|
Std ID |
Description (Standard Title) |
Detail |
|
GB/T 38626-2020
|
Information security technology - Guide to password protection for intelligent connected device
|
GB/T 38626-2020
|
|
GB/T 38628-2020
|
Information security technology - Cybersecurity guide for automotive electronics system
|
GB/T 38628-2020
|
|
GB/T 38629-2020
|
Information security technology - Technical specifications for signature verification server
|
GB/T 38629-2020
|
|
GB/T 38631-2020
|
Information technology - Security techniques - Sector-specific application of GB/T 22080 - Requirements
|
GB/T 38631-2020
|
|
GB/T 38632-2020
|
Information security technology - Security requirements for application of intelligent audio-video recording device
|
GB/T 38632-2020
|
|
GB/T 38635.1-2020
|
Information security technology - Identity-based cryptographic algorithms SM9 - Part 1: General
|
GB/T 38635.1-2020
|
|
GB/T 38635.2-2020
|
Information security technology - Identity-based cryptographic algorithms SM9 - Part 2: Algorithms
|
GB/T 38635.2-2020
|
|
GB/T 38636-2020
|
Information security technology - Transport layer cryptography protocol (TLCP)
|
GB/T 38636-2020
|
|
GB/T 38638-2020
|
Information security technology - Trusted computing - Architecture of trusted computing
|
GB/T 38638-2020
|
|
GB/T 38644-2020
|
Information security technology - Trusted computing - Testing method of trusted connect
|
GB/T 38644-2020
|
|
GB/T 38645-2020
|
Information security techniques - Guide for cybersecurity incident emergency exercises
|
GB/T 38645-2020
|
|
GB/T 38646-2020
|
Information security technology - Technical requirements of mobile signature service
|
GB/T 38646-2020
|
|
GB/T 38647.1-2020
|
Information technology - Security techniques - Anonymous digital signatures - Part 1: General
|
GB/T 38647.1-2020
|
|
GB/T 38647.2-2020
|
Information technology - Security techniques - Anonymous digital signatures - Part 2: Mechanisms using a group public key
|
GB/T 38647.2-2020
|
|
GB/T 38648-2020
|
Information security techniques - Guideline to bluetooth security
|
GB/T 38648-2020
|
|
GB/T 38671-2020
|
Information Security Technology - Technical Requirements for Remote Face Recognition System
|
GB/T 38671-2020
|
|
GB/T 38674-2020
|
Information security technology - Guideline on secure coding of application software
|
GB/T 38674-2020
|
|
GB/T 20283-2020
|
Information security technology - Guide for the production of protection profiles and security targets
|
GB/T 20283-2020
|
|
GB/T 39205-2020
|
Information security technology - Light-weight authentication and access control mechanism
|
GB/T 39205-2020
|
|
GB/T 20261-2020
|
Information security technology. System security engineering. Capability maturity model
|
GB/T 20261-2020
|
|
GB/T 25061-2020
|
Information security technology. XML digital signature syntax and processing specification
|
GB/T 25061-2020
|
|
GB/T 25068.1-2020
|
Information technology. Security techniques. Network security - Part 1: Overview and concepts
|
GB/T 25068.1-2020
|
|
GB/T 25068.2-2020
|
Information technology - Security techniques - Network security - Part 2: Guidelines for the design and implementation of network security
|
GB/T 25068.2-2020
|
|
GB/T 28458-2020
|
Information security technology - Cybersecurity vulnerability identification and description specification
|
GB/T 28458-2020
|
|
GB/T 30276-2020
|
Information security technology - Specification for cybersecurity vulnerability management
|
GB/T 30276-2020
|
|
GB/T 30279-2020
|
Information security technology - Guidelines for categorization and classification of cybersecurity vulnerability
|
GB/T 30279-2020
|
|
GB/T 39276-2020
|
Information security technology - General security requirements of network products and services
|
GB/T 39276-2020
|
|
GB/T 39335-2020
|
Information security technology - Guidance for personal information security impact assessment
|
GB/T 39335-2020
|
|
GB/T 39412-2020
|
Information security technology. Audit specification of code security
|
GB/T 39412-2020
|
|
GB/T 15852.1-2020
|
Information technology. Security techniques-Message authentication codes - Part 1: Mechanisms using a block cipher
|
GB/T 15852.1-2020
|
|
GB/T 20985.2-2020
|
Information technology - Security techniques - Information security incident management - Part 2: Guidelines to plan and prepare for incident response
|
GB/T 20985.2-2020
|
|
GB/T 39680-2020
|
Information security technology - Technique requirements and evaluation criteria for server security
|
GB/T 39680-2020
|
|
GB/T 39720-2020
|
Information security technology. Security technical requirements and test evaluation approaches for smart mobile terminal
|
GB/T 39720-2020
|
|
GB/T 39725-2020
|
Information security technology - Guide for health data security
|
GB/T 39725-2020
|
|
GB/T 39477-2020
|
(Information security technology Government information sharing Data security technical requirements)
|
