|
US$689.00 · In stock Delivery: <= 7 days. True-PDF full-copy in English will be manually translated and delivered via email. GA/T 1390.3-2017: Information security technology—General requirements for classified protection of cyber security—Part 3: Special security requirements for mobile interconnection Status: Valid
| Standard ID | Contents [version] | USD | STEP2 | [PDF] delivered in | Standard Title (Description) | Status | PDF |
| GA/T 1390.3-2017 | English | 689 |
Add to Cart
|
7 days [Need to translate]
|
Information security technology—General requirements for classified protection of cyber security—Part 3: Special security requirements for mobile interconnection
| Valid |
GA/T 1390.3-2017
|
PDF similar to GA/T 1390.3-2017
Basic data | Standard ID | GA/T 1390.3-2017 (GA/T1390.3-2017) | | Description (Translated English) | Information security technology��General requirements for classified protection of cyber security��Part 3: Special security requirements for mobile interconnection | | Sector / Industry | Public Security (Police) Industry Standard (Recommended) | | Classification of Chinese Standard | L80 | | Classification of International Standard | 35.040 | | Word Count Estimation | 30,393 | | Date of Issue | 2017-05-08 | | Date of Implementation | 2017-05-08 | | Issuing agency(ies) | Ministry of Public Security |
GA/T 1390.3-2017: Information security technology—General requirements for classified protection of cyber security—Part 3: Special security requirements for mobile interconnection ---This is a DRAFT version for illustration, not a final translation. Full copy of true-PDF in English version (including equations, symbols, images, flow-chart, tables, and figures etc.) will be manually/carefully translated upon your order.
Information security technology-General requirements for classified protection of cyber security-Part 3. Special security requirements for mobile interconnection
ICS 35.040
L80
People's Republic of China public safety industry standards
Information Security Technology Network Security Level Protection Basics
Requirements Part 3. Mobile Internet Security Extensions Requirements
protectionofcybersecurity-Part 3.Specialsecurityrequirementsfor
2017-05-08 Posted
2017-05-08 Implementation
Ministry of Public Security of People's Republic of China released
Directory
Foreword Ⅲ
Introduction IV
1 Scope 1
2 Normative references 1
3 Terms and definitions 1
4 Abbreviations 2
5 Overview of hierarchical protection objects using mobile Internet technology 2
5.1 Safety General Requirements 2
5.2 Level protection object structure 2
5.3 Protection Elements 3
5.4 Protection object rating 3
6 Level 1 Safety Requirements 3
6.1 Technical Requirements 3
6.1.1 Physical and Environmental Safety 3
6.1.2 Network and Communication Security 3
6.1.3 Equipment and computational safety 3
6.1.4 Application and Data Security 4
6.2 Management Requirements 4
6.2.1 Security Strategy and Management System 4
6.2.2 Security management agencies and personnel 4
6.2.3 Safety Construction Management 4
6.2.4 Safe Operation Management 5
7 Level 2 safety requirements 5
7.1 Technical Requirements 5
7.1.1 Physical and Environmental Safety 5
7.1.2 Network and Communication Security 5
7.1.3 Equipment and Computing Security 6
7.1.4 Application and Data Security 7
7.2 Management Requirements 7
7.2.1 Security Strategy and Management System 7
7.2.2 Security management agencies and personnel 8
7.2.3 Safety Construction Management 8
7.2.4 Safe Operation Management 9
Level 3 safety requirements
8.1 Technical Requirements 9
8.1.1 Physical and Environmental Safety 9
8.1.2 Network and Communication Security 10
8.1.3 Equipment and Computing Security 11
8.1.4 Application and Data Security 12
8.2 Management Requirements 12
8.2.1 Security Strategy and Management System 12
8.2.2 Security management agencies and personnel 13
8.2.3 Safety Construction Management 13
8.2.4 Safe Operation Management 14
Level 4 safety requirements
9.1 Technical Requirements
9.1.1 Physical and Environmental Safety 16
9.1.2 Network and Communication Security 16
9.1.3 Equipment and Computing Security 17
9.1.4 Application and Data Security 18
9.2 Management Requirements 19
9.2.1 Security Strategy and Management System 19
9.2.2 Security management agencies and personnel 19
9.2.3 Safety Construction Management 19
9.2.4 Safe Operation Management 21
Level 5 Safety Requirements 22
References 23
Foreword
GA/T 1390 "Information Security Technology Network Security Level Protection Basics" has been or is planned to release the following sections.
