HOME   Cart(0)   Quotation   About-Us Policy PDFs Standard-List
www.ChineseStandard.net Database: 189759 (12 Oct 2025)

GB/T 28448-2019 PDF English

US$2405.00 · In stock · Download in 9 seconds
GB/T 28448-2019: Information security technology - Evaluation requirement for classified protection of cybersecurity
Delivery: 9 seconds. True-PDF full-copy in English & invoice will be downloaded + auto-delivered via email. See step-by-step procedure
Status: Valid

GB/T 28448: Evolution and historical versions

Standard IDContents [version]USDSTEP2[PDF] deliveryName of Chinese StandardStatus
GB/T 28448-2019English2405 Add to Cart 0-9 seconds. Auto-delivery Information security technology - Evaluation requirement for classified protection of cybersecurity Valid
GB/T 28448-2012EnglishRFQ ASK 17 days Information security technology -- Testing and evaluation requirement for classified protection of information system Obsolete

Excerpted PDFs (Download full copy in 9 seconds upon purchase)

PDF Preview: GB/T 28448-2019
      

Similar standards

GB/T 28454   GB/T 28449   GB/T 28451   

GB/T 28448-2019: Information security technology - Evaluation requirement for classified protection of cybersecurity


---This is an excerpt. Full copy of true-PDF in English version (including equations, symbols, images, flow-chart, tables, and figures etc.), auto-downloaded/delivered in 9 seconds, can be purchased online: https://www.ChineseStandard.net/PDF.aspx/GBT28448-2019
NATIONAL STANDARD OF THE PEOPLE’S REPUBLIC OF CHINA ICS 35.040 L 80 Replacing GB/T 28448-2012 Information security technology - Evaluation requirement for classified protection of cybersecurity Issued on. MAY 10, 2019 Implemented on. DECEMBER 01, 2019 Issued by. General Administration of Quality Supervision, Inspection and Quarantine; Standardization Administration of PRC.

Table of Contents

Foreword... 4 Introduction... 6 1 Scope... 7 2 Normative references... 7 3 Terms and definitions... 8 4 Abbreviations... 10 5 Overview of testing-evaluation for classified cybersecurity protection... 10 5.1 Method of testing-evaluation for classified cybersecurity protection... 10 5.2 Single item testing-evaluation and overall testing-evaluation... 12 6 Requirements for level 1 testing-evaluation... 12 6.1 General requirements for security testing-evaluation... 12 6.2 Extended requirements for testing-evaluation of cloud computing security.. 40 6.3 Extended requirements for testing-evaluation of mobile internet security... 45 6.4 Extended requirements for testing-evaluation of IoT security... 48 6.5 Extended requirements for testing-evaluation of industrial control system security... 50 7 Requirements for level 2 testing-evaluation... 55 7.1 General requirements for security testing-evaluation... 55 7.2 Extended requirements for testing-evaluation of cloud computing security 122 7.3 Extended requirements for testing-evaluation of mobile internet security... 137 7.4 Extended requirements for testing-evaluation of IoT security... 143 7.5 Extended requirements for testing-evaluation of industrial control system security... 147 8 Requirements for level 3 testing-evaluation... 155 8.1 General requirements for security testing-evaluation... 155 8.2 Extended requirements for testing-evaluation of cloud computing security 261 8.3 Extended requirements for testing-evaluation of mobile internet security... 285 8.4 Extended requirements for testing-evaluation of IoT security... 293 Information security technology - Evaluation requirement for classified protection of cybersecurity

1 Scope

This standard stipulates the general requirements and extended requirements for testing-evaluation of security of classified protection targets. This standard is applicable to security evaluation service agencies, operation and use units of classified protection targets, for competent departments to conduct security evaluation and provide guidance on the security status of classified protection targets; it is also applicable to network security functional departments when conducting supervision and inspection of the classified protection of cybersecurity. Note. The level-5 classified protection target is an important supervision and management target, which has a special management mode and security evaluation requirements, so it is not described in this standard.

