Appendix I – Sources of Security Standards and Security Patterns

Printer Friendly, PDF & Email

[See Question 16, Section IV]

In the Interoperability Standards Advisory, a structure to capture necessary security patterns associated with interoperability needs is represented (see Section III-A and III-F for examples). To address public comments that requested a distinct security standards section the list below provides a number of sources to which stakeholders can look in order to find the latest applicable security standards.  Note that this list is not meant to be exhaustive, and while every effort is made to ensure links are current, links may become outdated as organizations make changes to their websites.