|
Std ID |
Description (Standard Title) |
|
GB/T 28449-2018
|
Information security technology - Testing and evaluation process guide for classified protection of cyber security
|
|
GB/T 36629.3-2018
|
Information security technology -- Security technique requirements for citizen cyber electronic identity -- Part 3: Verification service message and processing rules
|
|
GB/T 36950-2018
|
Information security technology -- Security technical requirements of smart card (EAL4+)
|
|
GB/T 36951-2018
|
Information security technology -- Security technical requirements for application of sensing terminals in internet of things
|
|
GB/T 36957-2018
|
Information security technology -- Requirements for disaster recovery service
|
|
GB/T 36958-2018
|
Information security technology - Technical requirements of security management center for classified protection of cybersecurity
|
|
GB/T 36959-2018
|
Information security technology - Capability requirements and evaluation specification for assessment organization of classified protection of cybersecurity
|
|
GB/T 36960-2018
|
Information security technology -- Authentication and authorization -- Access control middleware framework and interface
|
|
GB/T 36968-2018
|
Information security technology -- Technical specification for IPSec VPN
|
|
GB/T 37002-2018
|
Information security technology -- Security techniques requirement for electronic mail system
|
|
GB/T 37024-2018
|
Information security technology -- Security technical requirements of gateway in sensing layer of the internet of things
|
|
GB/T 37025-2018
|
Information security technology -- Security technical requirements of data transmission for internet of things
|
|
GB/T 37027-2018
|
Information security technology -- Specifications of definition and description for network attack
|
|
GB/T 37033.1-2018
|
Information security technology -- Technical requirements for cryptographic application for radio frequency identification systems -- Part 1: Cryptographic protection framework and security levels
|
|
GB/T 37033.2-2018
|
Information security technology -- Technical requirements for cryptographic application for radio frequency identification systems -- Part 2: Technical requirements for cryptographic application for RF tag, reader and communication
|
|
GB/T 37033.3-2018
|
Information security technology -- Technical requirements for cryptographic application for radio frequency identification systems -- Part 3: Technical requirements for key management
|
|
GB/T 37044-2018
|
Information security technology -- Security reference model and generic requirements for internet of things
|
|
GB/T 37046-2018
|
Information security techniques -- Assessment criteria for disaster recovery service capability
|
|
GB/T 37076-2018
|
Information security technology -- Technical requirements for fingerprint recognition system
|
|
GB/T 37090-2018
|
Information security technology -- Security technical requirements, testing and evaluation methods for antivirus products
|
|
GB/T 37091-2018
|
Information security technology -- Security office USB disk technology requirement
|
|
GB/T 37092-2018
|
Information security technology -- Security requirements for cryptographic modules
|
|
GB/T 37093-2018
|
Information security technology -- Security requirements for IoT sensing layer access to communication network
|
|
GB/T 37094-2018
|
Information security technology -- Security management requirements for office information systems
|
|
GB/T 37095-2018
|
Information security technology -- Security basic technical requirements for office information systems
|
|
GB/T 37096-2018
|
Information security technology -- Security testing specification for office information systems
|
|
GB/T 35788-2017
|
Security technical requirement for the electronic identification of motor vehicles
|
|
GB/T 33561-2017
|
Information security technology -- Vulnerabilities classification
|
|
GB/T 32918.5-2017
|
Information security technology - Public key cryptographic algorithm SM2 based on elliptic curves - Part 5: Parameter definition
|
|
GB/T 33560-2017
|
Information security technology -- Cryptographic application identifier criterion specification
|
|
GB/T 33562-2017
|
Information security technology -- Secure domain name system deployment guide
|
|
GB/T 33563-2017
|
Information security technology -- Security technology requirements for wireless local area network (wlan) client (EAL2+)
|
|
GB/T 33565-2017
|
