Path:
Home >
GB/T >
Page208 > GB/T 37954-2019
Price & Delivery
US$519.00 · In stock · Download in 9 secondsGB/T 37954-2019: Information security technology - Technique requirements and testing and evaluation approaches for industrial control system vulnerability detection products
Delivery: 9 seconds. True-PDF full-copy in English & invoice will be downloaded + auto-delivered via email. See
step-by-step procedureStatus: Valid
| Std ID | Version | USD | Buy | Deliver [PDF] in | Title (Description) |
| GB/T 37954-2019 | English | 519 |
Add to Cart
|
5 days [Need to translate]
|
Information security technology - Technique requirements and testing and evaluation approaches for industrial control system vulnerability detection products
|
Click to Preview a similar PDF
Basic data
| Standard ID | GB/T 37954-2019 (GB/T37954-2019) |
| Description (Translated English) | Information security technology - Technique requirements and testing and evaluation approaches for industrial control system vulnerability detection products |
| Sector / Industry | National Standard (Recommended) |
| Classification of Chinese Standard | L80 |
| Classification of International Standard | 35.040 |
| Word Count Estimation | 26,270 |
| Date of Issue | 2019-08-30 |
| Date of Implementation | 2020-03-01 |
| Issuing agency(ies) | State Administration for Market Regulation, China National Standardization Administration |
GB/T 37954-2019: Information security technology - Technique requirements and testing and evaluation approaches for industrial control system vulnerability detection products
---This is an excerpt. Full copy of true-PDF in English version (including equations, symbols, images, flow-chart, tables, and figures etc.), auto-downloaded/delivered in 9 seconds, can be purchased online: https://www.ChineseStandard.net/PDF.aspx/GBT37954-2019
(Information security technology Industrial control system vulnerability detection product technical requirements and test evaluation methods)
ICS 35.040
L80
National Standards of People's Republic of China
Information security technology
Technical requirements for industrial control system vulnerability detection products and
Test evaluation method
Informationsecuritytechnology-
Techniquerequirementsandtestingandevaluationapproachesforindustrial
Controlsystemvulnerabilitydetectionproducts
Published on.2019-08-30
2020-03-01 implementation
State market supervision and administration
China National Standardization Administration issued
Content
Foreword III
1 Scope 1
2 Normative references 1
3 Terms and Definitions 1
4 Abbreviations 1
5 Product Description 2
6 Safety technical requirements 2
6.1 Security function requirements 2
6.2 Self-safety requirements 4
6.3 Security Requirements 5
7 Evaluation method 6
7.1 Safety Function Test 6
7.2 Self-safety test 11
7.3 Security Assurance Method 14
Appendix A (Normative) Industrial Control System Vulnerability Detection Product Safety Function Level 18
Appendix B (normative appendix) Classification of industrial control system vulnerability detection product evaluation methods and evaluation items 19
Reference 20
Foreword
This standard was drafted in accordance with the rules given in GB/T 1.1-2009.
Please note that some of the contents of this document may involve patents. The issuing organization of this document is not responsible for identifying these patents.
This standard is proposed and managed by the National Information Security Standardization Technical Committee (SAC/TC260).
This standard was drafted. China Information Security Evaluation Center, China Electronics Technology Standardization Institute, Beijing University of Technology, Beijing Hao En Net
Network Technology Co., Ltd., Shenyang Institute of Automation, Chinese Academy of Sciences, Beijing Heli System Engineering Co., Ltd., Third Research of the Ministry of Public Security
Institute (National Network and Information System Security Product Quality Supervision and Inspection Center), Beijing Jiaotong University, PLA Information Support Force Information Engineering
Xuezhong, CZ Zhuzhou Electric Locomotive Co., Ltd.
The main drafters of this standard. Zhang Dajiang, Hu Renhao, Fan Kefeng, Zhou Ruikang, Lai Yingxu, Xie Feng, Yan Liqing, Ye Runguo, Shang Wenli, Zhao Jianming,
Lu Yi, Zou Chunming, Xie Anming, Zheng Wei, Wei Qiang, An Gaofeng, Wang Chunxia, Liang Meng, Wang Yizhou, Wang Wei, Zhang Sheng, Liu Yong.
Information security technology
Technical requirements for industrial control system vulnerability detection products and
Test evaluation method
1 Scope
This standard specifies the technical requirements for vulnerability detection products for industrial control systems, including safety functional requirements, their own safety requirements, and
Safety requirements, and the corresponding test evaluation methods.
This standard applies to the design, development and evaluation of industrial control system vulnerability detection products.
2 Normative references
The following documents are indispensable for the application of this document. For dated references, only dated versions apply to this article.
Pieces. For undated references, the latest edition (including all amendments) applies to this document.
