| | CYBER(17)011057 | LS to ITU-T SG17 regarding QSC | Accepted | Approach Infinity | LSout |
| | CYBER(17)011056r3 | Reply to LS from ITU-T SG17 on ' Security Requirements and Framework of Using Identity-Based Cryptography Mechanisms in Internet of Things | Accepted | CNIT | LSout |
| | CYBER(17)011056r2 | Reply to LS from ITU-T SG17 on ' Security Requirements and Framework of Using Identity-Based Cryptography Mechanisms in Internet of Things | Revised | CNIT | LSout |
| | CYBER(17)011056r1 | Reply to LS from ITU-T SG17 on ' Security Requirements and Framework of Using Identity-Based Cryptography Mechanisms in Internet of Things | Revised | CNIT | LSout |
| | CYBER(17)011056 | Reply to LS from ITU-T SG17 on ' Security Requirements and Framework of Using Identity-Based Cryptography Mechanisms in Internet of Things | Revised | CNIT | LSout |
| | CYBER(17)011055r2 | Draft - DTR/CYBER-0021 v0.0.7 (TR 103 456 ) "NIS Directive Implementation" | Accepted | CIS | Draft |
| | CYBER(17)011055r1 | Draft - DTR/CYBER-0021 v0.0.7 (TR 103 456 ) "NIS Directive Implementation" | Revised | CIS | Draft |
| | CYBER(17)011055 | Draft - DTR/CYBER-0021 v0.0.7 (TR 103 456 ) "NIS Directive Implementation" | Revised | CIS | Draft |
| | CYBER(17)011054r1 | LS to NFV on common interface to transfer sensitive functions to a trusted domain | Accepted | Bull SAS | LSout |
| | CYBER(17)011054 | LS to NFV on common interface to transfer sensitive functions to a trusted domain | Revised | Bull SAS | LSout |
| | CYBER(17)011053r1 | LS to ISO/IEC JTC 1/SC 27 on TC CYBER work | Accepted | ETSI | LSout |
| | CYBER(17)011053 | LS to ISO/IEC JTC 1/SC 27 on TC CYBER work | Revised | ETSI | LSout |
| | CYBER(17)011052r1 | LS to SA3 | Accepted | Approach Infinity | LSout |
| | CYBER(17)011052 | LS to SA3 | Revised | Approach Infinity | LSout |
| | CYBER(17)011051 | dts025-uml | Available | CNIT | Other |
| | CYBER(17)011050r1 | Suggested changes to draft for approval of WI 21 TR 103 456 Implementing NIS Directive | Available | Microsoft Ltd | Other |
| | CYBER(17)011050 | Suggested changes to draft for approval of WI 21 TR 103 456 Implementing NIS Directive | Revised | Microsoft Ltd | Other |
| | CYBER(17)011049 | Introduce the NWI proposal on software security | Available | Gemalto N.V. | Other |
| | CYBER(17)011048 | Introduce the NWI proposal on software security | Reserved | Gemalto N.V. | Other |
| | CYBER(17)011047 | Practical introductory guide to Privacy | Noted | KAT | Draft |
| | CYBER(17)011046r1 | Summary of progress on WI 27 (MSP) | Available | ADVENICA AB | Other |
| | CYBER(17)011046 | Summary of progress on WI 27 (MSP) | Revised | ADVENICA AB | Other |
| | CYBER(17)011045 | LS from ITU-T SG17 on ' Security Requirements and Framework of Using Identity-Based Cryptography Mechanisms in Internet of Things | Available | ITU-T | LSin |
| | CYBER(17)011044 | status category C liaison with ISO/IEC JTC 1/SC 38/WG 5 | Available | ISO/IEC JTC 1/SC 28 | LSin |
| | CYBER(17)011043 | Final TS 102 165-1 for approval combining all changes - changes accepted and cleaned | Accepted | Cadzow Communications | CR |
| | CYBER(17)011042 | Final TS 102 165-1 for approval combining all changes - changes highlighted | Accepted | Cadzow Communications | CR |
| | CYBER(17)011041a2 | COM(2017)477 Annex to Regulation for Cybersecurity Act | Available | Cadzow Communications | Other |
| | CYBER(17)011041a1 | COM(2017)477 Regulation for Cybersecurity Act | Available | Cadzow Communications | Other |