Information security technology -- Security technology requirements for wireless local area network (wlan) access system (EAL2+)
|
|
GB/T 33746.1-2017
|
Technical specification of NFC security -- Part 1: NFCIP-1 security services and protocol
|
|
GB/T 33746.2-2017
|
Technical specification of NFC security -- Part 2: Security mechanism requirements
|
|
GB/T 34095-2017
|
Information security technology -- Technology requirements for electronic payment of mobile terminal security based on short-range radio communication technology
|
|
GB/T 29246-2017
|
Information technology -- Security techniques -- Information security management systems -- Overview and vocabulary
|
|
GB/T 34942-2017
|
Information security technology -- The assessment method for security capability of cloud computing service
|
|
GB/T 34953.1-2017
|
Information technology -- Security techniques -- Anonymous entity authentication -- Part 1: General
|
|
GB/T 34975-2017
|
Information security technology -- Security technical requirements and testing and evaluation approaches for application software of smart mobile terminals
|
|
GB/T 34976-2017
|
Information security technology -- Security technical requirements and testing and evaluation approaches for operating system of smart mobile terminals
|
|
GB/T 34977-2017
|
Information security technology -- Security technology requirements and testing and evaluation approaches for data storage of mobile intelligent terminals
|
|
GB/T 34978-2017
|
Information security technology -- Technology requirements for personal information protection of smart mobile terminal
|
|
GB/T 34990-2017
|
Information security technology -- Technical requirements and testing evaluation approaches of information system security management platform products
|
|
GB/T 35101-2017
|
Information security technology -- Smart card reader security technology requirements (EAL4+)
|
|
GB/T 35274-2017
|
Information security technology -- Security capability requirements for big data services
|
|
GB/T 35291-2017
|
Information security technology -- Cryptography token application interface specification
|
|
GB/T 15843.1-2017
|
Information technology -- Security techniques -- Entity authentication -- Part 1: General
|
|
GB/T 15843.2-2017
|
Information technology -- Security techniques -- Entity authentication -- Part 2: Mechanisms using symmetric encipherment algorithms
|
|
GB/T 35275-2017
|
Information security technology -- SM2 cryptographic algorithm encrypted signature message syntax specification
|
|
GB/T 35276-2017
|
Information security technology -- SM2 cryptography algorithm usage specification
|
|
GB/T 35277-2017
|
Information security technology -- Security technical requirements and testing and evaluation approaches for antivirus gateway products
|
|
GB/T 35278-2017
|
Information security technology -- Technical requirements for mobile terminal security protection
|
|
GB/T 35279-2017
|
Information security technology -- Security reference architecture of cloud computing
|
|
GB/T 35280-2017
|
Information security technology -- Requirement and code of conduct for security testing bodies of information technology products
|
|
GB/T 35281-2017
|
Information security technology -- Security technique requirements for application servers in mobile internet
|
|
GB/T 35282-2017
|
Information security technology -- Security technology specifications of mobile e-government system
|
|
GB/T 35283-2017
|
Information security techniques -- Specification for the structure of desktop core configuration baseline
|
|
GB/T 35284-2017
|
Information security technology -- Requirements and assessment methods for website identity and system security
|
|
GB/T 35285-2017
|
Information security technology -- Public key infrastructure -- Technical requirements for digital certificate based reliable electronic signature creation and verification
|
|
GB/T 35286-2017
|
Information security technology -- Air-interface security test specification for low-rate wireless personal area networks
|
|
GB/T 35287-2017
|
Information security technology -- Guidelines of trusted identity technology for website
|
|
GB/T 35288-2017
|
Information security technology -- Specification on the job skills of certificate authority employees
|
|
GB/T 35289-2017
|
Information security technology -- Specification on the service quality of certification authority
|
|
GB/T 35290-2017
|
Information security technology -- General requirement of security for radio frequency identification systems
|
|
GB/T 35787-2017
|
