Home Cart Quotation About-Us
www.ChineseStandard.net
SEARCH

GB/T 33563-2024 English PDF

US$519.00 · In stock
Delivery: <= 5 days. True-PDF full-copy in English will be manually translated and delivered via email.
GB/T 33563-2024: Cybersecurity technology - Security technology requirements for wireless local area network client
Status: Valid

GB/T 33563: Historical versions

Standard IDUSDBUY PDFLead-DaysStandard Title (Description)Status
GB/T 33563-2024519 Add to Cart 5 days Cybersecurity technology - Security technology requirements for wireless local area network client Valid
GB/T 33563-20171399 Add to Cart 5 days Information security technology -- Security technology requirements for wireless local area network (wlan) client (EAL2+) Obsolete

Similar standards

GB/T 32918.5   GB/T 33561   GB/T 32921   GB/T 33565   GB/T 33560   

Basic data

Standard ID: GB/T 33563-2024 (GB/T33563-2024)
Description (Translated English): Cybersecurity technology - Security technology requirements for wireless local area network client
Sector / Industry: National Standard (Recommended)
Classification of Chinese Standard: L80
Classification of International Standard: 35.030
Word Count Estimation: 26,258
Date of Issue: 2024-04-25
Date of Implementation: 2024-11-01
Older Standard (superseded by this standard): GB/T 33563-2017
Issuing agency(ies): State Administration for Market Regulation, China National Standardization Administration

GB/T 33563-2024: Cybersecurity technology - Security technology requirements for wireless local area network client


---This is a DRAFT version for illustration, not a final translation. Full copy of true-PDF in English version (including equations, symbols, images, flow-chart, tables, and figures etc.) will be manually/carefully translated upon your order.
ICS 35:030 CCSL80 National Standards of People's Republic of China Replaces GB/T 33563-2017 Cybersecurity Technology Wireless LAN Client Security Technical Requirements Released on 2024-04-25 2024-11-01 Implementation State Administration for Market Regulation The National Standardization Administration issued

Table of Contents

Preface III 1 Scope 1 2 Normative references 1 3 Terms and Definitions 1 4 Abbreviations 2 5 Wireless LAN Client Description 2 6 Security Issues 3 6:1 Threat 3 6:1:1 Unauthorized access (T:UNAUTHORIZED_ACCESS) 3 6:1:2 Security function failure (T:SECURITY_FUNCTIONALITY_FAILURE) 3 6:1:3 Residual Information Utilization (T:RESIDUAL_DATA_EXPLOIT) 4 6:1:4 Logical Interface Attack (T:LOGICAL_INTERFACE_ATTACK) 4 6:1:5 Network Eavesdropping (T:NETWORK_EAVESDROP) 4 6:1:6 Network Attack (T:NETWORK_ATTACK) 4 6:1:7 Undetected Actions (T:UNDETECTED_ACTIONS) 4 6:2 Organizational Security Strategy 4 6:2:1 Password Management (P:CRYPTO_MANAGEMENT) 4 6:2:2 Authentication Management (P:AUTH_MANAGEMENT) 4 6:3 Assumption 4 6:3:1 Trusted Person (A:TRUSTED_PERSON) 4 6:3:2 Correct Connection (A:NO_TOE_BYPASS) 4 6:3:3 Trusted Platform (A:TRUSTED_PLATFORM) 4 7 Security Purpose 5 7:1 Wireless LAN Client Security Objectives 5 7:1:1 Authenticated Communications (O:AUTH_COMM) 5 7:1:2 Cryptographic functions (O:CRYPTOGRAPHIC_FUNCTIONS) 5 7:1:3 Self-test (O:SELF_TEST) 5 7:1:4 System Monitoring (O:SYSTEM_MONITORING) 5 7:1:5 TOE Administration (O:TOE_ADMINISTRATION) 5 7:1:6 Wireless AP connection (O:WIRELESS_ACCESS_POINT_CONNECTION) 5 7:1:7 Trusted Channel (O:TRUSTED_CHANNEL) 5 7:1:8 Access Control (O:ACCESS_CONTROL) 5 7:1:9 Logical attack resistance (O:LOGICATTACK_PREVENTION) 5 7:2 Environmental safety objectives 6 7:2:1 Trusted Person (OE:TRUSTED_PERSON) 6 7:2:2 TOE cannot be bypassed (OE:NO_TOE_BYPASS) 6 7:2:3 Platform (OE:PLATFORM) 6 7:2:4 Configuration (OE:CONFIG) 6 8 Safety requirements 6 8:1 Security Function Requirements 6 8:1:1 Safety function requirement classification 6 8:1:2 Safety Audit (FAU) 7 8:1:3 Cryptographic Support (FCS) 8 8:1:4 Marking and Identification (FIA) 9 8:1:5 Safety Management (FMT) 10 8:1:6 TSF protection (FPT) 11 8:1:7 TOE Access (FTA) and Trusted Path/Channel (FTP) 12 8:1:8 User Data Protection (FDP) 13 8:2 Security requirements 14 9 Basic Principles 14 9:1 Basic principles of security objectives 14 9:2 Basic principles of safety requirements 14 9:3 Basic principles of component dependencies 16 Reference 18

