| Standard ID | Contents [version] | USD | STEP2 | [PDF] delivered in | Standard Title (Description) | Status | PDF |
| GA/T 672-2006 | English | RFQ |
ASK
|
7 days [Need to translate]
|
Information security technology--Evaluation criteria for terminal computer system of security classified protection
| Obsolete |
GA/T 672-2006
|
PDF similar to GA/T 672-2006
Basic data | Standard ID | GA/T 672-2006 (GA/T672-2006) | | Description (Translated English) | Information security technology--Evaluation criteria for terminal computer system of security classified protection | | Sector / Industry | Public Security (Police) Industry Standard (Recommended) | | Classification of Chinese Standard | A90 | | Classification of International Standard | 35.040 | | Word Count Estimation | 39,315 | | Date of Issue | 2006-12-28 | | Date of Implementation | 2007-02-01 | | Quoted Standard | GB 17859-1999; GB/T 20271-2006; GB/T 20272-2006; GA/T 671-2006 | | Issuing agency(ies) | Ministry of Public Security | | Summary | This standard specifies the evaluation method of the terminal computer system. This standard applies to the evaluation of the terminal computer system developed in accordance with GA/T 671-2006 "Information security technology terminal computer system security level technical requirements". |
GA/T 672-2006: Information security technology--Evaluation criteria for terminal computer system of security classified protection ---This is a DRAFT version for illustration, not a final translation. Full copy of true-PDF in English version (including equations, symbols, images, flow-chart, tables, and figures etc.) will be manually/carefully translated upon your order.
Information security technology--Evaluation criteria for terminal computer system of security classified protection
ICS 35.040
A90
People's Republic of China Public Safety Industry Standard
Information security technology
Terminal computer system security level assessment criteria
Released on December 28,.2006
2007-02-01 implementation
Ministry of Public Security
Content
Foreword I
Introduction II
1 Scope 1
2 Normative references 1
3 Terms, definitions and abbreviations 1
3.1 Terms and Definitions 1
3.2 Abbreviations 2
4 Information Security Technology Terminal Computer System Security Level Evaluation Criteria 3
4.1 First level. user independent protection level 3
4.1.1 Security Function Requirements 3
4.1.2 SSOTCS Self Security 5
4.1.3 SSOTCS Design and Implementation 5
4.2 Level 2. System Audit Protection Level 8
4.2.1 Security function requirements 8
4.2.2 SSOTCS Self-protection 14
4.2.3 SSOTCS Design and Implementation 14
4.3 Level 3. Security Mark Protection Level 19
4.3.1 Security Function Requirements 19
4.3.2 SSOTCS Self Security Protection 27
4.3.3 SSOTCS Design and Implementation 27
Reference 35
Foreword
This standard was proposed by the Ministry of Public Security Information System Security Standardization Technical Committee.
This standard is under the jurisdiction of the National Information Security Standardization Technical Committee.
This standard was drafted. Ministry of Public Security Computer Information System Security Product Quality Supervision and Inspection Center.
The main drafters of this standard. Qiu Yuhua, Gu Jian, Jing Yuyuan, Li Yi, Shen Liang, Zhang Wei, Zou Chunming, Ma Haiyan, Yu You.
Introduction
This standard is used to guide evaluators on how to evaluate terminal computer systems at various levels of security.
The terminal computer system is responsible for a large amount of data storage, processing and transmission in the computer information system, which is the closest to the user.
Contact. The security of the terminal computer system plays a vital role in the security of the entire information system. Letter at each security level
In the information system, the terminal computer system should also reach the corresponding security level.
This standard is based on the relevant requirements of the "Technical Requirements for Security Levels of Information Security Technology Terminal Computer Systems", for the first, second and third
The terminal computer system of the level proposes a specific evaluation method, which can provide guidance for testing and development of the terminal computer system.
Information security technology
Terminal computer system security level assessment criteria
1 Scope
This standard specifies the evaluation method for the terminal computer system.
This standard applies to the development of GA/T 671-2006 "Information Security Technology Terminal Computer System Security Level Technical Requirements"
Evaluation of the terminal computer system.
2 Normative references
The terms in the following documents become the terms of this standard by reference in this standard. Any dated reference document, followed by
Some amendments (not including errata content) or revisions do not apply to this standard. However, parties to agreements based on this standard are encouraged to
Whether the latest version of these files can be used. For undated references, the latest edition applies to this standard.
GB 17859-1999 Computer Information System Security Protection Level Division Guidelines
GB/T 20271-2006 Information security technology information system general safety technical requirements
GB/T 20272-2006 Information security technology operating system security technical requirements
GA/T 671-2006 Information security technology terminal computer system security level technical requirements
3 Terms, definitions and abbreviations
3.1 Terms and definitions
GB 17859-1999, GB/T 20271-2006 and GB/T 20272-2006 established and the following terms and definitions apply to
This standard.
3.1.1
A computer system used by individuals is an important part of the information system, providing support for users to access network servers. terminal
The computer system behaves in two forms, a desktop computer system and a laptop computer system. Terminal computer system
Systems, operating systems, and application systems (including tools and other application software that support users accessing web servers)
composition.
3.1.2
A property in which an entity with this property always achieves its intended purpose in the expected behavior and manner.
3.1.3
A process of computing the hash value of an entity using a cryptographic hash algorithm.
3.1.4
The hash value measured by the entity in a trusted state can be used as a basis for integrity check.
3.1.5
A trusted entity is the basis for making trusted metrics within a terminal computer system.
|