GB/T 43696-2024 PDF English
US$200.00 · In stock · Download in 9 secondsGB/T 43696-2024: Cybersecurity security technology - Zero trust reference architecture Delivery: 9 seconds. True-PDF full-copy in English & invoice will be downloaded + auto-delivered via email. See step-by-step procedureStatus: Valid
| Standard ID | Contents [version] | USD | STEP2 | [PDF] delivery | Name of Chinese Standard | Status |
| GB/T 43696-2024 | English | 200 |
Add to Cart
|
0-9 seconds. Auto-delivery
|
Cybersecurity security technology - Zero trust reference architecture
| Valid |
Excerpted PDFs (Download full copy in 9 seconds upon purchase)PDF Preview: GB/T 43696-2024
GB/T 43696-2024: Cybersecurity security technology - Zero trust reference architecture---This is an excerpt. Full copy of true-PDF in English version (including equations, symbols, images, flow-chart, tables, and figures etc.), auto-downloaded/delivered in 9 seconds, can be purchased online: https://www.ChineseStandard.net/PDF.aspx/GBT43696-2024
GB
NATIONAL STANDARD OF THE
PEOPLE’S REPUBLIC OF CHINA
ICS 35.030
CCS L 80
Cybersecurity Technology - Zero Trust Reference
Architecture
Issued on: APRIL 25, 2024
Implemented on: NOVEMBER 1, 2024
Issued by. State Administration for Market Regulation;
Standardization Administration of the People’s Republic of China.
Table of Contents
Foreword... 3
1 Scope... 4
2 Normative References... 4
3 Terms and Definitions... 4
4 Typical Features... 5
5 Reference Architecture... 5
6 Core Components... 7
6.1 Policy Decision Component... 7
6.2 Policy Execution Component... 7
7 Supporting Components... 7
7.1 Task Management Component... 7
7.2 Identity Management Component... 7
7.3 Resource Management Component... 8
7.4 Environment Perception Component... 8
7.5 Cryptographic Service Component... 8
Bibliography... 9
Cybersecurity Technology - Zero Trust Reference
Architecture
1 Scope
This document specifies the zero trust reference architecture and describes the subject,
resources, core components and supporting components, as well as their correlations.
This document is applicable to the planning, design, development, application and evaluation
of information systems that adopt the zero trust architecture.
2 Normative References
The contents of the following documents constitute indispensable clauses of this document
through the normative references in the text. In terms of references with a specified date, only
versions with a specified date are applicable to this document. In terms of references without a
specified date, the latest version (including all the modifications) is applicable to this document.
GB/T 25069 Information Security Techniques - Terminology
3 Terms and Definitions
The terms and definitions defined in GB/T 25069 and the following are applicable to this
document.
3.1 zero trust
A network security philosophy with resource protection as the core.
NOTE. this philosophy holds that when a subject accesses a resource, regardless of whether the
subject and the resource are trustworthy, the trust relationship between the subject and the
resource needs to be built from scratch through continuous status perception and dynamic
trust evaluation to implement end-to-end secure access control.
3.2 zero trust architecture
Information system architecture established based on zero trust.
NOTE. it includes system components that constitute the architecture, as well as the relations
among the components.
3.3 subject
The entity that initiates the access request.
3.4 resource
The object accessible to the subject.
4 Typical Features
The zero trust architecture has the following typical features.
a) Continuous status perception.
Continuously collect relevant information on the subject, resources and the
environment, and analyze the security situation.
b) Dynamic trust evaluation.
In the process of the subject accessing resources, in accordance with the changes in
the security situation of the subject, resources and the environment, etc. that are
continuously perceived, trust evaluation is continuously performed to maintain or
change policy decisions.
c) Minimum authority.
In accordance with the task requirements and policy decisions, combined with the
time window and the granularity of the accessed resources, the minimum authority is
granted to the accessing subject.
d) Encrypted transmission.
Adopt cryptographic technology to establish an end-to-end data security channel for
the subject to access resources.
5 Reference Architecture
The zero trust reference architecture consists of subject, resources, core components and
supporting components, as shown in Figure 1.
6 Core Components
6.1 Policy Decision Component
The policy decision component consists of a policy engine and a policy manager, and its main
functions are as follows.
a) Policy engine. responsible for determining the subject’s access rights to resources.
Based on the information provided by the security policy and the supporting
components, it continuously performs trust evaluation, and makes access control
decisions of permission, rejection or revocation.
b) Policy manager. responsible for issuing control commands for the connection
between the subject and the resources. Relying on the access control decisions made
by the policy engine, it issues a command to the policy execution component to
establish, maintain or block the data security channel.
