|
US$699.00 ยท In stock Delivery: <= 4 days. True-PDF full-copy in English will be manually translated and delivered via email. GA/T 1144-2014: Information security technology. Security technical requirements for unauthorized external connection monitoring products
| Standard ID | Contents [version] | USD | STEP2 | [PDF] delivered in | Standard Title (Description) | Status | PDF |
| GA/T 1144-2014 | English | 699 |
Add to Cart
|
4 days [Need to translate]
|
Information security technology. Security technical requirements for unauthorized external connection monitoring products
| |
GA/T 1144-2014
|
PDF similar to GA/T 1144-2014
Basic data | Standard ID | GA/T 1144-2014 (GA/T1144-2014) | | Description (Translated English) | Information security technology. Security technical requirements for unauthorized external connection monitoring products | | Sector / Industry | Public Security (Police) Industry Standard (Recommended) | | Classification of Chinese Standard | A90 | | Classification of International Standard | 35.240 | | Word Count Estimation | 20,221 | | Quoted Standard | GB/T 25069-2010; GB 17859-1999; GB/T 18336.1-2008; GB/T 18336.2-2008; GB/T 18336.3-2008 | | Regulation (derived from) | Notice on Publication of Public Safety Industry Standard (Year of 2014); Industry Standard Record Announcement No. 4 of 2015 (No. 184) | | Issuing agency(ies) | Ministry of Public Security | | Summary | This standard specifies the safety functional requirements, safety assurance requirements and classification requirements for non-authorized outreach monitoring products. This standard applies to the design, development and testing of non-authorized outre |
GA/T 1144-2014: Information security technology. Security technical requirements for unauthorized external connection monitoring products ---This is a DRAFT version for illustration, not a final translation. Full copy of true-PDF in English version (including equations, symbols, images, flow-chart, tables, and figures etc.) will be manually/carefully translated upon your order.
Information security technology.Security technical requirements for unauthorized external connection monitoring products
ICS 35.240
A90
People 's Republic of China Public Security Industry Standard
Information Security Technology
Technical requirements for non - authorized outreach monitoring product safety
Released.2014-03-14
2014-03-14 Implementation
Issued by the Ministry of Public Security of the People 's Republic of China
Directory
Preface III
Introduction IV
1 Scope 1
2 normative reference document 1
3 Terms and definitions 1
4 Unauthorized Outside Monitoring Product Description 1
5 security environment 2
5.1 hypothesis 2
5.2 Threats 3
5.3 Organizational Security Strategy 3
6 safe purpose 4
6.1 Product safety objectives 4
6.2 Environmental safety objectives 4
7 safety function requirements 5
7.1 controlled host management 5
7.2 Unauthorized outreach monitoring 5
7.3 Response processing 5
7.4 Component Security 6
7.5 Safety Management 6
7.6 Audit function 7
8 security requirements 8
8.1 Configuration Management 8
8.2 Delivery and Operation 9
8.3 Development 9
8.4 Guidance Document 10
8.5 life cycle support 11
8.6 Test 11
8.7 Assessment of vulnerability 12
Basic Requirements for Technical Requirements
9.1 Safety Functional Requirements Fundamentals 13
9.2 Essentials of Safety Assurance 14
Classification requirements
10.1 Overview 14
10.2 Classification of safety function requirements
10.3 Safety Assurance Requirements Level 15
Foreword
This standard is drafted in accordance with the rules given in GB/T 1.1-2009.
This standard is proposed by the Ministry of Public Security Network Security Bureau.
This standard by the Ministry of Public Security Information System Security Standardization Technical Committee.
The drafting of this standard. the Ministry of Public Security Computer Information System Security Product Quality Supervision and Inspection Center, the Ministry of Public Security Network Security Bureau,
Xiamen City, the United States and Asia Park Branch Information Co., Ltd., the Ministry of Public Security Third Institute.
