HOME   Cart(0)   Quotation   About-Us Policy PDFs Standard-List
www.ChineseStandard.net Database: 189759 (19 Oct 2025)

GA/T 1141-2014 English PDF

US$769.00 · In stock
Delivery: <= 4 days. True-PDF full-copy in English will be manually translated and delivered via email.
GA/T 1141-2014: Information security technology-Computer configuration requirements for security classified protection
Standard IDContents [version]USDSTEP2[PDF] delivered inStandard Title (Description)StatusPDF
GA/T 1141-2014English769 Add to Cart 4 days [Need to translate] Information security technology-Computer configuration requirements for security classified protection GA/T 1141-2014

PDF similar to GA/T 1141-2014


Standard similar to GA/T 1141-2014

GB/T 37230   GA/T 1059   GB 13954   GA/T 1137   GA/T 1138   GA/T 1136   

Basic data

Standard ID GA/T 1141-2014 (GA/T1141-2014)
Description (Translated English) Information security technology-Computer configuration requirements for security classified protection
Sector / Industry Public Security (Police) Industry Standard (Recommended)
Classification of Chinese Standard A90
Classification of International Standard 35.240
Word Count Estimation 22,221
Date of Issue 2014-03-14
Date of Implementation 2014-03-14
Quoted Standard GB/T 22239-2008; GB/T 25069-2010
Regulation (derived from) Notice on Publication of Public Safety Industry Standard (Year of 2014); Industry Standard Record Announcement No. 4 of 2015 (No. 184)
Issuing agency(ies) Ministry of Public Security
Summary This standard specifies the operating system security configuration requirements for the various types of hosts in the second to fourth level information systems. This standard applies to the second level to fourth level information systems in various typ

GA/T 1141-2014: Information security technology-Computer configuration requirements for security classified protection


---This is a DRAFT version for illustration, not a final translation. Full copy of true-PDF in English version (including equations, symbols, images, flow-chart, tables, and figures etc.) will be manually/carefully translated upon your order.
Information security technology-Computer configuration requirements for security classified protection ICS 35.240 A90 People's Republic of China Public Security Industry Standards Information Security Technology Host Security Protection Configuration Requirements Issued on. 2014-03-14 2014-03-14 implementation People's Republic of China Ministry of Public Security

Table of Contents

Introduction Ⅲ 1 Scope 1 2 Normative references 1 3 Terms and definitions 4 second stage host security configuration requirements 1 4.1 Windows host security configuration 1 4.1.1 authentication security configuration 1 4.1.2 Access Control Security Configuration 2 4.1.3 Security Audit Security Configuration 2 4.1.4 Intrusion Prevention Security Configuration 3 4.1.5 malicious code prevention Security Configuration 3 4.1.6 Resource Control Security Configuration 3 4.2 Unix-Host Security Configuration 3 4.2.1 authentication Security Configuration 3 4.2.2 Access Control Security Configuration 4 4.2.3 Security Audit Security Configuration 4 4.2.4 Intrusion Prevention Security Configuration 5 4.2.5 malicious code prevention Security Configuration 5 4.2.6 Resource Control Security Configuration 5 5 third-level host security configuration requirements 5 5.1 Windows Host Security Configuration 5 5.1.1 authentication security configuration 5 5.1.2 Security marker 6 5.1.3 Access Control Security Configuration 6 5.1.4 Security Audit Security Configuration 7 5.1.5 Remaining Information Protection Security Configuration 7 5.1.6 Intrusion Prevention Security Configuration 7 5.1.7 malicious code prevention security configuration 8 5.1.8 Resource Control Security Configuration 8 5.2 Unix-8 Host Security Configuration 5.2.1 authentication security configuration 8 5.2.2 Security marker 9 5.2.3 Access Control Security Configuration 9 5.2.4 Security Audit Security Configuration 10 5.2.5 Remaining information protection security configuration 10 5.2.6 Intrusion Prevention Security Configuration 10 5.2.7 Security Configuration 10 malicious code prevention 5.2.8 Resource Control Security Configuration 11 6 fourth stage host security configuration requirements 11 6.1 Windows Host Security Configuration 11 6.1.1 authentication security configuration 11 6.1.2 Security marker 12 6.1.3 access control security configuration 12 6.1.4 Trusted Path 13 6.1.5 Security Audit Security Configuration 13 6.1.6 Remaining information protection security configuration 13 6.1.7 Intrusion Prevention Security Configuration 13 6.1.8 Security Configuration 14 malicious code prevention 6.1.9 Resource Control Security Configuration 14 6.2 Unix-host security configuration 15 6.2.1 authentication security configuration 15 6.2.2 Security marker 15 6.2.3 access control security configuration 15 6.2.4 Trusted Path 16 6.2.5 Security Audit Security Configuration 16 6.2.6 Remaining information protection security configuration 17 6.2.7 Intrusion Prevention Security Configuration 17 6.2.8 Security Configuration 17 malicious code prevention 6.2.9 Resource Control Security Configuration 17

