HOME   Cart(0)   Quotation   About-Us Tax PDFs Standard-List Powered by Google www.ChineseStandard.net Database: 189760 (22 Mar 2025)

GB/T 31167-2023 English PDF (GB/T 31167-2014: Older version)

Search result: GB/T 31167-2023 (GB/T 31167-2014 Older version)
Standard IDContents [version]USDSTEP2[PDF] delivered inStandard Title (Description)StatusPDF
GB/T 31167-2023English599 Add to Cart 5 days [Need to translate] Information security technology - Security guidance for cloud computing services Valid GB/T 31167-2023
GB/T 31167-2014English150 Add to Cart 0--9 seconds. Auto-delivery Information security technology -- Security guide of cloud computing services Obsolete GB/T 31167-2014


BASIC DATA
Standard ID GB/T 31167-2023 (GB/T31167-2023)
Description (Translated English) Information security technology -- Security guidance for cloud computing services
Sector / Industry National Standard (Recommended)
Classification of Chinese Standard L80
Classification of International Standard 35.030
Word Count Estimation 29,214
Date of Issue 2023-05-23
Date of Implementation 2023-12-01
Older Standard (superseded by this standard) GB/T 31167-2014
Drafting Organization Sichuan University, University of Science and Technology of China, Beijing Information Security Evaluation Center, Huawei Technologies Co., Ltd., China Institute of Electronic Technology Standardization, Beijing Tianrongxin Network Security Technology Co., Ltd., National Information Technology Security Research Center, China Network Security Review Technology and Certification Center, China Mobile Communications Group Co., Ltd., Shaanxi Provincial Information Technology Engineering Research Institute, National Industrial Information Security Development Research Center, Inspur Cloud Information Technology Co., Ltd., Sangfor Technology Co., Ltd., China Information Security Evaluation Center (Beijing), Hangzhou Anheng Information Technology Co., Ltd., the 30th Research Institute of China Electronics Technology Group Corporation, Huaxin Consulting Design and Research Institute Co., Ltd., China Power Great Wall Internet System Application Co., Ltd., Chengdu Shudao Yixin Technology Co., Ltd., New H3C Technology Co., Ltd.,
Administrative Organization National Information Security Standardization Technical Committee (SAC/TC 260)
Proposing organization National Information Security Standardization Technical Committee (SAC/TC 260)
Issuing agency(ies) State Administration for Market Regulation, National Standardization Management Committee


GB/T 31167-2023: Information Security Technology Cloud Computing Service Security Guidelines ICS 35:030 CCSL80 National Standards of People's Republic of China Replacing GB/T 31167-2014 Information Security Technology Cloud Computing Service Security Guidelines Released on 2023-05-23 2023-12-01 implementation State Administration for Market Regulation Released by the National Standardization Management Committee table of contents Preface III Introduction V 1 Range 1 2 Normative references 1 3 Terms and Definitions 1 4 Abbreviations 3 5 Cloud Computing Service Security Management 3 5:1 Overview 3 5:2 Responsibilities for Security Management Using Cloud Computing Services3 5:3 Basic principles of cloud computing service security management 4 5:4 Cloud Computing Service Lifecycle Security Management 4 6 planning preparation 5 6:1 Overview 5 6:2 Data classification 5 6:3 Business Classification 5 6:4 Security capability level 6 6:5 Requirements Analysis 7 6:6 Form a decision report 10 7 Select cloud service provider and deploy 10 7:1 Cloud Service Provider Security Capability Requirements 10 7:2 Select cloud service provider 10 7:3 Security considerations in contracts 11 7:4 Deployment 12 8 Operation Supervision 13 8:1 Overview 13 8:2 Roles and Responsibilities of Cloud Service Providers and Customer Operation Supervision 13 8:3 Customer's own operational supervision 14 8:4 Operation Supervision of Cloud Service Providers 15 9 Exit service 16 9:1 Exit Requirements 16 9:2 Determining the scope of data transfer16 9:3 Verifying Data Integrity 17 9:4 Safely delete data 17 Appendix A (informative) Safety responsibility division example 18 Appendix B (Informative) Cloud Computing Security Risks 21 Reference 23 foreword This document is in accordance with the provisions of GB/T 1:1-2020 "Guidelines for Standardization Work Part 1: Structure and Drafting Rules for Standardization Documents" drafting: This document replaces GB/T 31167-2014 "Information Security Technology Cloud Computing Service Security Guidelines", and is consistent with GB/T 31167-2014 In addition to structural adjustments and editorial changes, the main technical changes are as follows: ---Changed the scope of application from "government department" to "customer" (see Chapter 1, see Chapter 1 of the:2014 edition); --- Added support for GB/T 32400-2015 (see Chapter 3), GB/T 