2 Normative references

The following documents are essential to the application of this document. For the dated documents, only the versions with the dates indicated are applicable to this document; for the undated documents, only the latest version (including all the amendments) are applicable to this standard. GB 17859-1999 Classified criteria for security protection of computer information system GB/T 22239-2019 Information security technology - Baseline for classified protection of cybersecurity GB/T 25069 Information security technology - Glossary GB/T 25070-2019 Information security technology - Technical requirements of security design for classified protection of cybersecurity GB/T 28449-2018 Information security technology - Testing-evaluation process guide for classified protection of cybersecurity GB/T 31167-2014 Information security technology - Security guide of cloud computing services GB/T 31168-2014 Information security technology - Security capability requirements of cloud computing services GB/T 32919-2016 Information security - Industrial control systems - Guidelines for the application of security controls

3 Terms and definitions

The terms and definitions as defined in GB 17859-1999, GB/T 25069, GB/T 22239-2019, GB/T 25070-2019, GB/T 31167-2014, GB/T 31168-2014, GB/T 32919-2016 as well as the following terms and definitions apply to this document. For ease of use, the following repeatedly lists some terms and definitions in GB/T 31167-2014 and GB/T 31168-2014. 3.1 Interview The process that the evaluator helps the evaluator understand, clarify, or obtain evidence by guiding the relevant personnel of the classified protection target through purposeful (targeted) communication. 3.2 Examine The process that the evaluator observes, inspects, analyzes the evaluation target of testing-evaluation (such as system documents, various types of device and related security configurations, etc.) to help the evaluator understand, clarify or obtain evidence. 3.3 Test The process that the evaluator uses a predetermined method / tool to make the target of testing-evaluation (various types of device or security configuration) produce a specific result, meanwhile compare the running result with the expected result.

4 Abbreviations

The following abbreviations apply to this document. AP. Wireless Access Point APT. Advanced Persistent Threat DDoS. Distributed Denial of Service SSID. Service Set Identifier WEP. Wired Equivalent Privacy WiFi. Wireless Fidelity WPS. WiFi Protected Setup

5 Overview of testing-evaluation for classified

cybersecurity protection 5.1 Method of testing-evaluation for classified cybersecurity protection The basic method of implementation of testing-evaluation for classified cybersecurity protection is, focusing on specific evaluation targets, to adopt relevant evaluation methods; follow certain evaluation procedures; obtain required evidence data; give an evaluation of whether a certain level of security protection capability is reached. The detailed process and method for the implementation of testing-evaluation for classified cybersecurity protection are as shown in GB/T 28449-2018. The testing-evaluation of each requirement in this standard constitutes a single item testing-evaluation; all the specific testing-evaluation contents of a specific requirement constitute the evaluation implementation. Each specific testing- evaluation implementation requirement item in the single item testing- evaluation (hereinafter referred to as "testing-evaluation requirement item") corresponds to the requirement item (testing-evaluation index) included under the security control point. In the testing-evaluation of each requirement, it may use three testing-evaluation methods. interview, examine, test; it may also use one or two of them. The content of the testing-evaluation implementation fully covers the testing-evaluation requirements of all the requirement items in GB/T 22239-2019 and GB/T 25070-2019.When used, it shall, from the implementation of the testing-evaluation of single item, choose the testing- evaluation requirements of each requirement item in GB/T 22239-2019; meanwhile follow these testing-evaluation requirements to develop the testing- evaluation guidance, so as to standardize and guide testing-evaluation for classified cybersecurity protection activities. According to the survey results, the business process and data flow of the classified protection targets are analyzed to determine the scope of the testing- evaluation work. Combined with the security level of the classified protection target, comprehensively analyze the functions and characteristics of each device and component in the system; determine the testing-evaluation target at technical level from the attributes of the importance, security, sharing, comprehensiveness, appropriateness of the classified protection target constituting the component; determine the personal and management documents related to it as the testing-evaluation target of the management level. The testing-evaluation targets can be described according to categories, including computer rooms, business application software, host operating systems, database management systems, network interconnection device, security device, interviewers, security management documents. The testing-evaluation activities for classified cybersecurity protection involve testing-evaluation intensity, including testing-evaluation breadth (coverage) and testing-evaluation depth (intensity). For the implementation of testing- evaluations with a higher level of security protection, it shall choose a wider coverage of testing-evaluation targets and stronger testing-evaluation methods, to obtain more credible testing-evaluation evidence. For a detailed description of the testing-evaluation intensity, see Appendix A. Each level of testing-evaluation requirements includes 5 parts. general requirements for security testing-evaluation, extended requirements for cloud computing security testing-evaluation, extended requirements for mobile internet security testing-evaluation, extended requirements for IoT security testing-evaluation, extended requirements for industrial control system security testing-evaluation. For bigdata, please refer to Appendix B for the security testing-evaluation method. 5.2 Single item testing-evaluation and overall testing- evaluation Testing-evaluation for classified cybersecurity protection includes single item testing-evaluation and overall testing-evaluation. Single item testing-evaluation is a testing-evaluation of each security requirement item, which supports the repeatability and reproducibility of the testing-evaluation results. The single item testing-evaluation in this standard consists of testing-evaluation index, testing-evaluation targets, testing- evaluation implementation, unit judgment results. For ease of use, each testing- evaluation unit is numbered. For a detailed description, see Appendix C. The overall testing-evaluation is based on a single item testing-evaluation, to judge the overall security protection ability of the classified protection target. The overall security protection capability is judged from the perspectives of depth protection and complementary measures.

