US$139.00 ยท In stock Delivery: <= 3 days. True-PDF full-copy in English will be manually translated and delivered via email. GA/T 1252-2015: Fundamental requirements for computer operating system security configuration of police information network Status: Valid
Standard ID | Contents [version] | USD | STEP2 | [PDF] delivered in | Standard Title (Description) | Status | PDF |
GA/T 1252-2015 | English | 139 |
Add to Cart
|
3 days [Need to translate]
|
Fundamental requirements for computer operating system security configuration of police information network
| Valid |
GA/T 1252-2015
|
PDF similar to GA/T 1252-2015
Basic data Standard ID | GA/T 1252-2015 (GA/T1252-2015) | Description (Translated English) | Fundamental requirements for computer operating system security configuration of police information network | Sector / Industry | Public Security (Police) Industry Standard (Recommended) | Classification of Chinese Standard | A90 | Classification of International Standard | 35.020 | Word Count Estimation | 6,622 | Date of Issue | 2015-05-26 | Date of Implementation | 2015-05-26 | Regulation (derived from) | Notice on Publication of Public Safety Industry Standard (Year 2015); Industry Standard Record Announcement No. 2016 (No. 197) | Issuing agency(ies) | Ministry of Public Security | Summary | This standard specifies the security configuration requirements of the public security information network computer terminals and server operating systems such as identity authentication, access control, data capture control, intrusion prevention, residual information removal, application security and security audit. This standard applies to public security information network computer terminal and server operating system security management. |
GA/T 1252-2015: Fundamental requirements for computer operating system security configuration of police information network ---This is a DRAFT version for illustration, not a final translation. Full copy of true-PDF in English version (including equations, symbols, images, flow-chart, tables, and figures etc.) will be manually/carefully translated upon your order.
Fundamental requirements for computer operating system security configuration of police information network
ICS 35.020
A90
People's Republic of China Public Security Industry Standards
Public Security Information Network
Computer operating system requirements for basic security configuration
Issued on. 2015-05-26
2015-05-26 implementation
People's Republic of China Ministry of Public Security
Foreword
This standard was drafted in accordance with GB/T 1.1-2009 given rules.
The standard proposed by the Ministry of Science and Technology Information Bureau.
This standard by the Ministry of Public Security computer processing Standardization Technical Committee and Information Technology.
This standard was drafted. the Ministry of Science and Technology Information Bureau, the State Information Center, Research Institute of Ministry of Public Security third, Chen Rui Shanghai Information Technology
the company.
The main drafters of this standard. Li Jiang, Bei Liu, Xu Tao, Liu Aijiang, Lixin You, Shao Xudong, Chen Jiaming.
Public Security Information Network
Computer operating system requirements for basic security configuration
1 Scope
This standard specifies the identification of Public Security Information Network computer terminals and server operating systems, access control, resource control, intrusion prevention
Fan, clear the remaining information, application security, and security auditing security configuration basic requirements.
This standard applies to public security information network computer terminals and server operating system security management.
2 Acronyms
The following abbreviations apply to this document.
IPC. Inter Process Communication (InterProcessCommunication)
RPC. Remote Procedure Call Protocol (RemoteProcedureCalProtocol)
SNMP. SNMP (SimpleNetworkManagementProtocol)
SYN-ACK. Sync - Confirm (Synchronous-Acknowledgement)
WIFI. wireless fidelity (WirelessFidelity)
3 Configure the basic requirements identification
Authentication configuration should meet the following basic requirements.
a) limit the operating system failed consecutive login account number, after which the number of the account is locked;
b) setting exceeds limit illegal logins after locking time accounts;
c) Setting the operating system account password.
1) sufficient length;
2) include uppercase and lowercase letters, numbers or special characters;
3) Set the Validity Period;
d) visual intelligence enabled biometric authentication or certificate authentication and other ways;
e) when the system wakes from hibernation or suspended state prompted for a password.
Access Control Configuration 4 Basic requirements
Access control configuration should meet the following basic requirements.
a) disable the operating system's built-guest accounts and useless accounts, any person account (Everyone) and Support Account (Sup-
port);
b) prohibit anonymous accounts access to the operating system;
c) rename the default operating system account name, disable the default password for the account;
d) restrict remote access, volume maintenance tasks, enumerate account information, the process of setting priorities, change the computer's internal clock, commissioning
Accounts range system, driver installation or monitoring system performance and other rights;
e) to enable safe passage feature when remote access.
Tips & Frequently Asked Questions:Question 1: How long will the true-PDF of GA/T 1252-2015_English be delivered?Answer: Upon your order, we will start to translate GA/T 1252-2015_English as soon as possible, and keep you informed of the progress. The lead time is typically 1 ~ 3 working days. The lengthier the document the longer the lead time. Question 2: Can I share the purchased PDF of GA/T 1252-2015_English with my colleagues?Answer: Yes. The purchased PDF of GA/T 1252-2015_English will be deemed to be sold to your employer/organization who actually pays for it, including your colleagues and your employer's intranet. Question 3: Does the price include tax/VAT?Answer: Yes. Our tax invoice, downloaded/delivered in 9 seconds, includes all tax/VAT and complies with 100+ countries' tax regulations (tax exempted in 100+ countries) -- See Avoidance of Double Taxation Agreements (DTAs): List of DTAs signed between Singapore and 100+ countriesQuestion 4: Do you accept my currency other than USD?Answer: Yes. If you need your currency to be printed on the invoice, please write an email to [email protected]. In 2 working-hours, we will create a special link for you to pay in any currencies. Otherwise, follow the normal steps: Add to Cart -- Checkout -- Select your currency to pay.
|