GB/T 25069-2010 Information Security Technology Terminology
3 Terms and definitions
The following terms and definitions as defined in GB/T 25069-2010 apply to this document.
3.1
Vulnerability
Weaknesses in assets that can be exploited by threats.
3.2
Test case testcase
A set of inputs, execution conditions, and expected results for a particular goal to verify that a particular requirement is met.
3.3
Test set testset
A combination of test cases.
3.4
Industrial control configuration software industrialcontrolconfigurationsoftware
In the software platform and development environment of the control system monitoring layer, the user is provided with a flexible way to quickly configure the status of the field system.
software tools.
4 Abbreviations
The following abbreviations apply to this document.
DNP. Distributed Network Protocol (DistributedNetworkProtocol)
HTML. Hypertext Markup Language (HypertextMarkupLanguage)
HTTP. HyperText Transfer Protocol (HyperTextTransferProtocol)
GB/T 37954-2019
(Information security technology Industrial control system vulnerability detection product technical requirements and test evaluation methods)
ICS 35.040
L80
National Standards of People's Republic of China
Information security technology
Technical requirements for industrial control system vulnerability detection products and
Test evaluation method
Informationsecuritytechnology-
Techniquerequirementsandtestingandevaluationapproachesforindustrial
Controlsystemvulnerabilitydetectionproducts
Published on.2019-08-30
2020-03-01 implementation
State market supervision and administration
China National Standardization Administration issued
Content
Foreword III
1 Scope 1
2 Normative references 1
3 Terms and Definitions 1
4 Abbreviations 1
5 Product Description 2
6 Safety technical requirements 2
6.1 Security function requirements 2
6.2 Self-safety requirements 4
6.3 Security Requirements 5
7 Evaluation method 6
7.1 Safety Function Test 6
7.2 Self-safety test 11
7.3 Security Assurance Method 14
Appendix A (Normative) Industrial Control System Vulnerability Detection Product Safety Function Level 18
Appendix B (normative appendix) Classification of industrial control system vulnerability detection product evaluation methods and evaluation items 19
Reference 20
Foreword
This standard was drafted in accordance with the rules given in GB/T 1.1-2009.
Please note that some of the contents of this document may involve patents. The issuing organization of this document is not responsible for identifying these patents.
This standard is proposed and managed by the National Information Security Standardization Technical Committee (SAC/TC260).
This standard was drafted. China Information Security Evaluation Center, China Electronics Technology Standardization Institute, Beijing University of Technology, Beijing Hao En Net
Network Technology Co., Ltd., Shenyang Institute of Automation, Chinese Academy of Sciences, Beijing Heli System Engineering Co., Ltd., Third Research of the Ministry of Public Security
Institute (National Network and Information System Security Product Quality Supervision and Inspection Center), Beijing Jiaotong University, PLA Information Support Force Information Engineering
Xuezhong, CZ Zhuzhou Electric Locomotive Co., Ltd.
The main drafters of this standard. Zhang Dajiang, Hu Renhao, Fan Kefeng, Zhou Ruikang, Lai Yingxu, Xie Feng, Yan Liqing, Ye Runguo, Shang Wenli, Zhao Jianming,
Lu Yi, Zou Chunming, Xie Anming, Zheng Wei, Wei Qiang, An Gaofeng, Wang Chunxia, Liang Meng, Wang Yizhou, Wang Wei, Zhang Sheng, Liu Yong.
Information security technology
Technical requirements for industrial control system vulnerability detection products and
Test evaluation method
1 Scope
This standard specifies the technical requirements for vulnerability detection products for industrial control systems, including safety functional requirements, their own safety requirements, and
Safety requirements, and the corresponding test evaluation methods.
This standard applies to the design, development and evaluation of industrial control system vulnerability detection products.
2 Normative references
The following documents are indispensable for the application of this document. For dated references, only dated versions apply to this article.
Pieces. For undated references, the latest edition (including all amendments) applies to this document.
GB/T 25069-2010 Information Security Technology Terminology
3 Terms and definitions
The following terms and definitions as defined in GB/T 25069-2010 apply to this document.
3.1
Vulnerability
Weaknesses in assets that can be exploited by threats.
3.2
Test case testcase
A set of inputs, execution conditions, and expected results for a particular goal to verify that a particular requirement is met.
3.3
Test set testset
A combination of test cases.
3.4
Industrial control configuration software industrialcontrolconfigurationsoftware
In the software platform and development environment of the control system monitoring layer, the user is provided with a flexible way to quickly configure the status of the field system.
software tools.
4 Abbreviations
The following abbreviations apply to this document.
DNP. Distributed Network Protocol (DistributedNetworkProtocol)
HTML. Hypertext Markup Language (HypertextMarkupLanguage)
HTTP. HyperText Transfer Protocol (HyperTextTransferProtocol)
...