HOME   Cart(0)   Quotation   About-Us Policy PDFs Standard-List
www.ChineseStandard.net Database: 189759 (19 Oct 2025)

GB/T 37954-2019 PDF English

US$519.00 · In stock · Download in 9 seconds
GB/T 37954-2019: Information security technology - Technique requirements and testing and evaluation approaches for industrial control system vulnerability detection products
Delivery: 9 seconds. True-PDF full-copy in English & invoice will be downloaded + auto-delivered via email. See step-by-step procedure
Status: Valid
Standard IDContents [version]USDSTEP2[PDF] deliveryName of Chinese StandardStatus
GB/T 37954-2019English519 Add to Cart 5 days Information security technology - Technique requirements and testing and evaluation approaches for industrial control system vulnerability detection products Valid

Excerpted PDFs (Download full copy in 9 seconds upon purchase)

PDF Preview: GB/T 37954-2019
      

Similar standards

GB/T 37985   GB/T 37988   GB/T 37973   GB/T 37952   

GB/T 37954-2019: Information security technology - Technique requirements and testing and evaluation approaches for industrial control system vulnerability detection products


---This is an excerpt. Full copy of true-PDF in English version (including equations, symbols, images, flow-chart, tables, and figures etc.), auto-downloaded/delivered in 9 seconds, can be purchased online: https://www.ChineseStandard.net/PDF.aspx/GBT37954-2019
(Information security technology Industrial control system vulnerability detection product technical requirements and test evaluation methods) ICS 35.040 L80 National Standards of People's Republic of China Information security technology Technical requirements for industrial control system vulnerability detection products and Test evaluation method Informationsecuritytechnology- Techniquerequirementsandtestingandevaluationapproachesforindustrial Controlsystemvulnerabilitydetectionproducts Published on.2019-08-30 2020-03-01 implementation State market supervision and administration China National Standardization Administration issued Content Foreword III 1 Scope 1 2 Normative references 1 3 Terms and Definitions 1 4 Abbreviations 1 5 Product Description 2 6 Safety technical requirements 2 6.1 Security function requirements 2 6.2 Self-safety requirements 4 6.3 Security Requirements 5 7 Evaluation method 6 7.1 Safety Function Test 6 7.2 Self-safety test 11 7.3 Security Assurance Method 14 Appendix A (Normative) Industrial Control System Vulnerability Detection Product Safety Function Level 18 Appendix B (normative appendix) Classification of industrial control system vulnerability detection product evaluation methods and evaluation items 19 Reference 20

Foreword

This standard was drafted in accordance with the rules given in GB/T 1.1-2009. Please note that some of the contents of this document may involve patents. The issuing organization of this document is not responsible for identifying these patents. This standard is proposed and managed by the National Information Security Standardization Technical Committee (SAC/TC260). This standard was drafted. China Information Security Evaluation Center, China Electronics Technology Standardization Institute, Beijing University of Technology, Beijing Hao En Net Network Technology Co., Ltd., Shenyang Institute of Automation, Chinese Academy of Sciences, Beijing Heli System Engineering Co., Ltd., Third Research of the Ministry of Public Security Institute (National Network and Information System Security Product Quality Supervision and Inspection Center), Beijing Jiaotong University, PLA Information Support Force Information Engineering Xuezhong, CZ Zhuzhou Electric Locomotive Co., Ltd. The main drafters of this standard. Zhang Dajiang, Hu Renhao, Fan Kefeng, Zhou Ruikang, Lai Yingxu, Xie Feng, Yan Liqing, Ye Runguo, Shang Wenli, Zhao Jianming, Lu Yi, Zou Chunming, Xie Anming, Zheng Wei, Wei Qiang, An Gaofeng, Wang Chunxia, Liang Meng, Wang Yizhou, Wang Wei, Zhang Sheng, Liu Yong. Information security technology Technical requirements for industrial control system vulnerability detection products and Test evaluation method

1 Scope

This standard specifies the technical requirements for vulnerability detection products for industrial control systems, including safety functional requirements, their own safety requirements, and Safety requirements, and the corresponding test evaluation methods. This standard applies to the design, development and evaluation of industrial control system vulnerability detection products.

2 Normative references

The following documents are indispensable for the application of this document. For dated references, only dated versions apply to this article. Pieces. For undated references, the latest edition (including all amendments) applies to this document. GB/T 25069-2010 Information Security Technology Terminology

3 Terms and definitions

The following terms and definitions as defined in GB/T 25069-2010 apply to this document. 3.1 Vulnerability Weaknesses in assets that can be exploited by threats. 3.2 Test case testcase A set of inputs, execution conditions, and expected results for a particular goal to verify that a particular requirement is met. 3.3 Test set testset A combination of test cases. 3.4 Industrial control configuration software industrialcontrolconfigurationsoftware In the software platform and development environment of the control system monitoring layer, the user is provided with a flexible way to quickly configure the status of the field system. software tools.

