HOME   Cart(0)   Quotation   About-Us Tax PDFs Standard-List Powered by Google www.ChineseStandard.net Database: 189759 (1 Jun 2025)

PDF GM/T 0076-2019 English


Search result: GM/T 0076-2019
Standard IDContents [version]USDSTEP2[PDF] delivered inName of Chinese StandardStatus
GM/T 0076-2019English500 Add to Cart 0-9 seconds. Auto-delivery. Cryptography technical requirements for banking card information system Valid

PDF Preview: GM/T 0076-2019                   
      

GM/T 0076-2019: PDF in English (GMT 0076-2019)

GM/T 0076-2019 GM CRYPTOGRAPHIC INDUSTRY STANDARD OF THE PEOPLE’S REPUBLIC OF CHINA ICS 35.040 L 80 Cryptography technical requirements for banking card information system ISSUED ON: JULY 12, 2019 IMPLEMENTED ON: JULY 12, 2019 Issued by: State Cryptography Administration Table of Contents Foreword ... 4  Introduction ... 5  1 Scope ... 7  2 Normative references ... 7  3 Terms and definitions ... 8  4 Abbreviations ... 10  5 Bank card information system model ... 10  6 Basic requirements for cryptographic applications and functional requirements for cryptographic applications ... 11  7 Level 2 requirements for the security protection of cryptographic technology of bank card information system) ... 11  7.1 Basic requirements... 11  7.2 Security requirements for cryptographic technology ... 12  7.2.1 Physical and environmental security ... 12  7.2.2 Network and communication security ... 13  7.2.3 Device and computing security ... 14  7.2.4 Application and data security ... 16  7.2.5 Requirements for cryptographic allocation policy ... 18  7.3 Key security and management requirements ... 21  7.3.1 General ... 21  7.3.2 Key Security ... 21  7.3.3 Key management ... 23  7.4 Security management requirements ... 27  7.4.1 Overview ... 27  7.4.2 Security management system ... 27  7.4.3 Personnel management requirements ... 28  7.4.4 Cryptographic device management ... 29  7.4.5 Requirements for business terminal using passwords ... 29  8 Three-level requirements of cryptographic technology security protection of bank card information system ... 30  8.1 Basic requirements... 30  8.2 Security requirements for cryptographic technology ... 30  8.2.1 Physical and environmental security ... 30  8.2.2 Network and communication security ... 31  8.2.3 Device and computing security ... 34  8.2.4 Application and data security ... 37  8.2.5 Requirements for cryptographic allocation policy ... 39  8.3 Key security and management requirements ... 42  8.3.1 General ... 42  8.3.2 Key security ... 42  8.3.3 Key management ... 44  8.4 Security management requirements ... 50  8.4.1 Overview ... 50  8.4.2 Security management system ... 50  8.4.3 Personnel management requirements ... 51  8.4.4 Cryptographic device management ... 52  8.4.5 Requirements for business terminal using passwords ... 52  9 Level-4 requirements for security protection of cryptographic technology of bank card information system ... 53  9.1 Basic requirements... 53  9.2 Cryptographic technology security requirements ... 53  9.2.1 Physical and environmental security ... 53  9.2.2 Network and communication security ... 55  9.2.3 Device and computing security ... 58  9.2.4 Application and data security ... 62  9.2.5 Requirements for cryptographic allocation policy ... 64  9.3 Key security and management requirements ... 67  9.3.1 General ... 67  9.3.2 Key security ... 67  9.3.3 Key management ... 70  9.4 Security management requirements ... 77  9.4.1 Overview ... 77  9.4.2 Security management system ... 77  9.4.3 Personnel management requirements ... 78  9.4.4 Cryptographic device management ... 79  9.4.5 Requirements for business terminal using passwords ... 80  Appendix A (Normative) Comparison of security requirements ... 81  References ... 83  Cryptography technical requirements for banking card information system 1 Scope This standard is based on GM/T 0054-2018, JR/T 007-2012 and other standards, combined with the characteristics of the banking card system of banking financial institutions and the application needs of cryptographic technology in the classified protection of this type of information system, from three aspects of cryptographic security technical requirements, key security and management requirements, security management requirements, proposing specific requirements for the application of cryptographic technology in banking card systems with different security protection levels. This standard is applicable to the guidance, standardization and evaluation of commercial cryptographic applications in banking card information systems. 2 Normative references The following documents are essential to the application of this document. For the dated documents, only the versions with the dates indicated are applicable to this document; for the undated documents, only the latest version (including all the amendments) are applicable to this standard. GB/T 20547.2-2006 Banking - Secure cryptographic devices (retail) - Part 2 : Security compliance checklists for devices used in financial transactions GB/T 21078.1 Banking - Personal identification number management and security - Part 1: Basic principles and requirements for online PIN handling in ATM and POS systems GB/T 21079.1 Banking - Secure cryptographic devices (retail) - Part 1: Concepts, requirements and evaluation methods GM/T 0024 SSL VPN specification GM/T 0028 Security requirements for cryptographic modules GM/T 0036-2014 