Home Cart Quotation About-Us
www.ChineseStandard.net
SEARCH

GB/T 18336.2-2024 English PDF

US$4834.00 ยท In stock
Delivery: <= 20 days. True-PDF full-copy in English will be manually translated and delivered via email.
GB/T 18336.2-2024: Cybersecurity technology - Evaluation criteria for IT security - Part 2: Security functional components
Status: Valid

GB/T 18336.2: Historical versions

Standard IDUSDBUY PDFLead-DaysStandard Title (Description)Status
GB/T 18336.2-20244834 Add to Cart 20 days Cybersecurity technology - Evaluation criteria for IT security - Part 2: Security functional components Valid
GB/T 18336.2-2015500 Add to Cart Auto, < 3 mins Information technology -- Security techniques -- Evaluation criteria for IT security -- Part 2: Security functional components Obsolete
GB/T 18336.2-2008RFQ ASK 10 days IT security technology information technology security evaluation criteria -- Part 2: Security functional requirements Obsolete
GB/T 18336.2-2001RFQ ASK 10 days Information technology -- Security techniques -- Evaluation criteria for IT security -- Part 2: Security functional requirements Obsolete

Similar standards

GB/T 17964   GB/T 18336.4   GB/T 18336.5   GB/T 18336.3   

Basic data

Standard ID: GB/T 18336.2-2024 (GB/T18336.2-2024)
Description (Translated English): Cybersecurity technology - Evaluation criteria for IT security - Part 2: Security functional components
Sector / Industry: National Standard (Recommended)
Classification of Chinese Standard: L80
Classification of International Standard: 35.030
Word Count Estimation: 242,255
Date of Issue: 2024-04-25
Date of Implementation: 2024-11-01
Older Standard (superseded by this standard): GB/T 18336.2-2015
Issuing agency(ies): State Administration for Market Regulation, China National Standardization Administration

GB/T 18336.2-2024: Cybersecurity technology - Evaluation criteria for IT security - Part 2: Security functional components


---This is a DRAFT version for illustration, not a final translation. Full copy of true-PDF in English version (including equations, symbols, images, flow-chart, tables, and figures etc.) will be manually/carefully translated upon your order.
ICS 35:030 CCSL80 National Standards of People's Republic of China Replaces GB/T 18336:2-2015 Cybersecurity Technology Information Technology Security Assessment Criteria Part 2: Safety functional components Released on 2024-04-25 2024-11-01 Implementation State Administration for Market Regulation The National Standardization Administration issued

