GB/T 41241-2022 English PDFUS$539.00 ยท In stock
Delivery: <= 5 days. True-PDF full-copy in English will be manually translated and delivered via email. GB/T 41241-2022: Management requirements for cybersecurity of industrial control systems in nuclear power plant Status: Valid
Basic dataStandard ID: GB/T 41241-2022 (GB/T41241-2022)Description (Translated English): Management requirements for cybersecurity of industrial control systems in nuclear power plant Sector / Industry: National Standard (Recommended) Classification of Chinese Standard: N18 Word Count Estimation: 27,277 Issuing agency(ies): State Administration for Market Regulation, China National Standardization Administration GB/T 41241-2022: Management requirements for cybersecurity of industrial control systems in nuclear power plant---This is a DRAFT version for illustration, not a final translation. Full copy of true-PDF in English version (including equations, symbols, images, flow-chart, tables, and figures etc.) will be manually/carefully translated upon your order. Management requirements for cybersecurity of industrial control systems in nuclear power plant ICS 27.120.20 CCSN18 National Standards of People's Republic of China Nuclear power plant industrial control system network security management requirements 2022-10-01 Implementation State Administration for Market Regulation Released by the National Standardization Administration directory Preface III Introduction IV 1 Scope 1 2 Normative references 1 3 Terms and Definitions 1 4 Abbreviations 4 5 Nuclear Power Plant Industrial Control System Network Security Management 4 6 Network security technical protection of nuclear power plant industrial control system 13 7 Nuclear Power Plant Industrial Control System Network Security Emergency Management 15 Appendix A (Informative) Description of Cybersecurity Rating for Industrial Control System of Nuclear Power Plant 19 Reference 21 Figure A.1 Nuclear Power Plant Industrial Control System Cybersecurity Defense Model 19 Table A.1 Example of cyber security fortification level of industrial control system of nuclear power plant 20 forewordThis document is in accordance with the provisions of GB/T 1.1-2020 "Guidelines for Standardization Work Part 1.Structure and Drafting Rules of Standardization Documents" drafted. Please note that some content of this document may be patented. The issuing agency of this document assumes no responsibility for identifying patents. This document is proposed and managed by the National Standardization Technical Committee of Nuclear Instrumentation (SAC/TC30). This document was drafted by. China General Nuclear Power Engineering Co., Ltd., China General Nuclear Power Co., Ltd., Shanghai Nuclear Engineering Research and Design Institute Co., Ltd. Company, Jiangsu Nuclear Power Co., Ltd., Institute of Nuclear Industry Standardization, Tsinghua University, CNNC Wuhan Nuclear Power Operation Technology Co., Ltd., Fujian Fuqing Nuclear Power Co., Ltd., Beijing Guangli Nuclear System Engineering Co., Ltd., Daya Bay Nuclear Power Operation Management Co., Ltd., Liaoning Hongyanhe Nuclear Power Co., Ltd. Electric Co., Ltd., Qi Anxin Technology Group Co., Ltd., Hillstone Network Technology Co., Ltd., Sangfor Technology Co., Ltd. Division, China Nuclear Power Development Center. The main drafters of this document. Tan Ke, Wu Ting, Huang Weijun, Yan Zhenyu, Li Xianmin, Xie Hongyun, Liu Gaojun, Chun Zengjun, Yang Xiaochen, Li Ruolan, Guo Zhiwu, Zhou Liang, Peng Huaqing, Zhang Shuhui, Mao Lei, Zheng Wei, Xu Xiajun, Wang Lue, Zhao Lei, Liu Keke, Liang Xueyuan, Jin Wujian, Li Zhizhong, Zhang Renyou, Gao Hanjun, Qu Ming, Cai Hongwei, Lu Jun, Liu Yuan, Shi Qin, Li Shi, Li Guangfeng, Guan Junfeng, Zhang Tianyuan, Yan Pei, Liu Taihong, Luo Dongping, Hu Bing, Chen Wei.IntroductionIn order to improve and standardize the network security protection capability of the industrial control system of nuclear power plants, according to the national network security protection of power monitoring system requirements and regulations, the basic requirements for the security level protection of information systems in the power industry, the nuclear safety guidelines related to the instrumentation and control systems of nuclear power plants, etc. To meet the requirements of this document, this document was developed. Nuclear power plant industrial control system network security management requirements1 ScopeThis document specifies the management, technical protection and emergency management requirements for the cyber security of the industrial control system of the nuclear power plant. This document applies to all phases of the life cycle of industrial control systems in the field of nuclear power plants (including design, development, engineering implementation, operation and maintenance protection, decommissioning, etc.) network security activities, and it is also suitable for guiding users of the industrial control system of nuclear power plants to improve and improve the network security protection in the production system. system maintenance activities to protect the capability.2 Normative referencesThe contents of the following documents constitute essential provisions of this document through normative references in the text. Among them, dated citations documents, only the version corresponding to that date applies to this document; for undated references, the latest edition (including all amendments) applies to this document. GB/T 22240 Information Security Technology Network Security Graded Protection Grading Guide GB/T 25058 Implementation Guide for Information Security Technology Network Security Level Protection GB/T 28448 Information Security Technology Network Security Level Protection Evaluation Requirements GB/T 28449 Information Security Technology Network Security Level Protection Evaluation Process Guide3 Terms and DefinitionsThe following terms and definitions apply to this document. 3.1 Acceptance acceptance A method used to end project implementation in risk assessment activities, mainly organized by the assessed party to check the assessment activities item by item. The acceptance criteria are whether the assessment objectives are met. [Source. GB/T 30976.1-2014, 3.1.4] 3.2 access control accesscontrol A means of ensuring that the resources of a data processing system can only be accessed by authorized subjects in an authorized manner. [Source. GB/T 25069-2010, 2.2.1.42] 3.3 authentication authentication The act of verifying the purported identity of an entity. [Source. GB/T 33009.1-2016, 3.1.2] 3.4 availability Characteristics of data or resources that can be accessed and used by authorized entities as required. [Source. GB/T 20984-2007, 3.3] ......Tips & Frequently Asked Questions:Question 1: How long will the true-PDF of GB/T 41241-2022_English be delivered?Answer: Upon your order, we will start to translate GB/T 41241-2022_English as soon as possible, and keep you informed of the progress. The lead time is typically 3 ~ 5 working days. The lengthier the document the longer the lead time.Question 2: Can I share the purchased PDF of GB/T 41241-2022_English with my colleagues?Answer: Yes. The purchased PDF of GB/T 41241-2022_English will be deemed to be sold to your employer/organization who actually pays for it, including your colleagues and your employer's intranet.Question 3: Does the price include tax/VAT?Answer: Yes. Our tax invoice, downloaded/delivered in 9 seconds, includes all tax/VAT and complies with 100+ countries' tax regulations (tax exempted in 100+ countries) -- See Avoidance of Double Taxation Agreements (DTAs): List of DTAs signed between Singapore and 100+ countriesQuestion 4: Do you accept my currency other than USD?Answer: Yes. If you need your currency to be printed on the invoice, please write an email to Sales@ChineseStandard.net. In 2 working-hours, we will create a special link for you to pay in any currencies. Otherwise, follow the normal steps: Add to Cart -- Checkout -- Select your currency to pay. |