26/06/2018National Information Security Standardization Technical Committee (SAC TC260) called for public comments on 24 information security standard drafts

On 11th June, National Information Security Standardization Technical Committee (SAC TC260) called for public comments on 24 information security standard drafts and deadline was 25th July 2018.

            Information security technology – Security impact assessment guide of personal information

            Information security technology – Cybersecurity protection requirements of critical information infrastructure

            Information security technology – Security controls of critical information infrastructure

            Information security technology – Evaluation approaches for industrial control systems information security

            Information security technology – Cybersecurity guide for automotive electronics systems

            Information security technology – Security test requirements for cryptographic modules

            Information security technology – Guidance of cryptographic application for electronic records

            Information security techniques – Security technical requirements for operating system on smart mobile terminal

            Information security technology – Guide to malware incident prevention and handling

            Information security technology – Trusted computing architecture

            Information security technology – Guide to Bluetooth usage security

            Information security technology – Secure coding guide for application software

            Information security technology – Code security audit specification

            Information technology – Security techniques – Network security – Part 1: Overview and concepts

            Information technology – Security techniques – Network security – Part 2: Guidelines for the design and implementation of network security

            Information technology – Security techniques – Anonymous digital signatures – Part 1: General

            Information technology – Security techniques – Anonymous digital signatures – Part 2: Mechanisms using a group public key

            Information security technology – Security technical requirements and test evaluation approaches of smart mobile terminals

            Information security technology – Security technical requirements and testing and assessment approaches for firewall

            Information security technology – Trusted computing specification – Trusted connect testing specification

            Information security technology – Technical framework for authentication of mobile smart terminals based on biometric

            Information security technology – Technical requirements for mobile internet security audit products

            Information security technology – Light-weight authentication and access control mechanism

            Information security technology – Technical requirements for remote face recognition authentication system based on trusted environment

https://www.tc260.org.cn/

Chinese Version is available: 24 standard drafts-Chinese Version