|
US$249.00 ยท In stock Delivery: <= 3 days. True-PDF full-copy in English will be manually translated and delivered via email. GA 1278-2015: Information security technology. Basic procedures and requirements for internet service security evaluation
| Standard ID | Contents [version] | USD | STEP2 | [PDF] delivered in | Standard Title (Description) | Status | PDF |
| GA 1278-2015 | English | 249 |
Add to Cart
|
3 days [Need to translate]
|
Information security technology. Basic procedures and requirements for internet service security evaluation
| |
GA 1278-2015
|
PDF similar to GA 1278-2015
Basic data | Standard ID | GA 1278-2015 (GA1278-2015) | | Description (Translated English) | Information security technology. Basic procedures and requirements for internet service security evaluation | | Sector / Industry | Public Security (Police) Industry Standard | | Classification of Chinese Standard | A90 | | Classification of International Standard | 35.040 | | Word Count Estimation | 7,780 | | Date of Issue | 2015-10-26 | | Date of Implementation | 2016-01-01 | | Regulation (derived from) | Notice on Publication of Public Safety Industry Standard (Year 2015); Industry Standard Record Announcement No. 2016 (No. 197) | | Issuing agency(ies) | Ministry of Public Security | | Summary | This standard specifies the basic procedures and requirements for the implementation of security assessments by Internet service providers. This standard applies to Internet service providers for security assessment and public security organs to check the security of Internet services. |
GA 1278-2015: Information security technology. Basic procedures and requirements for internet service security evaluation ---This is a DRAFT version for illustration, not a final translation. Full copy of true-PDF in English version (including equations, symbols, images, flow-chart, tables, and figures etc.) will be manually/carefully translated upon your order.
Information security technology.Basic procedures and requirements for internet service security evaluation
ICS 35.040
A90
People's Republic of China Public Security Industry Standards
Information Security Technology
Basic Internet Security Assessment Procedures and Requirements
Issued on. 2015-10-26
2016-01-01 implementation
People's Republic of China Ministry of Public Security
Foreword
All the technical contents of this standard is mandatory.
This standard was drafted in accordance with GB/T 1.1-2009 given rules.
This standard is proposed and managed by the Ministry of Public Security Information System Standardization Technical Committee.
This standard was drafted. Ministry of Public Security Network Security Protection Agency, Ministry of Public Security the third Institute.
The main drafters of this standard. Bi Haibin, Jinbo, Circumstances of GA O, Chen Changsong, Zhuying Ju, Li Xianglong, Huangdao Li to Asaka.
Information Security Technology
Basic Internet Security Assessment Procedures and Requirements
1 Scope
This standard specifies the Internet service providers to implement basic safety assessment procedures and requirements.
This standard applies to Internet service providers to assess the safety and public security organs Internet service safety inspection.
2 Terms and definitions
The following terms and definitions apply to this document.
2.1
Internet service internetservice
To provide Internet access services, Internet data center services, Internet information services, Internet services and Internet Security
Internet services and other public services.
2.2
Internet service providers internetserviceprovider
Organizations or individuals to provide users with Internet services.
3 safety assessment and safety checks
Internet services on the front line, Internet service providers should organize themselves to carry out security assessments, submit an assessment report to the territorial public security organs,
Safety checks, the specific process in Appendix A.
4 assessment process
4.1 Assessment of the organization
Internet service provider Internet application services to carry out safety assessments can be taken in the following manner.
a) Internet service providers to organize themselves to perform safety assessment;
b) Internet service providers commissioned by third-party security evaluation organization appropriately qualified safety assessment;
c) Internet service providers commissioned by the territorial department of the public security network security experts recommended, agency security assessment.
Note. includes nationally recognized qualification, accreditation or qualification of safety assessment by the provincial department in charge of network security issued.
4.2 confidentiality requirements
Institutions and personnel involved in the assessment should be signed with an Internet service provider confidentiality agreement, we promise a conservative enterprise, trade secrets, and according to the law
Liability due to leaks should bear.
4.3 identify, analyze and evaluate the security compliance
From the following aspects of security identification, analysis and evaluation of Internet service compliance and preparation of safety assessment reports.
|