| US$1009.00 · In stockDelivery: <= 7 days. True-PDF full-copy in English will be manually translated and delivered via email.
 GB/T 31499-2015: Information security technology -- Technical requirements and testing and evaluation approaches for unified threat management products
 Status: Valid
 
	
		
			| Standard ID | Contents [version] | USD | STEP2 | [PDF] delivered in | Standard Title (Description) | Status | PDF |  
			| GB/T 31499-2015 | English | 1009 | Add to Cart | 7 days [Need to translate] | Information security technology -- Technical requirements and testing and evaluation approaches for unified threat management products | Valid | GB/T 31499-2015 |  
	 
       PDF similar to GB/T 31499-2015 
 Basic data             | Standard ID | GB/T 31499-2015 (GB/T31499-2015) |           | Description (Translated English) | Information security technology -- Technical requirements and testing and evaluation approaches for unified threat management products |           | Sector / Industry | National Standard (Recommended) |           | Classification of Chinese Standard | L80 |           | Classification of International Standard | 35.040 |           | Word Count Estimation | 48,467 |           | Date of Issue | 2015-05-15 |           | Date of Implementation | 2016-01-01 |           | Quoted Standard | GB 17859-1999; GB/T 18336.1-2008; GB/T 25069 |           | Regulation (derived from) | National Standard Announcement 2015 No. 15 |           | Issuing agency(ies) | General Administration of Quality Supervision, Inspection and Quarantine of the People's Republic of China, Standardization Administration of the People's Republic of China |           | Summary | This Standard specifies the functional requirements of unified threat management product performance, product requirements and product guarantee its own security requirements, and unified threat management product classification requirements, and according to the technical requirements for testing and evaluation methods are given. This Standard applies to unified threat management product design, development, testing and evaluation. | GB/T 31499-2015: Information security technology -- Technical requirements and testing and evaluation approaches for unified threat management products---This is a DRAFT version for illustration, not a final translation. Full copy of true-PDF in English version (including equations, symbols, images, flow-chart, tables, and figures etc.) will be manually/carefully translated upon your order.
 Information security technology. Technical requirements and testing and evaluation approaches for unified threat management products
ICS 35.040
L80
National Standards of People's Republic of China
Information security technology - Unified Threat Management Products
Technical requirements and testing and evaluation approaches
Issued on. 2015-05-15
2016-01-01 implementation
Administration of Quality Supervision, Inspection and Quarantine of People's Republic of China
Standardization Administration of China released
 Table of ContentsIntroduction Ⅲ
1 Scope 1
2 Normative references 1
3 Terms and definitions
4 Abbreviations 3
5 4 Review
5.1 UTM product concept model 4
5.2 Security Environment 5
5.3 Safety Goal 6
6 UTM classification note 7
6.1 Summary 7
6.2 Basic Level 7
6.3 zo intensity level 7
6.4 functional requirements and its own security classification 7
7 10 detailed technical requirements
7.1 Basic Level 10
7.2 zo intensity level 15
7.3 Performance Requirements 20
8 UTM product evaluation 21
8.1 General description 21
8.2 Functional Test 21
8.3 Performance Test 41
References 44ForewordThis standard was drafted in accordance with GB/T 1.1-2009 given rules.
Please note that some of the content of this document may involve patents. Release mechanism of the present document does not assume responsibility for the identification of these patents.
This standard by the National Safety Standardization Technical Committee (SAC/TC260) and focal points.
This standard was drafted. Beijing Venus Information Security Technology Co., Ltd., North China Institute of Computing Technology, Tsinghua University, Ministry of Public Security meter
Computer Information System Security Product Quality Supervision and Inspection Center, Ministry of Public Security the third Institute.
The main drafters of this standard. Yuan Zhihui, Zhang Yi, Chuang Tan, Yu excellent, Gu Jian, Yuan Wei library, Shen Ying, Tang Yi, Ren Ping, Pan Lei, Jiang Lei, Fan Chenggang,
Liu Jian, Li Guojun, Xiao Cong, Chen Shuo, Xi Bei, Yang Jinheng.
Information security technology - Unified Threat Management Products
Technical requirements and testing and evaluation approaches1 ScopeThis standard specifies the unified threat management product functionality requirements, performance metrics, product requirements and product guarantee its own security requirements, and
Unified threat management products grading requirements, and gives the test to evaluate the method according to the technical requirements.
This standard applies to unified threat management product design, development, testing and evaluation.2 Normative referencesThe following documents for the application of this document is essential. For dated references, only the dated version suitable for use herein
Member. For undated references, the latest edition (including any amendments) applies to this document.
GB 17859-1999 computer information system security protection classification criterion
GB/T 18336.1-2008 Information technology - Security techniques - Evaluation criteria for IT security - Part 1. Introduction and general
Model (ISO /IEC 15408-1.2005, IDT)
GB/T 25069 information security technology terms3 Terms and DefinitionsGB 17859-1999, GB/T 25069 and GB/T 18336.1-2008 and as defined in the following terms and definitions apply to this
file.
3.1
Unified Threat Management unifiedthreatmanagement; UTM
Through the unified deployment of security policies, the integration of multiple security functions, integrated defense against security threats for network and application systems
Gateway-type devices or systems.
3.2
Access control accesscontrol
Through the user access to network resources for identification and security policy in accordance with predefined groups to which they belong to authorize its funding proposed
Access requests to the source control technology.
3.3
Internal network internalnetwork
In the scope of the internal organization and external network isolation, protected trusted network area.
3.4
External network externalnetwork
Outside the organization-wide process, passing an open network of regional public resources.
3.5
Security Policy securitypolicy
Control method has specific security requirements to protect the safety and use of business systems, tools and approaches.
 
 Tips & Frequently Asked Questions:Question 1: How long will the true-PDF of GB/T 31499-2015_English be delivered?Answer: Upon your order, we will start to translate GB/T 31499-2015_English as soon as possible, and keep you informed of the progress. The lead time is typically 4 ~ 7 working days. The lengthier the document the longer the lead time. Question 2: Can I share the purchased PDF of GB/T 31499-2015_English with my colleagues?Answer: Yes. The purchased PDF of GB/T 31499-2015_English will be deemed to be sold to your employer/organization who actually pays for it, including your colleagues and your employer's intranet. Question 3: Does the price include tax/VAT?Answer: Yes. Our tax invoice, downloaded/delivered in 9 seconds, includes all tax/VAT and complies with 100+ countries' tax regulations (tax exempted in 100+ countries) -- See Avoidance of Double Taxation Agreements (DTAs): List of DTAs signed between Singapore and 100+ countries Question 4: Do you accept my currency other than USD?Answer: Yes. If you need your currency to be printed on the invoice, please write an email to [email protected] . In 2 working-hours, we will create a special link for you to pay in any currencies. Otherwise, follow the normal steps: Add to Cart -- Checkout -- Select your currency to pay.    |