Table of Contents

Preface VII Introduction IX 1 Scope 1 2 Normative references 1 3 Terms and Definitions 1 4 Abbreviations 3 5 Summary 3 5:1 Overview 3 5:2 Structure of this document 4 6 Functional Requirements Paradigm 4 7 Safety function components 7 7:1 Overview 7 7:2 Component Classification 11 8 Safety Audit (FAU) 11 8:1 Class Description 11 8:2 Security Audit Automatic Response (FAU_ARP) 12 8:3 Security Audit Data Generation (FAU_GEN) 13 8:4 Security Audit Analysis (FAU_SAA) 14 8:5 Safety Audit Review (FAU_SAR) 17 8:6 Security Audit Event Selection (FAU_SEL) 18 8:7 Security Audit Event Storage (FAU_STG) 19 9 Communication category (FCO) 21 9:1 Class Description 21 9:2 Non-repudiation of origin (FCO_NRO) 22 9:3 Non-repudiation of Receipt (FCO_NRR) 23 10 Password Support Class (FCS) 24 10:1 Class Description 24 10:2 Key Management (FCS_CKM) 25 10:3 Cryptographic Operation (FCS_COP) 28 10:4 Random Bit Generation (FCS_RBG) 29 10:5 Random Number Generation (FCS_RNG) 31 11 User Data Protection (FDP) 32 11:1 Class Description 32 11:2 Access Control Policy (FDP_ACC) 34 11:3 Access Control Function (FDP_ACF) 35 11:4 Data Identification (FDP_DAU) 36 11:5 Output from TOE (FDP_ETC) 37 11:6 Information Flow Control Policy (FDP_IFC) 38 11:7 Information Flow Control Function (FDP_IFF) 40 11:8 Information Retention Control (FDP_IRC) 43 11:9 Input from outside TOE (FDP_ITC) 44 11:10 TOE Internal Transfer (FDP_ITT) 46 11:11 Residual Information Protection (FDP_RIP) 48 11:12 Rollback (FDP_ROL) 49 11:13 Confidentiality of stored data (FDP_SDC) 50 11:14 Stored Data Integrity (FDP_SDI) 51 11:15 User data confidentiality protection between TSFs (FDP_UCT) 52 11:16 User Data Integrity Protection Between TSFs (FDP_UIT) 53 12 Marking and Identification (FIA) 55 12:1 Class Description 55 12:2 Authentication Failure (FIA_AFL) 56 12:3 Identity Authentication (FIA_API) 57 12:4 User Attribute Definition (FIA_ATD) 58 12:5 Confidentiality Standards (FIA_SOS) 59 12:6 User Authentication (FIA_UAU) 60 12:7 User Identification (FIA_UID) 63 12:8 User-Subject Binding (FIA_USB) 64 13 Security Management (FMT) 65 13:1 Class Description 65 13:2 Limited Capability and Availability (FMT_LIM) 66 13:3 Management of functions in TSF (FMT_MOF) 67 13:4 Management of Security Attributes (FMT_MSA) 68 13:5 Management of TSF Data (FMT_MTD) 70 13:6 Revocation (FMT_REV) 72 13:7 Security Attribute Expiration (FMT_SAE) 73 13:8 Management Function Specification (FMT_SMF) 74 13:9 Security Management Role (FMT_SMR) 74 14 Privacy (FPR) 76 14:1 Class Description 76 14:2 Anonymous (FPR_ANO) 77 14:3 Pseudonyms (FPR_PSE) 78 14:4 Unlinkability (FPR_UNL) 80 14:5 Unobservability (FPR_UNO) 80 15 TSF protection class (FPT) 82 15:1 Class Description 82 15:2 TOE Radiation (FPT_EMS) 84 15:3 Failure Protection (FPT_FLS) 85 15:4 TSF Initialization (FPT_INI) 85 15:5 Availability of