HOME   Cart(0)   Quotation   About-Us Policy PDFs Standard-List
www.ChineseStandard.net Database: 189759 (19 Oct 2025)

GA/T 1142-2014 English PDF

US$739.00 · In stock
Delivery: <= 4 days. True-PDF full-copy in English will be manually translated and delivered via email.
GA/T 1142-2014: Information security technology. Security technical requirements for host security inspecting products
Standard IDContents [version]USDSTEP2[PDF] delivered inStandard Title (Description)StatusPDF
GA/T 1142-2014English739 Add to Cart 4 days [Need to translate] Information security technology. Security technical requirements for host security inspecting products GA/T 1142-2014

PDF similar to GA/T 1142-2014


Standard similar to GA/T 1142-2014

GB/T 37230   GA/T 1059   GB 13954   GA/T 1137   GA/T 1138   GA/T 1136   

Basic data

Standard ID GA/T 1142-2014 (GA/T1142-2014)
Description (Translated English) Information security technology. Security technical requirements for host security inspecting products
Sector / Industry Public Security (Police) Industry Standard (Recommended)
Classification of Chinese Standard A90
Classification of International Standard 35.240
Word Count Estimation 21,29
Quoted Standard GB 17859-1999; GB/T 25069-2010; GB/T 18336.1-2008; GB/T 18336.2-2008; GB/T 18336.3-2008
Regulation (derived from) Notice on Publication of Public Safety Industry Standard (Year of 2014); Industry Standard Record Announcement No. 4 of 2015 (No. 184)
Issuing agency(ies) Ministry of Public Security
Summary This standard specifies the requirements for safety functions, safety assurance requirements and classification requirements of the mainframe safety inspection products. This standard applies to the host security check product design, development and test

GA/T 1142-2014: Information security technology. Security technical requirements for host security inspecting products


---This is a DRAFT version for illustration, not a final translation. Full copy of true-PDF in English version (including equations, symbols, images, flow-chart, tables, and figures etc.) will be manually/carefully translated upon your order.
Information security technology.Security technical requirements for host security inspecting products ICS 35.240 A90 People's Republic of China Public Security Industry Standards Information Security Technology Host Security check product safety technical requirements Issued on. 2014-03-14 2014-03-14 implementation People's Republic of China Ministry of Public Security

Table of Contents

Introduction Ⅲ Introduction Ⅳ 1 Scope 1 2 Normative references 1 3 Terms and definitions 4 Product Description 1 Host Security checks 5 2 Security Environment 5.1 Hypothesis 2 5.2 Threat 2 5.3 3 Organization for Security Policy 6 security objectives 3 6.1 Product Safety Objective 3 6.2 Environmental security objectives 3 7 Security functional requirements 4 7.1 Policy formulation 4 7.2 Check function 4 7.3 baseline function 5 7.4 Response Function 5 7.5 Analysis of test results 5 7.6 Stability and fault tolerance 6 7.7 centralized management 6 7.8 identification and authentication 6 7.9 Security Management 7 7.10 Audit 7 7.11 7 upgrades 8 8 Security assurance requirements 8.1 Configuration Management 8 8.2 Delivery and Operation 8 8.3 Development 9 8.4 guidance document 10 11 8.5 Life Cycle Support 8.6 Test 11 8.7 Vulnerability assessment 12 9 basic principles of technical requirements 13 9.1 Security functional requirements Fundamentals 13 9.2 Security assurance requirements 14 Fundamentals 10 Classification of claim 14 10.1 Overview 14 10.2 Classification of security functional requirements 14 10.3 Classification of security assurance requirements 15

Foreword

This standard was drafted in accordance with GB/T 1.1-2009 given rules. This standard was proposed by the Ministry of Public Security Network Security Protection Agency. This standard is under the jurisdiction of the Ministry of Public Security Information System Standardization Technical Committee. This standard was drafted. Ministry of Public Security of Computer Information System Security Product Quality Supervision and Inspection Center, Ministry of Public Security Network Security Protection Agency, blue Shield Security Technology Co., Ltd., Third Institute of Ministry of Public Security. The main drafters of this standard. Zhao, Gu Jian, Zhang Junbing, Zhang Yi, Qiu Zi Hua, Shen Liang, Zhang smiled, a good song, Lu Zhen, Yu excellent, Pun.