4 Abbreviations

The following abbreviations apply to this document. DNP. Distributed Network Protocol (DistributedNetworkProtocol) HTML. Hypertext Markup Language (HypertextMarkupLanguage) HTTP. HyperText Transfer Protocol (HyperTextTransferProtocol) GB/T 37954-2019 (Information security technology Industrial control system vulnerability detection product technical requirements and test evaluation methods) ICS 35.040 L80 National Standards of People's Republic of China Information security technology Technical requirements for industrial control system vulnerability detection products and Test evaluation method Informationsecuritytechnology- Techniquerequirementsandtestingandevaluationapproachesforindustrial Controlsystemvulnerabilitydetectionproducts Published on.2019-08-30 2020-03-01 implementation State market supervision and administration China National Standardization Administration issued Content Foreword III 1 Scope 1 2 Normative references 1 3 Terms and Definitions 1 4 Abbreviations 1 5 Product Description 2 6 Safety technical requirements 2 6.1 Security function requirements 2 6.2 Self-safety requirements 4 6.3 Security Requirements 5 7 Evaluation method 6 7.1 Safety Function Test 6 7.2 Self-safety test 11 7.3 Security Assurance Method 14 Appendix A (Normative) Industrial Control System Vulnerability Detection Product Safety Function Level 18 Appendix B (normative appendix) Classification of industrial control system vulnerability detection product evaluation methods and evaluation items 19 Reference 20

Foreword

This standard was drafted in accordance with the rules given in GB/T 1.1-2009. Please note that some of the contents of this document may involve patents. The issuing organization of this document is not responsible for identifying these patents. This standard is proposed and managed by the National Information Security Standardization Technical Committee (SAC/TC260). This standard was drafted. China Information Security Evaluation Center, China Electronics Technology Standardization Institute, Beijing University of Technology, Beijing Hao En Net Network Technology Co., Ltd., Shenyang Institute of Automation, Chinese Academy of Sciences, Beijing Heli System Engineering Co., Ltd., Third Research of the Ministry of Public Security Institute (National Network and Information System Security Product Quality Supervision and Inspection Center), Beijing Jiaotong University, PLA Information Support Force Information Engineering Xuezhong, CZ Zhuzhou Electric Locomotive Co., Ltd. The main drafters of this standard. Zhang Dajiang, Hu Renhao, Fan Kefeng, Zhou Ruikang, Lai Yingxu, Xie Feng, Yan Liqing, Ye Runguo, Shang Wenli, Zhao Jianming, Lu Yi, Zou Chunming, Xie Anming, Zheng Wei, Wei Qiang, An Gaofeng, Wang Chunxia, Liang Meng, Wang Yizhou, Wang Wei, Zhang Sheng, Liu Yong. Information security technology Technical requirements for industrial control system vulnerability detection products and Test evaluation method

1 Scope

This standard specifies the technical requirements for vulnerability detection products for industrial control systems, including safety functional requirements, their own safety requirements, and Safety requirements, and the corresponding test evaluation methods. This standard applies to the design, development and evaluation of industrial control system vulnerability detection products.

2 Normative references

The following documents are indispensable for the application of this document. For dated references, only dated versions apply to this article. Pieces. For undated references, the latest edition (including all amendments) applies to this document. GB/T 25069-2010 Information Security Technology Terminology

3 Terms and definitions

The following terms and definitions as defined in GB/T 25069-2010 apply to this document. 3.1 Vulnerability Weaknesses in assets that can be exploited by threats. 3.2 Test case testcase A set of inputs, execution conditions, and expected results for a particular goal to verify that a particular requirement is met. 3.3 Test set testset A combination of test cases. 3.4 Industrial control configuration software industrialcontrolconfigurationsoftware In the software platform and development environment of the control system monitoring layer, the user is provided with a flexible way to quickly configure the status of the field system. software tools.

4 Abbreviations

The following abbreviations apply to this document. DNP. Distributed Network Protocol (DistributedNetworkProtocol) HTML. Hypertext Markup Language (HypertextMarkupLanguage) HTTP. HyperText Transfer Protocol (HyperTextTransferProtocol) ......
Source: Above contents are excerpted from the full-copy PDF -- translated/reviewed by: www.ChineseStandard.net / Wayne Zheng et al.

Tips & Frequently Asked Questions

Question 1: How long will the true-PDF of English version of GB/T 37954-2019 be delivered?

Answer: The full copy PDF of English version of GB/T 37954-2019 can be downloaded in 9 seconds, and it will also be emailed to you in 9 seconds (double mechanisms to ensure the delivery reliably), with PDF-invoice.

Question 2: Can I share the purchased PDF of GB/T 37954-2019_English with my colleagues?

Answer: Yes. The purchased PDF of GB/T 37954-2019_English will be deemed to be sold to your employer/organization who actually paid for it, including your colleagues and your employer's intranet.

Question 3: Does the price include tax/VAT?

Answer: Yes. Our tax invoice, downloaded/delivered in 9 seconds, includes all tax/VAT and complies with 100+ countries' tax regulations (tax exempted in 100+ countries) -- See Avoidance of Double Taxation Agreements (DTAs): List of DTAs signed between Singapore and 100+ countries

Question 4: Do you accept my currency other than USD?

Answer: Yes. www.ChineseStandard.us -- GB/T 37954-2019 -- Click this link and select your country/currency to pay, the exact amount in your currency will be printed on the invoice. Full PDF will also be downloaded/emailed in 9 seconds.

How to buy and download a true PDF of English version of GB/T 37954-2019?

A step-by-step guide to download PDF of GB/T 37954-2019_EnglishStep 1: Visit website https://www.ChineseStandard.net (Pay in USD), or https://www.ChineseStandard.us (Pay in any currencies such as Euro, KRW, JPY, AUD).
Step 2: Search keyword "GB/T 37954-2019".
Step 3: Click "Add to Cart". If multiple PDFs are required, repeat steps 2 and 3 to add up to 12 PDFs to cart.
Step 4: Select payment option (Via payment agents Stripe or PayPal).
Step 5: Customize Tax Invoice -- Fill up your email etc.
Step 6: Click "Checkout".
Step 7: Make payment by credit card, PayPal, Google Pay etc. After the payment is completed and in 9 seconds, you will receive 2 emails attached with the purchased PDFs and PDF-invoice, respectively.
Step 8: Optional -- Go to download PDF.
Step 9: Optional -- Click Open/Download PDF to download PDFs and invoice.
See screenshots for above steps: Steps 1~3    Steps 4~6    Step 7    Step 8    Step 9