36325-2018 (see 7:3:3), GB/T 37972-2019 (see 8:1) for normative references; --- Added and changed some terms (see Chapter 3, Chapter 3 of the:2014 edition); --- Added the chapter "Abbreviations" (see Chapter 4); --- Deleted "Overview of Cloud Computing" (see Chapter 4 of the:2014 edition); --- Added references to "cloud capability type" and "cloud service category" (full text); --- Take "5:2 Cloud Computing Security Risks" in the:2014 edition as an informative appendix (see Appendix B); ---The content of 5:3 of the:2014 edition is included in the chapter "5:2:1 Roles and Responsibilities", and "cloud service security provider" is added as the content of the cloud New roles for computing services security management (see 5:2:1); --- Added guidance and examples of "division of security responsibilities" (see 5:2:2 and Appendix A); ---Change "review" to "assessment", and unify the name with the relevant documents (full text); --- Deleted "benefit assessment" (see 6:2 of the:2014 edition); ---Changed the title and content of the:2014 edition "6:3 Government Information Classification" (see 6:2); --- Deleted the technical content related to "sensitive information" and "public information" (see 6:3:2 and 6:3:3 of the:2014 edition); ---Change the title "Government Business Classification" to "Business Classification" to expand the scope of business (see 6:3, see 6:4 of the:2014 edition); ---Changed the conditions of key business in the business classification (see 6:3:4, see 6:4:4 of the:2014 edition); ---Deleted the content of "priority determination" (see 6:5 of the:2014 edition); --- Changed the security protection requirements and proposed three security capability levels (see 6:4, see 6:6 of the:2014 edition); --- Changed Figure 3 in the:2014 edition, adding key business types and advanced security capabilities (see Figure 2); --- Deleted "6:7:1 Overview" (see 6:7:1 of the:2014 edition); ---Changed the title and content of "6:7:2 Service Mode" in the:2014 edition, and changed the scope of control from service mode division to passability Type division control scope (see 6:5:1); --- Changed Figure 4 in the:2014 edition, and changed the service model to the basic cloud service capability type (see Figure 3); ---Increase the consideration of business system integration requirements to guide customers during migration (see 6:5:7, see 6:7:8 of the:2014 edition); ---Changed the technical content of "6:7:9 Data storage location" of the:2014 edition (see 6:5:8); ---Changed the content of "7:1 Security Capability Requirements for Cloud Service Providers": For specific requirements, refer to GB/T 31168-2023 (see 7:1, see 7:1 of the:2014 edition); --- Deleted chapters 7:1:1 to 7:1:10 in the:2014 edition (see 7:1:1~7:1:10 in the:2014 edition); --- Merge the content of 7:2:2 in the:2014 edition to 7:2 (see 7:2, see 7:2 of the:2014 edition); --- Added references to relevant documents of the service level agreement (see 7:3:3, see 7:3:3 of the:2014 edition); ---Changed the content of "8:1 Overview" and introduced GB/T 37972-2019 to provide cloud computing services for cloud service providers and operation regulators Provide guidance on operating regulatory activities (see 8:1, see 8:1 of the:2014 edition); ---Changed the content of "8:2:1 Overview", emphasizing that the responsibility for the operation supervision of cloud service security providers should be borne by the importer (see 8:2:1, see 8:2:1 of the:2014 edition); --- Increased the relevant responsibilities of customers in operation supervision (see 8:2:2, see 8:2:2 of the:2014 edition); --- Increased the type of major changes (see 8:4:3, see 8:4:2 of the:2014 version); --- Added the type of security event (see 8:4:4, see 8:4:3 of the:2014 version); --- Added the "Migration Principles" section, which is used to guide the principles that customers should require cloud service providers to follow when migrating data (see 9:2:1); ---Change the content of "9:2 Determining the scope of transfer" in the:2014 edition to "9:2:2 Scope of transfer" (see 9:2:2); ---Deleted "3) The media storing sensitive information cannot be used to store public open information" (see 9:4 of the:2014 edition); --- Use the footnote in measure c) of "9:4 Securely Deleting Data" in the:2014 edition as the note in measure c) (see 9:4): Please note that some contents of this document may refer to patents: The issuing agency of this document assumes no responsibility for identifying patents: This document is proposed and managed by the National Information Security Standardization Technical Committee (SAC/TC260): This document was drafted by: Sichuan University, University of Science and Technology of China, Beijing Information Security Evaluation Center, Huawei Technologies Co:, Ltd:, China Electronic Technology Standardization Research Institute, Beijing Tianrongxin Network Security Technology