output TSF data (FPT_ITA) 86 15:6 Confidentiality of exported TSF data (FPT_ITC) 87 15:7 Integrity of Output TSF Data (FPT_ITI) 88 15:8 Transmission of TSF data within TOE (FPT_ITT) 89 15:9 TSF Physical Protection (FPT_PHP) 91 15:10 Trusted Recovery (FPT_RCV) 93 15:11 Replay Detection (FPT_RPL) 95 15:12 State Synchronization Protocol (FPT_SSP) 95 15:13 Timestamp (FPT_STM) 96 15:14 TSF Data Consistency Between TSFs (FPT_TDC) 97 15:15 External Entity Test (FPT_TEE) 98 15:16 Consistency of TSF Data Replication within TOE (FPT_TRC) 99 15:17 TSF self-test (FPT_TST) 100 16 Resource Utilization (FRU) 101 16:1 Class Description 101 16:2 Fault Tolerance (FRU_FLT) 101 16:3 Service Priority (FRU_PRS) 102 16:4 Resource Allocation (FRU_RSA) 103 17 TOE Access Category (FTA) 105 17:1 Class Description 105 17:2 Optional Attribute Range Limitation (FTA_LSA) 105 17:3 Multiple Concurrent Session Limit (FTA_MCS) 106 17:4 Session Locking and Termination (FTA_SSL) 107 17:5 TOE Access Flag (FTA_TAB) 109 17:6 TOE Access History (FTA_TAH) 110 17:7 TOE Session Establishment (FTA_TSE) 111 18 Trusted Path/Channel Class (FTP) 111 18:1 Class Description 111 18:2 Inter-TSF Trusted Channel (FTP_ITC) 112 18:3 Trusted Channel Protocol (FTP_PRO) 113 18:4 Trusted Path (FTP_TRP) 115 Appendix A (Informative) Safety Function Requirements Application Notes 117 A:1 Overview117 A:2 Structure of description 117 Appendix B (Informative) Dependencies of Security Functional Components 120 Appendix C (Normative) FAU Category: Safety Auditing --- Application Note 130 C:1 Overview 130 C:2 Security Audit Automatic Response (FAU_ARP) 130 C:3 Security Audit Data Generation (FAU_GEN) 131 C:4 Safety Audit Analysis (FAU_SAA) 133 C:5 Safety Audit Review (FAU_SAR) 136 C:6 Security Audit Event Selection (FAU_SEL) 137 C:7 Security Audit Event Storage (FAU_STG) 138 Appendix D (Normative) FCO Class: Communications --- Application Note 140 D:1 Overview 140 D:2 Non-repudiation of origin (FCO_NRO) 140 D:3 Non-repudiation of Acceptance (FCO_NRR) 142 Appendix E (Normative) FCS Class: Cryptographic Support - Application Note 144 E:1 Overview 144 E:2 Key Management (FCS_CKM) 145 E:3 Cryptographic Operation (FCS_COP) 147 E:4 Random Bit Generation (FCS_RBG) 148 E:5 Random Number Generation (FCS_RNG) 150 Appendix F (Normative) FDP Class: User Data Protection --- Application Note 152 F:1 Rule 152 F:2 Access Control Policy (FDP_ACC) 153 F:3 Access Control Function (FDP_ACF) 154 F:4 Data Identification (FDP_DAU) 156 F:5 Output from TOE (FDP_ETC) 157 F:6 Information Flow Control Policy (FDP_IFC) 158 F:7 Information Flow Control Function (FDP_IFF) 159 F:8 Information Retention Control (FDP_IRC) 163 F:9 Input from outside TOE (FDP_ITC) 163 F:10 TOE Internal Transport (FDP_ITT) 165 F:11 Residual Information Protection (FDP_RIP) 167 F:12 Rollback (FDP_ROL) 168 F:13 Confidentiality of stored data (FDP_SDC) 169 F:14 Integrity of stored data (FDP_SDI) 170 F:15 User Data Confidentiality Protection for Transport Between TSFs (FDP_UCT) 171 F:16 User Data Integrity Transfer Protection between TSFs (FDP_UIT) 171 Appendix G (Normative) FIA Class: Marking and Identification --- Application Note 174 G:1 Overview 174 G:2 Authentication Failure (FIA_AFL) 174 G:3 Identity authentication (FIA_API) 175 G:4 User Attribute Definition (FIA_ATD) 176 G:5 Confidentiality Specification (FIA_SOS) 176 G:6 User Authentication (FIA_UAU) 177 G:7 User Identifier (FIA_UID) 180 G:8 User-Subject Binding (FIA_USB) 180 Appendix H (Normative) FMT Category: Safety Management --- Application Note 182 H:1 Overview 182 H:2 Limited Capability and Availability (FMT_LIM) 182 H:3 Management of functions in TSF (FMT_MOF) 183 H:4 Management of security attributes (FMT_MSA) 183 H:5 Management of TSF data (FMT_MTD) 185 H:6 Revocation (FMT_REV) 186 H:7 Security Attribute Expiration (FMT_SAE) 187 H:8 Management Function Specification (FMT_SMF) 188 H:9 Security Management Role (FMT_SMR) 188 Appendix I (Normative) FPR Category: Privacy --- Application Note 190 I:1 Overview 190 I:2 Anonymous (FPR_ANO) 190 I:3 Pseudonym (FPR_PSE) 192 I:4 Unlinkability (FPR_UNL) 195 I:5 Unobservability (FPR_UNO) 196 Appendix J (Normative) FPT Class: TSF Protection --- Application Note:200 J:1 Overview:200 J:2 TOE radiation (FPT_EMS):200 J:3 Failure Protection (FPT_FLS):201 J:4 TSF Initialization (FPT_INI):201 J:5 Availability of output TSF data (FPT_ITA) 202 J:6 Confidentiality of exported TSF data (FPT_ITC) 202 J:7 Integrity of output TSF data (FPT_ITI) 203 J:8 Transmission of TSF data within TOE (FPT_ITT) 204 J:9 TSF physical protection (FPT_PHP) 205 J:10 Trusted Recovery (FPT_RCV) 207 J:11 Replay Detection (FPT_RPL) 209 J:12 State Synchronization Protocol (FPT_SSP) 210 J:13 Timestamp (FPT_STM) 211 J:14 TSF Data Consistency Between TSFs (FPT_TDC) 211 J:15 Testing of external entities (FPT_TEE) 212 J:16 Consistency of TSF data replication within the TOE (FPT_TRC) 213 J:17 TSF Self-Test (FPT_TST) 213 Appendix K (Normative) FRU Class: Resource Utilization --- Application Note 215 K:1 Overview 215 K:2 Fault Tolerance (FRU_FLT) 215 K:3 Service Priority (FRU_PRS) 216 K:4 Resource Allocation (FRU_RSA) 217 Appendix L (Normative) FTA Class: TOE Access --- Application Note 219 L:1 Overview219 L:2 Optional Attribute Range Limitation (FTA_LSA) 219 L:3 Multiple Concurrent Session Limit (FTA_MCS) 220 L:4 Session Locking and Termination (FTA_SSL) 220 L:5 TOE access flag (FTA_TAB) 222 L:6 TOE Access History (FTA_TAH) 222 L:7 TOE Session Establishment (FTA_TSE) 223 Appendix M (Normative) FTP Class: Trusted Path/Channel --- Application Note 224 M:1 Overview 224 M:2 Inter-TSF Trusted Channel (FTP_ITC) 224 M:3 Trusted Channel Protocol (FTP_PRO) 224 M:4 Trusted Path (FTP_TRP) 226 References 227

