|
Std ID |
Description (Standard Title) |
Detail |
|
GB/T 20277-2015
|
Information security technology -- Testing and evaluation approaches of network and terminal separation products
|
GB/T 20277-2015
|
|
GB/T 20279-2015
|
Information security technology -- Security technical requirements of network and terminal separation products
|
GB/T 20279-2015
|
|
GB/T 20281-2015
|
Information security technology -- Security technical requirements and testing and evaluation approaches for firewall
|
GB/T 20281-2015
|
|
GB/T 31495.1-2015
|
Information security technology -- Indicator system of information security assurance and evaluation methods -- Part 1: Concepts and model
|
GB/T 31495.1-2015
|
|
GB/T 31495.2-2015
|
Information security technology -- Indicator system of information security assurance and evaluation methods -- Part 2: Indicator system
|
GB/T 31495.2-2015
|
|
GB/T 31495.3-2015
|
Information security technology -- Indicator system of information security assurance and evaluation methods -- Part 3: Implementation guide
|
GB/T 31495.3-2015
|
|
GB/T 31496-2015
|
Information technology -- Security techniques -- Information security management system implementation guidance
|
GB/T 31496-2015
|
|
GB/T 31497-2015
|
Information technology -- Security techniques -- Information security management -- Measurement
|
GB/T 31497-2015
|
|
GB/T 31499-2015
|
Information security technology -- Technical requirements and testing and evaluation approaches for unified threat management products
|
GB/T 31499-2015
|
|
GB/T 31500-2015
|
Information security technology -- Requirement of data recovery service for storage media
|
GB/T 31500-2015
|
|
GB/T 31501-2015
|
Information security technology -- Authentication and authorization -- Specification for authorization application programming decision interface
|
GB/T 31501-2015
|
|
GB/T 31502-2015
|
Information security technology -- Security protect framework of electronic payment system
|
GB/T 31502-2015
|
|
GB/T 31503-2015
|
Information security technology -- Encryption and signature message syntax for electronic document
|
GB/T 31503-2015
|
|
GB/T 31504-2015
|
Information security technology -- Authentication and authorization -- Digital identity information service framework specification
|
GB/T 31504-2015
|
|
GB/T 31505-2015
|
[Replaced by GB/T 20281-2020] Information security technology -- Technique requirements and testing and evaluation approaches for host-based firewall and personal firewall
|
GB/T 31505-2015
|
|
GB/T 31506-2015
|
Information security technology -- Security technology guidelines for web portal system of government
|
GB/T 31506-2015
|
|
GB/T 31507-2015
|
Information security technology -- General testing guide for security of smart card
|
GB/T 31507-2015
|
|
GB/T 31508-2015
|
Information security techniques -- Public key infrastructure -- Digital certificate policies classification and grading specification
|
GB/T 31508-2015
|
|
GB/T 31509-2015
|
Information security technology - Guide of implementation for information security risk assessment
|
GB/T 31509-2015
|
|
GB/T 31722-2015
|
Information technology -- Security techniques -- Information security risk management
|
GB/T 31722-2015
|
|
GB/T 32213-2015
|
Information security technology -- Public key infrastructure -- Specification for remote password authentication and key establishment
|
GB/T 32213-2015
|
|
GB/T 31167-2014
|
Information security technology -- Security guide of cloud computing services
|
GB/T 31167-2014
|
|
GB/T 31168-2014
|
Information security technology -- Security capability requirements of cloud computing services
|
GB/T 31168-2014
|
|
GB/T 20275-2013
|
Information security technology -- Technical requirements and testing and evaluation approaches for network-based intrusion detection system
|
GB/T 20275-2013
|
|
GB/T 20278-2013
|
Information security technology -- Security technical requirements for network vulnerability scanners
|
GB/T 20278-2013
|
|
GB/T 20945-2013
|
Information security technology -- Technical requirements, testing and evaluation approaches for information system security audit product
|
GB/T 20945-2013
|
|
GB/T 29765-2013
|
Information security technology -- Technical requirements and testing and evaluating method for data backup and recovery products
|
GB/T 29765-2013
|
|
GB/T 29766-2013
|
Information security technology -- Technical requirements and testing and evaluating approaches of website data recovery products
|
GB/T 29766-2013
|
|
GB/T 29767-2013
|
Information security techniques -- Public key infrastructure -- Bridge Certification Authority leveled certificate specification
|
GB/T 29767-2013
|
|
GB/T 29828-2013
|
Information security technology -- Trusted computing specification -- Trusted connect architecture
|
GB/T 29828-2013
|
|
GB/T 29829-2013
|
Information security techniques -- Functionality and interface specification of cryptographic support platform for trusted computing
|
GB/T 29829-2013
|
|
GB/T 30270-2013
|
Information technology -- Security technology -- Methodology for IT security evaluation
|
GB/T 30270-2013
|
|
GB/T 30271-2013
|
Information security technology -- Assessment criteria for information security service capability