Co:, Ltd:, National Information Technology Security Research Center, China Network Security Comprehensive Review Technology and Certification Center, China Mobile Communications Group Co:, Ltd:, Shaanxi Provincial Information Technology Engineering Research Institute, National Industrial Information Security Development Exhibition Research Center, Inspur Cloud Information Technology Co:, Ltd:, Sangfor Technology Co:, Ltd:, China Information Security Evaluation Center (Beijing), Hangzhou Anheng Information Technology Co:, Ltd:, the 30th Research Institute of China Electronics Technology Group Corporation, Huaxin Consulting Design Research Institute Co:, Ltd:, China Electric Great Wall Internet System Application Co:, Ltd:, Chengdu Shudao Yixin Technology Co:, Ltd:, New H3C Technology Co:, Ltd:, Tencent Cloud Computing (Beijing) limited liability company: The main drafters of this document: Chen Xingshu, Zhou Yachao, Wang Qixu, Min Jinghua, Yang Miaomiao, Luo Yonggang, Zhang Jianjun, Yang Jianjun, Zuo Xiaodong, Liu Haifeng, Zhang Bin, Jiang Weiqiang, Li Yuan, Yan Minrui, Wang Yan, Wang Huili, Zhang Mingming, Zhang Yong, Lu Xia, Wu Yang, Chen Xuehong, Shi Dawei, Liu Caiyun, Zhang Min, Qiu Qin, Wu Fuwei, Zhang Xiaofei, Zhao Dandan, Wang Yalu, Liu Junhe, Zhang Jiancong, Chen Jing, Wan Xiaolan, Ma Hongjun, Zhang Ge, Dong Ping, Yu Le, Yin Libo, Zhao Zhangjie, Zhu Yi, Qiu Yunxiang, Wang Yongxia: The release status of previous versions of this document and the documents it replaces are as follows: ---It was first published as GB/T 31167-2014 in:2014; --- This is the first revision: introduction This document and GB/T 31168-2023 "Information Security Technology Cloud Computing Service Security Capability Requirements" constitute cloud computing service security requirements: Basic file management: GB/T 31168-2023 describes the security features that cloud service providers should have when providing cloud computing services to customers: This document proposes security management and technical measures for customers when using cloud computing services: This document guides customers to do a good job in the preliminary analysis and planning of cloud computing services, select the appropriate cloud service provider and deployment mode, and implement cloud computing services: Supervise the operation of computing services to avoid the security risks of quitting cloud computing services or changing cloud service providers: This document guides customers in adopting cloud computing According to the life cycle of computing services, corresponding security technology and management measures are adopted to ensure the security of data and business, and to use cloud computing services safely: Information Security Technology Cloud Computing Service Security Guidelines 1 Scope This document puts forward the basic principles of security management for customers to adopt cloud computing services, and gives the life cycle stages of cloud computing services: The safety management and technical measures of the section are put forward, and the principles of cloud computing service safety management and the division of related responsibilities are proposed: This document is applicable to guide customers to safely adopt cloud computing services: 2 Normative references The contents of the following documents constitute the essential provisions of this document through normative references in the text: Among them, dated references For documents, only the version corresponding to the date is applicable to this document; for undated reference documents, the latest version (including all amendments) is applicable to this document: GB/T 25069-2022 Information Security Technical Terminology GB/T 31168-2023 Information Security Technology Cloud Computing Service Security Capability Requirements GB/T 32400-2015 Information Technology Cloud Computing Overview and Vocabulary 3 Terms and Definitions The following terms and definitions defined in GB/T 25069-2022 and GB/T 32400-2015 apply to this document: 3:1 cloud computing cloudcomputing Access scalable and flexible physical or virtual shared resource pools through the network, and self-service acquisition and management of resources on demand: Note: Examples of resources include servers, operating systems, networks, software, applications and storage devices, etc: [Source: ISO /IEC 17788:2014, 3:2:5] 3:2 cloud service cloudservice capability to provide one or more resources through cloud computing (3:1) using defined interfaces [Source: ISO /IEC 17788:2014, 3:2:8, with modifications] 3:3 Participant party A natural or legal person or group of persons, whether registered or not: [Source: GB/T 32400-2015, 3:1:6, modified] 3:4 cloud service provider cloudserviceprovider cloud service provider Participants that provide cloud computing services: [Source: GB/T 32400-2015, 3:2:15, modified] ......