GB/T 39477-2020
|
|
GB/T 22239-2019
|
Information security technology - Baseline for classified protection of cybersecurity
|
GB/T 22239-2019
|
|
GB/T 25070-2019
|
Information security technology - Technical requirements of security design for classified protection of cybersecurity
|
GB/T 25070-2019
|
|
GB/T 28448-2019
|
Information security technology - Evaluation requirement for classified protection of cybersecurity
|
GB/T 28448-2019
|
|
GB/T 15852.3-2019
|
Information technology -- Security techniques -- Message authentication codes (MACs) -- Part 3: Mechanisms using a universal hash-function
|
GB/T 15852.3-2019
|
|
GB/T 18018-2019
|
Information security technology - Technical requirement for router security
|
GB/T 18018-2019
|
|
GB/T 20009-2019
|
Information security technology - Security evaluation criteria for database management system
|
GB/T 20009-2019
|
|
GB/T 20272-2019
|
Information security technology - Security technical requirements for operating system
|
GB/T 20272-2019
|
|
GB/T 20273-2019
|
Information Security Technology - Security Technical Requirements for Database Management System
|
GB/T 20273-2019
|
|
GB/T 20979-2019
|
Information security technology - Technical requirements for iris recognition system
|
GB/T 20979-2019
|
|
GB/T 21050-2019
|
Information security technology - Security requirements for network switch
|
GB/T 21050-2019
|
|
GB/T 25058-2019
|
Information Security Technology - Implementation Guide for Classified Protection of Cybersecurity
|
GB/T 25058-2019
|
|
GB/T 37931-2019
|
Information security technology - Security technology requirements and testing and evaluation approaches for Web application security detection system
|
GB/T 37931-2019
|
|
GB/T 37932-2019
|
Information security technology - Security requirements for data transaction service
|
GB/T 37932-2019
|
|
GB/T 37933-2019
|
Information security technology - Technical requirements of industrial control system dedicated firewall
|
GB/T 37933-2019
|
|
GB/T 37934-2019
|
Information security technology - Security technical requirements of industrial control system security isolation and information ferry system
|
GB/T 37934-2019
|
|
GB/T 37935-2019
|
Information security technology - Trusted computing specification - Trusted software base
|
GB/T 37935-2019
|
|
GB/T 37939-2019
|
Information security technology - Security techniques requirement for network storage
|
GB/T 37939-2019
|
|
GB/T 37941-2019
|
Information security technology - Security technical requirements of industrial control system network audit products
|
GB/T 37941-2019
|
|
GB/T 37950-2019
|
Information security technology - Security technical requirements for desktop cloud
|
GB/T 37950-2019
|
|
GB/T 37952-2019
|
Information security technology - Technical requirements of mobile terminal security management platform
|
GB/T 37952-2019
|
|
GB/T 37953-2019
|
Information security technology - Security requirements and evaluation approaches for industrial control network monitor
|
GB/T 37953-2019
|
|
GB/T 37954-2019
|
Information security technology - Technique requirements and testing and evaluation approaches for industrial control system vulnerability detection products
|
GB/T 37954-2019
|
|
GB/T 37955-2019
|
Information security technology - Security technique requirements for numerical control network
|
GB/T 37955-2019
|
|
GB/T 37956-2019
|
Information security technology - Technology requirement for website security cloud protection platform
|
GB/T 37956-2019
|
|
GB/T 37962-2019
|
Information security technology - Common criteria for industrial control system products security
|
GB/T 37962-2019
|
|
GB/T 37964-2019
|
Information security technology - Guide for de-identifying personal information
|
GB/T 37964-2019
|
|
GB/T 37971-2019
|
Information security technology - Framework of smart city security system
|
GB/T 37971-2019
|
|
GB/T 37972-2019
|
Information security technology - Operation supervision framework of cloud computing service
|
GB/T 37972-2019
|
|
GB/T 37973-2019
|
Information security technology - Big data security management guide
|
GB/T 37973-2019
|
|
GB/T 37980-2019
|
Information security technology - Guide for security inspection of industrial control systems
|
GB/T 37980-2019
|
|
GB/T 37985-2019
|
Technical Requirements for Key Management System for the Electronic Identification of Motor Vehicles
|
GB/T 37985-2019
|
|
GB/T 37988-2019
|
Information security technology - Data security capability maturity model
|
GB/T 37988-2019
|
|
GB/T 38249-2019
|
Information security technology - Security guide of cloud computing services for government website
|
GB/T 38249-2019
|
|
GB/T 27422-2019
|
Conformity assessment - Requirements for bodies providing audit and certification of business continuity management systems
|
GB/T 27422-2019
|
|
GB/T 36322-2018
|
Information security technology -- Cryptographic device application interface specifications
