GB/T 30278-2024 English PDFUS$759.00 ยท In stock
Delivery: <= 6 days. True-PDF full-copy in English will be manually translated and delivered via email. GB/T 30278-2024: Cybersecurity technology - Government client computer core configuration specifications Status: Valid GB/T 30278: Historical versions
Basic dataStandard ID: GB/T 30278-2024 (GB/T30278-2024)Description (Translated English): Cybersecurity technology - Government client computer core configuration specifications Sector / Industry: National Standard (Recommended) Classification of Chinese Standard: L80 Classification of International Standard: 35.030 Word Count Estimation: 38,320 Date of Issue: 2024-11-28 Date of Implementation: 2025-06-01 Older Standard (superseded by this standard): GB/T 30278-2013,GB/T 35283-2017 Issuing agency(ies): State Administration for Market Regulation, China National Standardization Administration GB/T 30278-2024: Cybersecurity technology - Government client computer core configuration specifications---This is a DRAFT version for illustration, not a final translation. Full copy of true-PDF in English version (including equations, symbols, images, flow-chart, tables, and figures etc.) will be manually/carefully translated upon your order. ICS 35.030 CCSL80 National Standard of the People's Republic of China Replaces GB/T 30278-2013, GB/T 35283-2017 Cybersecurity Technology Core Configuration Specifications for Government Computer Terminals Released on 2024-11-28 2025-06-01 Implementation State Administration for Market Regulation The National Standardization Administration issued Table of ContentsPreface III Introduction IV 1 Scope 1 2 Normative references 1 3 Terms and Definitions 1 4 Abbreviations 2 5 Overview 2 6 Configuration Requirements 3 6.1 BIOS Configuration Requirements 3 6.2 Operating System Configuration Requirements 4 6.3 Office Software Configuration Requirements 6 6.4 Browser Configuration Requirements 6 6.5 Email Client Configuration Requirements 6 6.6 Security protection software configuration requirements 7 6.7 Instant messaging software configuration requirements 7 7 Automated deployment and monitoring requirements 8 7.1 Logical architecture of automated deployment and monitoring platform 8 7.2 Configuration Editing Function Requirements 8 7.3 Configuration Verification Function Requirements 9 7.4 Configuration and deployment functional requirements 9 7.5 Configuration monitoring function requirements 9 8 Implementation Process10 9 Configuration Requirements Verification Method 12 10 Automated deployment and monitoring require verification methods 21 Appendix A (Normative) Core Configuration Baseline Package 22 Appendix B (Informative) BIOS Access Control Configuration Example 25 Appendix C (Informative) Operating System Identity Authentication Configuration Example 27 Reference 32ForewordThis document is in accordance with the provisions of GB/T 1.1-2020 "Guidelines for standardization work Part 1.Structure and drafting rules for standardization documents" Drafting. This document replaces GB/T 30278-2013 "Information Security Technology Government Computer Terminal Core Configuration Specification" and GB/T 35283- 2017 "Information Security Technology Computer Terminal Core Configuration Baseline Structure Specification". This document is based on GB/T 30278-2013 and includes Compared with GB/T 30278-2013 and GB/T 35283-2017, in addition to structural adjustments and compilation In addition to logical changes, the main technical changes are as follows. --- Added instant messaging software and 5 security control points (see 5.1, 5.2); --- Added configuration requirements for identity authentication, access control, trusted verification, and data confidentiality (see 6.1); ---Added configurations for trusted verification, data confidentiality, data backup and recovery, personal information protection, application management, and data transmission control Requirements (see 6.2); --- Added configuration requirements for access control, intrusion prevention, personal information protection, residual information protection, and data transmission control (see 6.4); --- Added instant messaging software configuration requirements (see 6.7); --- Added configuration requirement verification method and automated deployment and monitoring requirement verification method (see Chapter 9, Chapter 10); --- Added normative reference document ISO /IEC 18180.2013 to replace the custom baseline configuration automation