6 Requirements for level 1 testing-evaluation

6.1 General requirements for security testing-evaluation 6.1.1 Security physical environment 6.1.1.1 Physical access control 6.1.1.1.1 Testing-evaluation unit (L1-PES1-01) The testing-evaluation unit includes the following requirements. a) Testing-evaluation index. The entrance and exit of the computer room shall be arranged with dedicated personnel on duty or equipped with electronic access control systems to control, identify and record the personnel entering. b) Testing-evaluation targets. Electronic access control system and duty records of computer room. c) Testing-evaluation’s implementation. It shall check whether a dedicated person is on duty or equipped with an electronic access control system. d) Unit judgment. If the content of the above testing-evaluation is positive, it meets the index requirements of the testing-evaluation unit; otherwise, it does not meet the index requirements of the testing-evaluation unit. 6.1.1.2 Anti-theft and anti-vandalism 6.1.1.2.1 Testing-evaluation unit (L1-PES1-02) The testing-evaluation unit includes the following requirements. a) Testing-evaluation index. The device or main components shall be fixed and marked with signs that are not easily removed. b) Testing-evaluation target. Computer room’s device or main components. c) The implementation of the testing-evaluation includes the following. 1) It shall check whether the device or main components in the computer room are fixed; 2) It shall check whether the device or main components in the computer room are provided with obvious signs that are difficult to remove. d) Unit judgment. If both 1) and 2) are positive, it meets the index requirements of this testing-evaluation unit; otherwise, it does not meet or partially meets the index requirements of this testing-evaluation unit.

7 Requirements for level 2 testing-evaluation

7.1 General requirements for security testing-evaluation 7.1.1 Security physical environment 7.1.1.1 Selection of physical location 7.1.1.1.1 Testing-evaluation unit (L2-PES1-01) The testing-evaluation unit includes the following requirements. a) Testing-evaluation index. The computer room site shall be selected in a construction with the capability of shockproof, windproof and rainproof. b) Testing-evaluation targets. Record documents and computer room. c) The implementation of the testing-evaluation includes the following. 1) It shall check whether the construction has seismic approval documents for construction seismic fortification; 2) It shall check whether there is no rain leakage in the computer room; 3) It shall check whether the doors and windows of the computer room are free from serious dust caused by wind; 4) It shall check whether the roof, walls, doors, windows and ground are not damaged or cracked. d) Unit judgment. If all of 1) ~ 4) are positive, it meets the index requirements of the testing-evaluation unit; otherwise, it does not meet or partially meets the index requirements of the testing-evaluation unit.