Security technical requirement for the read-write equipment of the electronic identification of motor vehicles
|
|
GB/T 20985.1-2017
|
Information technology -- Security techniques -- Information security incident management -- Part 1: Principles of incident management
|
|
GB/T 35273-2017
|
Information security technology -- Personal information security specification
|
|
GB/T 22080-2016
|
Information technology -- Security techniques -- Information security management systems -- Requirements
|
|
GB/T 22081-2016
|
Information technology -- Security techniques -- Code of practice for information security controls
|
|
GB/T 15843.3-2016
|
Information technology -- Security techniques -- Entity authentication -- Part 3: Mechanisms using digital signature techniques
|
|
GB/T 20276-2016
|
Information security technology -- Security requirements for embedded software in IC card with CPU
|
|
GB/T 22186-2016
|
Information security techniques -- Security technical requirements for IC card chip with CPU
|
|
GB/T 25067-2016
|
Information technology -- Security techniques -- Requirements for bodies providing audit and certification of information security management systems
|
|
GB/T 30269.601-2016
|
Information technology -- Sensor network -- Part 601: Information security: General technical specifications
|
|
GB/T 32905-2016
|
Information security techniques - SM3 cryptographic hash algorithm
|
|
GB/T 32907-2016
|
Information security technology - SM4 block cipher algorithm
|
|
GB/T 32914-2016
|
Information security technology -- Information security service provider management requirements
|
|
GB/T 32915-2016
|
Information security technology - Randomness test methods for binary sequence
|
|
GB/T 32917-2016
|
Information security technology -- Security technique requirements and testing and evaluation approaches for WEB application firewall
|
|
GB/T 32918.1-2016
|
Information security technology - Public key cryptographic algorithm SM2 based on elliptic curves - Part 1: General
|
|
GB/T 32918.2-2016
|
Information security technology - Public key cryptographic algorithm SM2 based on elliptic curves - Part 2: Digital signature algorithm
|
|
GB/T 32918.3-2016
|
Information security technology - Public key cryptographic algorithm SM2 based on elliptic curves - Part 3: Key exchange protocol
|
|
GB/T 32918.4-2016
|
Information security technology - Public key cryptographic algorithm SM2 based on elliptic curves - Part 4: Public key encryption algorithm
|
|
GB/T 32919-2016
|
Information security technology -- Application guide to industrial control system security control
|
|
GB/T 32920-2016
|
Information technology -- Security techniques -- Information security management for inter-sector and inter-organizational communications
|
|
GB/T 32921-2016
|
Information security technology - Security criterion on supplier conduct of information technology products
|
|
GB/T 32922-2016
|
Information security technology -- Baseline and implementation guide of IPSec VPN securing access
|
|
GB/T 32923-2016
|
Information technology -- Security techniques -- Governance of information security
|
|
GB/T 32924-2016
|
Information security technology - Guideline for cyber security warning
|
|
GB/T 32925-2016
|
Information security technology -- Basic security requirements for networked computer terminal of government
|
|
GB/T 32926-2016
|
Information security technology -- Information security management specification for government information technology service outsourcing
|
|
GB/T 32927-2016
|
Information security technology -- Security architecture of mobile smart terminal
|
|
GB/T 33131-2016
|
Information security technology -- Specification for IP storage network security based on IPSec
|
|
GB/T 33132-2016
|
Information security technology -- Guide of implementation for information security risk treatment
|
|
GB/T 33133.1-2016
|
Information security technology -- ZUC stream cipher algorithm -- Part 1: Algorithm description
|
|
GB/T 33134-2016
|
Information security technology -- Security requirement of public DNS service system
|
|
GB/T 18336.1-2015
|
Information technology -- Security techniques -- Evaluation criteria for IT security -- Part 1: Introduction and general model
|
|
GB/T 18336.2-2015
|
Information technology -- Security techniques -- Evaluation criteria for IT security -- Part 2: Security functional components
|
|
GB/T 18336.3-2015
|
Information technology -- Security techniques -- Evaluation criteria for IT security -- Part 3: Security assurance components
|