GB/T 30276-2020 PDF English
US$155.00 · In stock · Download in 9 secondsGB/T 30276-2020: Information security technology - Specification for cybersecurity vulnerability management Delivery: 9 seconds. True-PDF full-copy in English & invoice will be downloaded + auto-delivered via email. See step-by-step procedureStatus: Valid GB/T 30276: Evolution and historical versions
Standard ID | Contents [version] | USD | STEP2 | [PDF] delivery | Name of Chinese Standard | Status |
GB/T 30276-2020 | English | 155 |
Add to Cart
|
0-9 seconds. Auto-delivery
|
Information security technology - Specification for cybersecurity vulnerability management
| Valid |
GB/T 30276-2013 | English | 359 |
Add to Cart
|
3 days
|
Information security technology -- Vulnerability management criterion specification
| Obsolete |
Excerpted PDFs (Download full copy in 9 seconds upon purchase)PDF Preview: GB/T 30276-2020
GB/T 30276-2020: Information security technology - Specification for cybersecurity vulnerability management ---This is an excerpt. Full copy of true-PDF in English version (including equations, symbols, images, flow-chart, tables, and figures etc.), auto-downloaded/delivered in 9 seconds, can be purchased online: https://www.ChineseStandard.net/PDF.aspx/GBT30276-2020
GB
NATIONAL STANDARD OF THE
PEOPLE’S REPUBLIC OF CHINA
ICS 35.040
L 80
Replacing GB/T 30276-2013
Information security technology - Specification for
cybersecurity vulnerability management
ISSUED ON: NOVEMBER 19, 2020
IMPLEMENTED ON: JUNE 01, 2021
Issued by: State Administration for Market Regulation;
Standardization Administration of the People’s Republic of
China.
Table of Contents
Foreword ... 3
1 Scope ... 5
2 Normative references ... 5
3 Terms and definitions ... 5
4 Cybersecurity vulnerability management process ... 6
5 Cybersecurity vulnerability management requirements ... 8
5.1 Vulnerability discovery and report ... 8
5.2 Vulnerability receipt ... 8
5.3 Vulnerability verification ... 9
5.4 Vulnerability disposal ... 11
5.5 Vulnerability release ... 13
5.6 Vulnerability tracking ... 13
6 Verification method ... 14
References ... 15
Information security technology - Specification for
cybersecurity vulnerability management
1 Scope
This Standard specifies the management process, management requirements
and verification methods for each stage of the cybersecurity vulnerability
management process (including vulnerability discovery and report, receipt,
verification, disposal, release, tracking).
This Standard applies to cybersecurity vulnerability management activities that
are carried out by provider of network products and services, network operator,
vulnerability repository organization, and vulnerability emergency response
organization.
2 Normative references
The following documents are indispensable for the application of this document.
For dated references, only the dated version applies to this document. For
undated references, the latest edition (including all amendments) applies to this
document.
GB/T 25069, Information security technology - Glossary
GB/T 28458-2020, Information security technology - Cybersecurity
vulnerability identification and description specification
GB/T 30279-2020, Information security technology - Guidelines for
categorization and classification of cybersecurity vulnerability
3 Terms and definitions
Terms and definitions determined by GB/T 25069, GB/T 28458-2020 and the
following ones are applicable to this document.
3.1 User
Individuals or organizations that use network products and services.
3.2 Provider of network products and services
Individuals or organizations that provide network products and services.
5 Cybersecurity vulnerability management
requirements
5.1 Vulnerability discovery and report
During the vulnerability discovery and report stage, the requirements are as
follows:
a) Requirements for vulnerability discoverers:
-- Under the premise of following relevant national laws and regulations,
use manual or automatic methods to detect and analyze the
vulnerability, and verify the authenticity of the vulnerability;
-- When implementing vulnerability discovery activities, the user's system
operation and data security shall not be affected or damaged; there
shall be no behavior that violates the business operation and data
security of other organizations in order to discover vulnerabilities;
-- When identifying potential vulnerabilities of network products or services,
proactively assess possible security risks;
-- Effective measures shall be taken to prevent leakage of vulnerability
information.
b) Requirements for vulnerability reporters:
-- After discovering vulnerabilities in the network or products and services,
the vulnerability information shall be reported in time;
-- When reporting vulnerabilities, the vulnerabilities shall be described
objectively and truthfully.
5.2 Vulnerability receipt
In the vulnerability receipt stage, the requirements are as follows:
a) Vulnerability reports shall be provided with vulnerability receiving channels,
such as websites, emails or telephones; measures shall be taken to
ensure the security and confidential receipt of vulnerability information;
b) A vulnerability receipt strategy shall be formulated and publicly released,
to facilitate vulnerability reporters to report vulnerabilities. The receipt
strategy includes but is not limited to vulnerability receipt range,
vulnerability receipt channel, vulnerability receipt requirements,
vulnerability receipt process;
-- If the reported vulnerability is found in a product or service that the
provider or network operator does not currently provide support, the
provider or network operator shall continue to complete the
investigation and vulnerability verification, and confirm the impact of the
vulnerability on other supported products or online services.
b) If it is the vulnerability repository organization that performs the verification:
-- After confirming that the vulnerability is received, coordinate the
verification of the vulnerability information in a timely manner. The
coordination method may include: inform the provider of the product or
service that is related to the vulnerability to verify and confirm; jointly
perform verification and confirmation with the provider or network
operator who is associated with the vulnerability; work with the
vulnerability reporter to jointly verify and confirm the vulnerability
information;
-- Reflect the vulnerability objectively and truthfully; do not mislead the
provider or network operator, vulnerability reporter who is associated
with the vulnerability;
-- After verification, notify the provider or network operator who is
associated with the vulnerability in time.