Technical guidance of cryptographic application for access control systems based on contactless smart card GM/T 0054-2018 General requirements for information system cryptography a) When authenticating users who log in to network device, in order to prevent the authentication information from being reused and counterfeited, it should use the authenticity service of cryptographic technology to protect the authentication information from reuse and counterfeiting; its cryptographic function shall be correct and effective; b) When performing remote network management, in order to prevent the authentication information from being leaked during the transmission process, it should use the confidentiality service of cryptographic technology to protect the confidentiality of the authentication information; the cryptographic function shall be correct and effective; c) The network device system’s management user ID shall have the characteristics of not being easy to be fraudulently used; the static password of the key network device shall be more than 6 digits and consist of a mixture of letters, numbers, symbols, etc. and be replaced regularly; d) The information system shall use cryptographic technology to generate unique random identifiers for entities that have passed identity authentication; meanwhile ensure that the function is correct and effective. 7.2.3 Device and computing security 7.2.3.1 General Refer to GM/T 0054-2018 General requirements for information system cryptography application. 7.2.3.2 Audit records "Audit records", "access control", "identity authentication", "verification code and dynamic password", "cryptographic module" are part of the "device and computing security" of the bank card information system. In the level 2 requirements for the security protection of the cryptographic technology of the bank card information system, the following requirements are made for the indicators of "device and computing security-audit records": In order to prevent the audit record from being illegally modified, it should use the integrity service of cryptographic technology to protect the integrity of the audit record; its cryptographic function shall be correct and effective. 7.2.3.3 Access control "Audit records", "access control", "identity authentication", "verification code and dynamic password", "cryptographic module" are part of the "device and computing security" of the bank card information system. In the level 2 password": a) When sending the verification code by SMS or other channels, it shall use the correct cryptographic technology, to ensure that the dynamic password sent is completely random and unpredictable; b) When using SMS or other channels to send the verification code, it shall ensure that the content of the verification code is not disclosed; c) If it uses OTP tokens for identity verification, it shall use correct cryptographic techniques, to ensure that OTP is completely random and unpredictable. 7.2.3.6 Cryptographic module "Audit records", "access control", "identity authentication", "verification code and dynamic password", "cryptographic module" are part of the "device and computing security" of the bank card information system. In the level 2 requirements for the security protection of the cryptographic technology of the bank card information system, the following requirements are made for the indicators of "device and computing security-cryptographic module": It shall use the level 2 and above cryptographic modules which complies with GM/T 0028 or hardware cryptographic products approved by the national cryptographic management department to realize the cryptographic calculations and key management: a) The system's dedicated hardware or firmware and cryptographic device shall implement security functions such as authorization control, unauthorized access detection, operating status indication, etc., to ensure that the cryptographic module can operate correctly in the approved working mode; b) The system's dedicated hardware or firmware and cryptographic device shall be able to prevent unauthorized disclosure of the module's content or key security parameters; c) The system's dedicated hardware or firmware and cryptographic device shall be able to prevent unauthorized or undetectable modifications to cryptographic modules and cryptographic algorithms. 7.2.4 Application and data security 7.2.4.1 General Refer to 0054-2018 General requirements for information system cryptography "application and data security-terminal application": a) It should use the integrity service of cryptographic technology to verify the integrity of important programs; its cryptographic function shall be correct and effective; b) Terminal applications shall not store sensitive information such as user passwords, payment passwords, PAC, CVV, etc. in plaintext or encoding; c) When the terminal application processes sensitive data entered by the user, such as passwords, payment passwords, etc., it should use the security measures to ensure the confidentiality of sensitive data and ensure that it is not obtained by unauthorized access. 