8 Requirements for level 3 testing-evaluation

8.1 General requirements for security testing-evaluation 8.1.1 Security physical environment 8.1.1.1 Physical location selection 8.1.1.1.1 Testing-evaluation unit (L3-PES1-01) The testing-evaluation unit includes the following requirements. a) Testing-evaluation index. The computer room site shall be selected in a construction with the capability of shockproof, windproof and rainproof. b) Testing-evaluation targets. Record documents and computer room. c) The implementation of the testing-evaluation includes the following. 1) It shall check whether the construction has seismic approval documents for construction seismic fortification; 2) It shall check whether there is no rain leakage in the computer room; 3) It shall check whether doors and windows are free from serious dust caused by wind; 4) It shall check the roof, walls, doors, windows and ground for damage and cracking. d) Unit judgment. If all of 1) to 4) are positive, it meets the index requirements of the testing-evaluation unit; otherwise, it does not meet or partially meets the index requirements of the testing-evaluation unit. 8.1.1.1.2 Testing-evaluation unit (L3-PES1-02) The testing-evaluation unit includes the following requirements. a) Testing-evaluation index. The computer room site shall be avoided on the top floor or basement of the construction; otherwise, it shall strengthen the waterproof and moisture-proof measures. b) Testing-evaluation target. Computer room. c) Testing-evaluation’s implementation. It shall check whether the computer room is not located on the top floor or basement of the construction where it is located. If not, check whether the computer room takes waterproof and moisture-proof measures. d) Unit judgment. If the content of the above testing-evaluation is positive, it meets the index requirements of the testing-evaluation unit; otherwise, it does not meet the index requirements of the testing-evaluation unit. ......
Source: Above contents are excerpted from the full-copy PDF -- translated/reviewed by: www.ChineseStandard.net / Wayne Zheng et al.


      

Tips & Frequently Asked Questions

Question 1: How long will the true-PDF of English version of GB/T 28448-2019 be delivered?

Answer: The full copy PDF of English version of GB/T 28448-2019 can be downloaded in 9 seconds, and it will also be emailed to you in 9 seconds (double mechanisms to ensure the delivery reliably), with PDF-invoice.

Question 2: Can I share the purchased PDF of GB/T 28448-2019_English with my colleagues?

Answer: Yes. The purchased PDF of GB/T 28448-2019_English will be deemed to be sold to your employer/organization who actually paid for it, including your colleagues and your employer's intranet.

Question 3: Does the price include tax/VAT?

Answer: Yes. Our tax invoice, downloaded/delivered in 9 seconds, includes all tax/VAT and complies with 100+ countries' tax regulations (tax exempted in 100+ countries) -- See Avoidance of Double Taxation Agreements (DTAs): List of DTAs signed between Singapore and 100+ countries

Question 4: Do you accept my currency other than USD?

Answer: Yes. www.ChineseStandard.us -- GB/T 28448-2019 -- Click this link and select your country/currency to pay, the exact amount in your currency will be printed on the invoice. Full PDF will also be downloaded/emailed in 9 seconds.

Question 5: Should I purchase the latest version GB/T 28448-2019?

Answer: Yes. Unless special scenarios such as technical constraints or academic study, you should always prioritize to purchase the latest version GB/T 28448-2019 even if the enforcement date is in future. Complying with the latest version means that, by default, it also complies with all the earlier versions, technically.

How to buy and download a true PDF of English version of GB/T 28448-2019?

A step-by-step guide to download PDF of GB/T 28448-2019_EnglishStep 1: Visit website https://www.ChineseStandard.net (Pay in USD), or https://www.ChineseStandard.us (Pay in any currencies such as Euro, KRW, JPY, AUD).
Step 2: Search keyword "GB/T 28448-2019".
Step 3: Click "Add to Cart". If multiple PDFs are required, repeat steps 2 and 3 to add up to 12 PDFs to cart.
Step 4: Select payment option (Via payment agents Stripe or PayPal).
Step 5: Customize Tax Invoice -- Fill up your email etc.
Step 6: Click "Checkout".
Step 7: Make payment by credit card, PayPal, Google Pay etc. After the payment is completed and in 9 seconds, you will receive 2 emails attached with the purchased PDFs and PDF-invoice, respectively.
Step 8: Optional -- Go to download PDF.
Step 9: Optional -- Click Open/Download PDF to download PDFs and invoice.
See screenshots for above steps: Steps 1~3    Steps 4~6    Step 7    Step 8    Step 9