c) If it is the vulnerability emergency response organization that performs the
verification:
-- After confirming that the vulnerability is received, coordinate the
verification of the vulnerability information in a timely manner. The
coordination method may include: inform the provider of the product or
service who is related to the vulnerability to verify and confirm; jointly
perform verification and confirmation with the provider or network
operator who is associated with the vulnerability;
-- After verification, notify the provider or network operator who is
associated with the vulnerability in time.
d) When the following situations occur during the vulnerability verification
process, terminate the subsequent vulnerability management stage;
feedback to the vulnerability reporter:
-- Repeated vulnerability: The vulnerability is a repeated vulnerability, a
resolved or fixed vulnerability;
-- Unverifiable vulnerability: The vulnerability is a vulnerability that cannot
be verified by the provider, network operator, vulnerability repository
organization;
-- Inform the vulnerability reporters and users of the disposal measures of
the vulnerability in a timely manner; report to the vulnerability
emergency response organization when necessary;
-- Effective ways and convenient conditions shall be provided for users to
obtain patches, upgraded versions and temporary disposal suggestions;
-- Necessary technical support shall be provided to the affected users to
support them to complete the vulnerability repair;
-- The deeper reasons for the vulnerability should be investigated, to
determine whether other products or services have the same or similar
vulnerabilities.
b) Requirements for the vulnerability repository organization:
-- Cooperate with the vulnerability emergency response organization and
relevant network product providers and network operators to carry out
vulnerability disposal work;
-- Maintain an objective and accurate attitude in the process of
vulnerability disposal; timely share the verified vulnerability information
with providers, network operators, and vulnerability emergency
response organizations who are associated with the vulnerability;
-- Provide vulnerability disposal suggestions and related technical support
to providers, network operators who are associated with the
vulnerability;
-- Corresponding necessary measures shall be taken to protect the
security and confidentiality of the information that is related to the
reported vulnerability and to prevent the information from leaking and
being used by others.
c) Requirements for the vulnerability emergency response organization:
-- Coordinate and supervise the vulnerability disposal work; feedback the
vulnerability attribution, vulnerability disposal and other disposal
suggestions to the relevant vulnerability receivers.
-- Supervise and urge providers and network operators who are
associated with the vulnerability to take timely vulnerability repair or
preventive measures, so as to prevent cybersecurity threats which are
caused by the large-scale use of the vulnerability;
-- Work with providers or network operators who are associated with the
vulnerability to perform continuous tracking of the vulnerability disposal
...... Source: Above contents are excerpted from the full-copy PDF -- translated/reviewed by: www.ChineseStandard.net / Wayne Zheng et al.
Tips & Frequently Asked QuestionsQuestion 1: How long will the true-PDF of English version of GB/T 30276-2020 be delivered?Answer: The full copy PDF of English version of GB/T 30276-2020 can be downloaded in 9 seconds, and it will also be emailed to you in 9 seconds (double mechanisms to ensure the delivery reliably), with PDF-invoice. Question 2: Can I share the purchased PDF of GB/T 30276-2020_English with my colleagues?Answer: Yes. The purchased PDF of GB/T 30276-2020_English will be deemed to be sold to your employer/organization who actually paid for it, including your colleagues and your employer's intranet. Question 3: Does the price include tax/VAT?Answer: Yes. Our tax invoice, downloaded/delivered in 9 seconds, includes all tax/VAT and complies with 100+ countries' tax regulations (tax exempted in 100+ countries) -- See Avoidance of Double Taxation Agreements (DTAs): List of DTAs signed between Singapore and 100+ countriesQuestion 4: Do you accept my currency other than USD?Answer: Yes. www.ChineseStandard.us -- GB/T 30276-2020 -- Click this link and select your country/currency to pay, the exact amount in your currency will be printed on the invoice. Full PDF will also be downloaded/emailed in 9 seconds. Question 5: Should I purchase the latest version GB/T 30276-2020?Answer: Yes. Unless special scenarios such as technical constraints or academic study, you should always prioritize to purchase the latest version GB/T 30276-2020 even if the enforcement date is in future. Complying with the latest version means that, by default, it also complies with all the earlier versions, technically.
How to buy and download a true PDF of English version of GB/T 30276-2020?A step-by-step guide to download PDF of GB/T 30276-2020_EnglishStep 1: Visit website https://www.ChineseStandard.net (Pay in USD), or https://www.ChineseStandard.us (Pay in any currencies such as Euro, KRW, JPY, AUD). Step 2: Search keyword "GB/T 30276-2020". Step 3: Click "Add to Cart". If multiple PDFs are required, repeat steps 2 and 3 to add up to 12 PDFs to cart. Step 4: Select payment option (Via payment agents Stripe or PayPal). Step 5: Customize Tax Invoice -- Fill up your email etc. Step 6: Click "Checkout". Step 7: Make payment by credit card, PayPal, Google Pay etc. After the payment is completed and in 9 seconds, you will receive 2 emails attached with the purchased PDFs and PDF-invoice, respectively. Step 8: Optional -- Go to download PDF. Step 9: Optional -- Click Open/Download PDF to download PDFs and invoice. See screenshots for above steps: Steps 1~3 Steps 4~6 Step 7 Step 8 Step 9
|