21/05/2020
State Administration for Market Regulation (SAMR) and the Standardization Administration of China (SAC) released 26 national standards developed by the National Information Security Standardization Technical Committee (TC260) on April of 2020. The detailed list is as follows:
No. | New Number | Standard | Substituted Stage Number |
1 | GB/T 20281-2020 | Information Security Technology – Security Technical Requirements and Testing and Evaluation Approaches for Firewalls | GB/T 20010-2005,
GB/T 20281-2015, GB/T 31505-2015, GB/T 32917-2016 |
2 | GB/T 22240-2020 | Information Security Technology – Guidelines for Grading of Classified Protection of Cybersecurity | GB/T 22240-2008 |
3 | GB/T 25066-2020 | Information Security Technology – Type and Code of Information Security Products | GB/T 25066-2010 |
4 | GB/T 25067-2020 | Information Technology – Security Techniques – Requirements for Bodies Providing Audit and Certification of Information Security Management Systems | GB/T 25067-2016 |
5 | GB/T 28454-2020 | Information Technology – Security Techniques – Selection, Deployment and Operation of Intrusion Detection and Prevention Systems (IDPS) | GB/T 28454-2012 |
6 | GB/T 30284-202 | Information Security Technology – Technical Requirements of Security for Operating Systems in Smart Mobile Terminals | GB/T 30284-2013 |
7 | GB/T 34953.4-2020 | Information Technology – Security Techniques – Anonymous Entity Authentication Part 4: Mechanisms Based on Weak Secrets | |
8 | GB/T 38625-2020 | Information Security Technology – Security Requirements for Cryptography Modules | |
9 | GB/T 38626-2020 | Information Security Technology – Guidelines of Password Protection for Intelligent Connected Devices | |
10 | GB/T 38628-2020 | Information Security Technology – Cybersecurity Guide for Automotive Electronics Systems | |
11 | GB/T 38629-2020 | Information Security Technology –Technical Specifications for Signature Verification Servers | |
12 | GB/T 38631-2020 | Information Technology – Security Techniques – GB/T 22080 Specific Industry Application | |
13 | GB/T 38623-2020 | Information Security Technology – Application Security Requirements of Intelligent Audio Acquisition Equipment | |
14 | GB/T 38635.1-2020 | Information Security Technology – Cryptography Algorithms for SM9 Representation – Part 1: General Information | |
15 | GB/T 38635.2-2020 | Information Security Technology – SM9 Representation Cipher Algorithm – Part 2: Algorithms | |
16 | GB/T 38636-2020 | Information Security Technology – Transport Layer Cryptography Protocol (TLCP) | |
17 | GB/T 38638-2020 | Information Security Technology – Trusted Computing – Trusted Computing Architecture | |
18 | GB/T 38644-2020 | Information Security Technology – Trusted Computing – Trusted Link Test Methods | |
19 | GB/T 38645-2020 | Information Security Technology – Guidelines for Network Security Emergency Drills | |
20 | GB/T 38646-2020 | Information Security Technology – Mobile Signature Service Technical Requirements | |
21 | GB/T 38647.1-2020 | Information Technology – Security Techniques – Anonymous Digital Signatures – Part 1: General Information or General Specifications | |
22 | GB/T 38647.2-2020 | Information Technology – Security Techniques – Anonymous Digital Signatures – Part 2: Mechanisms Using Public Group Keys | |
23 | GB/T 38648-2020 | Information Security Technology – Bluetooth Security Guide | |
24 | GB/T 38649-2020 | Information Security Technology – Guide of Information Security Assurance Frameworks for Smart Cities | |
25 | GB/T 38671-2020 | Information Security Technology – Technical Requirements of Remote Face Recognition Systems | |
26 | GB/T 38674-2020 | Information Security Technology – Application Software Security Programming Guide |
For the Chinese version news, please see:
By Luna ZHAO on May 21,2020.