On 11th June, National Information Security Standardization Technical Committee (SAC TC260) called for public comments on 24 information security standard drafts and deadline was 25th July 2018.
• Information security technology – Security impact assessment guide of personal information
• Information security technology – Cybersecurity protection requirements of critical information infrastructure
• Information security technology – Security controls of critical information infrastructure
• Information security technology – Evaluation approaches for industrial control systems information security
• Information security technology – Cybersecurity guide for automotive electronics systems
• Information security technology – Security test requirements for cryptographic modules
• Information security technology – Guidance of cryptographic application for electronic records
• Information security techniques – Security technical requirements for operating system on smart mobile terminal
• Information security technology – Guide to malware incident prevention and handling
• Information security technology – Trusted computing architecture
• Information security technology – Guide to Bluetooth usage security
• Information security technology – Secure coding guide for application software
• Information security technology – Code security audit specification
• Information technology – Security techniques – Network security – Part 1: Overview and concepts
• Information technology – Security techniques – Network security – Part 2: Guidelines for the design and implementation of network security
• Information technology – Security techniques – Anonymous digital signatures – Part 1: General
• Information technology – Security techniques – Anonymous digital signatures – Part 2: Mechanisms using a group public key
• Information security technology – Security technical requirements and test evaluation approaches of smart mobile terminals
• Information security technology – Security technical requirements and testing and assessment approaches for firewall
• Information security technology – Trusted computing specification – Trusted connect testing specification
• Information security technology – Technical framework for authentication of mobile smart terminals based on biometric
• Information security technology – Technical requirements for mobile internet security audit products
• Information security technology – Light-weight authentication and access control mechanism
• Information security technology – Technical requirements for remote face recognition authentication system based on trusted environment
Chinese Version is available: 24 standard drafts-Chinese Version