7.2.5 Requirements for cryptographic allocation policy 7.2.5.1 Cryptographic algorithm configuration "Cryptographic algorithm allocation", "cryptographic protocol use", "application ciphertext generation", "bank card terminal", "password keyboard", "cryptographic device use" are components of the bank card information system’s "cryptographic allocation policy requirements". In the level 2 requirements for the cryptographic technology security protection of bank card information systems, the following requirements are set for the indicators of "cryptographic allocation strategy requirements-cryptographic algorithm allocation": It shall use the algorithm approved by the national cryptographic management authority. 7.2.5.2 Use of cryptographic protocol "Cryptographic algorithm allocation", "cryptographic protocol use", "application ciphertext generation", "bank card terminal", "password keyboard", "cryptographic device use" are components of the bank card information system’s "cryptographic allocation policy requirements". In the level 2 requirements for the security protection of the cryptographic technology of the bank card information system, the following requirements are made for the indicators of "cryptographic allocation strategy requirement-cryptographic protocol use": It shall use the cryptographic protocol that has passed the security review of the national cryptographic administration department to realize the cryptographic function. 7.2.5.3 Generation of application ciphertext between the cryptographic devices; - It shall use cryptographic device to transmit the private key between the device that generates the key and the device that uses the key; - After importing the key to the target device, the key transfer device shall not retain any information that may reveal the key; - When using a key transfer device, the key (if an explicit key identifier is used, also includes the key identifier) shall be transferred from the cryptographic device that generated the key to the key transfer device; this device shall be physically transported to the location of the cryptographic device that actually uses the key. d) When using the key component, it shall confirm: - The key components constituting the key shall be imported or exported to the device manually or by the key transmission device; the transmission process of the key component shall not disclose any part of the key component to any unauthorized individual; - When the key components are distributed in a readable form, each key component shall be distributed through a key envelope that will not reveal the value of the key component before opening; - Before entering the key component, it shall check the key envelope or cryptographic device for signs of tampering. If one of the components is tampered with, this set of key components shall not be used and shall be destroyed according to the procedures described in GB/T 21078.1; - The key component shall be individually input by each holder of the key component and verify whether the input of the key component is correct. e) The key administrator shall be responsible for checking the consistency of the verification value generated when the key is imported and exported. f) After the key component is entered into the cryptographic device, the key envelope shall be destroyed or sealed in another tamper-proof key envelope for possible future use. g) After the key is injected, save the medium storing the backup key in a password envelope; after being supervised and confirmed by a special person, lock it in the safe. 7.3.3.2 Key storage and custody "Key import and export", "key storage and custody", "key use and replacement", corresponding emergency treatment and response measures; f) Manage the system administrator password, user password, user authority of the cryptographic machine and cryptographic management device. Once a leak occurs or the authority is out of control, it shall initiate an inspection and tracking program. Evaluate the incident level according to the situation of out of control of authority; meanwhile update the relevant key in due course. 7.3.3.4 Key backup and recovery "Key import and export", "key storage and custody", "key use and replacement", "key backup and recovery" are part of the bank card information system’s "key management". In the level 2 requirements for the security protection of the cryptographic technology of the bank card information system, the following requirements are set for the indicator of "key management-key backup and recovery": a) It shall establish the key recovery and correction workflow; clarify the situations to trigger the key replacement and correction; specify the standard operating process for key replacement and correction; retain the operation records of key replacement and correction; b) If it suspects that the key is leaked or the security of the device is threatened, the key shall be withdrawn or replaced (for example, destroyed or revoked); c) It shall formulate a clear key backup strategy; adopt a secure and reliable key backup and recovery mechanism, to backup and restore the key; d) It shall record the key backup or restoration and generate the audit information. The audit information includes the subject of backup or restoration, the time of backup or restoration, etc.; e) There shall be security measures to prevent the leakage and replacement of keys; f) It shall ensure the security of the storage location and form of the key; restrict the access rights of the key; g) If, based on the information that the attacker has obtained, it can be confirmed that an unauthorized key replacement has occurred, then the following steps shall be followed for key replacement: - Erase any encrypted version of the storage key that has been confirmed to be replaced; confirm whether all the existing encrypted keys are legal; if there is an illegal key, it shall be deleted; management system that has deficiencies or needs improvement shall be revised. f) The release process of relevant management systems should be clarified. 