|
GB/T 30271-2013
|
|
GB/T 30272-2013
|
Information security technology -- Public Key Infrastructure -- Testing and evaluation guide on standard conformance
|
GB/T 30272-2013
|
|
GB/T 30273-2013
|
Information security technology -- Common methodology for information systems security assurance evaluation
|
GB/T 30273-2013
|
|
GB/T 30274-2013
|
Information security techniques -- Public Key Infrastructure -- Specification of testing on application interfaces of electronic signature card
|
GB/T 30274-2013
|
|
GB/T 30275-2013
|
Information security technology -- Authentication and authorization -- Authentication middleware framework and interface specification
|
GB/T 30275-2013
|
|
GB/T 30276-2013
|
Information security technology -- Vulnerability management criterion specification
|
GB/T 30276-2013
|
|
GB/T 30277-2013
|
Information security technology -- Public key infrastructures -- Certification authentication institution identity code specification
|
GB/T 30277-2013
|
|
GB/T 30278-2013
|
Information security technology -- Chinese government desktop core configuration specifications
|
GB/T 30278-2013
|
|
GB/T 30279-2013
|
Information security technology -- Vulnerability classification guide
|
GB/T 30279-2013
|
|
GB/T 30280-2013
|
Information security technology -- Authentication and authorization -- Geospatial eXtensible Access Control Markup Language (GeoXACML)
|
GB/T 30280-2013
|
|
GB/T 30281-2013
|
Information security technology - Authentication and authorization. eXtensible Access Control Markup Language (XACML)
|
GB/T 30281-2013
|
|
GB/T 30282-2013
|
Information security technology -- Techniques requirements and testing and evaluation approaches for anti-spam product
|
GB/T 30282-2013
|
|
GB/T 30283-2013
|
Information security technology -- Information security service -- Category
|
GB/T 30283-2013
|
|
GB/T 30284-2013
|
Technical requirements of security for operating system in smart mobile terminal (EAL2)
|
GB/T 30284-2013
|
|
GB/T 30285-2013
|
Information security technology -- Construction and sustain management specifications of disaster recovery center
|
GB/T 30285-2013
|
|
GB/T 15852.2-2012
|
Information technology -- Security techniques -- Message Authentication Codes (MACs) -- Part 2: Mechanisms using a dedicated hash-function
|
GB/T 15852.2-2012
|
|
GB/T 25068.1-2012
|
Information technology -- Security techniques -- IT network security -- Part 1: Network security management
|
GB/T 25068.1-2012
|
|
GB/T 25068.2-2012
|
Information technology -- Security techniques -- IT network security -- Part 2: Network security architecture
|
GB/T 25068.2-2012
|
|
GB/T 28447-2012
|
Information security technology -- Specification on the operation management of a certificate authority
|
GB/T 28447-2012
|
|
GB/T 28448-2012
|
Information security technology -- Testing and evaluation requirement for classified protection of information system
|
GB/T 28448-2012
|
|
GB/T 28449-2012
|
Information security technology -- Testing and evaluation process guide for classified protection of information system security
|
GB/T 28449-2012
|
|
GB/T 28450-2012
|
Information security technology -- Guidelines for information security management system auditing
|
GB/T 28450-2012
|
|
GB/T 28451-2012
|
Information security technology -- Technical requirements and testing and evaluation approaches for network-based intrusion prevention system products
|
GB/T 28451-2012
|
|
GB/T 28452-2012
|
Information security technology -- Common security technique requirement for application software system
|
GB/T 28452-2012
|
|
GB/T 28453-2012
|
Information security technology -- Information system security management assessment requirements
|
GB/T 28453-2012
|
|
GB/T 28454-2012
|
Information technology -- Security techniques -- Selection, deployment and operations of intrusion detection systems
|
GB/T 28454-2012
|
|
GB/T 28455-2012
|
Information security technology -- Entity authentication involving a trusted third party and access architecture specification
|
GB/T 28455-2012
|
|
GB/T 28456-2012
|
Testing specification for applications of IPsec protocol
|
GB/T 28456-2012
|
|
GB/T 28457-2012
|
Testing specification for applications of SSL protocol
|
GB/T 28457-2012
|
|
GB/T 28458-2012
|
Information security technology -- Vulnerability identification and description specification
|
GB/T 28458-2012
|
|
GB/T 29240-2012
|
Information security technology -- General security technique requirements and testing and evaluation method for terminal computer
|
GB/T 29240-2012
|
|
GB/T 29241-2012
|
Information security technology -- Public key infrastructure -- PKI interoperability evaluation criteria
|
GB/T 29241-2012
|
|
GB/T 29242-2012
|
Information security technology -- Authentication and authorization -- Security assertion markup language
|
GB/T 29242-2012
|
|
GB/T 29243-2012
|
Information security technology -- Specifications of delegated certification path construction and delegated validation for digital certificate
|
GB/T 29243-2012
|
|
GB/T 29244-2012
|
Information security technology -- Basic security requirements for office devices
|
GB/T 29244-2012
|
|
GB/T 29245-2012
|
