|
US$809.00 · In stock Delivery: <= 5 days. True-PDF full-copy in English will be manually translated and delivered via email. GA/T 403.2-2014: Information security technology. Security technical requirements for intrusion detection products. Part 2: Host. based products GA/T 403.2: Evolution and historical versions
| Standard ID | Contents [version] | USD | STEP2 | [PDF] delivered in | Standard Title (Description) | Status | PDF |
| GA/T 403.2-2014 | English | 809 |
Add to Cart
|
5 days [Need to translate]
|
Information security technology. Security technical requirements for intrusion detection products. Part 2: Host. based products
| |
GA/T 403.2-2014
|
| GA/T 403.2-2002 | English | 559 |
Add to Cart
|
3 days [Need to translate]
|
Information technology -- Technical requirements for intrusion detection products -- Part 2: Host-based products
| Obsolete |
GA/T 403.2-2002
|
PDF similar to GA/T 403.2-2014
Basic data | Standard ID | GA/T 403.2-2014 (GA/T403.2-2014) | | Description (Translated English) | Information security technology. Security technical requirements for intrusion detection products. Part 2: Host. based products | | Sector / Industry | Public Security (Police) Industry Standard (Recommended) | | Classification of Chinese Standard | A90 | | Classification of International Standard | 35.240 | | Word Count Estimation | 23,224 | | Date of Issue | 2014-03-24 | | Date of Implementation | 2014-03-24 | | Older Standard (superseded by this standard) | GA/T 403.2-2002 | | Quoted Standard | GB 17859-1999; GB/T 18336.1-2008; GB/T 25069-2010; GB/T 18336.2-2008; GB/T 18336.3-2008 | | Regulation (derived from) | Announcement on Releasing Public Safety Industry Standard (Year of 2014) | | Issuing agency(ies) | Ministry of Public Security | | Summary | This standard specifies the host-based intrusion detection products, security functional requirements, security requirements and grade requirements. It is suitable for the design, development and detection of host-based intrusion detection products. |
GA/T 403.2-2014: Information security technology. Security technical requirements for intrusion detection products. Part 2: Host. based products ---This is a DRAFT version for illustration, not a final translation. Full copy of true-PDF in English version (including equations, symbols, images, flow-chart, tables, and figures etc.) will be manually/carefully translated upon your order.
Information security technology.Security technical requirements for intrusion detection products.Part 2. Host.based products
ICS 35.240
A90
People's Republic of China Public Security Industry Standards
Replacing GA/T 403.2-2002
Information Security Technology
Intrusion detection products safety technical requirements
Part 2. Host-based products
Part 2. Host-basedproducts
Issued on. 2014-03-24
2014-03-24 implementation
People's Republic of China Ministry of Public Security
Table of Contents
Introduction Ⅲ
Introduction Ⅳ
1 Scope 1
2 Normative references 1
3 Terms and definitions
4 Host Intrusion Detection Product Description 1
5 1 Security Environment
5.1 Hypothesis 1
5.2 Threat 2
5.3 2 Organization for Security Policy
2 6 security purposes
6.1 Product Safety Objective 2
6.2 Environmental security objectives 3
7 Security functional requirements 3
7.1 data acquisition function claim 3
7.2 intrusion analysis Claim 4
7.3 Intrusion Response Feature Requirements 4
7.4 Management Control functional requirements 4
7.5 test results processing requirements 5
5 7.6 product flexibility requirements
7.7 authentication 6
7.8 administrators to manage 6
7.9 Security Audit 7
7.10 Data Security Event 7
7.11 Communications Security 7
7.12 8 self-protection
7.13 8 Self-monitoring
8 8 Security assurance requirements
8.1 Configuration Management 8
8.2 Delivery and Operation 9
8.3 Development 9
8.4 guidance document 11
11 8.5 Life Cycle Support
8.6 Test 11
8.7 Vulnerability assessment 12
9 basic principles of technical requirements 13
9.1 Security functional requirements Fundamentals 13
9.2 Security assurance requirements 15 Fundamentals
10 Classification of claim 15
10.1 Overview 15
10.2 Classification of security functional requirements 15
10.3 Classification of security assurance requirements 17
Foreword
GA/T 403 "information security technology intrusion detection product safety technical requirements" is divided into two parts.
--- Part 1. network products;
--- Part 2. Host products.
This section GA/T 403 Part 2.
This section drafted in accordance with GB/T 1.1-2009 given rules.
This Part replaces GA/T 403.2-2002 "IT intrusion detection products safety - Part 2. Host-based production
Goods ", compared with the GA/T 403.2-2002 main technical changes are as follows.
