|
Std ID |
Description (Standard Title) |
Detail |
|
GB/T 20945-2023
|
Information security technology - Technical specification for network security audit products
|
GB/T 20945-2023
|
|
GB/T 24364-2023
|
Information security technology - Implementation guide for information security risk management
|
GB/T 24364-2023
|
|
GB/T 28451-2023
|
Information security technology - Technical specification for network intrusion prevention system
|
GB/T 28451-2023
|
|
GB/T 30282-2023
|
Information security technology - Technical specification for anti-spam products
|
GB/T 30282-2023
|
|
GB/T 31167-2023
|
Information security technology - Security guidance for cloud computing services
|
GB/T 31167-2023
|
|
GB/T 31168-2023
|
Information security technology - Security capability requirements for cloud computing services
|
GB/T 31168-2023
|
|
GB/T 31496-2023
|
Information technology - Security techniques - Information security management systems - Guidance
|
GB/T 31496-2023
|
|
GB/T 32920-2023
|
Information security technology - Information security management for inter-sector and inter-organizational communications
|
GB/T 32920-2023
|
|
GB/T 35282-2023
|
Information security technology - Security technology specifications of mobile e-government system
|
GB/T 35282-2023
|
|
GB/T 42564-2023
|
Information security technology - Security technical requirements for edge computing
|
GB/T 42564-2023
|
|
GB/T 42570-2023
|
Information security technology - Security framework for blockchain technology
|
GB/T 42570-2023
|
|
GB/T 42571-2023
|
Information security technology - Security specification for blockchain information service
|
GB/T 42571-2023
|
|
GB/T 42572-2023
|
Information security technology - Trusted execution environment service specification
|
GB/T 42572-2023
|
|
GB/T 42573-2023
|
Information security technology - Security technical requirements for identity service in network
|
GB/T 42573-2023
|
|
GB/T 42574-2023
|
Information security technology - Implementation guidelines for notices and consent in personal information processing
|
GB/T 42574-2023
|
|
GB/T 42582-2023
|
Information security technology - Personal information security testing and evaluation specification in mobile internet applications(App)
|
GB/T 42582-2023
|
|
GB/T 42583-2023
|
Information security technology - Technical specifications for government network security monitoring platform
|
GB/T 42583-2023
|
|
GB/T 42589-2023
|
Information security technology - Specification for electronic credential service security
|
GB/T 42589-2023
|
|
GB/T 32914-2023
|
Information security technology - Capability requirements of cybersecurity service
|
GB/T 32914-2023
|
|
GB/T 32916-2023
|
Information security techniques - Guidelines for the assessment of information security controls
|
GB/T 32916-2023
|
|
GB/T 35274-2023
|
Information security technology - Security capability requirements for big data services
|
GB/T 35274-2023
|
|
GB/T 42829-2023
|
Basic requirements of quantum secure communication applications
|
GB/T 42829-2023
|
|
GB/T 42884-2023
|
Information security technology - Guidelines for life cycle security management of mobile Internet applications(App)
|
GB/T 42884-2023
|
|
GB/T 42888-2023
|
Information security technology - Assessment specification for security of machine learning algorithms
|
GB/T 42888-2023
|
|
GB/T 43206-2023
|
Information security technology - Testing and evaluation requirements for information system cryptography application
|
GB/T 43206-2023
|
|
GB/T 43207-2023
|
Information security technology - Guidelines of design for information system cryptography application
|
GB/T 43207-2023
|
|
GB/T 43269-2023
|
Information security techniques - Assessment criteria for cybersecurity emergency capability
|
GB/T 43269-2023
|
|
GB/T 43435-2023
|
Information security technology - Security requirements for software development kit (SDK) in mobile internet applications (App)
|
GB/T 43435-2023
|
|
GB/T 43445-2023
|
Information security technology - Basic security requirements for pre-installed applications on smart mobile terminals
|
GB/T 43445-2023
|
|
GB/T 29246-2023
|
Information security technology - Information security management systems - Overview and vocabulary
|
GB/T 29246-2023
|
|
GB/T 35290-2023
|
Information security technology - Security technical specification for radio frequency identification(RFID) systems
|
GB/T 35290-2023
|
|
GB/T 43557-2023
|
Information security technology - Guidelines for cyber security information submission
|
GB/T 43557-2023
|
|
GB/T 43577.1-2023
|
Information security technology - Electronic discovery - Part 1: Overview and concepts
|
GB/T 43577.1-2023
|
|
GB/T 43578-2023
|