GB/T 31167-2014 GB NATIONAL STANDARD OF THE PEOPLE’S REPUBLIC OF CHINA ICS 35.040 L 80 Information security technology - Security guide of cloud computing services ISSUED ON. SEPTEMBER 03, 2014 IMPLEMENTED ON. APRIL 01, 2015 Issued by. General Administration of Quality Supervision, Inspection and Quarantine of the People's Republic of China; Standardization Administration of the People's Republic of China. Table of Contents Foreword ... 4 Introduction ... 5 1 Scope ... 6 2 Normative references ... 6 3 Terms and definitions ... 6 4 Cloud computing overview ... 8 4.1 Main features of cloud computing ... 8 4.2 Service modes ... 9 4.3 Deployment modes ... 9 4.4 Advantages of cloud computing ... 10 5 Risk management of cloud computing ... 11 5.1 General ... 11 5.2 Cloud computing security risks ... 11 5.3 Main roles and responsibilities of cloud computing service security management ... 14 5.4 Basic requirements for cloud computing service security management ... 14 5.5 Life cycle of cloud computing services ... 15 6 Planning preparation ... 16 6.1 General ... 16 6.2 Benefit assessment ... 17 6.3 Classification of government information ... 18 6.4 Classification of government business ... 20 6.5 Priority determination ... 22 6.6 Security protection requirements ... 23 6.7 Demand analysis ... 24 6.8 Forming a decision report ... 30 7 Selecting service providers and deployment ... 31 7.1 Security capability requirements for cloud service providers ... 31 7.2 Determining the cloud service provider ... 33 7.3 Security considerations in contracts ... 34 7.4 Deployment ... 38 8 Operational supervision ... 39 8.1 General ... 39 8.2 Role and responsibilities of operational supervision ... 40 8.3 Customers’ own operational supervision ... 42 8.4 Operational supervision of cloud service providers ... 43 9 Exiting services ... 44 9.1 Exit request ... 44 9.2 Determining the scope of data handover ... 45 9.3 Verifying the integrity of data ... 46 9.4 Safely deleting data ... 46 Bibliography ... 48 Information security technology - Security guide of cloud computing services 1 Scope This Standard describes the main security risks that cloud computing may face, proposes the basic requirements for the security management of cloud computing services by government departments and the security management and technical requirements for each phase of the life cycle of cloud computing services. This Standard provides safety guidance throughout the life cycle for government departments to adopt cloud computing services, especially socialized cloud computing services. It is applicable for government departments to purchase and use cloud computing services, and can also be used for reference by key industries and other enterprises and institutions. 2 Normative references The following referenced documents are indispensable for the application of this document. For dated references, only the edition cited applies. For undated references, the latest edition of the referenced document (including any amendments) applies. GB/T 25069-2010 Information security technology glossary GB/T 31168-2014 Information security technology - Security capability requirements of cloud computing services 3 Terms and definitions For the purpose of this document, the following terms and definitions and those defined in GB/T 25069-2010 apply. 3.1 cloud computing A mode of accessing scalable, flexible physical or virtual shared resource pools via network, and acquiring and managing resources as needed by the self. 4.2 Service modes According to the types of resources provided by the cloud service provider, cloud service modes can be divided into three main categories. a) Software as a Service (SaaS). In SaaS mode, the cloud service provider provides customers with applications running on the cloud computing infrastructure. Customers do not need to purchase or develop software. They can use the client (such as a web browser) or program interface on different devices to access and use the applications provided by the cloud service provider via internet, such as email system and collaborative office system. Customers usually cannot manage or control low-level resources, such as networks, servers, operating systems, storage, etc., that support the operation of applications, but they may have limited configuration management of applications. b) Platform as a Service (PaaS). In PaaS mode, the cloud service provider provides customers with software development and operation platforms running on the cloud computing infrastructure, such as standard languages and tools, data access, general interfaces, etc. Customers can use the platform to develop and deploy their own software. Customers usually cannot manage or control the low-level resources, such as networks, servers, operating systems, storage, etc., required to support the platform, but they can configure the application's operating environment and control the applications deployed by themselves. c) Infrastructure as a Service (IaaS). In IaaS mode, the cloud service provider provides computing resources such as virtual machines, storage, and networks to customers, and provides service interfaces to access the cloud computing infrastructure. Customers can deploy or run operating systems, middleware, databases and applications on these resources. Customers usually cannot manage or control the cloud computing infrastructure, but they can control the operating systems, storage, and applications deployed by themselves, as well as partially control the network components they use, such as host firewalls. 