GB/T 31505-2015 PDF English
US$510.00 · In stock · Download in 9 secondsGB/T 31505-2015: [Replaced by GB/T 20281-2020] Information security technology -- Technique requirements and testing and evaluation approaches for host-based firewall and personal firewall Delivery: 9 seconds. True-PDF full-copy in English & invoice will be downloaded + auto-delivered via email. See step-by-step procedureStatus: Obsolete
| Standard ID | Contents [version] | USD | STEP2 | [PDF] delivery | Name of Chinese Standard | Status |
| GB/T 31505-2015 | English | 510 |
Add to Cart
|
0-9 seconds. Auto-delivery
|
[Replaced by GB/T 20281-2020] Information security technology -- Technique requirements and testing and evaluation approaches for host-based firewall and personal firewall
| Obsolete |
Excerpted PDFs (Download full copy in 9 seconds upon purchase)PDF Preview: GB/T 31505-2015
GB/T 31505-2015: [Replaced by GB/T 20281-2020] Information security technology -- Technique requirements and testing and evaluation approaches for host-based firewall and personal firewall
---This is an excerpt. Full copy of true-PDF in English version (including equations, symbols, images, flow-chart, tables, and figures etc.), auto-downloaded/delivered in 9 seconds, can be purchased online: https://www.ChineseStandard.net/PDF.aspx/GBT31505-2015
GB
NATIONAL STANDARD OF THE
PEOPLE’S REPUBLIC OF CHINA
ICS 35.040
L 80
Information security technology - Technique
requirements and testing and evaluation approaches
for host-based firewall and personal firewall
Issued on. MAY 15, 2015
Implemented on. JANUARY 01, 2016
Issued by. General Administration of Quality Supervision, Inspection and
Quarantine;
Standardization Administration of PRC.
Table of Contents
Foreword... 3
1 Scope... 4
2 Normative references... 4
3 Terms and definitions... 4
4 Descriptions of host-based firewall and personal firewall... 5
5 Security technical requirements... 5
5.1 General description... 5
5.2 Basic level requirements... 6
5.3 Enhanced level requirements... 13
6 Test evaluation method... 26
6.1 Test environment... 26
6.2 Basic level test... 26
6.3 Enhanced level test... 41
Foreword
This standard was drafted in accordance with the rules issued by GB/T 1.1-
2009.
This standard was proposed by and shall be under the jurisdiction of the
National Information Security Standardization Technical Committee (SAC/TC
260).
Drafting organizations of this standard. Computer Information System Security
Product Quality Supervision and Inspection Center of the Ministry of Public
Security, China Electronic Technology Standardization Research Institute,
Beijing Venus Technology Co., Ltd., the Third Research Institute of the Ministry
of Public Security.
The main drafters of this standard. Lu Zhen, Gu Jian, Wei Xiang, Yu You, Deng
Qi, Luo Fengying, Xu Yuna, Zhang Xiaoxiao, Wu Qicong.
Information security technology - Technique
requirements and testing and evaluation approaches
for host-based firewall and personal firewall
1 Scope
This standard specifies the security technical requirements, evaluation methods,
security classification of host-based firewalls.
This standard applies to the design, development and testing of host-based
firewall and personal firewall.
2 Normative references
The following documents are essential to the application of this document. For
the dated documents, only the versions with the dates indicated are applicable
to this document; for the undated documents, only the latest version (including
all the amendments) are applicable to this standard.
GB/T 18336.3-2008 Information technology - Security techniques -
Evaluation criteria for IT security - Part 3.Security assurance requirements
GB/T 25069 Information security technology - Glossary
3 Terms and definitions
The terms and definitions as defined in GB/T 25069 as well as the following
terms and definitions apply to this document.
3.1
Host-based firewall and personal firewall
It is also known the host-based firewall or personal firewall, which is a
software which runs on standalone computer.
3.2
Security policy
It refers to provisions and policies related to management and protection of
security domain routines.
4 Descriptions of host-based firewall and personal firewall
The host-based firewall and personal firewall is installed in the form of software
on the end user's computer (including personal computers and servers), to
prevent threats from the outside to the inside and from the inside to the outside.
The host-based firewall and personal firewall can not only monitor and control
the network-level data flow, but also monitor and control the program, to
compensate the insufficiency of traditional defense methods such as gateway
firewall and antivirus software. Generally, the host-based firewall and personal
firewall on the server can also perform unified control over all nodes; implement
unified security policies and responses.
5 Security technical requirements
5.1 General description
5.1.1 Classification of security technical requirements
This standard divides the security technical requirements of host-based firewall
and personal firewall into two major categories.
5.1.2 Security level
This standard divides the level of security function requirements according to
the strength of the host-based firewall security function; divides the level of
security assurance requirements according to GB/T 18336.3-2008.
5.2 Basic level requirements
5.2.1 Security function requirements
5.2.1.2 Security policy revision
Products shall provide standardized security policies, which can be revised by
users.
5.2.1.3 Application network access control
The security function of the product shall be able to control the permission of
each application on the host to use the network; the control of the application's
access to the network shall include the following three methods.
5.2.1.5 Identity authentication
5.2.1.5.1 Basic authentication
Before performing any functions related to the administrator, the product shall
authenticate the user's identity.
