HOME   Cart(0)   Quotation   About-Us Policy PDFs Standard-List
www.ChineseStandard.net Database: 189760 (25 Oct 2025)

GB/T 31722-2025 English PDF

US$1084.00 · In stock
Delivery: <= 7 days. True-PDF full-copy in English will be manually translated and delivered via email.
GB/T 31722-2025: Cybersecurity technology - Guidance on managing information security risks
Status: Valid

GB/T 31722: Evolution and historical versions

Standard IDContents [version]USDSTEP2[PDF] delivered inStandard Title (Description)StatusPDF
GB/T 31722-2025English1084 Add to Cart 7 days [Need to translate] Cybersecurity technology - Guidance on managing information security risks Valid GB/T 31722-2025
GB/T 31722-2015English495 Add to Cart 0--9 seconds. Auto-delivery Information technology -- Security techniques -- Information security risk management Valid GB/T 31722-2015

Basic data

Standard ID GB/T 31722-2025 (GB/T31722-2025)
Description (Translated English) Cybersecurity technology - Guidance on managing information security risks
Sector / Industry National Standard (Recommended)
Classification of Chinese Standard L80
Classification of International Standard 35.030
Word Count Estimation 54,553
Date of Issue 2025-08-01
Date of Implementation 2026-02-01
Older Standard (superseded by this standard) GB/T 31722-2015
Issuing agency(ies) State Administration for Market Regulation, Standardization Administration of China

GB/T 31722-2025: Cybersecurity technology - Guidance on managing information security risks

---This is an excerpt. Full copy of true-PDF in English version (including equations, symbols, images, flow-chart, tables, and figures etc.), auto-downloaded/delivered in 9 seconds, can be purchased online: https://www.ChineseStandard.net/PDF.aspx/GBT31722-2025
ICS 35.030 CCSL80 National Standard of the People's Republic of China Replaces GB/T 31722-2015 Cybersecurity Technology Information Security Risk Management Guidance Released on August 1, 2025 Implementation on February 1, 2026 State Administration for Market Regulation The National Standardization Administration issued