4.3 Deployment modes Depending on the range of customers using the cloud computing platform, cloud computing is divided into four deployment modes. private cloud, public cloud, community cloud and hybrid cloud. a) Private cloud. The cloud computing platform is only available to a specific customer. The cloud computing infrastructure of the private cloud can be owned, managed and operated by the cloud service provider, this private cloud is called off-site private cloud (or outsourced private cloud). It can cloud service provider, and the cloud service provider has the ability to access, utilize or manipulate the customer data. After migrating data and business systems to the cloud computing platform, security relies heavily on cloud service providers and the security measures they take. Cloud service providers usually regard the security measures and status of cloud computing platforms as intellectual property rights and trade secrets. In the absence of the necessary right to know, it is difficult for customers to understand and master the implementation and operation status of cloud service providers' security measures; it is difficult to effectively supervise and manage these security measures; it cannot effectively supervise the unauthorized access and use of customer data by internal personnel of cloud service providers; it increases the risk of customer data and services. 5.2.2 Responsibility between customers and cloud service providers is difficult to define In the traditional mode, the responsibility for information security is relatively clear according to the principle of who is in charge of who is responsible, who runs and who is responsible who is responsible and who is responsible. In the cloud computing model, the management and operation entities of the cloud computing platform are different from the responsible entities of data security, and how the mutual responsibilities are defined and there are no clear rules. Different service modes and deployment modes, and the complexity of the cloud computing environment also increase the difficulty of defining the responsibility between cloud service providers and customers. Cloud service providers may also purchase and use services from other cloud service providers. For example, cloud service providers that provide SaaS services may build their services on PaaS or IaaS of other cloud service providers, which makes the responsibility more difficult to define. 5.2.3 Jurisdiction issues are possible In the cloud computing environment, the actual storage location of data is often not controlled by the customer, and the customer's data may be stored in an oversea data center, changing the jurisdiction of the data and business. NOTE. Governments in some countries may require cloud service providers to provide access to these data centers in accordance with national laws, and even require cloud service providers to provide data in other countries' data centers. 5.2.4 Data ownership protection is at risk adopting cloud computing services, determine their own data and business types, determine whether it is suitable to adopt cloud computing services; determine the security capability requirements of cloud computing services according to the types of data and business; carry out demand analysis is to form a decision report according to the characteristics of cloud computing services. 5.5.3 Selecting service providers and deployment In the selecting service providers and deployment stage, customers shall select cloud service providers according to security requirements and security capabilities of cloud computing services, negotiate contracts with cloud service providers (including service level agreement, security requirements, confidentiality requirements, etc.), complete the deployment or migration of data and business to the cloud computing platform. 5.5.4 Operational supervision In the operational supervision stage, customers shall guide and supervise cloud service providers to fulfill their contractual obligations and responsibilities, guide business system users to comply with government information system security management policies and standards, and jointly maintain data, business and cloud computing environment security. 5.5.5 Exiting services When exiting cloud computing services, customers shall require cloud service providers to fulfill relevant responsibilities and obligations, and ensure that the data and business security in the exiting cloud computing service stage, such as safely returning customer data and completely eliminating customer data on the cloud computing platform. When the cloud service provider needs to be changed, the customer shall select a new cloud service provider according to the requirements, and focus on the data and business security during the cloud computing service migration process; the original cloud service provider shall also be required to fulfill related responsibilities and obligations. 6 Planning preparation 6.1 General 5.2 explains the security risks and new problems faced by cloud computing. Cloud computing services are not suitable for all customers, and not all applications are suitable for deployment to cloud computing environments. measures are implemented by the cloud service provider. b) In PaaS mode, the security measures of the software platform layer are shared between the customer and the cloud service provider. The customer is responsible for the security of the applications developed and deployed by himself and the operating environment, and other security measures are implemented by the cloud service provider. c) In IaaS mode, the security measures of the virtualized computing resource layer are shared by the customer and the cloud service provider. The customer is responsible for the security of the operating system, operating environment and applications deployed by himself. The cloud service provider is responsible for the security of the virtual machine monitor and the underlying resources. The lower three layers in Figure 4 consist of the facility layer, the hardware layer and the resource abstraction control layer. The facility layer and the hardware layer are the physical elements of the cloud computing environment. The facility layer mainly includes heating, ventilation, air conditioning, power and communication. The hardware layer includes all physical computing resources, such as. servers, networks (routers, firewalls, switches, network connections and