HOME   Cart(0)   Quotation   About-Us Policy PDFs Standard-List
www.ChineseStandard.net Database: 189759 (19 Oct 2025)

GA/T 1390.2-2017 English PDF

US$789.00 · In stock
Delivery: <= 7 days. True-PDF full-copy in English will be manually translated and delivered via email.
GA/T 1390.2-2017: Information security technology—General requirements for classified protection of cyber security—Part 2: Special security requirements for cloud computing
Status: Valid
Standard IDContents [version]USDSTEP2[PDF] delivered inStandard Title (Description)StatusPDF
GA/T 1390.2-2017English789 Add to Cart 7 days [Need to translate] Information security technology—General requirements for classified protection of cyber security—Part 2: Special security requirements for cloud computing Valid GA/T 1390.2-2017

PDF similar to GA/T 1390.2-2017


Standard similar to GA/T 1390.2-2017

GM/T 0130   GM/T 0124   GA/T 1389   GA/T 1390.5   GA/T 1390.3   

Basic data

Standard ID GA/T 1390.2-2017 (GA/T1390.2-2017)
Description (Translated English) Information security technology��General requirements for classified protection of cyber security��Part 2: Special security requirements for cloud computing
Sector / Industry Public Security (Police) Industry Standard (Recommended)
Classification of Chinese Standard L80
Classification of International Standard 35.40
Word Count Estimation 34,364
Date of Issue 2017-05-08
Date of Implementation 2017-05-08
Issuing agency(ies) Ministry of Public Security

GA/T 1390.2-2017: Information security technology—General requirements for classified protection of cyber security—Part 2: Special security requirements for cloud computing


