GOST R ISO/IEC 27034-5-2020 PDF

GOST R ISO/IEC 27034-5-2020

Name in English:
GOST R ISO/IEC 27034-5-2020

Name in Russian:
ГОСТ Р ИСО/МЭК 27034-5-2020

Description in English:

Information technology. Security techniques. Application security. Part 5. Protocols and application security controls data structure

Description in Russian:
Информационные технологии. Методы и средства обеспечения безопасности. Безопасность приложений. Часть 5. Структуры данных протоколов и мер обеспечения безопасности приложений
Document status:
Active

Format:
Electronic (PDF)

Page count:
36

Delivery time (for English version):
6 business days

Delivery time (for Russian version):
1 business day

SKU:
GOST44271

Choose Document Language:
€10

Full title and description

GOST R ISO/IEC 27034-5-2020 — Information technology. Security techniques. Application security. Part 5: Protocols and application security controls data structure. This is the Russian national adoption (GOST R) of the ISO/IEC 27034-5 standard, providing standardized data structures and protocol definitions for application security controls (ASCs) used across the application security life‑cycle.

Abstract

GOST R ISO/IEC 27034-5-2020 describes and explains a minimal set of essential attributes for Application Security Controls (ASCs) and specifies the data structures and protocol elements required to represent those controls. It also details activities and roles of the Application Security Life Cycle Reference Model (ASLCRM) to ensure consistent creation, exchange and verification of ASC information between stakeholders and tools.

General information

  • Status: Adopted / Accepted (national standard).
  • Publication date: 01 June 2021 (approved by Rosstandart by order dated 10 November 2020).
  • Publisher: Federal Agency on Technical Regulating and Metrology (Rosstandart) — issued as a GOST R national adoption of ISO/IEC 27034-5.
  • ICS / categories: 35.030 (Information technology — IT security).
  • Edition / version: GOST R ISO/IEC 27034-5-2020 (national adoption of ISO/IEC 27034-5).
  • Number of pages: 36.

Scope

The standard defines the minimal information elements and structural attributes necessary to describe application security controls (ASCs), and prescribes how those elements are used within the Application Security Life Cycle Reference Model (ASLCRM). It covers the logical data model for ASC identification, metadata (identifier, name, version, maturity, lifecycle stage), relationships to activities and verification measures, and the protocol/data‑exchange structures needed to support interoperable ASC creation, distribution and verification. The companion technical specification (ISO/IEC TS 27034‑5‑1) provides XML schema implementations of these data structures.

Key topics and requirements

  • Definition of Application Security Controls (ASC) and required attributes (identifier, name, version, description, maturity/trust level, lifecycle stage).
  • Data structure and protocol model to represent ASCs for exchange between tools and stakeholders.
  • Specification of roles and activities in the Application Security Life Cycle Reference Model (ASLCRM) related to ASC creation, verification and management.
  • Requirements for ASC metadata to support reuse, interoperability and traceability across development, deployment and operation.
  • Guidance for including complex/non‑text elements (documents, code artifacts) within ASC records and for recording verification/audit evidence.
  • Mapping and implementation guidance via complementary XML schemas (see ISO/IEC TS 27034‑5‑1).

Typical use and users

Used by application security architects, software developers, security engineers, system integrators, QA and test teams, application owners, security operations and auditors. Tool vendors and platform providers use the data structure to exchange ASC metadata and automate verification, while organizations adopt the standard to normalize ASC definitions, reduce duplication of controls, and improve consistency of security lifecycle activities.

Related standards

Part of the ISO/IEC 27034 application security family and closely aligned with related information security standards including ISO/IEC 27034‑1 through ISO/IEC 27034‑4 and ISO/IEC TS 27034‑5‑1 (XML schemas). It complements management and risk standards such as ISO/IEC 27001 (ISMS), ISO/IEC 27002 (controls guidance), ISO/IEC 27005 (risk management) and ISO/IEC 27035 (incident management) when application‑level controls must be specified, managed and audited.

Keywords

application security, ASC, Application Security Controls, ASLCRM, protocols, data structure, XML schema, lifecycle, verification, interoperability, Rosstandart, GOST R, ISO/IEC 27034‑5.

FAQ

Q: What is this standard?

A: GOST R ISO/IEC 27034-5-2020 is the Russian national adoption of ISO/IEC 27034‑5: it formalizes the data structures and protocol definitions for describing and exchanging Application Security Controls (ASCs) within the application security lifecycle.

Q: What does it cover?

A: It covers the minimal set of information attributes and structural requirements for ASCs, the roles/activities in the Application Security Life Cycle Reference Model (ASLCRM), and the protocol/data formats needed for interoperable exchange and verification of ASC information. Companion XML schemas are provided in ISO/IEC TS 27034‑5‑1.

Q: Who typically uses it?

A: Security architects, developers, application owners, integrators, security tool vendors and auditors use this standard to define, share and verify application security controls consistently across projects and toolchains.

Q: Is it current or superseded?

A: The GOST R adoption was approved in late 2020 and came into effect 01 June 2021; it implements the content of ISO/IEC 27034‑5 (edition referenced at time of adoption). Users should check the current ISO/IEC 27034‑5 lifecycle for any later international revisions or confirmations when maintaining compliance.

Q: Is it part of a series?

A: Yes — it is part of the ISO/IEC 27034 series (Application security). See other parts (27034‑1 to 27034‑4) and the related technical specification 27034‑5‑1 for XML schema mappings.

Q: What are the key keywords?

A: Application security, ASC, ASLCRM, control metadata, protocol data structure, interoperability, XML schema, lifecycle, verification, GOST R.