interfaces), storage components (hard disks) and other physical computing components. The resource abstraction control layer implements software abstraction of physical computing resources through virtualization or other software technologies, and implements access control of resource based on software components such as resource allocation, access control, and usage monitoring. In all service modes, these three layers are under the full control of the cloud service provider, and all security measures are implemented by the cloud service provider. The upper three layers in Figure 4 form the logical elements of the cloud computing environment by the application software layer, the software platform layer and the virtualized computing resource layer. The virtualized computing resource layer provides customers with access to computing resources such as virtual machines, virtual storage and virtual networks through service interfaces. The software platform layer provides customers with compilers, libraries, tools, middleware and other software tools and components for application development and deployment. The application software layer provides customers with the application software required by the business system, and customers access these application software through clients or program interfaces. Customers can choose the service mode according to the characteristics of different service modes and the security management requirements of their own data and business systems, combined with their own technical capabilities, pay for the resources used by the business system. Customers shall prioritize the deployment or migration of businesses with dynamic and periodic changes in resources to the cloud computing platform, which may save money while meeting business performance requirements. 6.7.6 Delay Delay is the time delay for the cloud computing environment to process a request, including the time required for the customer request messages transmitting to the cloud computing environment and the resulting postback, and the processing time of the cloud computing environment. Different types of applications have significant differences in delay requirements for cloud computing services. For example, e-mail usually allows for short service interruptions and large network delays, but automation and real-time applications generally require higher requirements for delay. Customers shall conduct a detailed analysis of the requirements for the response speed of the business system, to determine the tolerance of the business itself for delay and possible remedies. Before deploying or migrating data and services to the cloud computing platform, it shall consider indicator requirements such as response time and massive data transmission performance. 6.7.7 Business continuity Whether the cloud computing service will be interrupted and whether it can continue to be accessed depends on many factors, including the network, the cloud computing platform, and the cloud service provider. Network dependence. Cloud computing services rely on networks such as the Internet, where customers access services through a continuously available network connection. Network dependence means that each application is a web application, and the complexity of the network from the customer to the cloud computing platform is usually higher than that of the customer's internal local area network. Platform dependence. Despite the high reliability of professional cloud computing platforms, cloud computing platform failures and service interruptions cannot be completely avoided due to human factors (such as malicious attacks or administrator errors), natural disasters (such as floods, typhoons, earthquakes, etc.). Cloud service provider dependence. When using self-own systems, even if the hardware and software provider suspends technical support, after-sales service or business, customers may not be affected immediately and can continue to c) Cloud computing service mode and deployment mode selection. Analyze the security measures implementation boundaries and management boundaries of customers and cloud service providers; d) Risk analysis. Analyze the security threats that may be encountered after data and business are deployed to the cloud computing environment, and propose countermeasures; e) Functional requirement analysis. Analyze the resource requirements in different modes, the backup and recovery capabilities of data, the storage location of backup data, the data transmission mode and network bandwidth requirements, and the data interaction requirements between the business to be deployed on the cloud computing platform and other systems; f) Performance requirements analysis. Mainly analyze indicators such as availability, reliability, resilience, transaction response time and throughput rate. g) Security requirements. Determine the security capability requirements of the cloud computing service based on the classification results of the information and business to be deployed to the cloud computing platform; h) Business continuity requirements. After the business system is migrated to the cloud computing platform, the original system can operate in parallel with the business system migrated to the cloud computing platform for a period of time; i) A preliminary plan of exiting cloud computing services or changing cloud service providers; j) A plan for security awareness, technical and management training for relevant customer personnel; k) Leaders and working departments responsible for adopting cloud computing services of the organization and their responsibilities. l) Other important issues that shall be considered in the procurement and use of cloud computing services. 