US$439.00 ยท In stock Delivery: <= 4 days. True-PDF full-copy in English will be manually translated and delivered via email. GB/T 29244-2024: Cybersecurity technology - Security specification for office devices Status: Valid GB/T 29244: Evolution and historical versions
Standard ID | Contents [version] | USD | STEP2 | [PDF] delivered in | Standard Title (Description) | Status | PDF |
GB/T 29244-2024 | English | 439 |
Add to Cart
|
4 days [Need to translate]
|
Cybersecurity technology - Security specification for office devices
| Valid |
GB/T 29244-2024
|
GB/T 29244-2012 | English | 279 |
Add to Cart
|
3 days [Need to translate]
|
Information security technology -- Basic security requirements for office devices
| Valid |
GB/T 29244-2012
|
PDF similar to GB/T 29244-2024
Basic data Standard ID | GB/T 29244-2024 (GB/T29244-2024) | Description (Translated English) | Cybersecurity technology - Security specification for office devices | Sector / Industry | National Standard (Recommended) | Classification of Chinese Standard | L80 | Classification of International Standard | 35.030 | Word Count Estimation | 22,289 | Date of Issue | 2024-09-29 | Date of Implementation | 2025-04-01 | Older Standard (superseded by this standard) | GB/T 29244-2012,GB/T 38558-2020 | Issuing agency(ies) | State Administration for Market Regulation, China National Standardization Administration |
GB/T 29244-2024: Cybersecurity technology - Security specification for office devices---This is a DRAFT version for illustration, not a final translation. Full copy of true-PDF in English version (including equations, symbols, images, flow-chart, tables, and figures etc.) will be manually/carefully translated upon your order.
ICS 35.030
CCSL80
National Standard of the People's Republic of China
Replaces GB/T 29244-2012, GB/T 38558-2020
Network security technology office equipment safety specifications
Released on 2024-09-29
2025-04-01 Implementation
State Administration for Market Regulation
The National Standardization Administration issued
Table of Contents
Preface III
1 Scope 1
2 Normative references 1
3 Terms and Definitions 1
4 Abbreviations 2
5 General 2
6 Safety technical requirements 2
6.1 Security Function Requirements 2
6.2 Security requirements 4
7 Evaluation Methods 6
7.1 Safety Function Requirements Evaluation Method 6
7.2 Security Assurance Requirements Assessment Method 8
Appendix A (Normative) Classification of office equipment and classification of safety technical requirements 11
Appendix B (Normative) Classification and evaluation methods of office equipment 14
Foreword
This document is in accordance with the provisions of GB/T 1.1-2020 "Guidelines for standardization work Part 1.Structure and drafting rules for standardization documents"
Drafting.
This document replaces GB/T 29244-2012 "Information security technology - Basic safety requirements for office equipment" and GB/T 38558-2020
Compared with GB/T 29244-2012 and GB/T 38558-2020, "Information Security Technology Office Equipment Security Test Method" has
In addition to adjustments and editorial changes, the main technical changes are as follows.
--- Added overview (see Chapter 5);
--- Changed the terms and definitions (see Chapter 3, Chapter 3 of GB/T 29244-2012 edition);
--- Added "firmware security" related requirements (see 6.1.3) and corresponding evaluation methods (see 7.1.3);
--- Added "safety assurance requirements" and corresponding assessment methods (see 6.2 and 7.2);
---Change "security audit" to "logging and auditing" (see 6.1.4, 4.3 of GB/T 29244-2012 edition);
--- Change "session" to "communication security" (see 6.1.6, 4.7 of GB/T 29244-2012 edition);
--- Change "data management" to "user data security" (see 6.1.5, 5.2 of GB/T 29244-2012 edition);
---Change "Security attribute management" to "Configuration security" (see 6.1.8, 5.1 of GB/T 29244-2012 edition).
Please note that some of the contents of this document may involve patents. The issuing organization of this document does not assume the responsibility for identifying patents.
This document was proposed and coordinated by the National Cybersecurity Standardization Technical Committee (SAC/TC260).