Introduction

This standard is described in detail and host security checking product safety environment-related assumptions, threats and organizational security policies defined host security Full security purposes check the product and its supporting environment, demonstrated by the basic principles of security functional requirements and be able to trace the products covered by safety purposes, Security purposes can be traced back cover and secure environment-related assumptions, threats and organizational security policies. The standard base-level reference to GB/T 18336.3-2008 prescribed level EAL2 security assurance requirements, and enhance the level at EAL4 level Security assurance requirements based on the vulnerability analysis requires upgrade to an attacker can withstand moderate attack potential attack. This standard only gives the host security checks security checks should meet the technical requirements, but the host security inspection product specific technical implementation Now way, way, etc. is not required. Information Security Technology Host Security check product safety technical requirements

1 Scope

This standard specifies the security features host security inspection product requirements, security assurance requirements and grading requirements. This standard applies to the host security checks product design, development and testing.

2 Normative references

The following documents for the application of this document is essential. For dated references, only the dated version suitable for use herein Member. For undated references, the latest edition (including any amendments) applies to this document. GB 17859-1999 computer information system security protection classification criterion GB/T 18336-2008 (all parts), Information technology - Security techniques - Information Technology Security Evaluation Guidelines GB/T 25069-2010 Information security technology terms

3 Terms and Definitions

GB 17859-1999, GB/T 18336-2008 (all parts) and GB/T 25069-2010 defined and the following terms and definitions Meaning applicable to this document. 3.1 Agent agent Installed on the host to be checked, the configuration component for collecting host information. 3.2 Management Console managementconsole For configuration information collected for centralized storage and analysis, and engine management, security policy configuration checks, alarm management, things Parts and components in response to other management. A console can manage multiple engines. 3.3 Check inspect Security configuration hosts collected and analyzed by the engine, and focus on the process of the console display.

4 host security checks Product Description

Product composition by the agent and management console, security policies based on predefined templates, through the management console to install the agent home Machine security checks, the agent collects data, the management console analyze data and generate reports. Achieve its security configuration found in The purpose of the issue, in addition to a host of important data security check of the product itself and its interior is protected by assets. Check the project includes several common areas. configuration checks, system resources (CPU, memory, disk), anti-virus software, processes, services, System shared resources, startup items, peripheral interface devices, system accounts, software installation, hardware configuration, network connection, system vulnerabilities. Host Security checks products to C/S standalone deployment or deployment, and perform security functions. Its goal is security security check Installed engine host.

Tips & Frequently Asked Questions:

Question 1: How long will the true-PDF of GA/T 1142-2014_English be delivered?

Answer: Upon your order, we will start to translate GA/T 1142-2014_English as soon as possible, and keep you informed of the progress. The lead time is typically 2 ~ 4 working days. The lengthier the document the longer the lead time.

Question 2: Can I share the purchased PDF of GA/T 1142-2014_English with my colleagues?

Answer: Yes. The purchased PDF of GA/T 1142-2014_English will be deemed to be sold to your employer/organization who actually pays for it, including your colleagues and your employer's intranet.

Question 3: Does the price include tax/VAT?

Answer: Yes. Our tax invoice, downloaded/delivered in 9 seconds, includes all tax/VAT and complies with 100+ countries' tax regulations (tax exempted in 100+ countries) -- See Avoidance of Double Taxation Agreements (DTAs): List of DTAs signed between Singapore and 100+ countries

Question 4: Do you accept my currency other than USD?

Answer: Yes. If you need your currency to be printed on the invoice, please write an email to [email protected]. In 2 working-hours, we will create a special link for you to pay in any currencies. Otherwise, follow the normal steps: Add to Cart -- Checkout -- Select your currency to pay.