Foreword

This document is in accordance with the provisions of GB/T 1:1-2020 "Guidelines for standardization work Part 1: Structure and drafting rules for standardization documents" Drafting: This document replaces GB/T 33563-2017 "Information Security Technology Wireless LAN Client Security Technical Requirements (Assessment Level 2 Compared with GB/T 33563-2017, in addition to structural adjustments and editorial changes, the main technical changes are as follows: a) The scope of TOE has been changed (see Chapter 5 and Chapter 6 of the:2017 edition); b) Changed the threats faced by WLAN clients to include 7 threat categories, 2 organizational security policies, and 4 assumptions (see Section 6 Chapter 7 of the:2017 edition); c) Changed "TOE security objectives" and "Environmental security objectives", including 9 TOE security objectives and 4 environmental security objectives (See Chapter 7, Chapter 8 of the:2017 edition); d) Changed the wireless LAN client security function requirements, including 8 categories and 33 security function requirements (see 8:1,:2017 version Chapter 9, Chapter 10); e) Changed the wireless LAN client security requirements (see 8:2, 9:2 of the:2017 version); f) Added “Basic Principles”, including the correspondence between security issues and security objectives, security objectives and security requirements, and between components: Dependencies (see Chapter 9): Please note that some of the contents of this document may involve patents: The issuing organization of this document does not assume the responsibility for identifying patents: This document was proposed and coordinated by the National Cybersecurity Standardization Technical Committee (SAC/TC260): This document was drafted by: China Information Security Evaluation Center, Institute of Information Engineering, Chinese Academy of Sciences, Beijing Jiaotong University, CRRC Industrial Research Institute Institute Co:, Ltd:, Xi'an Xidian Jietong Wireless Network Communication Co:, Ltd:, the First Research Institute of the Ministry of Public Security, China Electronics Technology Standardization Institute Institute of Information Technology, Beijing Topsec Network Security Technology Co:, Ltd:, Sangfor Technologies Co:, Ltd:, Zhengzhou Xindajiean Information Technology Co:, Ltd: Company, Changyang Technology (Beijing) Co:, Ltd:, Shenzhen Xinrui Network Technology Co:, Ltd:, Beijing Luyuntian Network Security Technology Research Institute Co:, Ltd:, Xi'an Jiaotong University Jabil Network Technology Co:, Ltd:, Zhongfu Information Co:, Ltd:, State Grid Blockchain Technology (Beijing) Co:, Ltd:, China Cybersecurity Review Technology and Certification Center, H3C Technologies Co:, Ltd:, and China Electric Power Research Institute Co:, Ltd: The main drafters of this document are: Chen Dongqing, Zhang Liang, Han Jideng, Guo Tao, Shao Shuai, Wu Runpu, Li Meicong, Liu Qi, Fan Yuming, Wang Wei, Liu Jiqiang, Wang Jian, Tang Haichuan, Wang Junyong, Zhang Bianling, Zhu Zhenrong, Zhang Dongju, Kou Zengjie, An Gaofeng, Bao Xuhua, Ye Runguo, Ma Hongli, Han Xiude, Zhao Hua, Lai Guoqiang, He Jianfeng, Zhu Dali, Fan Wei, Mi Baoxin, Long Gang, Gao Jinping, Sun Pengke, Hou Mengyun, Yang Ke, Shen Yongbo, Wan Xiaolan, Wang Haixiang: The previous versions of this document and the documents it replaces are as follows: ---First published in:2017 as GB/T 33563-2017; ---This is the first revision: Cybersecurity Technology Wireless LAN Client Security Technical Requirements