6.2 Policy Execution Component
The policy execution component implements identity authentication and controls the data
security channel between the subject and the resources under the management of the policy
decision component.
a) Identity authentication. in accordance with the command of the policy decision
component, it coordinates with the supporting components to implement identity
authentication for the subject.
b) Control of data security channel. in accordance with the command issued by the
policy manager, it starts, monitors and terminates the data security channel between
the subject and the authorized resources.
7 Supporting Components
7.1 Task Management Component
Coordinate the subject’s purpose of access, drive the subject’s task of accessing resources,
including task objectives, task responsibilities and task processes, etc., link up entity access
rights, and provide associated task lifecycle management services, collaborative services on
task and resource access rights, task approval services, task identification services, task audit
services and task-related information for the subject, resources, core components and other
supporting components, including subject task attribute information, resource task attribute
information, task status information, task approval information and task audit information, etc.
7.2 Identity Management Component
Provide entity identity management services, entity identity attribute association services,
personal entity identity authentication services, device identity authentication services, entity
access rights management services and identity-related information for the subject, resources,
core components and other supporting components, including entity identity identification,
entity identity information, entity attribute information, entity access rights information, etc.
7.3 Resource Management Component
Provide data resource management services, device resource management services, network
resource management services, computing resource management services, application resource
management services, resource entity identity authentication services, resource attribute
association services, resource business collaborative management services and resource-related
information, resource rating and classification information, device configuration information,
resource identity information, resource access rights information, resource access context
information, etc. for the subject, resources, core components and other supporting components.
Resource management takes resource unit as the smallest unit, and several resource units are
combined into the accessed resource. Resource units are associated with the same resource
identifier, have unified resource attributes, and implement common security policies.
7.4 Environment Perception Component
During the process of the subject accessing resources, by collecting network traffic, asset
information, logs, vulnerability information, user behavior, threat information and other data,
the network behavior and user behavior in the process of accessing are analyzed to obtain,
understand, trace back, and display the status changes and trends of the subject, resources and
access environment for the subject, resources, core components and other supporting
components.
7.5 Cryptographic Service Component
Ensure the authenticity of the entity identity of the subject, resources, core components and
other supporting components, the confidentiality and integrity of the data, and the non-
repudiation of the operation behavior, and provide cryptography-related network and
communication security services, equipment and computing security services, application and
data security services for the subject, resources, core components and other supporting
components.
...... Source: Above contents are excerpted from the full-copy PDF -- translated/reviewed by: www.ChineseStandard.net / Wayne Zheng et al.
Tips & Frequently Asked QuestionsQuestion 1: How long will the true-PDF of English version of GB/T 43696-2024 be delivered?Answer: The full copy PDF of English version of GB/T 43696-2024 can be downloaded in 9 seconds, and it will also be emailed to you in 9 seconds (double mechanisms to ensure the delivery reliably), with PDF-invoice. Question 2: Can I share the purchased PDF of GB/T 43696-2024_English with my colleagues?Answer: Yes. The purchased PDF of GB/T 43696-2024_English will be deemed to be sold to your employer/organization who actually paid for it, including your colleagues and your employer's intranet. Question 3: Does the price include tax/VAT?Answer: Yes. Our tax invoice, downloaded/delivered in 9 seconds, includes all tax/VAT and complies with 100+ countries' tax regulations (tax exempted in 100+ countries) -- See Avoidance of Double Taxation Agreements (DTAs): List of DTAs signed between Singapore and 100+ countriesQuestion 4: Do you accept my currency other than USD?Answer: Yes. www.ChineseStandard.us -- GB/T 43696-2024 -- Click this link and select your country/currency to pay, the exact amount in your currency will be printed on the invoice. Full PDF will also be downloaded/emailed in 9 seconds.
How to buy and download a true PDF of English version of GB/T 43696-2024?A step-by-step guide to download PDF of GB/T 43696-2024_EnglishStep 1: Visit website https://www.ChineseStandard.net (Pay in USD), or https://www.ChineseStandard.us (Pay in any currencies such as Euro, KRW, JPY, AUD). Step 2: Search keyword "GB/T 43696-2024". Step 3: Click "Add to Cart". If multiple PDFs are required, repeat steps 2 and 3 to add up to 12 PDFs to cart. Step 4: Select payment option (Via payment agents Stripe or PayPal). Step 5: Customize Tax Invoice -- Fill up your email etc. Step 6: Click "Checkout". Step 7: Make payment by credit card, PayPal, Google Pay etc. After the payment is completed and in 9 seconds, you will receive 2 emails attached with the purchased PDFs and PDF-invoice, respectively. Step 8: Optional -- Go to download PDF. Step 9: Optional -- Click Open/Download PDF to download PDFs and invoice. See screenshots for above steps: Steps 1~3 Steps 4~6 Step 7 Step 8 Step 9
|