7.4.3 Personnel management requirements "Security management system", "personnel management requirements", "cryptographic device management", "password-using business terminal requirements" are part of the "security management requirements" of the bank card information system. In the level 2 requirements for the security protection of the cryptographic technology of the bank card information system, the following requirements are set for the indicator of "security management requirements-personnel management requirements": a) It shall understand and abide by laws and regulations related to passwords; b) It shall be able to use cryptographic products correctly; c) A personnel training system shall be established to provide special training for personnel involved in the operation and management of passwords and key management; d) According to the requirements of the competent department and the actual situation of the organization, a certain number of key management personnel, security auditors, cryptographic device operators and other positions shall be assigned; the above-mentioned positions cannot be concurrently held by each other; e) It shall be equipped with full-time key management personnel; personnel in this position cannot be concurrently held by personnel in other positions; f) A post responsibility system shall be established to clarify the responsibilities and authorities of relevant personnel in the management of cryptographic device and key system management; the management of device and systems related to cryptographic management and the use of accounts shall not be shared by many people; g) The key management personnel shall be regular employees of the organization; they shall be filed level by level, to standardize key management; h) It shall establish a personnel selection system and review system for cryptographic management and cryptographic device operation; determine full-time personnel to undertake related tasks; implement necessary review of relevant personnel; b) In the process of establishing a secure access path, the integrity service of cryptographic technology shall be used to ensure the integrity of the routing control information in the secure access path; its cryptographic function shall be correct and effective. 8.2.2.5 Audit records "Communication security", "identity authentication", "secure access path", "audit records" are the components of the "secure access path" of the bank card information system. In the level-3 requirements for cryptographic technology security protection of bank card information systems, the following requirements are set for the indicator of "network and communication security- audit records": The integrity service of cryptographic technology shall be used to protect the integrity of audit records; its cryptographic function shall be correct and effective. 8.2.3 Device and computing security 8.2.3.1 General Refer to GM/T 0054-2018 General requirements for information system cryptography application. 8.2.3.2 Audit records "Audit records", "identity authentication", "access control", "verification code and dynamic password", "cryptographic module" are part of the "device and computing security" of the bank card information system. In the level-3 requirements for cryptographic technology security protection of bank card information systems, the following requirements are set for the indicator of "device and computing security-audit records": In order to prevent the audit record from being illegally modified, it should use the integrity service of cryptographic technology to protect the integrity of the audit record; its cryptographic function shall be correct and effective. 8.2.3.3 Identity authentication "Audit records", "identity authentication", "access control", "verification code and dynamic password", "cryptographic module" are part of the "device and computing security" of the bank card information system. In the level-3 requirements for the cryptographic technology security protection of bank card information systems, the following requirements are made for the indicator of "device and computing security-identity authentication": c) For bank card’s main account number, magnetic track (including chip equivalent magnetic track information) information, card verification code (CVN, CVN2), personal identification number (PIN), card validity period and other sensitive account information, as well as the key fields such as user ID number, mobile phone number, cryptographic technology shall be used for confidentiality protection; d) For systems that provide services to the outside world through the Internet, in the entire message or conversation process in the communication process, it shall use a dedicated communication protocol or encryption method to ensure the confidentiality of the communication process; e) The confidentiality service of cryptographic technology shall be used to realize the confidentiality protection of the transmission of system management data, authentication information and important business data; its cryptographic function shall be correct and effective. 