HOME   Cart(0)   Quotation   About-Us Policy PDFs Standard-List
www.ChineseStandard.net Database: 189759 (19 Oct 2025)

GB/T 30976.2-2014 English PDF

US$529.00 · In stock
Delivery: <= 4 days. True-PDF full-copy in English will be manually translated and delivered via email.
GB/T 30976.2-2014: Industrial control system security -- Part 2: Acceptance specification
Status: Valid
Standard IDContents [version]USDSTEP2[PDF] delivered inStandard Title (Description)StatusPDF
GB/T 30976.2-2014English529 Add to Cart 4 days [Need to translate] Industrial control system security -- Part 2: Acceptance specification Valid GB/T 30976.2-2014

PDF similar to GB/T 30976.2-2014


Standard similar to GB/T 30976.2-2014

GB/T 33008.1   GB/T 33009.1   GB/T 33009.2   GB/T 41771.6   GB/T 20965   GB/T 30992   

Basic data

Standard ID GB/T 30976.2-2014 (GB/T30976.2-2014)
Description (Translated English) Industrial control system security -- Part 2: Acceptance specification
Sector / Industry National Standard (Recommended)
Classification of Chinese Standard N10
Classification of International Standard 25.040
Word Count Estimation 23,259
Date of Issue 7/24/2014
Date of Implementation 2/1/2015
Quoted Standard GB/T 2423.1-2008; GB/T 2423.2-2008; GB 3836.1; GB 3836.2; GB 3836.4; GB 4793.1-2007; GB/T 15153.1-1998; GB/T 15153.2-2000; GB/T 18018-2007; GB/T 18268.1-2010; GB/T 18272.4-2006; GB/T 25068.3-2010; GB/T 25069-2010; GB/T 30976.1-2014
Regulation (derived from) National Standards Bulletin No. 19, 2014
Issuing agency(ies) General Administration of Quality Supervision, Inspection and Quarantine of the People's Republic of China, Standardization Administration of the People's Republic of China
Summary This standard specifies the safety of industrial control systems for information security solutions for acceptance processes, test content, methods and requirements to be met. The program can improve its security by adding devices or systems. The various

GB/T 30976.2-2014: Industrial control system security -- Part 2: Acceptance specification

---This is a DRAFT version for illustration, not a final translation. Full copy of true-PDF in English version (including equations, symbols, images, flow-chart, tables, and figures etc.) will be manually/carefully translated upon your order.
Industrial control system security Part 2. Acceptance specification ICS 25.040 N10 National Standards of People's Republic of China Industrial control systems information security Part 2. Acceptance Issued on. 2014-07-24 2015-02-01 implementation Administration of Quality Supervision, Inspection and Quarantine of People's Republic of China Standardization Administration of China released

Table of Contents

Preface Ⅰ Introduction Ⅱ 1 Scope 1 2 Normative references 1 3 Terms and definitions 2 4 Overview 3 4.1 Acceptance of the basic principles of 3 4.2 Acceptance Scheme 3 4.3 Acceptance test schedule 4 4.4 Acceptance of forms of work 4 5 Acceptance preparation stage 4 5.1 Acceptance determine the objectives and scope 4 5.2 Document Preparation 5 6 Risk Analysis and disposal phase 5 6.1 Risk Analysis System 5 6.2 risk management program 6 7 Capacity validation phase 6 7.1 Equipment requirements 6 7.2 System Test 10 7.3 Acceptance Conclusion 11 Appendix A (informative) Acceptance inspection table 12 Annex B (informative) Acceptance conclusions 16 Annex C (informative) Acceptance does not meet the entry table 17 References 18

Foreword

GB/T 30976 "Industrial Control Systems Security" is divided into two parts. --- Part 1. Specification for the assessment; --- Part 2. acceptance. This section GB/T Part of 230,976. This section drafted in accordance with GB/T 1.1-2009 given rules. This part is proposed by China Machinery Industry Federation. This part of the measurement and control of industrial processes by the National Standardization Technical Committee (SAC/TC124) and the National Information Security Standardization Committee (SAC/TC260) centralized. This section is drafted. Machinery Industrial Instrumentation Technology and Economy Institute, China Electronics Standardization Institute, Beijing and Lee When System Engineering Co., Ltd., Beijing Iron and Steel Design Institute, China Electric Power Research Institute, Tsinghua University, Zhejiang University, Southwest University, heavy Chongqing University of Posts and Telecommunications, Huazhong University of Science and Technology Co., China Nuclear Power Engineering Co., Ltd., Shanghai Automation Instrumentation Co., Kyland Shares Company, Beijing Science and Technology Co., Austin, Siemens (China) Co., Ltd., Schneider Electric (China) Co., Rockwell Automation (China) Co., Ltd., Mitsubishi Electric Automation (China) Co., Ltd., China Instrument Society, Chinese Academy of Sciences Shenyang Institute of Automation, Wireless Network Security National Engineering Laboratory, Xi'an Electric Co., Ltd. Jietong wireless network, the central office of EPRI, North Beijing Haitai radius of Science and Technology Co., Ltd., Qingdao Tofino Information Security Technology Co., Ltd., Beijing Guodian Zhishen Control Technology Co., Ltd., Beijing Forcecontrol Wah Hong Technology Co., Ltd., Yokogawa Electric (China) Co., Ltd. Beijing R & D Center, China Standard Software Co., Ltd., North China Electric Power Design Institute Engineering Co., Ltd., Huawei Digital Technology (Chengdu) Co., Ltd., Guangdong Aerospace Satellite Technology Limited. The main drafters of this section. Ding Lu, Tang Yihong, Roan, Xiade Hai, high Kunlun, Wang Xue, FENG Dong-qin, Liu Feng, Wang Hao, Zhou Chunjie, Lu Dong Po, Zhang Jianjun, Xuebai Hua, Chen Xiaofeng, Suiai Fen, Chen Cong, Hua Rong, Gong Ming, Zhang Li, Song Yan, Li Qin, Hu Yanan, Wang Xiong, Hubo Liang, Liu positive, Tianyu Cong, Fang Liang, Yang Lei, He Jia, Ma Xinxin TRANSACTIONS Yang Ying Liang Mei Ke, Wang Yumin, Wang Yong, Du Jialin, Wang Yijun, Chen Gang day, Zhang Tao, Wang Pei, Liu Limin, Dingqing Zhi, Liu Wenlong, money Xiaobin, mirror Zhu Ling, Zhang Zhi.