| | CYBER(17)011041 | Security Certification initiative in EU | Available | Cadzow Communications | Other |
| | CYBER(17)011040 | NIS Questionnaire draft from ENISA | Available | Cadzow Communications | Other |
| | CYBER(17)011039 | Report from QSC 3 | Available | Approach Infinity | Report |
| | CYBER(17)011038 | Draft - DTS/CYBER-0025 v0.0.4 (TS 103 532 ) "Attribute Based Encryption for Attribute Based Access Control" | Noted | CNIT | Draft |
| | CYBER(17)011037 | Some ideas and issues regarding Contexts in part-2 | Available | ADVENICA AB | Other |
| | CYBER(17)011036 | Suggestions for Enhancements and Extensions of mcTLS | Available | ADVENICA AB | Other |
| | CYBER(17)011035r1 | STF529 Mil. C progress report | Accepted | CNIT | Other |
| | CYBER(17)011035 | STF529 Mil. C progress report | Revised | CNIT | Other |
| | CYBER(17)011034r1 | Draft - DTS/CYBER-0020 v0.0.8 (TS 103 458 ) "Application of ABE for data protection on smart devices, cloud and mobile services" | Noted | CNIT | Draft |
| | CYBER(17)011034 | Draft - DTS/CYBER-0020 v0.0.8 (TS 103 458 ) "Application of ABE for data protection on smart devices, cloud and mobile services" | Revised | CNIT | Draft |
| | CYBER(17)011033r1 | Information Note on the history of TLS | Available | CIS | Other |
| | CYBER(17)011033 | Information Note on the history of TLS | Revised | CIS | Other |
| | CYBER(17)011032 | Draft - DTS/CYBER-0019 v0.0.4 (TS 103 457 ) "Common interface to transfer sensitive functions to a trusted domain." | Noted | Bull SAS | Draft |
| | CYBER(17)011031 | Draft - DTS/CYBER-0027-2 v0.0.3 (TS 103 523-2 ) "Middlebox - Part 2" | Noted | ADVENICA AB | Draft |
| | CYBER(17)011030 | Draft - DTS/CYBER-0027-1 v0.0.7 (TS 103 523-1 ) "Middlebox - Part 1" | Noted | ADVENICA AB | Draft |
| | CYBER(17)011029 | LS from ITU-T SG17 work on quantum-safe PKI | Available | ITU-T | LSin |
| | CYBER(17)011028 | LS from ITU-T SG17 on Technical framework for security services provided by operators | Available | ITU-T | LSin |
| | CYBER(17)011027a1 | Potential changes to TS 103 307 | Available | Tencastle Limited | Other |
| | CYBER(17)011027 | TS 103 307 Update on techniques for assuring digital evidence | Available | Tencastle Limited | Other |
| | CYBER(17)011026 | Draft proposal for Technical Report on Security techniques for software protection | Available | Gemalto N.V. | Other |
| | CYBER(17)011025 | ETSI Security Week 2018 | Available | ETSI | Other |
| | CYBER(17)011024 | CEN-CENELEC TC 8 July 2017 Meeting notes | Available | ETSI | Other |
| | CYBER(17)011023r4 | Security techniques for protecting software in a white box model | Accepted | Gemalto N.V. | NWI |
| | CYBER(17)011023r3 | Security techniques for protecting software in a white box model | Revised | Gemalto N.V. | NWI |
| | CYBER(17)011023r2 | Security techniques for protecting software in a white box model | Revised | Gemalto N.V. | NWI |
| | CYBER(17)011023r1 | Security techniques for protecting software in a white box model | Revised | Gemalto N.V. | NWI |
| | CYBER(17)011023 | Security techniques for protecting software in a white box model | Revised | Gemalto N.V. | NWI |
| | CYBER(17)011022 | Draft DTR/CYBER-QSC-007 v0.0.4 "QSC-KEX" | Accepted | NCSC | Draft |
| | CYBER(17)011021 | TC CYBER Strategy Latest Draft 0.7 | Available | Zeata Security Ltd | Other |
| | CYBER(17)011020 | TC CYBER Presentation for Brussels Sept 17th 2017 | Available | Zeata Security Ltd | Other |
| | CYBER(17)011019 | CYBER-WI-021, TR 103 456, NIS-Directive for approval | Noted | Rapporteur | Draft |