7 Selecting service providers and deployment 7.1 Security capability requirements for cloud service providers Cloud service providers that provide cloud computing services to customers shall have the following 10 aspects of security capabilities. necessary information needed to properly perform their job duties; d) When a third party requests disclosure of information in c) or sensitive customer information, it shall not respond and shall report immediately; e) Activities or practices that violate or may result in violations of agreements, regulations, procedures, strategies, laws, shall be reported immediately upon discovery; f) After the contract is completed, the cloud service provider shall return the information and customer data in c), and specify the specific requirements and contents of the return; g) Define the validity period of the confidentiality agreement. 7.3.5 Information security related contents in contracts When signing a contract with a cloud service provider, the customer shall fully consider the security risks that the cloud computing service may face, agree on management, technology, personnel, etc. through the contract, and require the cloud service provider to provide the customer with safe and reliable services. The contract shall include at least the following information security related contents. a) The responsibility and obligations of the cloud service provider, including but not limited to all the contents of 7.3.2. If other parties participate, the responsibilities and obligations of other parties shall be clarified; b) The technical and management standards that the cloud service provider shall comply with; c) The service level agreement, clarifying the customer's specific performance requirements, security requirements, etc.; d) The confidentiality clauses, including those who have access to customer information, especially sensitive information; e) The responsibility and obligation of the customer to protect the intellectual property rights of the cloud service provider; f) The conditions for the termination of the contract and the obligations and obligations of the cloud service provider after the termination of the contract; g) If data interaction between the business system in the cloud computing platform and other business systems of the customer is needed, the a) the responsibilities and obligations specified in the contract and related policies and regulations are implemented, and the technical standards are effectively implemented; b) the quality of service meets the contract requirements; c) the security of customer data and businesses in the event of significant changes; d) respond to security incidents in a timely and effective manner. 8.2 Role and responsibilities of operational supervision 8.2.1 General Customers shall strengthen the operational supervision of cloud service providers and themselves in accordance with contracts, rules and regulations and standards. Cloud service providers and third party assessment organizations shall actively participate and cooperate. Customers and cloud service providers shall clearly identify the person responsible for the operational supervision and his contact information. 8.2.2 Supervision responsibilities of customers The responsibilities of customers in operational supervision activities are as follows. a) supervise cloud service providers to strictly abide by the various responsibilities and obligations specified in the contract, and consciously abide by the rules and regulations and standards related to government information security; b) assist cloud service providers in handling major information security incidents; c) conduct annual security check on the cloud computing platform of cloud service providers in accordance with the government information system security inspection requirements; d) under the support of cloud service providers, supervise the following aspects. 1) service operating status; 2) performance indicators, such as resource usage; 3) special security needs; handover of the non-generic-format files; b) Program code. For customer-customized functions or business systems, whether to transfer executable programs, source code and technical materials are defined in the contract or other agreements, which may include. executable programs, source code, functional descriptions, design documentation, description of development and operation environment, maintenance manual, user manual, etc. c) Other data. According to the prior agreement and the negotiation between the two parties, determine other data that shall be handed over, including relevant data collected and counted during the operation of the customer's business, such as customer behavior habit statistics and network traffic characteristics of the cloud computing service; d) Documentation. The various documents provided by the customer to the cloud service provider during the use of the cloud computing service, and relevant materials related to the customer jointly completed by the two parties. 9.3 Verifying the integrity of data The customer shall verify the integrity of the data returned by the cloud service provider. In order to obtain the complete data, the customer shall take the following measures. a) Require the cloud service provider to completely return the customer data according to the handover data checklist, paying special attention to historical data and archived data; b) Supervise the process by which the cloud service provider returns customer data and verify the validity of the returned data. Decrypt and verify the encrypted data; use the tool to recover the generic-format data and verify; c) The validity and integrity of the data can be verified by the business system, e.g. deploy the data and business systems on a new platform for verification. 9.4 Safely deleting data After the customer exits the cloud computing service, the cloud service provider shall still be required to securely process the customer data and assume relevant responsibilities and obligations. The customer shall take the following measures. a) After exiting the service, the cloud service provider is required to securely ......

Similar standards: GB/T 31168-2023  GB/T 15843.2-2024  
Similar PDFs (Auto-delivered in 9 seconds): GB/T 31167-2014  GB/T 31168-2014  GB/T 31509-2015  GB/T 31722-2015