Introduction

In recent years, rapid development of network technology and the frequent occurrence of various types of information security incidents, making industrial automation and control system communication network Network information security is more and more attention. Network communication technology for industrial automation systems is different from the terms used in the office environment Machine network technology operator. Information security office network and other commonly used anti-virus software and firewall software and hardware solutions to solve security problems. In the industrial Application environment, network security have higher requirements, malware invasion resulting in the production line will stop, personal injury, information leakage, thereby A serious threat to human life, serious consequences for the safe operation of the industrial production, national security and so on. With the large-scale industrial automation and control systems More and more widely, as a whole, industrial automation and control the network core, the issue of information security has become a top priority. This section provides information on the industrial control system security capabilities to implement security solutions for acceptance acceptance processes, test content, Methods and should meet the requirements. These tests are to prove that after the increase in industrial control systems security solutions to meet safety Requirements, and to ensure its key performance indicators within the allowable range. The content of this standard can be used as guidance in practical work for a variety of Process plants, factories and control systems. Industrial control systems information security Part 2. Acceptance

1 Scope

GB/T 30976 provisions of this part of the security of industrial control systems for information security solutions for acceptance processes, measurement Test content, methods and requirements to be met. The program can improve its security by adding devices or systems. The contents of this section may be used as practice guidance applicable to the petroleum, chemical, electric power, nuclear facilities, transportation, metallurgy, water treatment, Manufacturing and other control systems and equipment used in industry.

2 Normative references

The following documents for the application of this document is essential. For dated references, only the dated version suitable for use herein Member. For undated references, the latest edition (including any amendments) applies to this document. GB/T 2423.1-2008 Environmental testing for electric and electronic products Part 2. Test methods - Test A. Cold (IEC 60068-2- 1.2007, IDT) GB/T 2423.2-2008 Environmental testing for electric and electronic products Part 2. Test methods - Test B. Dry heat (IEC 60068-2- 2.2007, IDT) GB 3836.1 explosive atmospheres - Part 1. General requirements Equipment (GB 3836.1-2010, IEC 60079-0.2007, MOD) GB 3836.2 explosive atmospheres - Part 2. the flameproof enclosure "d" protection devices (GB 3836.2-2010, IEC 60079- 1.2007, MOD) GB 3836.4 explosive atmospheres - Part 4. the intrinsically safe "i" Device Protection (GB 3836.4-2010, IEC 60079- 11.2006, MOD) GB 4793.1-2007 measurement, control and laboratory safety requirements for electrical equipment Part 1. General requirements (IEC 61010- 1.2001, IDT) GB/T 15153.1-1998 Telecontrol equipment and systems Part 2. Operating conditions Section 1. Power supply and electromagnetic compatibility (IEC 60870-2-1.1995, IDT) GB/T 15153.2-2000 Telecontrol equipment and systems Part 2. Operating conditions Part 2. Environmental conditions (climatic, mechanical and Other non-electrical influences) (IEC 606870-2-2.1996, IDT) GB/T 18018-2007 Information technology security router security technical requirements Electrical equipment EMC requirements - Part GB/T 18268.1-2010 measurement, control and laboratory use 1. General requirements (IEC 61326-1.2005, IDT) Evaluation of GB/T 18272.4-2006 industrial process measurement and control system evaluation of system properties - Part 4. System performance Assessment (IEC 61069-4.1997, IDT) GB/T 25068.3-2010 Information technology - Security techniques - IT network security - Part 3. Use the security gateway Wangjiantongxin Security (ISO /IEC 18028-3.2005, IDT) GB/T 25069-2010 Information security technology terms GB/T 30976.1-2014 information security in industrial control systems - Part 1. Specification for the assessment

Tips & Frequently Asked Questions:

Question 1: How long will the true-PDF of GB/T 30976.2-2014_English be delivered?

Answer: Upon your order, we will start to translate GB/T 30976.2-2014_English as soon as possible, and keep you informed of the progress. The lead time is typically 2 ~ 4 working days. The lengthier the document the longer the lead time.

Question 2: Can I share the purchased PDF of GB/T 30976.2-2014_English with my colleagues?

Answer: Yes. The purchased PDF of GB/T 30976.2-2014_English will be deemed to be sold to your employer/organization who actually pays for it, including your colleagues and your employer's intranet.

Question 3: Does the price include tax/VAT?

Answer: Yes. Our tax invoice, downloaded/delivered in 9 seconds, includes all tax/VAT and complies with 100+ countries' tax regulations (tax exempted in 100+ countries) -- See Avoidance of Double Taxation Agreements (DTAs): List of DTAs signed between Singapore and 100+ countries

Question 4: Do you accept my currency other than USD?

Answer: Yes. If you need your currency to be printed on the invoice, please write an email to [email protected]. In 2 working-hours, we will create a special link for you to pay in any currencies. Otherwise, follow the normal steps: Add to Cart -- Checkout -- Select your currency to pay.