| | CYBER(17)011018 | Report 05 Sep 2017 meeting CYBER-WI-021-NIS-Directive | Available | Rapporteur | Report |
| | CYBER(17)011017 | LS from SA3 to SAGE cc CYBER on 256-bit algorithms for 5G | Available | 3GPP SA 3 | LSin |
| | CYBER(17)011016r1 | New TS 103 523-4, "Cyber, Middlebox Security Protocol, Part 4: Profile for network based IPsec traffic | Accepted | CIS | NWI |
| | CYBER(17)011016 | New TS 103 523-4, "Cyber, Middlebox Security Protocol, Part 4: Profile for network based IPsec traffic | Revised | CIS | NWI |
| | CYBER(17)011015r2 | New TS 103 523-3 "Cyber, Middlebox Security Protocol, Part 3: Profile for cloud data centre virtual instantiations with TLS based traffic | Accepted | CIS | NWI |
| | CYBER(17)011015r1 | New TS 103 523-3 "Cyber, Middlebox Security Protocol, Part 3: Profile for cloud data centre virtual instantiations with TLS based traffic | Revised | CIS | NWI |
| | CYBER(17)011015 | New TS 103 523-3 "Cyber, Middlebox Security Protocol, Part 3: Profile for cloud data centre virtual instantiations with TLS based traffic | Revised | CIS | NWI |
| | CYBER(17)011014 | Middlebox Structured Ecosystem of Events and Published Materials | Available | CIS | Other |
| | CYBER(17)011013 | Revised Annex A, Use Cases and Bibliography Annex for MSP, Part 1 | Available | CIS | Other |
| | CYBER(17)011012 | Information on action 9.1 related to CIS fees | Available | CIS | Other |
| | CYBER(17)011011 | Reply LS on data confidentiality and data access control in IoT using Attribute Based Encryption | Available | oneM2M | LSin |
| | CYBER(17)011010 | Modification of example eTVRA database to accommodate new text | Available | Cadzow Communications | CR |
| | CYBER(17)011009 | Revision of references and use of text from ISO/IEC 15408-2 | Available | Cadzow Communications | CR |
| | CYBER(17)011008 | Reply LS to IETF Security area directors on middlebox | Available | CIS | LSout |
| | CYBER(17)011007 | Reply LS to IETF Security area directors on middlebox | Reserved | CIS | LSout |
| | CYBER(17)011006r1 | Reply LS to IETF Security area directors on middlebox | Accepted | Zeata Security Ltd | LSout |
| | CYBER(17)011006 | Reply LS to IETF Security area directors on middlebox | Revised | Zeata Security Ltd | LSout |
| | CYBER(17)011005 | Information on action 9.1 related to CIS fees | Available | ETSI | Other |
| | CYBER(17)011004a2 | SC 27 WG5 drafts after Hamilton April 2017 | Available | ISO/IEC JTC 1 SC 27 | LSin |
| | CYBER(17)011004a1 | SC 27 WG4 drafts after Hamilton April 2017 | Available | ISO/IEC JTC 1 SC 27 | LSin |
| | CYBER(17)011004 | ISO/IEC JTC 1/SC 27 liaison statement to ETSI TC CYBER | Available | ISO/IEC JTC 1 SC 27 | LSin |
| | CYBER(17)011003 | LS on middlebox from IETF Security Area Directors | Available | ISOC/IETF | LSin |
| | CYBER(17)011002r1 | CYBER#11 report | Accepted | ETSI | Report |
| | CYBER(17)011002 | CYBER#11 report | Revised | ETSI | Report |
| | CYBER(17)011001r3 | CYBER#11 agenda | Accepted | Chairman | Agenda |
| | CYBER(17)011001r2 | CYBER#11 agenda | Revised | Chairman | Agenda |
| | CYBER(17)011001r1 | CYBER#11 agenda | Revised | Chairman | Agenda |
| | CYBER(17)011001 | CYBER#11 agenda | Revised | Chairman | Agenda |
| | CYBER(17)000136r1 | Reply LS to ITU-T SG17 on middlebox | Accepted | NCSC | LSout |
| | CYBER(17)000136 | Reply LS to ITU-T SG17 on middlebox | Revised | NCSC | LSout |
| | CYBER(17)000135 | ETSI mcTLS protocol demonstration | Accepted | NCSC | NWI |