standards Australia’s Standards Development activity. The Nominating Organisation appoints a representative to represent the views of that organisation’s interest group during the development of a Standard.

    Constitution
     
  • Standards Australia participates in Standards development with the International standards bodies as listed below.

    For further information on ISO relationships please visit ISO’s website www.iso.org

    For further information on IEC relationships please visit IEC’s website www.iec.ch

    Organisation
    Title
    • ISO/IEC

      IT Security techniques

  • Below is the list of current Standards developed and published by Standards Australia. This list does not display the obsolete, superseded, available superseded and withdrawn Standards. The published Standards are documents that set out specifications and procedures designed to ensure products, services and systems are safe, reliable and consistently perform the way they are intended to.

    Purchasing Standards

    To purchase a Standard, please contact our publishing partner SAI Global InfoStore.

    Designation
    Publication Title
    • AS 14443.1-2003

      Identification cards - Contactless integrated circuit(s) cards - Proximity cards - Physical characteristics

    • AS 14443.1-2003 Rec:2016

      Identification cards - Contactless integrated circuit(s) cards - Proximity cards - Part 1: Physical characteristics

    • AS 14443.2-2003

      Identification cards - Contactless integrated circuit(s) cards - Proximity cards - Radio frequency power and signal interface

    • AS 14443.2-2003 Rec:2016

      Identification cards - Contactless integrated circuit(s) cards - Proximity cards - Part 2: Radio frequency power and signal interface

    • AS 14443.3-2003

      Identification cards - Contactless integrated circuit(s) cards - Proximity cards - Initialization and anticollision

    • AS 14443.3-2003 Rec:2016

      Identification cards - Contactless integrated circuit(s) cards - Proximity cards - Part 3: Initialization and anticollision

    • AS 14443.4-2003

      Identification cards - Contactless integrated circuit(s) cards - Proximity cards - Transmission protocol

    • AS 14443.4-2003 Rec:2016

      Identification cards - Contactless integrated circuit(s) cards - Proximity cards - Part 4: Transmission protocol

    • AS 15693.1-2003

      Identification cards - Contactless integrated circuit(s) cards - Vicinity cards - Physical characteristics

    • AS 15693.2-2003

      Identification cards - Contactless integrated circuit(s) cards - Vicinity cards - Air interface and initialization

    • AS 15693.3-2003

      Identification cards - Contactless integrated circuit(s) cards - Vicinity cards - Anticollision and transmission protocol

    • AS 3522.6-2002

      Identification cards - Recording technique - Magnetic stripe - High coercivity

    • AS 4860-2007

      Knowledge-based identity authentication - Recognizing Known Customers

    • AS ISO/IEC 27001:2015

      Information technology - Security techniques - Information security management systems - Requirements

    • AS ISO/IEC 27001:2015 Amd 1:2016

      Information technology - Security techniques - Information security management systems - Requirements

    • AS ISO/IEC 27002:2015

      Information technology - Security techniques - Code of practice for information security controls

    • AS ISO/IEC 27002:2015 Amd 1:2016

      Information technology - Security techniques - Code of practice for information security controls

    • AS ISO/IEC 27003:2017

      Information technology - Security techniques - Information security management systems - Guidance

    • AS ISO/IEC 27011:2017

      Information technology - Security techniques –Information security control guidelines based on ISO/IEC 27002 for telecommunications organizations

    • AS ISO/IEC 27013:2017

      Information technology - Security techniques - Guidance on the integrated implementation of ISO/IEC 27001 and ISO/IEC 20000-1

    • AS ISO/IEC 27035.1:2017

      Information technology—Security techniques—Information security incident management, Part 1: Principles of incident management

    • AS ISO/IEC 27035.2:2017

      Information technology—Security techniques—Information security incident management, Part 2: Guidelines to plan and prepare for incident response

    • AS/NZS ISO/IEC 11770.2-2008

      Information technology - Security techniques - Key management - Mechanisms using symmetric techniques

    • AS/NZS ISO/IEC 11770.3-2008

      Information technology - Security techniques - Key management - Mechanisms using asymmetric techniques

    • AS/NZS ISO/IEC 11770.4-2008

      Information technology-Security techniques - Key management - Mechanisms based on weak secrets

    • AS/NZS ISO/IEC 17799-2001 AMDT 1-2004

      Information technology - Code of practice for information security management

    • AS/NZS ISO/IEC 17799-2006 AMDT 1

      Information technology - Security techniques - Code of practice for information security management

    • AS/NZS ISO/IEC 18028.1-2008

      Information technology - Security techniques - IT network security - Network security management

    • AS/NZS ISO/IEC 18028.5-2008

      Information technology - Security techniques - IT network security - Securing communications across networks using virtual private networks

    • AS/NZS ISO/IEC 18033.2-2008

      Information technology - Security techniques - Encryption algorithms - Asymmetric ciphers

    • AS/NZS ISO/IEC 27005-2012

      Information technology - Security techniques - Information security risk management (ISO/IEC 27005:2011, MOD)

    • AS/NZS ISO/IEC 9798.2-2008

      Information technology - Security techniques - Entity authentication - Mechanisms using symmetric encipherment algorithms

    • AS/NZS ISO/IEC 9798.3-2008

      Information technology - Security techniques - Entity authentication - Mechanisms using digital signature techniques

    • AS/NZS ISO/IEC 9798.4-2008

      Information technology - Security techniques - Entity authentication - Mechanisms using a cryptographic check function

  • The Sub Committees within the Technical Committee are listed here.

    Sub Committees