Home Cart Quotation About-Us
www.ChineseStandard.net
SEARCH

GBZ41288-2022 English PDF

US$279.00 ยท In stock
Delivery: <= 3 days. True-PDF full-copy in English will be manually translated and delivered via email.
GBZ41288-2022: Information security technology - Guidelines of cyber security protection for important industrial control system
Status: Valid
Standard IDUSDBUY PDFLead-DaysStandard Title (Description)Status
GB/Z 41288-2022279 Add to Cart 3 days Information security technology - Guidelines of cyber security protection for important industrial control system Valid

Similar standards

GB/T 41819   GB/T 41871   GB/T 41479   GB/T 19713   GB/Z 41290   

Basic data

Standard ID: GB/Z 41288-2022 (GB/Z41288-2022)
Description (Translated English): Information security technology - Guidelines of cyber security protection for important industrial control system
Sector / Industry: National Standard
Classification of Chinese Standard: L80
Word Count Estimation: 14,111
Issuing agency(ies): State Administration for Market Regulation, China National Standardization Administration

GBZ41288-2022: Information security technology - Guidelines of cyber security protection for important industrial control system


---This is a DRAFT version for illustration, not a final translation. Full copy of true-PDF in English version (including equations, symbols, images, flow-chart, tables, and figures etc.) will be manually/carefully translated upon your order.
GB /Z 41288-2022 Information security technology - Guidelines of cyber security protection for important industrial control system ICS 35.030 CCSL80 National Standardization Guiding Technical Document of the People's Republic of China Information Security Technology Guidelines for Network Security Protection of Important Industrial Control Systems Published on 2022-03-09 2022-10-01 Implementation State Administration for Market Regulation Released by the National Standardization Administration directory Preface I 1 Scope 1 2 Normative references 1 3 Terms and Definitions 1 4 Abbreviations 3 5 Important industrial control system characteristics and safety protection principles 3 5.1 Important Industrial Control System Features 3 5.2 Important Industrial Control System Network Security Protection Principles 4 5.3 Network Security Protection System of Important Industrial Control System 4 6 Safety Protection Technology 6 6.1 Infrastructure Security 6 6.2 Architecture Security 6 6.3 System Safety 8 6.4 Safe and Trustworthy Protection 9 7 Emergency backup measures9 7.1 Redundant Standby 9 7.2 Multiple lines of defense 9 7.3 Emergency Response 10 8 Safety management 11 8.1 Integration into the safety production management system 11 8.2 Safety management of all personnel 11 8.3 Security management of all equipment 11 8.4 Full life cycle security management 11

foreword

This document is in accordance with the provisions of GB/T 1.1-2020 "Guidelines for Standardization Work Part 1.Structure and Drafting Rules of Standardization Documents" drafted. Please note that some content of this document may be patented. The issuing agency of this document assumes no responsibility for identifying patents. This document is proposed and managed by the National Information Security Standardization Technical Committee (SAC/TC260). This document is drafted by. Global Energy Internet Research Institute Co., Ltd., State Grid Corporation of China, National Information Technology Security Research Center Heart, National Energy Administration, NARI Group Co., Ltd., China Electric Power Research Institute Co., Ltd., China Southern Power Grid Co., Ltd., China Huaneng Group Co., Ltd., China Information Security Evaluation Center, 11th Bureau of the Ministry of Public Security, China Electronics Standardization Institute, China Aerospace Science and Industry Corporation Group Co., Ltd., Machinery Industry Instrumentation Comprehensive Technology and Economic Research Institute, the Third Research Institute of the Ministry of Public Security, National Industrial Information Security Development Research Institute Research Center, Shenyang Institute of Automation, Chinese Academy of Sciences, Shenyang Institute of Computing Technology, Chinese Academy of Sciences, Xuji Group Co., Ltd., China National Railway Group Co., Ltd., China General Nuclear Power Corporation, China Three Gorges Corporation, China National Offshore Oil Corporation Co., Ltd., China Shipbuilding Industry Corporation, State Grid Fujian Electric Power Co., Ltd., Beijing Sifang Relay Automation Co., Ltd., China Railway Research Institute Group Co., Ltd., Dongfang Electronics Co., Ltd., Beijing Hollysys Intelligent Technology Co., Ltd., Zhejiang University, State Grid Corporation of East China Branch, State Grid Jiangxi Electric Power Co., Ltd. Electric Power Research Institute, Beijing Qixingchen Information Security Technology Co., Ltd. Company, Guoneng Zhishen Control Technology Co., Ltd., China Electricity Council Technology Development Service Center, Shanghai Electric Power University, Hangzhou Silan Microelectronics Subsidiary Co., Ltd., Hunan Qilin Xin'an Technology Co., Ltd., Beijing Xinda Explorer Technology Co., Ltd., Qingdao Haier Technology Co., Ltd. Company, Qi Anxin Technology Group Co., Ltd. The main drafters of this document. Xin Yaozhong, Yu Yong, Li Bing, Hu Hongsheng, Xu Haiming, Yisu, Zhu Shishun, Guo Jiancheng, Nan Guilin, Tao Hongzhu, Sun Wei, Tao Wenwei, Guo Sen, Li Jingchun, Guo Qiquan, Liu Xiangang, Li Bin, Zhu Guobang, Zhang Tao, Fan Chunling, Shi Congcong, Li Ming, Guo Qian, Bi Lidong, Wang Yumin, Chen Xuehong, Ma Yue, Yang Weiyong, Gao Kunlun, Deng Zhaoyun, Zhang Xiaojian, Wang Changbao, Yu Pengfei, Ma Xiao, Li Ling, Liang Shouyu, Shang Wenli, Yang Hao, Yin Zhenyu, Cao Wantian, Mao Jiang, Shi Yanping, Zheng Sheng, Zou Lailong, Mao Yunping, Wang Qiang, Ren Yanming, Wang Yong, Wang Wanqi, Zhang Yan, Ci Guoxing, Feng Dongqin, Zhang Liang, Yang Ruxia, Meng Yahui, Zhu Jingling, Liu Sen, Zhu Yiming, Zhao Guanghuan, Chen Songzheng, Liu Wenqing, Xie Dong, Xu Zhifang, Zuo Yingnan. Information Security Technology Guidelines for Network Security Protection of Important Industrial Control Systems