Information security techniques -- Basic requirements of information security for national department
|
GB/T 29245-2012
|
|
GB/T 29246-2012
|
Information technology -- Security techniques -- Information security management systems -- Overview and vocabulary
|
GB/T 29246-2012
|
|
GB/T 26855-2011
|
Information security technology -- Public key infrastructure -- Certificate policy and certification practice statement framework
|
GB/T 26855-2011
|
|
GB/T 25055-2010
|
Information security techniques -- Public key infrastructure security supporting platform framework
|
GB/T 25055-2010
|
|
GB/T 25056-2010
|
Information security techniques -- Specifications of cryptograph and related security technology for certificate authentication system
|
GB/T 25056-2010
|
|
GB/T 25057-2010
|
Information security techniques -- Public key infrastructure -- Specification of application interface of electronic signature card
|
GB/T 25057-2010
|
|
GB/T 25058-2010
|
Information security technology -- Implementation guide for classified protection of information system
|
GB/T 25058-2010
|
|
GB/T 25059-2010
|
Information security technology -- Public key infrastructure -- Simple online certificate status protocol
|
GB/T 25059-2010
|
|
GB/T 25060-2010
|
Information security techniques -- Public key infrastructure -- Interface specification of X.509 digital certificates application
|
GB/T 25060-2010
|
|
GB/T 25061-2010
|
Information security technology -- Public key infrastructure -- XML digital signature syntax and processing specification
|
GB/T 25061-2010
|
|
GB/T 25062-2010
|
Information security technology -- Authentication and authorization -- Role-based access control model and management specification
|
GB/T 25062-2010
|
|
GB/T 25063-2010
|
Information security technology -- Testing and evaluation requirement for server security
|
GB/T 25063-2010
|
|
GB/T 25064-2010
|
Information security technology - Public key infrastructure - Electronic signature formats specification
|
GB/T 25064-2010
|
|
GB/T 25065-2010
|
Information security technology -- Public key infrastructure -- Security requirements for signature creation applications
|
GB/T 25065-2010
|
|
GB/T 25066-2010
|
Information security technology -- Type and code of information security product
|
GB/T 25066-2010
|
|
GB/T 25067-2010
|
Information technology -- Security techniques -- Requirements for bodies providing audit and certification of information security management systems
|
GB/T 25067-2010
|
|
GB/T 25068.3-2010
|
Information technology -- Security techniques -- IT network security -- Part 3: Securing communications between networks using security gateways
|
GB/T 25068.3-2010
|
|
GB/T 25068.4-2010
|
Information technology -- Security techniques -- IT network security -- Part 4: Securing remote access
|
GB/T 25068.4-2010
|
|
GB/T 25068.5-2010
|
Information technology -- Security techniques -- IT network security -- Part 5: Securing communications across networks using virtual private networks
|
GB/T 25068.5-2010
|
|
GB/T 25069-2010
|
Information security technology - Glossary
|
GB/T 25069-2010
|
|
GB/T 25070-2010
|
Information security technology -- Technical requirements of security design for information system classified protection
|
GB/T 25070-2010
|
|
GB/T 24363-2009
|
Information security technology -- Specifications of emergency response plan for information security
|
GB/T 24363-2009
|
|
GB/T 20274.2-2008
|
Information security technology -- Evaluation framework for information systems security assurance -- Part 2: Technical assurance
|
GB/T 20274.2-2008
|
|
GB/T 20274.3-2008
|
Information security technology -- Evaluation framework for information systems security assurance -- Part 3: Management assurance
|
GB/T 20274.3-2008
|
|
GB/T 20274.4-2008
|
Information security technology -- Evaluation framework for information systems security assurance -- Part 4: Engineering assurance
|
GB/T 20274.4-2008
|
|
GB/T 22239-2008
|
Information security technology -- Baseline for classified protection of information system security
|
GB/T 22239-2008
|
|
GB/T 15843.1-2008
|
Information technology -- Security techniques -- Entity authentication -- Part 1: General
|
GB/T 15843.1-2008
|
|
GB/T 15843.2-2008
|
Information technology -- Security techniques -- Entity authentication -- Part 2: Mechanisms using symmetric encipherment algorithm
|
GB/T 15843.2-2008
|
|
GB/T 15843.3-2008
|
Information technology -- Security techniques -- Entity authentication -- Part 3: Mechanisms using digital signature techniques
|
GB/T 15843.3-2008
|
|
GB/T 15843.4-2008
|
Information technology -- Security techniques -- Entity authentication -- Part 4: Mechanisms using a cryptographic check function
|
GB/T 15843.4-2008
|
|
GB/T 15852.1-2008
|
Information technology -- Security techniques -- Message Authentication Codes (MACs) -- Part 1: Mechanisms using a block cipher
|
GB/T 15852.1-2008
|
|
GB/T 17903.1-2008
|
Information technology -- Security techniques -- Non-repudiation -- Part 1: General
|
GB/T 17903.1-2008
|
|
GB/T 17903.2-2008
|
Information technology -- Security techniques -- Non-repudiation -- Part 2: Mechanisms using symmetric techniques
|
GB/T 17903.2-2008
|