Table of Contents

Preface III Introduction IV 1 Scope 1 2 Normative references 1 3 Terms and Definitions 1 3.1 Terms related to information security risks 1 3.2 Terms related to information security risk management 4 4 File Structure 5 5 Information Security Risk Management 6 5.1 Information Security Risk Management Process 6 5.2 Information Security Risk Management Cycle 7 6 Environment Establishment 7 6.1 Matters for the organization to consider 7 6.2 Basic requirements for identifying interested parties 8 6.3 Application Risk Assessment 8 6.4 Establish and maintain information security risk criteria 8 6.5 Selecting the appropriate method 12 7 Information Security Risk Assessment Process 12 7.1 Overview 12 7.2 Information Security Risk Identification 13 7.3 Information Security Risk Analysis 14 7.4 Information Security Risk Assessment 16 8 Information Security Risk Management Process 17 8.1 Overview 17 8.2 Select appropriate information security risk treatment options 17 8.3 Identify all controls required to implement information security risk treatment options 18 8.4 Comparison of identified controls with controls in Appendix A of GB/T 22080-2025 20 8.5 Preparation of a Statement of Applicability 20 8.6 Information Security Risk Management Plan 21 9 Run 23 9.1 Perform information security risk assessment process 23 9.2 Execute information security risk management process 23 10 Utilizing ISMS-related processes 23 10.1 Organizational Environment 23 10.2 Leadership and Commitment 24 10.3 Communication and Consultation 24 10.4 Documented information 25 10.5 Monitoring and Review 27 10.6 Management Review 28 10.7 Corrective Actions 28 10.8 Continuous Improvement 28 Appendix A (informative) Examples of techniques to support the risk assessment process 30 A.1 Information Security Risk Criteria 30 A.2 Practical Techniques 34 Reference 48 Figure 1 Information Security Risk Management Process 6 Figure A.1 Components of information security risk assessment 34 Figure A.2 Example of an asset dependency graph 35 Figure A.3 Identification of stakeholders in the ecosystem 38 Figure A.4 Risk assessment based on risk scenarios 45 Figure A.5 Example of SFDT model application 47 Table A.1 Example of consequence scale 30 Table A.2 Likelihood Scale Example 31 Table A.3 Examples of qualitative approaches to risk criteria 32 Table A.4 Logarithmic likelihood scale example 33 Table A.5 Example of a logarithmic consequence scale 33 Table A.6 Example of an evaluation scale using a three-color risk matrix 34 Table A.7 Examples of risk sources and common attack methods 36 Table A.8 Example of motivation classification using expected end state37 Table A.9 Examples of attack targets 37 Table A.10 Typical threat examples 39 Table A.11 Typical vulnerability examples 41 Table A.12 Examples of risk scenarios in two approaches 45 Table A.13 Examples of relationships between risk scenarios and monitoring risk-related events 46 Preface This document is in accordance with the provisions of GB/T 1.1-2020 "Guidelines for standardization work Part 1.Structure and drafting rules for standardization documents" Drafting. This document replaces GB/T 31722-2015 "Information Technology Security Technology Information Security Risk Management" and GB/T 31722- Compared with.2015, in addition to structural adjustments and editorial changes, the main technical changes are as follows. a) Deleted the terms “impact”, “information security risk”, “risk aversion”, “risk estimation” and their definitions (see Chapter 3 of the.2015 edition); b) Added terms such as “risk scenario” and “control” and their definitions (see Chapter 3); c) “Background” has been deleted (see Chapter 5 of the.2015 edition); d) Added "Information Security Risk Management Cycle" (see 5.2); e) The “Information Security Risk Assessment Process” has been modified to include “Situation-based Approach” and “Asset-based Approach” (see Chapter 7, Chapter 8 of the.2015 edition); f) Added "Operation" (see Chapter 9); g) Added “Utilization of ISMS related processes” (see Chapter 10). This document is equivalent to ISO /IEC 27005.2022 "Information Security, Cybersecurity and Privacy Protection - Guidance on Information Security Risk Management". The following minimal editorial changes have been made to this document. ---To coordinate with my country's technical standards system, the name of the standard will be changed to "Guidelines for Information Security Risk Management in Cybersecurity Technologies". Please note that some of the contents of this document may involve patents. The issuing organization of this document does not assume the responsibility for identifying patents. This document is proposed and coordinated by the National Cybersecurity Standardization Technical Committee (SAC/TC260). This document was drafted by. China Electronics Technology Standardization Institute, Beijing Anxin Tianxing Technology Co., Ltd., China Cybersecurity Review and Certification Certification and Market Supervision Big Data Center, China National Accreditation Service for Conformity Assessment, China Information Security Evaluation Center, Heilongjiang Provincial Cyberspace Research Center Research Center, China Electronics Great Wall Internet System Application Co., Ltd., Shandong Provincial Institute of Standardization, Beijing Tianrongxin Network Security Technology Co., Ltd., Guangzhou Civil Aviation Information Technology Co., Ltd., Shaanxi Network and Information Security Evaluation Center, AsiaInfo Technologies (Chengdu) Co., Ltd., China Southern Power Grid China Power Grid Information and Communication Technology Co., Ltd., New H3C Technologies Co., Ltd., State Grid Network Security (Beijing) Technology Co., Ltd., State Computer Group Network Emergency Technical Processing Coordination Center, China United Network Communications Group Co., Ltd., Venusstar Information Technology Group Co., Ltd., Beijing Shenzhou Green Alliance Technology Co., Ltd., China Science and Technology Information Security Common Technology National Engineering Research Center Co., Ltd., Hangzhou Anheng Information Technology Co., Ltd. Co., Ltd., the First Research Institute of the Ministry of Public Security, Beijing Hillstone Network Technology Co., Ltd., and Civil Aviation Chengdu Electronic Information Technology Co., Ltd. Beijing Zhongjin Cloud Network Technology Co., Ltd., Beijing CESI Certification Co., Ltd., Shanghai Guanan Information Technology Co., Ltd., Shanghai San Zero Guard Information Security Co., Ltd., Beijing Times Newway Information Technology Co., Ltd., Northwestern Polytechnical University, State Energy Group New Energy Technology RESEARCH INSTITUTE LIMITED. The main drafters of this document are. Xu Yuna, Chen Qingmin, Lin Yanghuichen, Wang Bingzheng, Fu Zhigao, Youqi, Fan Kefeng, Li Lin, Wang Yan, Fang Zhou, Qu Jiaxing, Bai Rui, Min Jinghua, Gong Wei, Lei Xiaofeng, Bai Xudong, Yang Jingjing, Lu Li, Wang Jiao, Zhu Xuefeng, Zheng Yaozong, Li Jun, Liao Shuangxiao, Wang Jian, Wan Xiaolan, Li Zhiqi, Cui Mufan, Jin Pu, Hu Yue, Hao Shaoshuo, Hu Jianxun, Chen Xing, Lü You, Li Qiuxiang, He Yisheng, Ma Yong, Cheng Yan, Zhao Lihua, Xie Jiang, Liu Biao, Wang Lianqiang, Wang Zhen, Gao Chao, Zhang Qiusheng, Li Jing, and Lü Fangchao. The previous versions of this document and the documents it replaces are as follows. ---First published in.2015 as GB/T 31722-2015; ---This is the first revision.