--- Standard name was changed to "information security technology intrusion detection products safety - Part 2. Host products";
--- Increased Host-based intrusion detection product description (see Chapter 4);
--- Increase the security environment, including the assumptions, threats and organizational security policies (see Chapter 5);
--- Increased security purposes, including the purpose of product safety and environmental safety purposes (see Chapter 6);
--- Remove the host intrusion detection product performance requirements (see the 2002 edition, Chapter 7);
--- Deleted the database support (see the 2002 version of 6.1.5.5);
--- Modify the content of security functional requirements (see Chapter 7, Chapter 8, 2002 edition);
--- Increase the technical requirements of the basic principles, including the basic principles of security functional requirements and security assurance requirements for the basic principles (see Chapter 9).
Please note that some of the content of this document may involve patents. Release mechanism of the present document does not assume responsibility for the identification of these patents.
This part is proposed by the Ministry of Public Security Network Security Protection Agency.
This part of the jurisdiction of the Ministry of Public Security Information System Standardization Technical Committee.
This section drafted by. Ministry of Public Security of Computer Information System Security Product Quality Supervision and Inspection Center, Blue Shield Information Security Technology Co. Shares
Companies, Third Institute of Ministry of Public Security.
The main drafters of this section. a good song, Wuqi Cong, Li, Gu Jian, Hu Weina, Zhao, Yang Chen Zhong.
This part of the standard replaces the previous editions are.
--- GA/T 403.2-2002.
Introduction
GA/T in this part 403 is described in detail with the host intrusion detection products safe environment-related assumptions, threats and organizational security policies
Strategy, defines the destination host intrusion detection security products and supporting environment, demonstrated by the basic principles of security functional requirements and can be traced back
Products covered security purposes, for security purposes can be traced back cover and secure environment-related assumptions, threats and organizational security policies.
This section basically level with reference to the GB/T 18336.3-2008 prescribed level EAL2 security assurance requirements, and enhance the level at EAL4 level
Security assurance requirements based on the vulnerability analysis requires upgrade to an attacker can withstand moderate attack potential attack.
This section only gives a Host-based intrusion detection products should meet the technical requirements of safety, but for Host-based intrusion detection products of specific skills
Art implementations, a method is not required.
Information Security Technology
Intrusion detection products safety technical requirements
Part 2. Host-based products
1 Scope
GA/T 403 provisions of this part of the Host-based intrusion detection products, security functional requirements, security assurance requirements and grading requirements.
This section applies to the design, development and testing Host-based intrusion detection products.
2 Normative references
The following documents for the application of this document is essential. For dated references, only the dated version suitable for use herein
Member. For undated references, the latest edition (including any amendments) applies to this document.
GB 17859-1999 computer information system security protection classification criterion
GB/T 18336-2008 (all parts), Information technology - Security techniques - Information Technology Security Evaluation Guidelines
GB/T 25069-2010 Information security technology terms
3 Terms and Definitions
GB 17859-1999, terms and definitions GB/T 18336-2008 (all parts) and GB/T 25069-2010 defined apply
This document.
4 Host Intrusion Detection Product Description
Host-based intrusion detection products to system logs, application logs as a data source, or by other means (such as monitoring systems tune
Use) to collect information from the target host on the analysis, which found abnormal behavior Intrusion Detection System. Host-based intrusion detection products through
Often as a standalone version, installed on the monitored host.
5 Security Environment
5.1 Suppose
Host-based intrusion detection products related assumptions security environment as shown in Table 1.
Table 1 is assumed
If the name is assumed Description
Physical access
Product processing resources should be limited within controlled access to devices to prevent unauthorized physical access. All implementation of product safety
Full policy-related hardware and software shall be protected from unauthorized physical changes
Human capacity authorized administrator is harmless, well-trained, and follow the Administrator's Guide
Tips & Frequently Asked Questions:Question 1: How long will the true-PDF of GA/T 403.2-2014_English be delivered?Answer: Upon your order, we will start to translate GA/T 403.2-2014_English as soon as possible, and keep you informed of the progress. The lead time is typically 3 ~ 5 working days. The lengthier the document the longer the lead time. Question 2: Can I share the purchased PDF of GA/T 403.2-2014_English with my colleagues?Answer: Yes. The purchased PDF of GA/T 403.2-2014_English will be deemed to be sold to your employer/organization who actually pays for it, including your colleagues and your employer's intranet. Question 3: Does the price include tax/VAT?Answer: Yes. Our tax invoice, downloaded/delivered in 9 seconds, includes all tax/VAT and complies with 100+ countries' tax regulations (tax exempted in 100+ countries) -- See Avoidance of Double Taxation Agreements (DTAs): List of DTAs signed between Singapore and 100+ countriesQuestion 4: Do you accept my currency other than USD?Answer: Yes. If you need your currency to be printed on the invoice, please write an email to [email protected]. In 2 working-hours, we will create a special link for you to pay in any currencies. Otherwise, follow the normal steps: Add to Cart -- Checkout -- Select your currency to pay. Question 5: Should I purchase the latest version GA/T 403.2-2014?Answer: Yes. Unless special scenarios such as technical constraints or academic study, you should always prioritize to purchase the latest version GA/T 403.2-2014 even if the enforcement date is in future. Complying with the latest version means that, by default, it also complies with all the earlier versions, technically.
|