8.2.4.3 Data storage "Data transmission", "data storage", "terminal application" are part of the "application and data security" of the bank card information system. In the level- 3 requirements for cryptographic technology security protection of bank card information systems, the following requirements are made for the indicator of "application and data security-data storage": a) The integrity service of cryptographic technology should be used to detect the integrity of system management data, authentication information and important business data in the storage process; its cryptographic function shall be correct and effective; b) The confidentiality service of cryptographic technology should be used to realize the confidentiality protection of the storage of system management data, authentication information and important business data; its cryptographic function shall be correct and effective. 8.2.4.4 Terminal application "Data transmission", "data storage", "terminal application" are part of the "application and data security" of the bank card information system. In the level- 3 requirements for the cryptographic technology security protection of bank card information systems, the following requirements are made for the indicator of "application and data security-terminal application": a) The integrity service of cryptographic technology shall be used to verify the integrity of important programs; its cryptographic function shall be correct and effective; requirements: For manned terminals (such as POS), the amount input process must be separated from the PIN input process, to avoid accidentally displaying the PIN on the terminal's display screen. If the amount and PIN are entered on the same keyboard, the amount input and PIN input shall be two distinct operations. If there is no other confirmation operation, the PIN entered by the cardholder shall be used for the amount confirmation. 8.2.5.5 Password keyboard "Cryptographic algorithm allocation", "cryptographic protocol use", "application ciphertext generation", "bank card terminal", "password keyboard", "cryptographic device use" are components of the bank card information system’s "cryptographic allocation policy requirements". For the password keyboard, the following requirements shall be met: a) The technical requirements of the password keyboard shall comply with the relevant regulations and standards of the national cryptographic management authority and the industry authority; b) The password keyboard contains special devices with encryption operation processing function, which can complete message encryption, decryption, message authentication calculation and verification. The password keyboard shall be able to store the key securely and prevent it from being read. It shall be possible to store and select multiple sets of keys; c) The transaction amount must be displayed on the screen of the password keyboard; d) When the cardholder types the password, the display of the password keyboard cannot display plain text, only asterisks; e) The information transmission between the password keyboard and the POS terminal shall be in the form of cipher text. 8.2.5.6 Cryptographic device use "Cryptographic algorithm allocation", "cryptographic protocol use", "application ciphertext generation", "bank card terminal", "password keyboard", "cryptographic device use" are components of the bank card information system’s "cryptographic allocation policy requirements". In the level-3 requirements for cryptographic technology security protection of bank card information systems, the following requirements are set for the indicator of "cryptographic allocation strategy requirements-cryptographic device use": a) Key injection shall be performed in the presence of key administrators, security auditors, cryptographic device operators. The security auditors should also be present and record the operation memo; submit security audit logs, security audit documents, etc.; b) The key transmission, import and export process shall be carried out in accordance with the principle of dual control and key division. If it needs to use key components, the required key components shall be imported separately by the key component holder; c) When transferring and importing keys, it shall confirm: - Only when the cryptographic device authenticates at least two authorized persons, such as through a password, can the private key be transmitted; for manually distributed keys, the management process shall be used, such as paper authorization method, to authenticate the identity of the authorized person; - Only when it is sure that the cryptographic device has not been tampered with that may lead to the disclosure of keys or sensitive data before using it, can it import the private key into the cryptographic device; - Only when it is sure that there is no eavesdropping device installed at the interface of the cryptographic device that may cause the leakage of any element of the transmission key, can the private key be transmitted between the cryptographic devices; - The device used to transmit the private key between the device generating the key and the device using the key shall be a cryptographic device; - After importing the key to the target device, the key ...... ......
 
Source: Above contents are excerpted from the PDF -- translated/reviewed by: www.chinesestandard.net / Wayne Zheng et al.