Foreword

This document is in accordance with the provisions of GB/T 1:1-2020 "Guidelines for standardization work Part 1: Structure and drafting rules for standardization documents" Drafting: This document is part 2 of GB/T 18336 "Cybersecurity Technology Information Technology Security Assessment Criteria": GB/T 18336 has been The following parts were published: --- Part 1: Introduction and general model; --- Part 2: Safety functional components; --- Part 3: Safety assurance components; --- Part 4: Normative framework for assessment methods and activities; --- Part 5: Predefined security requirements package: This document replaces GB/T 18336:2-2015 "Information Technology Security Technology Information Technology Security Evaluation Criteria Part 2: Security Compared with GB/T 18336:2-2015, in addition to structural adjustments and editorial changes, the main technical changes are as follows: --- Added 9 security function families, including: FCS_RBG "Random bit generation" (see 10:4), FCS_RNG "Random number generation" (see 10:5), FDP_IRC "Information Retention Control" (see 11:8), FDP_SDC "Confidentiality of Stored Data" (see 11:13), FIA_API "Proof of Identity" (see 12:3), FMT_LIM "Limited Capabilities and Availability" (see 13:2), FPT_EMS "TOE radiation" (see 15:2), FPT_INI "TSF initialization" (see 15:4), FTP_PRO "Trusted Channel Protocol" (see 18:3); --- Added 6 security function components (or component elements), including: FAU_STG:1 "Audit data storage location" (see 8:7:12), FCS_CKM:5 "Key derivation" (see 10:2:9), FCS_CKM:6 "Time and event of key destruction" (see 10:2:10), FDP _ETC:2 "User data output with security attributes" (see 11:5:7:4), FPT_STM:2 "Time source" (see 15:13:8), FTA_TAB:1 "Default TOE access flag" (see 17:5:5:1); --- Changed one security function component, FCS_CKM:4 "Key Destruction" (see 10:2:8, 9:1:8 of the:2015 edition); --- Added component dependencies (see Appendix B): This document is equivalent to ISO /IEC 15408-2:2022 "Information security, network security and privacy protection information technology security assessment standards" Part 2: Safety functional components: The following minimal editorial changes were made to this document: --- In order to coordinate with the existing standards, the name of the standard will be changed to "Cybersecurity Technology Information Technology Security Assessment Criteria Part 2: Security Full-featured components: Please note that some of the contents of this document may involve patents: The issuing organization of this document does not assume the responsibility for identifying patents: This document is proposed and coordinated by the National Cybersecurity Standardization Technical Committee (SAC/TC260): This document was drafted by: China Information Security Evaluation Center, the Third Research Institute of the Ministry of Public Security, and the National Computer Network Emergency Response Technology Coordination Center Center, the 15th Research Institute of China Electronics Technology Group Corporation, Beijing Municipal Government Information Security Center, Hefei Datang Storage Technology Co:, Ltd: Xi'an University of Posts and Telecommunications, Ant Technology Group Co:, Ltd:, Qi'anxin Technology Group Co:, Ltd:, Beijing Zhongce Anhua Technology Co:, Ltd: Company, Shanghai Fuyuan Technology Service Co:, Ltd:, Beijing Antiy Network Security Technology Co:, Ltd:, Hangzhou Jinzhita Technology Co:, Ltd:, Hefei Tian Wei Information Security Technology Co:, Ltd:, Institute of Information Engineering, Chinese Academy of Sciences, Beijing University of Posts and Telecommunications, Hangzhou Anheng Information Technology Co:, Ltd: Shenzhen Haiyun Security Technology Co:, Ltd:, China Software Evaluation Center, China Automotive Engineering Research Institute Research Institute Co:, Ltd:, Kelai Network Technology Co:, Ltd:, Hisense Group Holdings Co:, Ltd:, Beijing Shenzhou Green Alliance Technology Co:, Ltd: Company, Beijing Oriental Jinxin Technology Co:, Ltd:, Alibaba Cloud Technology Co:, Ltd:, and Yuanjiang Shengbang (Beijing) Network Technology Co:, Ltd: The main drafters of this document are: Shi Hongsong, Zhang Baofeng, Jia Wei, Yang Yongsheng, Gao Jinping, Pang Bo, Gu Jian, Guo Yunfeng, Gu Shen, Zhang Jilan, Zhang Yong, Bai Xiaoyuan, Zhang Yu, Chen Chaochao, Lu Zhen, Wu Jianshuang, Gao Song, Liu Yuhan, Li Hexin, Huang Xiaoli, Li Jing, Rao Huayi, Huo Shanshan, Liu Jian, Mou Jie, He Hai, Xie Chaohai, Ye Jianwei, Chen Xing, An Jincheng, Ye Runguo, Zuo Jian, Feng Yun, Liu Yanzhao, Wang Weizhe, Jin Ze, Tao Xiaofeng, Liu Xueli, Quan Xiaowen, Gao Xuesong, Tang Gang, Long Qin, Xu Yuan, Li Fengjuan, Deng Hui, Bi Haiying, Wang Beibei, Chen Jiazhe, Yang Jing, Wei Wei, and Liu Hongwei: This document was first published in:2001 as GB/T 18336:2-2001, revised for the first time in:2008, and revised for the second time in:2015: This is the third revision:

Introduction

The safety functional components defined in this document are safety functional components expressed in a protection profile (PP), PP-module, function package or safety target (ST): Functional requirements or components: These requirements describe the expected security behavior of an evaluation object (TOE) and are intended to meet the requirements in PP, PP - Security objectives specified in a module, functional package or ST: These requirements describe those requirements that users must meet through direct interaction with IT (e:g: input, output) or security attributes that can be detected through IT response: Security functional components are used to express security functional requirements that are designed to counteract threats in the assumed operating environment of the TOE: and/or override any identified organizational security policies: GB/T 18336 is proposed to consist of five parts: --- Part 1: Introduction and general model: This aims to provide an overall overview of GB/T 18336 and define the basic principles of information technology security assessment: It introduces general concepts and principles and gives a general model for evaluation: --- Part 2: Safety functional components: Aims to establish a set of standardized templates for functional components that can be used to describe safety functional requirements: These functional components are structured in the form of classes and families, and specific functions are constructed through component selection, refinement, and cutting: safety functional requirements: --- Part 3: Security assurance components: Aims to establish a set of standardized templates for security assurance components that can be used to describe security assurance requirements: These security assurance components are structured in classes and families, defining the criteria for evaluation of PP, ST, and TOE: Then, specific security requirements are constructed through component selection, refinement, and tailoring: --- Part 4: Normative framework for evaluation methods and activities: Aims to provide a standardized framework for normative evaluation methods and activities: These assessment methods and activities are included in the PP, ST and any supporting documents for assessors to use based on The evaluation work is carried out based on the models described in other parts of GB/T 18336: --- Part 5: Predefined security requirement packages: Aims to provide security assurance requirements and security functions commonly used by stakeholders Required packages, examples of packages provided include Evaluation Assurance Level (EAL) and Combined Assurance Package (CAP): The target readers of this document are mainly consumers, developers, and evaluators of secure IT products: Provides additional information about the intended readers of GB/T 18336 and how the intended reader groups can use GB/T 18336: These groups can Use this document as follows: a) Consumers, when selecting components to express functional requirements to meet the safety objectives stated in a PP, PP-module, functional package or ST This document is used when the safety objectives and safety requirements are to be considered: Detailed information about the system: b) Developers, in responding to actual or anticipated consumer security requirements when constructing TOEs, may find a standard in this document: The content of this document can also be used as a basis to further define a TOE that meets these requirements: Security features and mechanisms: c) Assessor, using the security functional requirements defined in this document to verify the TOE expressed in PP, PP-module, functional package, ST Do the functional requirements meet IT security objectives and whether all dependencies have been explained and met: Use this document to help determine whether a given TOE meets the stated requirements: Note: This document uses bold and italic fonts in some cases to distinguish terms from the rest of the text: For hierarchical components, when a requirement is enhanced or modified and exceeds the requirements of the previous component, it is usually shown in boldface: Additionally, any new or enhanced allowed operations beyond the previous components are highlighted in bold: Convention uses italics to indicate text with precise meaning: For security assurance requirements, this convention also applies to special verbs related to assessment: Cybersecurity Technology Information Technology Security Assessment Criteria Part 2: Safety functional components

1 Scope

This document defines the required structure and content of safety functional components for use in safety assessments: It contains a classification of safety components Catalog to meet the common security functional requirements of many IT products:

2 Normative references

The contents of the following documents constitute the essential clauses of this document through normative references in this document: For referenced documents without a date, only the version corresponding to that date applies to this document; for referenced documents without a date, the latest version (including all amendments) applies to This document: GB/T 18336:1-2024 Cybersecurity technology Information technology security assessment criteria Part 1: Introduction and general model (ISO /IEC 15408......
Image     

Tips & Frequently Asked Questions:

Question 1: How long will the true-PDF of GB/T 18336.2-2024_English be delivered?

Answer: Upon your order, we will start to translate GB/T 18336.2-2024_English as soon as possible, and keep you informed of the progress. The lead time is typically 15 ~ 20 working days. The lengthier the document the longer the lead time.

Question 2: Can I share the purchased PDF of GB/T 18336.2-2024_English with my colleagues?

Answer: Yes. The purchased PDF of GB/T 18336.2-2024_English will be deemed to be sold to your employer/organization who actually pays for it, including your colleagues and your employer's intranet.

Question 3: Does the price include tax/VAT?

Answer: Yes. Our tax invoice, downloaded/delivered in 9 seconds, includes all tax/VAT and complies with 100+ countries' tax regulations (tax exempted in 100+ countries) -- See Avoidance of Double Taxation Agreements (DTAs): List of DTAs signed between Singapore and 100+ countries

Question 4: Do you accept my currency other than USD?

Answer: Yes. If you need your currency to be printed on the invoice, please write an email to Sales@ChineseStandard.net. In 2 working-hours, we will create a special link for you to pay in any currencies. Otherwise, follow the normal steps: Add to Cart -- Checkout -- Select your currency to pay.

Question 5: Should I purchase the latest version GB/T 18336.2-2024?

Answer: Yes. Unless special scenarios such as technical constraints or academic study, you should always prioritize to purchase the latest version GB/T 18336.2-2024 even if the enforcement date is in future. Complying with the latest version means that, by default, it also complies with all the earlier versions, technically.