1 Scope

This document specifies the security function requirements and security assurance requirements for wireless LAN clients, and gives the security requirements faced by wireless LAN clients: Description of the security issue: This document is applicable to the testing, evaluation and procurement of wireless LAN client products, as well as guiding the research and development of such products:

2 Normative references

The contents of the following documents constitute the essential clauses of this document through normative references in this document: For referenced documents without a date, only the version corresponding to that date applies to this document; for referenced documents without a date, the latest version (including all amendments) applies to This document: GB 15629:11 Information technology systems - Telecommunications and information exchange - Specific requirements for local area networks and metropolitan area networks - Part 11 Division: Wireless LAN Media Access Control and Physical Layer Specifications GB/T 18336:1-2024 Cybersecurity technology Information technology security assessment criteria Part 1: Introduction and general model GB/T 18336:2-2024 Cybersecurity technology Information technology security assessment criteria Part 2: Security function requirements GB/T 18336:3-2024 Cybersecurity technology Information technology security assessment criteria Part 3: Security assurance requirements GB/T 25069-2022 Information Security Technical Terminology GB/T 32915-2016 Information security technology Binary sequence randomness detection method GB/T 39786-2021 Information security technology Basic requirements for the application of cryptography in information systems

3 Terms and definitions

The following terms and definitions as defined in GB 15629:11, GB/T 18336:1-2024, GB/T 25069-2022 and the following terms and definitions apply to this document: 3:1 Access point: AP A network access device that provides access between wireless LAN clients and wired networks and forwards frames between wireless networks and wired networks: Port equipment: 3:2 authentication server A component used for identity authentication in a wireless LAN access system: 3:3 An executive component that enables a remote user to establish wireless communication with an accessed network using a client machine:
......
Image     

Tips & Frequently Asked Questions:

Question 1: How long will the true-PDF of GB/T 33563-2024_English be delivered?

Answer: Upon your order, we will start to translate GB/T 33563-2024_English as soon as possible, and keep you informed of the progress. The lead time is typically 3 ~ 5 working days. The lengthier the document the longer the lead time.

Question 2: Can I share the purchased PDF of GB/T 33563-2024_English with my colleagues?

Answer: Yes. The purchased PDF of GB/T 33563-2024_English will be deemed to be sold to your employer/organization who actually pays for it, including your colleagues and your employer's intranet.

Question 3: Does the price include tax/VAT?

Answer: Yes. Our tax invoice, downloaded/delivered in 9 seconds, includes all tax/VAT and complies with 100+ countries' tax regulations (tax exempted in 100+ countries) -- See Avoidance of Double Taxation Agreements (DTAs): List of DTAs signed between Singapore and 100+ countries

Question 4: Do you accept my currency other than USD?

Answer: Yes. If you need your currency to be printed on the invoice, please write an email to Sales@ChineseStandard.net. In 2 working-hours, we will create a special link for you to pay in any currencies. Otherwise, follow the normal steps: Add to Cart -- Checkout -- Select your currency to pay.

Question 5: Should I purchase the latest version GB/T 33563-2024?

Answer: Yes. Unless special scenarios such as technical constraints or academic study, you should always prioritize to purchase the latest version GB/T 33563-2024 even if the enforcement date is in future. Complying with the latest version means that, by default, it also complies with all the earlier versions, technically.