Information security technology - Universal cryptography service interface specification
|
GB/T 43578-2023
|
|
GB/T 20278-2022
|
Information security technology - Security technical requirements and testing assessment approaches for network vulnerability scanners
|
GB/T 20278-2022
|
|
GB/T 25069-2022
|
Information security techniques - Terminology
|
GB/T 25069-2022
|
|
GB/T 41266-2022
|
Security testing methods for critical network devices - Switch
|
GB/T 41266-2022
|
|
GB/T 41267-2022
|
Security technical requirements for critical network devices - Switch
|
GB/T 41267-2022
|
|
GB/T 41268-2022
|
Security testing methods for critical network devices - Router
|
GB/T 41268-2022
|
|
GB/T 41269-2022
|
Security technical requirements for critical network devices - Router
|
GB/T 41269-2022
|
|
GB/T 20984-2022
|
Information security technology - Risk assessment method for information security
|
GB/T 20984-2022
|
|
GB/T 29829-2022
|
Information security technology - Functionality and interface specification of cryptographic support platform for trusted computing
|
GB/T 29829-2022
|
|
GB/T 30283-2022
|
Information security technology - Information security service - Classification and code
|
GB/T 30283-2022
|
|
GB/T 31506-2022
|
Information security technology - Security guidelines for website system of government affairs
|
GB/T 31506-2022
|
|
GB/T 41387-2022
|
Information security technology - Smart home general security specification
|
GB/T 41387-2022
|
|
GB/T 41388-2022
|
Information security technology - Trusted execution environment - Basic security specification
|
GB/T 41388-2022
|
|
GB/T 41389-2022
|
Information security technology - SM9 cryptographic algorithm application specification
|
GB/T 41389-2022
|
|
GB/T 41391-2022
|
Information security technology - Basic requirements for collecting personal information in mobile internet applications
|
GB/T 41391-2022
|
|
GB/T 41400-2022
|
Information security technology - Information security protection capability maturity model of industrial control systems
|
GB/T 41400-2022
|
|
GB/T 41479-2022
|
Information security technology - Network data processing security requirements
|
GB/T 41479-2022
|
|
GB/T 41574-2022
|
Information technology - Security techniques - Code of practice for protection of personal information in public clouds
|
GB/T 41574-2022
|
|
GB/T 25068.3-2022
|
Information technology - Security techniques - Network security - Part 3: Threats, design techniques and control for network access scenarios
|
GB/T 25068.3-2022
|
|
GB/T 25068.4-2022
|
Information technology - Security techniques - Network security - Part 4: Securing communications between networks using security gateways
|
GB/T 25068.4-2022
|
|
GB/T 41773-2022
|
Information security technology - Security requirements of gait recognition data
|
GB/T 41773-2022
|
|
GB/T 41806-2022
|
Information security technology - Security requirements of genetic recognition data
|
GB/T 41806-2022
|
|
GB/T 41807-2022
|
Information security technology - Security requirements of voiceprint recognition data
|
GB/T 41807-2022
|
|
GB/T 41817-2022
|
Information security technology - Guidelines for personal information security engineering
|
GB/T 41817-2022
|
|
GB/T 41819-2022
|
Information security technology - Security requirements of face recognition data
|
GB/T 41819-2022
|
|
GB/T 41871-2022
|
Information security technology - Security requirements for processing of motor vehicle data
|
GB/T 41871-2022
|
|
GB/T 42012-2022
|
Information security technology - Data security requirements for instant messaging services
|
GB/T 42012-2022
|
|
GB/T 42013-2022
|
Information security technology - Data security requirements for express logistics services
|
GB/T 42013-2022
|
|
GB/T 42014-2022
|
Information security technology - Data security requirements for online shopping services
|
GB/T 42014-2022
|
|
GB/T 42015-2022
|
Information security technology - Data security requirements for internet payment services
|
GB/T 42015-2022
|
|
GB/T 42016-2022
|
Information security technology - Data security requirements for online audio and video services
|
GB/T 42016-2022
|
|
GB/T 42017-2022
|
Information security technology - Data security requirements for online ride-hailing services
|
GB/T 42017-2022
|
|
GB/T 17901.3-2021
|
Information technology - Security techniques - Key management - Part 3: Mechanisms using asymmetric techniques
|
GB/T 17901.3-2021
|
|
GB/T 25068.5-2021
|
Information technology - Security techniques - Network security - Part 5: Securing communications across networks using virtual private networks
|
GB/T 25068.5-2021
|
|
GB/T 39786-2021
|