--- Part 1. General requirements for safety;
--- Part 2. Cloud computing security extension requirements;
--- Part 3. Mobile Internet Security Extension Requirements;
--- Part 4. IoT Security Extension Requirements;
--- Part 5. Industrial control safety requirements for expansion;
--- Part 6. Big Data Security Extensions Requirements.
This part is the third part of GA/T 1390.
This section drafted in accordance with the specifications given GB/T 1.1-2009.
This section proposed by the Ministry of Public Security Cyber Security.
This part of the Ministry of Public Security Information System Security Standardization Technical Committee proposed and centralized.
This section drafted unit. Beijing Ding Pu Technology Co., Ltd., Ministry of Public Security Institute of the Third, Beijing University of Technology, Industrial Control System
Security Engineering National Engineering Laboratory.
The main drafters of this section. Wang Jiangbo, Yu Qing, Zhang Zongxi, Ren Weihong, Yu Dongsheng, Zhao Yong, Du Jing, Zhou Ying, Xie Chaihai.
Introduction
In order to adapt to the mobile Internet, cloud computing, big data, Internet of Things and industrial control and other new technologies, the new application of information security level protection
Work carried out, the Ministry of Public Security Information System Security Standardization Technical Committee proposed for the mobile Internet, cloud computing, big data, Internet of Things and industry
Control and other new technologies, new applications to develop a series of public safety industry standards.
This section is targeted at the level of protection of objects using the mobile Internet technology part of the proposed security extension requirements, so the level of protection required
At the same time comply with GB/T 22239 safety general requirements.
The future may add new sections as technology changes to address specific areas of security extension requirements.
Information Security Technology Network Security Level Protection Basics
Requirements Part 3. Mobile Internet Security Extensions Requirements
1 Scope
This part of GA/T 1390 specifies the basic protection requirements for the protection of different levels of protection using mobile Internet technology.
This section applies to guide the classification of non-classified security level object of security construction and supervision and management.
2 Normative references
The following documents for the application of this document is essential. For dated references, only the dated version applies to this article
Pieces. For undated references, the latest edition (including all amendments) applies to this document.
Computer Information Systems - Security Protection Classification Guidelines
GB/T 22239 Information security technology Information system security level protection basic requirements
Information security technology information system security level protection grading guide
Information technology - Security terminology
3 Terms and definitions
GB 17859-1999, GB/T 22239, GB/T 22240 and GB/T 25069-2010 as defined by the following terms and definitions suitable
Used in this document.
3.1
Mobile terminal mobiledevice
Terminal equipment used in the mobile service includes general purpose terminals such as smartphones, tablets and personal computers, and dedicated terminal equipment.
3.2
Wireless access device wirelessaccessdevice
The use of wireless communication technology to mobile terminals access wired network communications equipment.
Note. The wireless access equipment in this standard does not include public wireless access equipment (such as public WiFi, carrier base stations, etc.).
3.3
Wireless access gateway wirelessaccessgateway
Deployed between the wireless network and the wired network, the wired network security equipment.
3.4
Mobile application mobileapplication
The application software developed for the mobile terminal includes the application software preset by the mobile terminal and the application software provided by the Internet information service provider
Third-party applications that are downloaded, installed, and upgraded through mobile application distribution platforms such as websites and application stores.
3.5
Mobile terminal management system mobiledevicemanagementsystem
Dedicated software for mobile device management, application management and content management, including client software and server software.
Tips & Frequently Asked Questions:Question 1: How long will the true-PDF of GA/T 1390.3-2017_English be delivered?Answer: Upon your order, we will start to translate GA/T 1390.3-2017_English as soon as possible, and keep you informed of the progress. The lead time is typically 4 ~ 7 working days. The lengthier the document the longer the lead time. Question 2: Can I share the purchased PDF of GA/T 1390.3-2017_English with my colleagues?Answer: Yes. The purchased PDF of GA/T 1390.3-2017_English will be deemed to be sold to your employer/organization who actually pays for it, including your colleagues and your employer's intranet. Question 3: Does the price include tax/VAT?Answer: Yes. Our tax invoice, downloaded/delivered in 9 seconds, includes all tax/VAT and complies with 100+ countries' tax regulations (tax exempted in 100+ countries) -- See Avoidance of Double Taxation Agreements (DTAs): List of DTAs signed between Singapore and 100+ countriesQuestion 4: Do you accept my currency other than USD?Answer: Yes. If you need your currency to be printed on the invoice, please write an email to [email protected]. In 2 working-hours, we will create a special link for you to pay in any currencies. Otherwise, follow the normal steps: Add to Cart -- Checkout -- Select your currency to pay.
|