---This is a DRAFT version for illustration, not a final translation. Full copy of true-PDF in English version (including equations, symbols, images, flow-chart, tables, and figures etc.) will be manually/carefully translated upon your order.
Information security technology-General requirements for classified protection of cyber security-Part 2. Special security requirements for cloud computing ICS 35.40 L80 People's Republic of China public safety industry standards Information Security Technology Network Security Level Protection Basics Requirements Part 2. Cloud Computing Security Extensions Requirements cybersecurity-Part 2.Specialsecurityrequirementsforcloudcomputing 2017-05-08 Posted 2017-05-08 Implementation Ministry of Public Security of People's Republic of China released Directory Foreword V. Introduction Ⅵ 1 Scope 1 2 Normative references 1 3 Terms and definitions 1 4 Cloud Computing Security Overview 2 4.1 cloud computing platform 2 4.2 cloud computing platform rating 3 5 Level 1 safety requirements 3 5.1 Technical Requirements 3 5.1.1 Physical and Environmental Safety 3 5.1.2 Network and Communication Security 3 5.1.2.1 Network Architecture 3 5.1.2.2 Access Control 3 5.1.2.3 intrusion prevention 4 5.1.2.4 Security Audit 4 5.1.3 equipment and computing security 4 5.1.3.1 Identification 4 5.1.3.2 Access Control 4 5.1.3.3 Security Audit 4 5.1.3.4 intrusion prevention 4 5.1.3.5 Resource Control 4 5.1.3.6 Mirroring and Snapshot Protection 4 5.1.4 Application and Data Security 4 5.1.4.1 Security Audit 4 5.1.4.2 Resource Control 5 5.1.4.3 Interface Security 5 5.1.4.4 Data Integrity 5 5.1.4.5 Data Confidentiality 5 5.1.4.6 Data backup and recovery 5 5.1.4.7 Residual Information Protection 5 5.2 Management Requirements 5 5.2.1 Security management agencies and personnel 5 5.2.1.1 Authorization 5 5.2.1.2 Personnel recruitment 5 5.2.2 Safety Construction Management 5 5.2.2.1 test and acceptance 5 5.2.2.2 Cloud service provider choice 5.2.2.3 Supply Chain Management 6 5.2.3 Safe Operation Management 6 5.2.3.1 Environmental Management 5.2.3.2 Monitoring and Audit Management 6 6 Level 2 safety requirements 6 6.1 Technical Requirements 6 6.1.1 Physical and Environmental Safety 6 6.1.2 Network and Communication Security 6 6.1.2.1 Network Architecture 6 6.1.2.2 Access Control 7 6.1.2.3 Intrusion Prevention 7 6.1.2.4 Security Audit 7 6.1.3 Equipment and Computing Security 7 6.1.3.1 Identification 7 6.1.3.2 Access Control 7 6.1.3.3 Security Audit 7 6.1.3.4 Intrusion Prevention 7 6.1.3.5 Resource Control 7 6.1.3.6 Mirroring and Snapshot Protection 7 6.1.4 Application and Data Security 8 6.1.4.1 Security Audit 8 6.1.4.2 Resource Control 8 6.1.4.3 Interface Security 8 6.1.4.4 Data Integrity 8 6.1.4.5 Data Confidentiality 8 6.1.4.6 Data backup and recovery 8 6.1.4.7 Residual Information Protection 8 6.2 Management Requirements 8 6.2.1 Security management agencies and personnel 8 6.2.1.1 Authorization 8 6.2.1.2 Personnel recruitment 8 6.2.2 Safety Construction Management 9 6.2.2.1 Test acceptance 9 6.2.2.2 Cloud service provider choice 6.2.2.3 Supply Chain Management 9 6.2.3 Safe Operation Management 9 6.2.3.1 Environmental Management 9 6.2.3.2 Monitoring and Audit Management 9 7 Level 3 Safety Requirements 9 7.1 Technical Requirements 9 7.1.1 Physical and Environmental Safety 9 7.1.2 Network and Communication Security 10 7.1.2.1 Network Architecture 10 7.1.2.2 Access Control 10 7.1.2.3 Intrusion Prevention 10 7.1.2.4 Security Audit 10 7.1.3 Equipment and Computing Security 10 7.1.3.1 Identification 10 7.1.3.2 Access Control 11 7.1.3.3 Security Audit 11 7.1.3.4 Intrusion Prevention 11 7.1.3.5 Malicious Code Prevention 11 7.1.3.6 Resource Control 11 7.1.3.7 Mirroring and Snapshot Protection 11 7.1.4 Application and Data Security 11 7.1.4.1 Security Audit 11 7.1.4.2 Resource Control 12 7.1.4.3 Interface Security 12 7.1.4.4 Data Integrity 12 7.1.4.5 Data Confidentiality 12 7.1.4.6 Data backup and recovery 12 7.1.4.7 Residual Information Protection 12 7.2 Management Requirements 12 7.2.1 Security management agencies and personnel 12 7.2.1.1 Authorization 12 7.2.1.2 Personnel recruitment 12 7.2.2 Security Construction Management 13 7.2.2.1 Security Program Design 13 7.2.2.2 Test acceptance 13 7.2.2.3 Cloud Service Provider Selection 13 7.2.2.4 Supply Chain Management 13 7.2.3 Safe Operation Management 13 7.2.3.1 Environmental Management 13 7.2.3.2 Configuration Management 13 7.2.3.3 Monitoring and Audit Management 14 Level 4 Safety Requirements 14 8.1 Technical Requirements 8.1.1 Physical and Environmental Safety 14 8.1.2 Network and Communication Security 14 8.1.2.1 Network Architecture 14 8.1.2.2 Access Control 14 8.1.2.3 Intrusion Prevention 15 8.1.2.4 Security Audit 15 8.1.3 Equipment and Computing Security 15 8.1.3.1 Identification 15 8.1.3.2 Access Control 15 8.1.3.3 Security Audit 15 8.1.3.4 Intrusion Prevention 15 8.1.3.5 Malicious Code Prevention 15 8.1.3.6 Resource Control 16 8.1.3.7 Mirroring and Snapshot Protection 16 8.1.4 Application and Data Security 16 8.1.4.1 Security Audit 16 8.1.4.2 Resource Control 16 8.1.4.3 Interface Security 16 8.1.4.4 Data Integrity 16 8.1.4.5 Data Confidentiality 16 8.1.4.6 Data backup and recovery 17 8.1.4.7 Residual Information Protection 17 8.2 Management Requirements 17 8.2.1 Security Management Agency and Personnel 17 8.2.1.1 Authorization 17 8.2.1.2 Personnel Recruitment 17 8.2.2 Security Construction Management 17 8.2.2.1 Security Program Design 17 8.2.2.2 Test Acceptance 17 8.2.2.3 Cloud Provider Selection 17 8.2.2.4 Supply Chain Management 18 8.2.3 Safe Operation Management 18 8.2.3.1 Environmental Management 18 8.2.3.2 Configuration Management 18 8.2.3.3 Monitoring and Audit Management 18 Appendix A (Informative) Cloud Computing Platform Security Threats 19 Appendix B (normative) security management responsibilities of different service models 21 Appendix C (normative) This part of the object is applicable 24 References 25

