Home   Cart   Quotation   Policy   About-Us
www.ChineseStandard.net
SEARCH

GB/T 36626-2018 English PDF

US$359.00 ยท In stock
Delivery: <= 4 days. True-PDF full-copy in English will be manually translated and delivered via email.
GB/T 36626-2018: Information security technology -- Management guide for secure operation and maintenance of information systems
Status: Valid
Standard IDUSDBUY PDFLead-DaysStandard Title (Description)Status
GB/T 36626-2018359 Add to Cart 4 days Information security technology -- Management guide for secure operation and maintenance of information systems Valid

Similar standards

GB/T 36630.1   GB/T 36635   GB/T 36624   GB/T 36630.4   GB/T 36630.3   

Basic data

Standard ID: GB/T 36626-2018 (GB/T36626-2018)
Description (Translated English): Information security technology -- Management guide for secure operation and maintenance of information systems
Sector / Industry: National Standard (Recommended)
Classification of Chinese Standard: L80
Classification of International Standard: 35.040
Word Count Estimation: 18,176
Date of Issue: 2018-09-17
Date of Implementation: 2019-04-01
Issuing agency(ies): State Administration for Market Regulation, China National Standardization Administration

GB/T 36626-2018: Information security technology -- Management guide for secure operation and maintenance of information systems


---This is a DRAFT version for illustration, not a final translation. Full copy of true-PDF in English version (including equations, symbols, images, flow-chart, tables, and figures etc.) will be manually/carefully translated upon your order.
Information security technology - Management guide for secure operation and maintenance of information systems ICS 35.040 L80 National Standards of People's Republic of China Information security technology Information System Security Operation and Maintenance Management Guide Published on.2018-09-17 Implementation of.2019-04-01 State market supervision and administration China National Standardization Administration issued

Content

Foreword I 1 Scope 1 2 Normative references 1 3 Terms and Definitions 1 4 Abbreviations 2 5 Information System Security Operation and Maintenance System 2 5.1 Safety Operation and Maintenance Model 2 5.2 Classification of safety operation and maintenance activities 3 5.3 Safety operation and maintenance activities elements 3 5.4 Safety Operation and Maintenance Management Principles 3 6 Security Operation and Maintenance Strategy 3 6.1 Security Operation and Maintenance Strategy Formulation 3 6.2 Security Operation and Maintenance Strategy Review 4 7 Management of the safe operation and maintenance organization 4 7.1 Roles and Responsibilities of Safe Operation and Maintenance 4 7.2 Pre-employment review 5 7.3 Job performance responsibilities 5 7.4 Termination and Change 6 8 Safety Operation and Maintenance Procedures 6 8.1 Asset Management 6 8.2 Log Management 7 8.3 Access Control 7 8.4 Password Management 8 8.5 Vulnerability Management 8 8.6 Backup 9 8.7 Security Event Management and Response 9 9 Safety operation and maintenance support system 10 9.1 Information System Security Service Desk 10 9.2 Asset Management System 11 9.3 Vulnerability Management System 11 9.4 Intrusion Detection System 12 9.5 Abnormal Behavior Monitoring System 12 9.6 Association Analysis System 12 Reference 14

Foreword

This standard was drafted in accordance with the rules given in GB/T 1.1-2009. Please note that some of the contents of this document may involve patents. The issuing organization of this document is not responsible for identifying these patents. This standard is proposed and managed by the National Information Security Standardization Technical Committee (SAC/TC260). This standard was drafted. Zhejiang Yuanwang Information Co., Ltd., CLP Great Wall Internet System Application Co., Ltd., China Electronic Technology Standard Institute of Standardization, National Information Center, Beijing Lisichen New Technology Co., Ltd., Xi'an Future International Information Co., Ltd., Guangzhou Saibao Certification Center Service Co., Ltd. The main drafters of this standard. Fu Ruyi, Jiang Xingjie, Shangguan Xiaoli, Ma Hongjun, Qi Jinghua, Wang Huili, Liu Wei, Fu Gang, Bai Feng, Shao Senlong, Jin Jianghuan, Yao Longfei, Liu Jingling, Zhao Wei, Zhao Tuo, Chen Ying, Liu Haidi. Information security technology Information System Security Operation and Maintenance Management Guide

1 Scope

This standard provides guidance and recommendations for the information system security operation and maintenance management system, and gives the management of the security operation and maintenance strategy and security operation and maintenance organization. Objectives, requirements, and implementation guidelines for related activities such as management, safety operation and maintenance procedures, and safety operation and maintenance support systems. This standard can be used to guide the establishment and operation of the information system security operation and maintenance management system of each organization.

2 Normative references

The following documents are indispensable for the application of this document. For dated references, only dated versions apply to this article. Pieces. For undated references, the latest edition (including all amendments) applies to this document. GB/T 22081-2016 Information Technology Security Technology Information Security Control Practice Guide GB/T 29246-2017 Information technology security technology information security management system overview and vocabulary GB/T 31722-2015 Information technology security technology information security risk management

3 Terms and definitions

The following terms and definitions as defined in GB/T 29246-2017 apply to this document. 3.1 Threat threat A potential source of an event that could lead to negative outcomes for an asset or organization. [GB/T 25069-2010, definition 2.3.94] 3.2 Information system security operation and maintenance secureoperationandmaintenanceofinformationsystems A series of pre-defined actions taken to ensure that the information system is protected from various security threats after the information system has been authorized to operate activity. 3.3 Security policy securitypolicy A set of rules, guidelines, and guidelines for managing how assets, including sensitive information, are managed, protected, and distributed within an organization and its systems. Practice, especially those that have an impact on system security and related elements. [GB/T 25069-2010, definition 2.3.2] 3.4 Procedure procedure A written description of the course of action taken to perform a given task. [GB/T 25069-2010, definition 2.1.7] 3.5 Information system security operation and maintenance support system supportsystemforsecureoperationandmaintenanceofinformation Systems An auxiliary system tool used to support the secure operation and maintenance of information systems. Including but not limited to automatic asset discovery system, configuration management system,
......
Image     

Tips & Frequently Asked Questions:

Question 1: How long will the true-PDF of GB/T 36626-2018_English be delivered?

Answer: Upon your order, we will start to translate GB/T 36626-2018_English as soon as possible, and keep you informed of the progress. The lead time is typically 2 ~ 4 working days. The lengthier the document the longer the lead time.

Question 2: Can I share the purchased PDF of GB/T 36626-2018_English with my colleagues?

Answer: Yes. The purchased PDF of GB/T 36626-2018_English will be deemed to be sold to your employer/organization who actually pays for it, including your colleagues and your employer's intranet.

Question 3: Does the price include tax/VAT?

Answer: Yes. Our tax invoice, downloaded/delivered in 9 seconds, includes all tax/VAT and complies with 100+ countries' tax regulations (tax exempted in 100+ countries) -- See Avoidance of Double Taxation Agreements (DTAs): List of DTAs signed between Singapore and 100+ countries

Question 4: Do you accept my currency other than USD?

Answer: Yes. If you need your currency to be printed on the invoice, please write an email to Sales@ChineseStandard.net. In 2 working-hours, we will create a special link for you to pay in any currencies. Otherwise, follow the normal steps: Add to Cart -- Checkout -- Select your currency to pay.