|
GB/T 36322-2018
|
|
GB/T 36324-2018
|
Information security technology -- Information security classification specifications of industrial control systems
|
GB/T 36324-2018
|
|
GB/T 20518-2018
|
Information security technology -- Public key infrastructure -- Digital certificate format
|
GB/T 20518-2018
|
|
GB/T 36323-2018
|
Information security technology -- Security management fundamental requirements for industrial control systems
|
GB/T 36323-2018
|
|
GB/T 36466-2018
|
Information security technology -- Implementation guide to risk assessment of industrial control systems
|
GB/T 36466-2018
|
|
GB/T 25056-2018
|
Information security technology -- Specifications of cryptograph and related security technology for certificate authentication system
|
GB/T 25056-2018
|
|
GB/T 36470-2018
|
Information security technology -- Common security functional requirements for data acquisition and control field devices of industrial control systems
|
GB/T 36470-2018
|
|
GB/T 15843.6-2018
|
Information technology -- Security techniques -- Entity authentication -- Part 6: Mechanisms using manual data transfer
|
GB/T 15843.6-2018
|
|
GB/T 34953.2-2018
|
Information technology -- Security techniques -- Anonymous entity authentication -- Part 2: Mechanisms based on signatures using a group public key
|
GB/T 34953.2-2018
|
|
GB/T 36618-2018
|
Information security technology -- Specification for financial information service security
|
GB/T 36618-2018
|
|
GB/T 36619-2018
|
Information security technology -- Naming specification on domain names of Chinese government organs and public institutions
|
GB/T 36619-2018
|
|
GB/T 36624-2018
|
Information technology -- Security techniques -- Authenticated encryption
|
GB/T 36624-2018
|
|
GB/T 36626-2018
|
Information security technology -- Management guide for secure operation and maintenance of information systems
|
GB/T 36626-2018
|
|
GB/T 36627-2018
|
Information security technology - Testing and evaluation technical guide for classified cybersecurity protection
|
GB/T 36627-2018
|
|
GB/T 36629.1-2018
|
Information security technology -- Security technique requirements for citizen cyber electronic identity -- Part 1: Security technique requirements for reader
|
GB/T 36629.1-2018
|
|
GB/T 36629.2-2018
|
Information security technology -- Security technique requirements for citizen cyber electronic identity -- Part 2: Security technique requirements of carrier
|
GB/T 36629.2-2018
|
|
GB/T 36630.1-2018
|
Information Security Technology - Controllability Evaluation Index for Security of Information Technology Products - Part 1: General Principles
|
GB/T 36630.1-2018
|
|
GB/T 36630.2-2018
|
Information security technology -- Controllability evaluation index for security of information technology products -- Part 2: Central processing unit
|
GB/T 36630.2-2018
|
|
GB/T 36630.3-2018
|
Information security technology -- Controllability evaluation index for security of information technology products -- Part 3: Operating system
|
GB/T 36630.3-2018
|
|
GB/T 36630.4-2018
|
Information security technology -- Controllability evaluation index for security of information technology products -- Part 4: Office suite
|
GB/T 36630.4-2018
|
|
GB/T 36630.5-2018
|
Information security technology -- Controllability evaluation index for security of information technology products -- Part 5: General purpose computer
|
GB/T 36630.5-2018
|
|
GB/T 36631-2018
|
Information security technology -- Time stamp policy and time stamp practice rules
|
GB/T 36631-2018
|
|
GB/T 36632-2018
|
Information security technology -- Format specifications for citizen cyber electronic identity
|
GB/T 36632-2018
|
|
GB/T 36633-2018
|
Information security technology -- Technical guide for identity authentication over network
|
GB/T 36633-2018
|
|
GB/T 36635-2018
|
Information security technology - Basic requirements and implementation guide of network security monitoring
|
GB/T 36635-2018
|
|
GB/T 36637-2018
|
Information security technology -- Guidelines for the information and communication technology supply chain risk management
|
GB/T 36637-2018
|
|
GB/T 36639-2018
|
Information security technology -- Trusted computing specification -- Trusted support platform for server
|
GB/T 36639-2018
|
|
GB/T 36643-2018
|
Information security technology -- Cyber security threat information format
|
GB/T 36643-2018
|
|
GB/T 36644-2018
|
Information security technology - Methods for obtaining security attestations for digital signature applications
|
GB/T 36644-2018
|
|
GB/T 36651-2018
|
Information security techniques - Biometric authentication protocol framework based on trusted environment
|
GB/T 36651-2018
|
|
GB/T 15851.3-2018
|
Information technology -- Security techniques -- Digital signature schemes giving message recovery -- Part 3: Discrete logarithm based mechanisms
|
GB/T 15851.3-2018
|