| GB/T 36626-2018 English PDFUS$359.00 ยท In stock Delivery: <= 4 days. True-PDF full-copy in English will be manually translated and delivered via email. GB/T 36626-2018: Information security technology -- Management guide for secure operation and maintenance of information systems Status: Valid 
 Basic dataStandard ID: GB/T 36626-2018 (GB/T36626-2018)Description (Translated English): Information security technology -- Management guide for secure operation and maintenance of information systems Sector / Industry: National Standard (Recommended) Classification of Chinese Standard: L80 Classification of International Standard: 35.040 Word Count Estimation: 18,176 Date of Issue: 2018-09-17 Date of Implementation: 2019-04-01 Issuing agency(ies): State Administration for Market Regulation, China National Standardization Administration GB/T 36626-2018: Information security technology -- Management guide for secure operation and maintenance of information systems---This is a DRAFT version for illustration, not a final translation. Full copy of true-PDF in English version (including equations, symbols, images, flow-chart, tables, and figures etc.) will be manually/carefully translated upon your order. Information security technology - Management guide for secure operation and maintenance of information systems ICS 35.040 L80 National Standards of People's Republic of China Information security technology Information System Security Operation and Maintenance Management Guide Published on.2018-09-17 Implementation of.2019-04-01 State market supervision and administration China National Standardization Administration issued ContentForeword I 1 Scope 1 2 Normative references 1 3 Terms and Definitions 1 4 Abbreviations 2 5 Information System Security Operation and Maintenance System 2 5.1 Safety Operation and Maintenance Model 2 5.2 Classification of safety operation and maintenance activities 3 5.3 Safety operation and maintenance activities elements 3 5.4 Safety Operation and Maintenance Management Principles 3 6 Security Operation and Maintenance Strategy 3 6.1 Security Operation and Maintenance Strategy Formulation 3 6.2 Security Operation and Maintenance Strategy Review 4 7 Management of the safe operation and maintenance organization 4 7.1 Roles and Responsibilities of Safe Operation and Maintenance 4 7.2 Pre-employment review 5 7.3 Job performance responsibilities 5 7.4 Termination and Change 6 8 Safety Operation and Maintenance Procedures 6 8.1 Asset Management 6 8.2 Log Management 7 8.3 Access Control 7 8.4 Password Management 8 8.5 Vulnerability Management 8 8.6 Backup 9 8.7 Security Event Management and Response 9 9 Safety operation and maintenance support system 10 9.1 Information System Security Service Desk 10 9.2 Asset Management System 11 9.3 Vulnerability Management System 11 9.4 Intrusion Detection System 12 9.5 Abnormal Behavior Monitoring System 12 9.6 Association Analysis System 12 Reference 14ForewordThis standard was drafted in accordance with the rules given in GB/T 1.1-2009. Please note that some of the contents of this document may involve patents. The issuing organization of this document is not responsible for identifying these patents. This standard is proposed and managed by the National Information Security Standardization Technical Committee (SAC/TC260). This standard was drafted. Zhejiang Yuanwang Information Co., Ltd., CLP Great Wall Internet System Application Co., Ltd., China Electronic Technology Standard Institute of Standardization, National Information Center, Beijing Lisichen New Technology Co., Ltd., Xi'an Future International Information Co., Ltd., Guangzhou Saibao Certification Center Service Co., Ltd. The main drafters of this standard. Fu Ruyi, Jiang Xingjie, Shangguan Xiaoli, Ma Hongjun, Qi Jinghua, Wang Huili, Liu Wei, Fu Gang, Bai Feng, Shao Senlong, Jin Jianghuan, Yao Longfei, Liu Jingling, Zhao Wei, Zhao Tuo, Chen Ying, Liu Haidi. Information security technology Information System Security Operation and Maintenance Management Guide1 ScopeThis standard provides guidance and recommendations for the information system security operation and maintenance management system, and gives the management of the security operation and maintenance strategy and security operation and maintenance organization. Objectives, requirements, and implementation guidelines for related activities such as management, safety operation and maintenance procedures, and safety operation and maintenance support systems. This standard can be used to guide the establishment and operation of the information system security operation and maintenance management system of each organization.2 Normative referencesThe following documents are indispensable for the application of this document. For dated references, only dated versions apply to this article. Pieces. For undated references, the latest edition (including all amendments) applies to this document. GB/T 22081-2016 Information Technology Security Technology Information Security Control Practice Guide GB/T 29246-2017 Information technology security technology information security management system overview and vocabulary GB/T 31722-2015 Information technology security technology information security risk management3 Terms and definitionsThe following terms and definitions as defined in GB/T 29246-2017 apply to this document. 3.1 Threat threat A potential source of an event that could lead to negative outcomes for an asset or organization. [GB/T 25069-2010, definition 2.3.94] 3.2 Information system security operation and maintenance secureoperationandmaintenanceofinformationsystems A series of pre-defined actions taken to ensure that the information system is protected from various security threats after the information system has been authorized to operate activity. 3.3 Security policy securitypolicy A set of rules, guidelines, and guidelines for managing how assets, including sensitive information, are managed, protected, and distributed within an organization and its systems. Practice, especially those that have an impact on system security and related elements. [GB/T 25069-2010, definition 2.3.2] 3.4 Procedure procedure A written description of the course of action taken to perform a given task. [GB/T 25069-2010, definition 2.1.7] 3.5 Information system security operation and maintenance support system supportsystemforsecureoperationandmaintenanceofinformation Systems An auxiliary system tool used to support the secure operation and maintenance of information systems. Including but not limited to automatic asset discovery system, configuration management system, ......Tips & Frequently Asked Questions:Question 1: How long will the true-PDF of GB/T 36626-2018_English be delivered?Answer: Upon your order, we will start to translate GB/T 36626-2018_English as soon as possible, and keep you informed of the progress. The lead time is typically 2 ~ 4 working days. The lengthier the document the longer the lead time.Question 2: Can I share the purchased PDF of GB/T 36626-2018_English with my colleagues?Answer: Yes. The purchased PDF of GB/T 36626-2018_English will be deemed to be sold to your employer/organization who actually pays for it, including your colleagues and your employer's intranet.Question 3: Does the price include tax/VAT?Answer: Yes. Our tax invoice, downloaded/delivered in 9 seconds, includes all tax/VAT and complies with 100+ countries' tax regulations (tax exempted in 100+ countries) -- See Avoidance of Double Taxation Agreements (DTAs): List of DTAs signed between Singapore and 100+ countriesQuestion 4: Do you accept my currency other than USD?Answer: Yes. If you need your currency to be printed on the invoice, please write an email to Sales@ChineseStandard.net. In 2 working-hours, we will create a special link for you to pay in any currencies. Otherwise, follow the normal steps: Add to Cart -- Checkout -- Select your currency to pay. |