GBZ42885-2023 English PDFUS$519.00 ยท In stock
Delivery: <= 5 days. True-PDF full-copy in English will be manually translated and delivered via email. GBZ42885-2023: Information security technology - Guidance for cyber security information sharing Status: Valid
Basic dataStandard ID: GB/Z 42885-2023 (GB/Z42885-2023)Description (Translated English): Information security technology - Guidance for cyber security information sharing Sector / Industry: National Standard Classification of Chinese Standard: L80 Classification of International Standard: 35.030 Word Count Estimation: 26,211 Date of Issue: 2023-08-06 Date of Implementation: 2024-03-01 Issuing agency(ies): State Administration for Market Regulation, China National Standardization Administration GBZ42885-2023: Information security technology - Guidance for cyber security information sharing---This is a DRAFT version for illustration, not a final translation. Full copy of true-PDF in English version (including equations, symbols, images, flow-chart, tables, and figures etc.) will be manually/carefully translated upon your order. GB /Z 42885-2023.Information Security Technology Network Security Information Sharing Guidelines ICS 35.030 CCSL80 National Standardization Guiding Technical Documents of the People's Republic of China Information Security Technology Cybersecurity Information Sharing Guide Published on 2023-08-06 2024-03-01 Implementation State Administration for Market Regulation Released by the National Standardization Administration Committee Table of contentsPreface III 1 Scope 1 2 Normative reference documents 1 3 Terms and Definitions 1 4 Abbreviations 1 5 Sharing Activity Elements 2 5.1 Overview 2 5.2 Sharing scenario 2 5.3 Shared participation role 2 5.4 Sharing mode 3 5.5 Network security information 3 6 Basic Principles 3 6.1 Security Principle 3 6.2 Controllability principle 3 6.3 Compliance Principle 4 7 Shared scope 4 8 Sharing activity process 4 8.1 Overview 4 8.2 Preparation for sharing activities 4 8.3 Sharing activity implementation 6 8.4 Termination of sharing activities8 Appendix A (informative) Examples of cybersecurity information sharing activities 9 Appendix B (informative) Example 10 of network security information sharing model B.1 Central sharing model10 B.2 Peer-to-peer sharing mode10 B.3 Hybrid Sharing Mode11 B.4 Group Sharing Mode 11 Appendix C (informative) Network security information description 13 C.1 Threat information description13 C.2 Security incident information description13 C.3 Vulnerability information description13 C.4 Description of countermeasure information14 C.5 Description of experience information14 C.6 Situation information description14 Appendix D (Informative) Overview of Information Exchange Technology in Sharing Activities15 D.1 Network security information exchange model15 D.2 Network security information exchange method 16 D.3 Network security information data interface description 17 Reference 18ForewordThis document complies with the provisions of GB/T 1.1-2020 "Standardization Work Guidelines Part 1.Structure and Drafting Rules of Standardization Documents" Drafting. Please note that some content in this document may be subject to patents. The publisher of this document assumes no responsibility for identifying patents. This document is proposed and coordinated by the National Information Security Standardization Technical Committee (SAC/TC260). This document was drafted by. National Industrial Information Security Development Research Center, China Electronics Technology Standardization Institute, National Computer Network Emergency Technology Coordination Center, China Information Security Evaluation Center, Institute of Information Engineering, Chinese Academy of Sciences, Hangzhou Anheng Information Technology Co., Ltd. Co., Ltd., Beijing Shenzhou Green League Technology Co., Ltd., Sichuan University, Beijing Tianrongxin Network Security Technology Co., Ltd., China Electronic Information Industry The Sixth Research Institute of Industrial Group Co., Ltd., Electric Power Research Institute of State Grid Xinjiang Electric Power Co., Ltd., China Aerospace Science and Industry Aviation Technology Research Institute, Guoneng Information Technology Co., Ltd., China Southern Power Grid Digital Grid Group Co., Ltd., Tencent Cloud Computing (Beijing) Co., Ltd., Shaanxi Provincial Network Network and Information Security Assessment Center. The main drafters of this document. Zhang Ge, Zhang Zheyu, Wang Shirui, Sun Jun, Yu Meng, Xiao Junfang, Hao Zhiqiang, Wang Huili, Guo Jing, Du Yuge, Jiang Zhengwei, Liang Wei, Wu Hao, Wang Junfeng, Tang Binhui, An Gaofeng, Yang Peng, Guo Li, Liu Zhilei, Li Mingxuan, Pei Yanchun, Zhang Liguang, Han Pengjun, Lu Huahui, Li Yang, Cheng Xi, Yang Zitao, Fan Kai, Qin Xiaowei, Ren Zejun, Wang Rui, Wang Zun, Xie Chengyun, Gao Rui, Jiang Jun. Information Security Technology Cybersecurity Information Sharing Guide1 ScopeThis document establishes the elements and basic principles of network security information sharing activities, and describes the scope and process of sharing activities. This document applies to network security information sharing activities between various organizations or individuals.2 Normative reference documentsThe contents of the following documents constitute essential provisions of this document through normative references in the text. Among them, the dated quotations For undated referenced documents, only the version corresponding to that date applies to this document; for undated referenced documents, the latest version (including all amendments) applies to this document. GB/T 25069-2022 Information security technical terms3 Terms and definitionsThe terms and definitions defined in GB/T 25069-2022 and the following apply to this document. 3.1 Information describing network security (i.e. cyberspace security)-related situations. Note. Network security information mainly includes threat information, security event information, vulnerability information, countermeasure information, experience information, situation information, etc. 3.2 sharing activities sharing activities By adopting effective organizational mechanisms and technical means, network security information can be reused among participants. Note. Network security information in sharing activities can be shared one-way, two-way or multi-way. 3.3 sharingmodesharingmode Behavioral patterns of information sharing among participants. Note. Sharing modes are mainly divided into central sharing mode, point-to-point sharing mode, hybrid sharing mode and group sharing mode.4 AbbreviationsThe following abbreviations apply to this document. P2P. peer-to-peer technology (peer-to-peer) ......Tips & Frequently Asked Questions:Question 1: How long will the true-PDF of GBZ42885-2023_English be delivered?Answer: Upon your order, we will start to translate GBZ42885-2023_English as soon as possible, and keep you informed of the progress. The lead time is typically 3 ~ 5 working days. The lengthier the document the longer the lead time.Question 2: Can I share the purchased PDF of GBZ42885-2023_English with my colleagues?Answer: Yes. The purchased PDF of GBZ42885-2023_English will be deemed to be sold to your employer/organization who actually pays for it, including your colleagues and your employer's intranet.Question 3: Does the price include tax/VAT?Answer: Yes. Our tax invoice, downloaded/delivered in 9 seconds, includes all tax/VAT and complies with 100+ countries' tax regulations (tax exempted in 100+ countries) -- See Avoidance of Double Taxation Agreements (DTAs): List of DTAs signed between Singapore and 100+ countriesQuestion 4: Do you accept my currency other than USD?Answer: Yes. If you need your currency to be printed on the invoice, please write an email to Sales@ChineseStandard.net. In 2 working-hours, we will create a special link for you to pay in any currencies. Otherwise, follow the normal steps: Add to Cart -- Checkout -- Select your currency to pay. |