GB/T 29245-2012 English PDFUS$259.00 · In stock
Delivery: <= 3 days. True-PDF full-copy in English will be manually translated and delivered via email. GB/T 29245-2012: Information security techniques -- Basic requirements of information security for national department Status: Valid
Basic dataStandard ID: GB/T 29245-2012 (GB/T29245-2012)Description (Translated English): Information security techniques -- Basic requirements of information security for national department Sector / Industry: National Standard (Recommended) Classification of Chinese Standard: L80 Classification of International Standard: 35.040 Word Count Estimation: 11,173 Quoted Standard: GB/T 20984-2007; GB/T 22239-2008; GB/T 22240-2008 Regulation (derived from): National Standards Bulletin No. 41 of 2012 Issuing agency(ies): General Administration of Quality Supervision, Inspection and Quarantine of the People's Republic of China, Standardization Administration of the People's Republic of China Summary: This standard specifies the basic government information security management requirements for the guidance of government departments at all levels of information security management. This standard involves confidentiality, in accordance with confidentiali GB/T 29245-2012: Information security techniques -- Basic requirements of information security for national department---This is a DRAFT version for illustration, not a final translation. Full copy of true-PDF in English version (including equations, symbols, images, flow-chart, tables, and figures etc.) will be manually/carefully translated upon your order. Information security techniques. Basic requirements of information security for national department ICS 35.040 L80 National Standards of People's Republic of China Information Security Technology, Government Information Security Management basic requirements Issued on. 2012-12-31 2013-06-01 implementation Administration of Quality Supervision, Inspection and Quarantine of People's Republic of China Standardization Administration of China released Table of ContentsPreface Ⅰ Introduction Ⅱ 1 Scope 1 2 Normative references 1 3 Organization of information security management 1 4 daily information security management 1 1 4.1 Basic requirements 4.2 Personnel Management 1 4.3 Asset Management 2 4.4 Purchasing Management 2 4.5 Outsourcing Management 2 Funds Guarantee 4.6 2 5 Information Security Management 3 5.1 Basic requirements 3 5.2 Network perimeter protection management 3 5.3 Protection Management Information System 3 5.4 Portal Protection Management 3 5.5 Email Protection Management 3 5.6 Terminal Computer Protection Management 4 5.7 storage medium Protection Management 4 6 Information Security Emergency Management 4 7 Information security education and training 4 8 Security checks 5 Reference 6ForewordThis standard was drafted in accordance with GB/T 1.1-2009 given rules. This standard by the National Safety Standardization Technical Committee (SAC/TC260) and focal points. This standard drafting units. China Electronics Standardization Institute, China Software Testing Center. The main drafters of this standard. Yang Jianjun, Luo Feng Ying, Wang Yanming, high-Chi Yang, Zhu Xuan, Tang Wang, Fu Ruyi, Puxian Guo, Liang Bo.IntroductionThe establishment of standards primarily for the information security management guidance and information security inspections at all levels of government to protect the government Organs and departments and units of information security and information systems. Information Security Technology, Government Information Security Management basic requirements1 ScopeThis standard specifies the basic government information security management requirements for information security management guidance at all levels of government. this Standard involved in security work, in accordance with privacy regulations and standards; work involving passwords, password management in accordance with national regulations. This standard applies to all levels of government departments and other units can use and reference.2 Normative referencesThe following documents for the application of this document is essential. For dated references, only the dated version suitable for use herein Member. For undated references, the latest edition (including any amendments) applies to this document. GB/T 20984-2007 Information Security techniques - Information security risk assessment specification GB/T 22239-2008 Information security technology information system security protection essential requirements GB/T 22240-2008 Information security technology information system security protection rating guide3 Organization of information security managementThe entry requirements include. a) should strengthen their leadership and responsibility, improve measures to establish and improve information security and accountability mechanism; b) should be a clear leader in charge of the unit responsible for information security management, in accordance with national laws and regulations of the relevant requirements, the actual Organizations to develop information security management system, improve the technical protection measures to coordinate the handling of major information security incidents; c) shall designate an authority, specific commitment to information security management, the organization responsible for implementing information security management system and information security technologies Art protective measures, information security education and training to carry out supervision and inspection; d) The internal organization should designate a full-time or part-time information security officer, responsible for the daily information security supervision, inspection, guidance. letter Information security officer should have a strong sense of responsibility and awareness of information security, information security master the basic knowledge and skills.4 daily information security management4.1 Basic requirements The entry requirements include. a) shall establish general principles and objectives of information security, a clear mandate and the main principles of information security; b) shall establish and improve information security management system, strengthening technical support means construction, improve information security management information Level; c) should be strengthened personnel, assets, purchasing, outsourcing of security management and ensure information security funding. 4.2 Personnel Management The entry requirements include. ......Tips & Frequently Asked Questions:Question 1: How long will the true-PDF of GB/T 29245-2012_English be delivered?Answer: Upon your order, we will start to translate GB/T 29245-2012_English as soon as possible, and keep you informed of the progress. The lead time is typically 1 ~ 3 working days. The lengthier the document the longer the lead time.Question 2: Can I share the purchased PDF of GB/T 29245-2012_English with my colleagues?Answer: Yes. The purchased PDF of GB/T 29245-2012_English will be deemed to be sold to your employer/organization who actually pays for it, including your colleagues and your employer's intranet.Question 3: Does the price include tax/VAT?Answer: Yes. Our tax invoice, downloaded/delivered in 9 seconds, includes all tax/VAT and complies with 100+ countries' tax regulations (tax exempted in 100+ countries) -- See Avoidance of Double Taxation Agreements (DTAs): List of DTAs signed between Singapore and 100+ countriesQuestion 4: Do you accept my currency other than USD?Answer: Yes. If you need your currency to be printed on the invoice, please write an email to Sales@ChineseStandard.net. In 2 working-hours, we will create a special link for you to pay in any currencies. Otherwise, follow the normal steps: Add to Cart -- Checkout -- Select your currency to pay. |