file format (see Appendix Record A). Please note that some of the contents of this document may involve patents. The issuing organization of this document does not assume the responsibility for identifying patents. This document was proposed and coordinated by the National Cybersecurity Standardization Technical Committee (SAC/TC260). This document was drafted by. China Cyberspace Security Technology Co., Ltd., National Information Center, Kylin Software Co., Ltd., Huawei Technologies Co., Ltd., Beijing Topsec Network Security Technology Co., Ltd., Changyang Technology (Beijing) Co., Ltd., Tongxin Software Technology Co., Ltd., E-Government National Engineering Laboratory for Cloud Technology Application, China Electronics Standardization Institute, Lenovo (Beijing) Co., Ltd., Beijing Shengxin Network Technology Co., Ltd. Ltd., China Science and Technology Information Security Common Technology National Engineering Research Center Co., Ltd., Alibaba Cloud Computing Co., Ltd., Zhengzhou Xindajiean Information Technology Co., Ltd., Beijing Qihoo Technology Co., Ltd., 360 Technology Group Co., Ltd., Xi'an University of Posts and Telecommunications, Kunlun Technology (Beijing) Technology Co., Ltd., Beijing Shenzhou Green Alliance Technology Co., Ltd., Qi'anxin Technology Group Co., Ltd., Xi'an Jiaotong University Jabil Network Technology Co., Ltd. Technology Co., Ltd., Beijing Zhongke Weilan Technology Co., Ltd., Inspur (Shandong) Computer Technology Co., Ltd., Jilin Information Security Evaluation Center, Beijing Beixinyuan Software Co., Ltd., Beijing Shanshi Network Technology Co., Ltd., Shenzhen Nengxinan Technology Co., Ltd., Venusstar Information Technology Group Co., Ltd., National Confidentiality Technology Evaluation Center, State Grid Xinjiang Electric Power Co., Ltd. Power Science Research Institute, Datang Gaohong Xinan (Zhejiang) Information Technology Co., Ltd., the Fifth Electronic Research Institute of the Ministry of Industry and Information Technology, and Antiy Technology Group Co., Ltd. Company, China Software Evaluation Center (Software and Integrated Circuit Promotion Center of the Ministry of Industry and Information Technology), Beijing University of Posts and Telecommunications, China Unicom (Sichuan) Industry INTERNET LIMITED. The main drafters of this document are. Zhang Jianjun, Liu Bei, Yang Shangxin, Meng Yaping, Chen Yunran, Wang Qiang, Zhan Mao, Dong Junping, Wang Zhen, Gui Yao, Zhang Yu, An Gaofeng, Zhao Hua, He Xuelin, Xu Tao, Yan Guixun, Li Zhanwei, Zhu Hua, Li Ruxin, Liu Jun, Sun Liang, He Jianfeng, Bian Jianchao, Dudu, Hu Jianxun, Long Qin, Liu Weihua, Yao Yinan, Zhang Zhilei, Li Fuqin, Liao Baicheng, Zhang Yong, Li Dequan, Hua Chang, An Jincheng, Guo Wei, Bai Xinlu, Li Yan, Liu Zhanfeng, Yang Yong, Zhao Yong, Liang Guiqian, Li Deqing, Ma Jin, Jia Nan, Liu Bo, Ma Wei, Liu Haijie, Chai Siyue, Zhang Shenghua, Zhang Lei, Zhou Runsong, Guo Ying, Ma Xiangliang, Li Shijing and Zhang Tao. The previous versions of this document and the documents it replaces are as follows. ---GB/T 30278-2013; ---GB/T 35283-2017; ---This is the first revision.IntroductionThe core configuration specification of government computer terminals is to ensure the computer security of government departments and reduce the risk of system security problems caused by improper configuration. To reduce the risk of full vulnerabilities, establish a security baseline for government computers, and guide the deployment of security configuration baselines in government office environments. This document is based on the three-level security requirements of GB/T 22239-2019 "Basic Requirements for Information Security Technology Network Security Level Protection" The full configuration baseline takes the seven types of software commonly used on government computers as the core configuration scope of this document, and proposes Security configuration requirements, guide software vendors and security vendors to formulate core configuration baselines according to requirements, and guide government departments to complete computer security verification. When users refer to this document to protect government terminal data, they should follow the classification and grading standards of government terminal data. GB/T 30278-2013 has been issued and implemented for more than ten years. The concept of government computer terminal security baseline has received more and more attention, and both the government office environment and