1 Scope

This document specifies the basic principles, security protection technologies, emergency backup measures and security management of important industrial control systems. In order to establish a network security protection system for important industrial control systems. This document is applicable to the planning and design, research and development, operation management, upgrading and transformation of important industrial control systems, and other business systems. Also available for reference.

2 Normative references

The contents of the following documents constitute essential provisions of this document through normative references in the text. Among them, dated citations documents, only the version corresponding to that date applies to this document; for undated references, the latest edition (including all amendments) applies to this document. GB/T 9361 Computer Site Safety Requirements GB 17859 Criteria for classification of security protection levels of computer information systems GB/T 18336.2 Information Technology Security Technology Information Technology Security Assessment Criteria Part 2.Security Functional Components GB/T 20272 Information Security Technology Operating System Security Technical Requirements GB/T 20984 Information Security Technology Information Security Risk Assessment Specification GB/T 21028 Information Security Technology Server Security Technical Requirements GB/T 21050 Information Security Technology Network Switch Security Technical Requirements GB/T 22239 Basic requirements for classified protection of information security technology network security GB/T 25068.3 Information Technology Security Technology IT Network Security Part 3.Internet Communication Security Using Security Gateways Protect GB/T 25069 Information Security Technical Terminology GB /Z 25320 (all parts) Power system management and its information exchange data and communication security GB/T 30976.1 Industrial Control System Information Security Part 1.Evaluation Specification GB/T 31504 Information Security Technology Authentication and Authorization Digital Identity Information Service Framework Specification GB/T 32919 Information Security Technology Industrial Control System Security Control Application Guide GB/T 36323 Basic Requirements for Safety Management of Information Security Technology Industrial Control System GB/T 36324 Information Security Classification Specification for Information Security Technology Industrial Control System GB/T 36466 Implementation Guide for Risk Assessment of Information Security Technology Industrial Control System GB/T 36572 Guidelines for Network Security Protection of Electric Power Monitoring System GB/T 37092 Information Security Technology Cryptographic Module Security Requirements GB/T 37962 Information Security Technology Industrial Control System Product Information Security General Evaluation Criteria GB/T 37980 Information Security Technology Industrial Control System Safety Inspection Guide

3 Terms and Definitions

The terms and definitions defined in GB 17859, GB/T 25069, GB/T 31504 and GB/T 36572 and the following terms and definitions apply to this document.
......
Image     

Tips & Frequently Asked Questions:

Question 1: How long will the true-PDF of GBZ41288-2022_English be delivered?

Answer: Upon your order, we will start to translate GBZ41288-2022_English as soon as possible, and keep you informed of the progress. The lead time is typically 1 ~ 3 working days. The lengthier the document the longer the lead time.

Question 2: Can I share the purchased PDF of GBZ41288-2022_English with my colleagues?

Answer: Yes. The purchased PDF of GBZ41288-2022_English will be deemed to be sold to your employer/organization who actually pays for it, including your colleagues and your employer's intranet.

Question 3: Does the price include tax/VAT?

Answer: Yes. Our tax invoice, downloaded/delivered in 9 seconds, includes all tax/VAT and complies with 100+ countries' tax regulations (tax exempted in 100+ countries) -- See Avoidance of Double Taxation Agreements (DTAs): List of DTAs signed between Singapore and 100+ countries

Question 4: Do you accept my currency other than USD?

Answer: Yes. If you need your currency to be printed on the invoice, please write an email to Sales@ChineseStandard.net. In 2 working-hours, we will create a special link for you to pay in any currencies. Otherwise, follow the normal steps: Add to Cart -- Checkout -- Select your currency to pay.