Support Centre

You have out of 5 free articles left for the month

Signup for a trial to access unlimited content.

Start Trial

Continue reading on DataGuidance with:

Free Member

Limited Articles

Create an account to continue accessing select articles, resources, and guidance notes.

Free Trial

Unlimited Access

Start your free trial to access unlimited articles, resources, guidance notes, and workspaces.

China: TC260 requests comments on several cybersecurity national standards

On November 11, 2024, the National Information Security Standardization Technical Committee (TC260) requested comments on 15 draft national standards regarding security. In particular, several national standards concern network security and information security audits.

You can read the press release, as well as information on how to submit comments, only available in Chinese for:

  • the Security Technology Binary Sequence Randomness Detection Method here;
  • the Network Security Technology Email System Security Technical Specification here;
  • the Security Specifications for Embedded Operating Systems of Network Security Technology here;
  • the Network Security Technology Computer Basic Input and Output System (BIOS) Security Technical Specification here;
  • the Network Security Technology Operating System Security Technical Specification here;
  • the Security Requirements, Testing, and Evaluation Methods for Quantum Key Distribution for Cybersecurity Technology Part 1: Requirements here;
  • the Security Specifications for IC Card Chips with Central Processing Units in Network Security Technology here;
  • the Network Security Technology Cyberspace Mapping Data Exchange Format here;
  • the Network Security Technology Storage Security Guide here;
  • the Cybersecurity Technology Cybersecurity Incident Investigation Part 1: Incident Investigation Principles and Processes here;
  • the Cybersecurity Technology Information Security Management System Audit and Certification Bodies here;
  • the Guidelines for Information Security Management System Auditing of Cybersecurity Technology here;
  • the Baseline Requirements for Security Configuration of Government Cloud with Cybersecurity Technology here;
  • the Specifications for Entity Authentication and Access Architecture for Introducing Trusted Third Parties into Network Security Technology here; and
  • the Security Requirements, Test, and Evaluation Methods for Quantum Key Distribution for Cybersecurity Technology Part 2: Test and Evaluation Methods here.