Continue reading on DataGuidance with:
Free Member
Limited ArticlesCreate an account to continue accessing select articles, resources, and guidance notes.
Already have an account? Log in
11 November 2024
China: TC260 requests comments on several cybersecurity national standards
On November 11, 2024, the National Information Security Standardization Technical Committee (TC260) requested comments on 15 draft national standards regarding security. In particular, several national standards concern network security and information security audits.
You can read the press release, as well as information on how to submit comments, only available in Chinese for:
- the Security Technology Binary Sequence Randomness Detection Method here;
- the Network Security Technology Email System Security Technical Specification here;
- the Security Specifications for Embedded Operating Systems of Network Security Technology here;
- the Network Security Technology Computer Basic Input and Output System (BIOS) Security Technical Specification here;
- the Network Security Technology Operating System Security Technical Specification here;
- the Security Requirements, Testing, and Evaluation Methods for Quantum Key Distribution for Cybersecurity Technology Part 1: Requirements here;
- the Security Specifications for IC Card Chips with Central Processing Units in Network Security Technology here;
- the Network Security Technology Cyberspace Mapping Data Exchange Format here;
- the Network Security Technology Storage Security Guide here;
- the Cybersecurity Technology Cybersecurity Incident Investigation Part 1: Incident Investigation Principles and Processes here;
- the Cybersecurity Technology Information Security Management System Audit and Certification Bodies here;
- the Guidelines for Information Security Management System Auditing of Cybersecurity Technology here;
- the Baseline Requirements for Security Configuration of Government Cloud with Cybersecurity Technology here;
- the Specifications for Entity Authentication and Access Architecture for Introducing Trusted Third Parties into Network Security Technology here; and
- the Security Requirements, Test, and Evaluation Methods for Quantum Key Distribution for Cybersecurity Technology Part 2: Test and Evaluation Methods here.