Foreword

GA/T 1390 "Information Security Technology Network Security Level Protection Basics" has been or is planned to release the following sections. --- Part 1. General requirements for safety; --- Part 2. Cloud computing security extension requirements; --- Part 3. Mobile Internet Security Extension Requirements; --- Part 4. IoT Security Extension Requirements; --- Part 5. Industrial control safety requirements for expansion; --- Part 6. Big Data Security Extensions Requirements. This part of GA/T 1390 Part 2. This section drafted in accordance with GB/T 1.1-2009 given rules. This section proposed by the Ministry of Public Security Cyber Security. This part of the Ministry of Public Security Information System Security Standardization Technical Committee. This part of the drafting unit. Ministry of Public Security Information Security Rating Protection Evaluation Center, National Information Center, Ali Cloud Computing Co., Ltd., Chinese Academy of Sciences Information Engineering Institute, Hangzhou H3C Technologies Co., Ltd., Huawei Technologies Co., Ltd., Venus Information Technology Co., Ltd. The main drafters of this section. Zhang Zhenfeng, Ding Zhaohui, Li Ming, Ren Weihong, Hu Juan, Shen Yongbo, Su Yanfang, Chen Feng, Li Yu, Liu Jing, Chen Xuexiu, Gao Yanan, Chen Chi, Yu Jing, Yao Guofu, Huang Min, Duan Weiheng, Guo Chunmei.

Introduction

GB/T 22239-2008 "Information Security Technology Information System Security Level Protection Requirements" in the protection of information security level The process of work has played a very important role, is widely used in various industries and fields to carry out the construction of information security level protection Change and grade evaluation work, but with the development of information technology, GB/T 22239-2008 in timeliness, ease of use, maneuverability required To further improve. In order to adapt to the mobile Internet, cloud computing, big data, Internet of Things and industrial control and other new technologies, the new application of information security level protection Work to be carried out, the need to GB/T 22239-2008 revised, revised ideas and methods for mobile Internet, cloud computing, big data, Internet of Things and industrial control and other new technologies, new application areas proposed extended security requirements. Information Security Technology Network Security Level Protection Basics Requirements Part 2. Cloud Computing Security Extensions Requirements

1 Scope

This part of GA/T 1390 specifies the security protection of cloud computing platforms and cloud tenant business application systems with different levels of security Claim. This section applies to guide the classification of non-classified cloud computing platform and cloud tenant business application system security construction and supervision and management.

2 Normative references

The following documents for the application of this document is essential. For dated references, only the dated version applies to this article Pieces. For undated references, the latest edition (including all amendments) applies to this document. Computer Information Systems - Security Protection Classification Guidelines GB/T 22239 Information security technology Information system security level protection basic requirements Information security technology information system security level protection grading guide Information technology - Security terminology Information Security Technology Cloud Computing Service Security Guide Information security technology Cloud computing service security capability requirements

3 Terms and definitions

GB 17859-1999, GB/T 25069-2010 and GB/T 31168-2014 as defined by the following terms and definitions apply to This document. For ease of use, some of the terms and definitions in GB/T 31168-2014 are listed below. 3.1 Cloud computing cloudcomputing Access scalable, flexible pool of physical or virtual shared resources over the network and self-service access and management of resources on demand. [GB/T 31168-2014, Definition 3.1] 3.2 Cloud computing infrastructure cloudcomputinginfrastructure An infrastructure of cloud computing that consists of hardware resources and resource abstraction control components. Note 1. Hardware resources include all physical computing resources including servers (CPUs, memory, etc.), storage components (hard disks, etc.), network components (routers, fire protection Walls, switches, network connections and interfaces, etc.) and other physical computing foundation elements. Resource abstraction control component to physical computing resources for software pumping Like, cloud providers provide and manage access to physical compute resources through these components. Note 2. Rewrite GB/T 31168-2014, the definition of 3.5. 3.3 Cloud computing platform cloudcomputingplatform Cloud service provider cloud computing infrastructure and the collection of service software on it. Remark GB/T 31168-2014, the definition of 3.6.

Tips & Frequently Asked Questions:

Question 1: How long will the true-PDF of GA/T 1390.2-2017_English be delivered?

Answer: Upon your order, we will start to translate GA/T 1390.2-2017_English as soon as possible, and keep you informed of the progress. The lead time is typically 4 ~ 7 working days. The lengthier the document the longer the lead time.

Question 2: Can I share the purchased PDF of GA/T 1390.2-2017_English with my colleagues?

Answer: Yes. The purchased PDF of GA/T 1390.2-2017_English will be deemed to be sold to your employer/organization who actually pays for it, including your colleagues and your employer's intranet.

Question 3: Does the price include tax/VAT?

Answer: Yes. Our tax invoice, downloaded/delivered in 9 seconds, includes all tax/VAT and complies with 100+ countries' tax regulations (tax exempted in 100+ countries) -- See Avoidance of Double Taxation Agreements (DTAs): List of DTAs signed between Singapore and 100+ countries

Question 4: Do you accept my currency other than USD?

Answer: Yes. If you need your currency to be printed on the invoice, please write an email to [email protected]. In 2 working-hours, we will create a special link for you to pay in any currencies. Otherwise, follow the normal steps: Add to Cart -- Checkout -- Select your currency to pay.