Foreword

This standard was drafted in accordance with GB/T 1.1-2009 given rules. This standard was proposed by the Ministry of Public Security Network Security Protection Agency. This standard is under the jurisdiction of the Ministry of Public Security Information System Standardization Technical Committee. This standard was drafted. Ministry of Public Security of Computer Information System Security Product Quality Supervision and Inspection Center, Ministry of Public Security Network Security Protection Agency, public Third Institute Abe. The main drafters of this standard. Qiu Zi Hua, a good song, Zhangjun Bing, Zhang smiled, Gu Wei, Gu Jian, Yu excellent. Information Security Technology Host Security Protection Configuration Requirements

1 Scope

This standard specifies the second level to the fourth level information systems, various types of host operating system security configuration requirements. This standard applies to the second level to the fourth level information system security configuration of all types of the host operating system.

2 Normative references

The following documents for the application of this document is essential. For dated references, only the dated version suitable for use herein Member. For undated references, the latest edition (including any amendments) applies to this document. GB/T 22239-2008 Information security technology information system security protection essential requirements GB/T 25069-2010 Information security technology terms

3 Terms and Definitions

Terms and definitions GB/T 22239-2008 and GB/T 25069-2010 defined apply to this document.

4 second stage host security configuration requirements

4.1 Windows Host Security Configuration 4.1.1 authentication security configuration 4.1.1.1 Identity Security Configuration The host response settings for each account login password, the password should not be empty. 4.1.1.2 Identification of information security configuration Should enable the host password security policies and set the following. a) Minimum password length; b) password complexity; c) the maximum password age. 4.1.1.3 Identification Process Security Configuration Should enable the host account lockout policy, and set the following. a) Account lockout threshold; b) to reset the account lockout count time; c) account lockout time.

Tips & Frequently Asked Questions:

Question 1: How long will the true-PDF of GA/T 1141-2014_English be delivered?

Answer: Upon your order, we will start to translate GA/T 1141-2014_English as soon as possible, and keep you informed of the progress. The lead time is typically 2 ~ 4 working days. The lengthier the document the longer the lead time.

Question 2: Can I share the purchased PDF of GA/T 1141-2014_English with my colleagues?

Answer: Yes. The purchased PDF of GA/T 1141-2014_English will be deemed to be sold to your employer/organization who actually pays for it, including your colleagues and your employer's intranet.

Question 3: Does the price include tax/VAT?

Answer: Yes. Our tax invoice, downloaded/delivered in 9 seconds, includes all tax/VAT and complies with 100+ countries' tax regulations (tax exempted in 100+ countries) -- See Avoidance of Double Taxation Agreements (DTAs): List of DTAs signed between Singapore and 100+ countries

Question 4: Do you accept my currency other than USD?

Answer: Yes. If you need your currency to be printed on the invoice, please write an email to [email protected]. In 2 working-hours, we will create a special link for you to pay in any currencies. Otherwise, follow the normal steps: Add to Cart -- Checkout -- Select your currency to pay.