Information security technology - Baseline for information system cryptography application
|
GB/T 39786-2021
|
|
GB/T 40018-2021
|
Information security technology - Certificate request and application protocol based on multiple channels
|
GB/T 40018-2021
|
|
GB/T 17964-2021
|
Information security technology - Modes of operation for a block cipher
|
GB/T 17964-2021
|
|
GB/T 20275-2021
|
Information security technology - Technical requirements and testing and evaluation approaches for network-based intrusion detection system
|
GB/T 20275-2021
|
|
GB/T 29765-2021
|
Information security technology - Technical requirements and testing and evaluating approaches for data backup and recovery products
|
GB/T 29765-2021
|
|
GB/T 29766-2021
|
Information security technology - Technical requirements and testing and evaluating approaches of website data recovery products
|
GB/T 29766-2021
|
|
GB/T 33133.2-2021
|
Information security technology - ZUC stream cipher algorithm - Part 2: Confidentiality algorithm
|
GB/T 33133.2-2021
|
|
GB/T 33133.3-2021
|
Information security technology - ZUC stream cipher algorithm - Part 3: Integrity algorithm
|
GB/T 33133.3-2021
|
|
GB/T 40645-2021
|
Information security technology - General requirements for security of internet information services
|
GB/T 40645-2021
|
|
GB/T 40650-2021
|
Information security technology - Trusted computing specification - Trusted platform control module
|
GB/T 40650-2021
|
|
GB/T 40651-2021
|
Information security technique - Entity authentication assurance framework
|
GB/T 40651-2021
|
|
GB/T 40652-2021
|
Information security technology - Guide to malware incident prevention and handling
|
GB/T 40652-2021
|
|
GB/T 40653-2021
|
Information security technology - Technical requirements for security processor
|
GB/T 40653-2021
|
|
GB/T 40813-2021
|
Information security technology - Security protection technical requirements and testing evaluation methods of industrial control systems
|
GB/T 40813-2021
|
|
GB/T 17903.2-2021
|
(Information technology Security technology Non-repudiation - Part 2: Mechanisms using symmetric technology)
|
GB/T 17903.2-2021
|
|
GB/T 30272-2021
|
(Information Security Technology Public Key Infrastructure Standard Compliance Assessment)
|
GB/T 30272-2021
|
|
GB/T 40660-2021
|
Information security technology - General requirements for biometric information protection
|
GB/T 40660-2021
|
|
GB/T 17901.1-2020
|
Information technology - Security techniques - Key management - Part 1: Framework
|
GB/T 17901.1-2020
|
|
GB/T 35273-2020
|
Information security technology - Personal information security specification
|
GB/T 35273-2020
|
|
GB/T 38540-2020
|
Information Security Technology - Technical Specification of Secure Electronic Seal Signature Cryptography
|
GB/T 38540-2020
|
|
GB/T 38541-2020
|
Information security technology - Guidance of cryptographic application for electronic records
|
GB/T 38541-2020
|
|
GB/T 38542-2020
|
Information security technology - Technical framework for authentication of mobile smart terminals based on biometric
|
GB/T 38542-2020
|
|
GB/T 38556-2020
|
Information security technology - Technical specifications for one-time-password cryptographic application
|
GB/T 38556-2020
|
|
GB/T 38558-2020
|
Information security technology - Security test method for office devices
|
GB/T 38558-2020
|
|
GB/T 38561-2020
|
Information security technology - Technical requirements for cybersecurity management support system
|
GB/T 38561-2020
|
|
GB/T 20281-2020
|
Information Security Technology - Security Technical Requirements and Testing Assessment Approaches for Firewall
|
GB/T 20281-2020
|
|
GB/T 22240-2020
|
Information security technology - Classification guide for classified protection of cybersecurity
|
GB/T 22240-2020
|
|
GB/T 25066-2020
|
Information security technology - Type and code of information security products
|
GB/T 25066-2020
|
|
GB/T 25067-2020
|
Information technology - Security techniques - Requirements for bodies providing audit and certification of information security management systems
|
GB/T 25067-2020
|
|
GB/T 28454-2020
|
Information technology - Security techniques - Selection, deployment and operation of intrusion detection and prevention systems (IDPS)
|
GB/T 28454-2020
|
|
GB/T 30284-2020
|
Information security techniques - Security technical requirements for operating system on smart mobile terminal
|
GB/T 30284-2020
|
|
GB/T 34953.4-2020
|
Information technology - Security techniques - Anonymous entity authentication - Part 4: Mechanisms based on weak secrets
|
GB/T 34953.4-2020
|
|
GB/T 38625-2020
|
Information security technology - Security test requirements for cryptographic modules
|
GB/T 38625-2020
|