China certification: Cybersecurity product category updated

 

 

 

              China Cybersecurity office published the new product list for Cybersecurity test and certification on July 3rd ,2023.

              Products fall in the below category should be tested to the related GB standards or apply for Cybersecurity certification.

              More informaiton please contact info@china-srrc.com 

 

 

Product name

Description 

Critical Network equipment

1.Router

Entire system  throughput capacity (two-way)12Tbps

Entire system routing table capacity550,000 lines

2.Switch

Entire system  throughput capacity (two-way)30Tbps

Entire system packet forwarding rate10Gpps

3.Server (Rack mounted)

CPU number8

Single CPU core number≥14

Memory capacity≥256GB

4.Programmable Logic Controller (PLC)

Controller instruction execution time0.08 ms

Special network security product

 

1.Data backup integrated machine

Can back up and restore information system data, and

Products that manage the backup and recovery process.

2.Firewall

Analyze the data flow and access control

Products with safety protection functions.

3.Intrusion detection system (IDS)

Using data packets on the network as the data source, all data packets of the protected network node are monitored and analyzed to find abnormal behavior products.

4.Intrusion Prevention System (IPS)

 

It is deployed on a network path in the form of a bridge or gateway, detects network behaviors with intrusion characteristics by analyzing network traffic, and intercepts the products before they pass into the protected network.

5.Network and terminal isolation products

Security control points are established between different network terminals and network security domains to provide controllable access services between different network terminals and network security domains.

6.Anti-Spam Product

Software or combinations of software and hardware that can identify and process spam, including but not limited to anti-spam gateways, anti-spam systems, anti-spam software installed on mail servers, and anti-spam products integrated with mail servers.

7.Network security audit system

Records and activity data of networks, information systems and their components are collected and stored and analyzed to enable event traceability and the discovery of security breaches or anomalies.

8.network vulnerability scanning products 

Software or a combination of software and hardware that uses scanning to detect possible security weaknesses in a target network system.

9.security database system

A database system that follows a complete set of system security policies from all stages of system design, implementation, use and management, is designed to ensure data security at the database level.

10. Website data recovery products

 

Provide website data monitoring, anti-tampering, and data backup and recovery and other security functions of the product.

11. Virtual private network products

 

A product that establishes a dedicated secure transmission channel on a public communication infrastructure network such as an Internet link.

12. Antivirus gateway

 

The product is deployed between networks, analyzes the communication between the network layer and the application layer, and protects against viruses on the network based on predefined filtering rules and protection policies.

13.Unified threat management product (UTM)

 

A unified security policy integrates multiple security functions to comprehensively defend against security threats to networks and application systems.

14.Virus control products

 

Products used to detect or prevent the spread of malicious code and tampering, theft and destruction of host operating system applications and user files.

15. Secure operating system

The operating system from system design, implementation to use and other stages follow a complete set of security policies, the purpose is to ensure system security at the operating system level.

16. Secure network storage

 

A dedicated storage device connected to a server over a network based on different protocols.

17. Public key infrastructure

Support public key management system, provide authentication, encryption, integrity and undeniable service infrastructure.

18. Cybersecurity situational awareness products

 

By collecting network traffic, asset information, logs, vulnerability information, alarm information, threat information and other data, analyzing and processing network behavior and user behavior and other factors, grasp the network security status, predict the network security trend, and display, monitor and warn the product.

19. Information system security management platform

 

The platform implements unified management of the security policy of information system and the security mechanism of the secure computing environment, security zone boundary and secure communication network that execute the policy.

20. Network-based flow control products

 

A traffic management system that monitors traffic and controls bandwidth on the network in the security domain.

21. Load balancing product

 

It provides link load balancing, server load balancing, network traffic optimization, and intelligent processing.

22. Information filtering products

 

Text, pictures and other network information screening control products.

 

23.Denial of service attack resistant products

 

Products used to identify and intercept denial of service attacks and ensure system availability.

24.Terminal access control products

 

The product provides the access control function for terminals that access the network.

 

25. USB mobile storage media management system

 

The mobile storage device uses identity authentication, access control, and audit mechanisms to implement trusted access between the mobile storage device and host devices.

26. File encryption product

 

Protects data stored in files from attackers and ensures data security.

27.Data breach protection products

 

By controlling and auditing the main channels for the output of sensitive information inside the security zone, it prevents unauthorized disclosure of sensitive information inside the security zone.

28.Data destruction software products

 

Information technology is used to clear the underlying data at the logical level and completely destroy the products of the data carried by the storage media.

29. Security configuration Check the product

 

The product detects asset security configuration and analyzes asset compliance based on security configuration requirements, and generates security configuration suggestions and compliance reports.

30. Operation and maintenance security management products

 

The product implements single sign-on, centralized authorization, centralized management, and audit during the maintenance of important information system assets.

31.Log analysis product

 

A security product that collects log data from information systems and performs centralized storage and analysis.

32. Identity authentication product

 

Products that require users to provide identification information based on electronic information or biological information to confirm the identity of users of the application system.

33. Terminal security monitoring products

 

Monitor and control terminal security to detect and block unauthorized use of system and network resources.

34.Electronic document security management products

 

By creating or converting secure electronic documents into secure electronic documents, you can manage, monitor, and audit secure electronic documents in a unified manner.

 

 

 

 

Created on:2023-07-04 21:28
PV:0
Collect
HOME    China certification: Cybersecurity product category updated