This document was drafted by. China Electronics Technology Standardization Institute, National Computer Network Emergency Response Technical Processing Coordination Center, National Information
Technology Security Research Center, Zhuhai Pantum Electronics Co., Ltd., Peking University, Epson (China) Co., Ltd., Fujifilm Business Innovation (China)
Co., Ltd., Changyang Technology (Beijing) Co., Ltd., Hewlett-Packard China Co., Ltd., Lenovo (Beijing) Co., Ltd., Venusstar Information
Technology Group Co., Ltd., Konica Minolta (China) Investment Co., Ltd., Canon (China) Co., Ltd., Guangdong Radio and Television Metrology and Testing Group
Co., Ltd., National Office Equipment and Consumables Quality Inspection and Testing Center (Tianjin Tianfu Testing Technology Co., Ltd.), Ideal (China) Science
Industrial Co., Ltd., Beijing Gaode Pinchuang Technology Co., Ltd., Sharp Office Equipment (Changshu) Co., Ltd., Zhuhai Tianwei Pegasus Printing Supplies Co., Ltd.
Co., Ltd., Brother (China) Commercial Co., Ltd., Hangzhou Anheng Information Technology Co., Ltd., Toshiba Tec Information Systems (Shenzhen) Co., Ltd.
Co., Ltd., H3C Technologies Co., Ltd., Beijing Shuanxing Technology Co., Ltd., Beijing Zhongke Weilan Technology Co., Ltd., Tianjin Optoelectronic Communication Technology Co., Ltd.
Co., Ltd., Institute of Software, Chinese Academy of Sciences, and State Grid Blockchain Technology (Beijing) Co., Ltd.
The main drafters of this document are. Yang Jianjun, Sun Yan, Zhang Dongju, Shangguan Xiaoli, Li Yixi, Wang Xizi, Zhao Xinqiang, Peng Jibing, Zhang Zhijun,
Chen Yunran, Xie Anming, Yu Liangwen, Zhu Qing, Zhao Hua, Yang Fengchen, Li Ruxin, Yang Tianshi, Chen Ting, Yang Chen, Tang Di, Zhang Yu, Hu Quan, Wang Zhengliang,
Fan Zhiguo, Qiao Huaixin, He Gang, Chen Xing, Wang Hengbo, Chen Yong, Wan Xiaolan, Liu Yuhong, Guo Wei, Sun Fang, Yan Min, and Shi Zhuyu.
The previous versions of this document and the documents it replaces are as follows.
---First published in.2012 as GB/T 29244-2012, and first published in 2020 as GB/T 38558-2020;
---This is the first revision.
Network security technology office equipment safety specifications
1 Scope
This document specifies the security function requirements, security assurance requirements and evaluation methods for office equipment.
This document applies to the procurement, evaluation, maintenance and management of office equipment, and also to the safe design, implementation and operation of office equipment.
2 Normative references
The contents of the following documents constitute essential clauses of this document through normative references in this document.
For referenced documents without a date, only the version corresponding to that date applies to this document; for referenced documents without a date, the latest version (including all amendments) applies to
This document.
GB/T 18336 Information technology security technology Information technology security assessment criteria
GB/T 25069 Information security technical terms
GB/T 29829 Information security technology trusted computing cryptographic support platform function and interface specification
3 Terms and definitions
The terms and definitions defined in GB/T 18336 and GB/T 25069 and the following apply to this document.
3.1
Office equipmentofficedevice
Equipment used to produce or process electronic or other media files.
Note. Office equipment mainly refers to equipment with one or more functions of printing, scanning, faxing and copying.
3.2
Administrator
A user who is authorized to manage some or all parts of an office device.
3.3
User
An entity (human or information technology entity) that operates or interacts with office equipment.
3.4
User data userdata
Data created by or for a user that does not affect the operation of the security functions of the office equipment.
Note. User data includes user document data and user function data.
3.5
Nonvolatile storage
Memory in which stored data is not lost when the power is turned off.
Note. Non-volatile memory mainly includes built-in or external hard disk, universal serial bus (USB) disk, secure digital (SD) card, and flash memory.
3.6
Firmware
Programs that implement office equipment interface communications, security functions, data parsing, image processing, engine control, etc.
|