5.2.1.5.2 Authentication failure handling
The product shall provide certain authentication failure handling measures, to
prevent violent code cracking.
The product shall have a security audit function; the specific technical
requirements are as follows.
5.2.2 Security assurance requirements
5.2.2.1 Configuration management
5.2.2.1.1 Version number
Developers shall provide unique identifiers for different versions of the product.
5.2.2.3 Development
5.2.2.3.1 Description of informal function specification
The developer shall provide a functional specification, which shall meet the
following requirements.
5.2.2.3.3 Informal correspondence verification
The developer shall provide a correspondence analysis between all adjacent
pairs of product security function representations.
For each adjacent pair represented by the product security function, the
analysis shall explain that all related security functions represented by relatively
abstract security functions shall be correctly and completely refined in the more
specific security function representation.
6 Test evaluation method
6.1 Test environment
The test environment is as shown in Figure 1.
6.2 Basic level test
6.2.1 Security function test
6.2.1.1 IP packet filtering
The test evaluation methods and expected results of IP packet filtering of host-
based firewall and personal firewall products are as follows.
6.2.1.3 Application network access control
The test evaluation methods and expected results of application network
access control of host-based firewall and personal firewall products are as
follows.
6.2.1.4 Intrusion prevention
The test evaluation methods and expected results of the intrusion prevention of
host-based firewall and personal firewall products are as follows.
6.2.1.5 Identity authentication
6.2.1.6 Security management
6.2.1.6.3 Remote management encryption
The test evaluation methods and expected results of remote management
encryption for host-based firewall and personal firewall products are as follows.
6.2.1.7 Security audit
The test evaluation methods and expected results of the security audit of host-
based firewall and personal firewall products are as follows.
6.2.2 Security assurance evaluation
6.2.2.1 Configuration management
6.2.2.1.1 Version number
The test evaluation methods and expected results of the version number are as
follows.
6.3.1.5 Intrusion prevention
The test evaluation methods and expected results of the intrusion prevention of
host-based firewall and personal firewall products are as follows.
6.3.2.7.1.2 Analysis confirmation
The test evaluation methods and expected results of analysis confirmation are
as follows.
6.3.2.7.2 Assessment of product security function strength
The test evaluation methods and expected results of the assessment of product
security function strength are as follows.
6.3.2.7.3 Vulnerability analysis
6.3.2.7.3.1 Developer vulnerability analysis
The test evaluation methods and expected results of developer vulnerability
analysis are as follows.
6.3.2.7.3.2 Independent vulnerability analysis
The test evaluation methods and expected results of the independent
vulnerability analysis are as follows.
6.3.2.7.3.3 Intermediate resistance
The test evaluation methods and expected results of intermediate resistance
are as follows.
...... Source: Above contents are excerpted from the full-copy PDF -- translated/reviewed by: www.ChineseStandard.net / Wayne Zheng et al.
Tips & Frequently Asked QuestionsQuestion 1: How long will the true-PDF of English version of GB/T 31505-2015 be delivered?Answer: The full copy PDF of English version of GB/T 31505-2015 can be downloaded in 9 seconds, and it will also be emailed to you in 9 seconds (double mechanisms to ensure the delivery reliably), with PDF-invoice. Question 2: Can I share the purchased PDF of GB/T 31505-2015_English with my colleagues?Answer: Yes. The purchased PDF of GB/T 31505-2015_English will be deemed to be sold to your employer/organization who actually paid for it, including your colleagues and your employer's intranet. Question 3: Does the price include tax/VAT?Answer: Yes. Our tax invoice, downloaded/delivered in 9 seconds, includes all tax/VAT and complies with 100+ countries' tax regulations (tax exempted in 100+ countries) -- See Avoidance of Double Taxation Agreements (DTAs): List of DTAs signed between Singapore and 100+ countriesQuestion 4: Do you accept my currency other than USD?Answer: Yes. www.ChineseStandard.us -- GB/T 31505-2015 -- Click this link and select your country/currency to pay, the exact amount in your currency will be printed on the invoice. Full PDF will also be downloaded/emailed in 9 seconds.
How to buy and download a true PDF of English version of GB/T 31505-2015?A step-by-step guide to download PDF of GB/T 31505-2015_EnglishStep 1: Visit website https://www.ChineseStandard.net (Pay in USD), or https://www.ChineseStandard.us (Pay in any currencies such as Euro, KRW, JPY, AUD). Step 2: Search keyword "GB/T 31505-2015". Step 3: Click "Add to Cart". If multiple PDFs are required, repeat steps 2 and 3 to add up to 12 PDFs to cart. Step 4: Select payment option (Via payment agents Stripe or PayPal). Step 5: Customize Tax Invoice -- Fill up your email etc. Step 6: Click "Checkout". Step 7: Make payment by credit card, PayPal, Google Pay etc. After the payment is completed and in 9 seconds, you will receive 2 emails attached with the purchased PDFs and PDF-invoice, respectively. Step 8: Optional -- Go to download PDF. Step 9: Optional -- Click Open/Download PDF to download PDFs and invoice. See screenshots for above steps: Steps 1~3 Steps 4~6 Step 7 Step 8 Step 9
|