The main drafters of this standard. Zou Chunming, Yu You, Lu Lei, Wu Qicong, Lu Zhen, Gu Jian, Chen Fen, Zhang Yongguang
Introduction
This standard describes in detail the assumptions, threats, and organizational security policies associated with non-authorized outreach monitoring of the product's security environment,
The purpose of the outreach monitoring product and its supporting environment is to demonstrate that the safety function requirements can be traced back and covered with product safety objectives, safety objectives
The ability to trace and cover security-related assumptions, threats, and organizational security policies.
The basic level of this standard refers to the GB/T 18336.3-2008 in the provisions of the EAL2 level security requirements, enhanced level in the EAL4 level
Security assurance requirements, based on the vulnerability analysis requirements can be raised to attack the potential of attack attack attack.
This standard only gives the technical requirements for non-authorized outreach monitoring products to be met, but the specific technical aspects of non-authorized outreach monitoring products
Technology to achieve the way, methods do not do the request.
Information Security Technology
Technical requirements for non - authorized outreach monitoring product safety
1 Scope
This standard specifies the safety functional requirements, safety assurance requirements, and grading requirements for non-authorized outreach products.
This standard applies to the design, development and testing of unauthorized outreach monitoring products.
2 normative reference documents
The following documents are indispensable for the application of this document. For dated references, only the dated edition applies to this article
Pieces. For undated references, the latest edition (including all modifications) applies to this document.
Classification rules for the classification of security levels for computer information systems GB 17859-1999
GB/T 18336-2008 (all parts) Information technology Security technology Information technology security assessment criteria
Information security technical terminology GB/T 25069-2010
3 terms and definitions
GB 17859-1999, GB/T 18336-2008 (all parts) and GB/T 25069-2010 and the following terms and definitions
Applies to this document.
3.1
Unauthorized outexientconnection
The interconnection behavior of the protected network internal hosts in connection with unauthorized networks outside the security policy, including but not limited to dual
Network card, modem, ADSL, wireless card and so on.
3.2
Proxy agent
Software program, can accept the server control, to achieve the host of non-authorized outreach behavior monitoring.
3.3
Controlled host controledhost
Installed the agent, able to accept the server control of the host.
4 Unauthorized Outside Monitoring Product Description
Unlicensed outbound monitoring products are usually deployed in C/S mode, including servers and agents. Can be controlled by the server on the host
Issued a policy to monitor or block the host host in the security policy to allow the connection outside the non-authorized network behavior, and its timely positioning,
The agent can send the monitoring results and alarm information to the server.
There are two main types of network environments for non-authorized outreach monitoring products. one is an isolated network, which is physically isolated from other networks,
Usually that the network within the network through a certain way to connect to other networks that is non-authorized outreach; the second category for the controlled network, the network
And other networks are logically accessible, but access to other networks is controlled and/or auditable if the hosts within the network pass
Tips & Frequently Asked Questions:Question 1: How long will the true-PDF of GA/T 1144-2014_English be delivered?Answer: Upon your order, we will start to translate GA/T 1144-2014_English as soon as possible, and keep you informed of the progress. The lead time is typically 2 ~ 4 working days. The lengthier the document the longer the lead time. Question 2: Can I share the purchased PDF of GA/T 1144-2014_English with my colleagues?Answer: Yes. The purchased PDF of GA/T 1144-2014_English will be deemed to be sold to your employer/organization who actually pays for it, including your colleagues and your employer's intranet. Question 3: Does the price include tax/VAT?Answer: Yes. Our tax invoice, downloaded/delivered in 9 seconds, includes all tax/VAT and complies with 100+ countries' tax regulations (tax exempted in 100+ countries) -- See Avoidance of Double Taxation Agreements (DTAs): List of DTAs signed between Singapore and 100+ countriesQuestion 4: Do you accept my currency other than USD?Answer: Yes. If you need your currency to be printed on the invoice, please write an email to [email protected]. In 2 working-hours, we will create a special link for you to pay in any currencies. Otherwise, follow the normal steps: Add to Cart -- Checkout -- Select your currency to pay.
|