computer technology have changed. First, as computer technology changes, the government office environment presents a variety of software of the same type and complex security configuration. Secondly, with the advancement of computer hardware and software technology, the widespread use of biometric technology and trusted computing technology has made computing In view of this, it is necessary to revise and improve GB/T 30278 and GB/T 35283 in a timely manner to continuously adapt to the government environment. new changes in the environment and new requirements for security baselines. Cybersecurity Technology Core Configuration Specifications for Government Computer Terminals1 ScopeThis document defines the core configuration objects and configuration scope of government computer terminals, and stipulates configuration requirements, automated deployment and monitoring requirements. It provides a method to verify the configuration requirements and the automated deployment and monitoring requirements. This document applies to the core configuration technology implementation and testing and verification of government computer terminals.2 Normative referencesThe contents of the following documents constitute the essential terms of this article through normative references in this article. For referenced documents without a date, only the version corresponding to that date applies to this document; for referenced documents without a date, the latest version (including all amendments) applies to This document. GB/T 22239-2019 Information security technology - Basic requirements for cybersecurity level protection GB/T 25069-2022 Information Security Technical Terminology GB/T 25100-2010 Dublin Core Metadata Element Set for Information and Documentation GB/T 25647-2010 E-government terminology GB/T 40692-2021 Definition and scope of government information system3 Terms and definitionsGB/T 22239-2019, GB/T 25069-2022, GB/T 25647-2010 and GB/T 40692-2021 and The following terms and definitions apply to this document. 3.1 Computer terminals that support government departments in carrying out their business operations. Note. Such as desktop computers, laptops, and virtual desktops. 3.2 Core configuration coreconfiguration The process of setting parameters for core configuration items (3.3). Note. By limiting or disabling functions with potential security risks or loopholes through core configuration, and enabling or strengthening security protection functions, the computer can be strengthened to resist security risks. ability. 3.3 Key parameter configuration items that affect the security of government computer terminal systems or software. Note. Core configuration item types include switch items, enumeration items, interval items, and compound items. ......Tips & Frequently Asked Questions:Question 1: How long will the true-PDF of GB/T 30278-2024_English be delivered?Answer: Upon your order, we will start to translate GB/T 30278-2024_English as soon as possible, and keep you informed of the progress. The lead time is typically 4 ~ 6 working days. The lengthier the document the longer the lead time.Question 2: Can I share the purchased PDF of GB/T 30278-2024_English with my colleagues?Answer: Yes. The purchased PDF of GB/T 30278-2024_English will be deemed to be sold to your employer/organization who actually pays for it, including your colleagues and your employer's intranet.Question 3: Does the price include tax/VAT?Answer: Yes. Our tax invoice, downloaded/delivered in 9 seconds, includes all tax/VAT and complies with 100+ countries' tax regulations (tax exempted in 100+ countries) -- See Avoidance of Double Taxation Agreements (DTAs): List of DTAs signed between Singapore and 100+ countriesQuestion 4: Do you accept my currency other than USD?Answer: Yes. If you need your currency to be printed on the invoice, please write an email to Sales@ChineseStandard.net. In 2 working-hours, we will create a special link for you to pay in any currencies. Otherwise, follow the normal steps: Add to Cart -- Checkout -- Select your currency to pay.Question 5: Should I purchase the latest version GB/T 30278-2024?Answer: Yes. Unless special scenarios such as technical constraints or academic study, you should always prioritize to purchase the latest version GB/T 30278-2024 even if the enforcement date is in future. Complying with the latest version means that, by default, it also complies with all the earlier versions, technically. |