introduction

This document provides guidance on. --- Implement the information security risk management requirements specified in GB/T 22080-2025; measures to address information security related risks (see 6.1 and Chapter 8 of GB/T 22080-2025); --- Implement the risk management guidance in GB/T 24353-2022 in the information security environment. This document contains specific guidance on risk management and supplements GB/T 31496-2023. Cybersecurity Technology Information Security Risk Management Guidance 1 Scope This document provides guidance to help organizations. ---Meet the requirements of GB/T 22080-2025 on activities to address information security risks; ---Implement information security risk management activities, especially information security risk assessment and disposal. This document is applicable to all organizations, regardless of type, size or sector. 2 Normative references The contents of the following documents constitute the essential clauses of this document through normative references in this document. For referenced documents without a date, only the version corresponding to that date applies to this document; for referenced documents without a date, the latest version (including all amendments) applies to This document. Note. GB/T 29246-2023 Information security technology - Information security management system overview and vocabulary (ISO /IEC 27000.2018, IDT) 3 Terms and Definitions For the purposes of this document, the terms and definitions defined in ISO /IEC 27000 and the following apply. ISO and IEC maintain terminology databases used for standardization at the following addresses. 3.1 Terms related to information security risks 3.1.1 external context The external conditions in which an organization seeks to achieve its goals. Note. The external environment includes the following. ---International, national, regional or local social, cultural, political, legal, regulatory, financial, technological, economic and geological environment; ---Key drivers and trends that have an impact on organizational goals; ---Relationships with external stakeholders, their views, values, needs and expectations; ---Contractual relationships and commitments; ---The complexity and dependencies of the network. [Source. GB/T 23694-2024, 3.3.4, with modifications] 3.1.2 internal context The internal situation in which an organization seeks to achieve its goals. Note. The internal environment includes the following. ---Vision, mission and values;

Tips & Frequently Asked Questions:

Question 1: How long will the true-PDF of GB/T 31722-2025_English be delivered?

Answer: Upon your order, we will start to translate GB/T 31722-2025_English as soon as possible, and keep you informed of the progress. The lead time is typically 4 ~ 7 working days. The lengthier the document the longer the lead time.

Question 2: Can I share the purchased PDF of GB/T 31722-2025_English with my colleagues?

Answer: Yes. The purchased PDF of GB/T 31722-2025_English will be deemed to be sold to your employer/organization who actually pays for it, including your colleagues and your employer's intranet.

Question 3: Does the price include tax/VAT?

Answer: Yes. Our tax invoice, downloaded/delivered in 9 seconds, includes all tax/VAT and complies with 100+ countries' tax regulations (tax exempted in 100+ countries) -- See Avoidance of Double Taxation Agreements (DTAs): List of DTAs signed between Singapore and 100+ countries

Question 4: Do you accept my currency other than USD?

Answer: Yes. If you need your currency to be printed on the invoice, please write an email to [email protected]. In 2 working-hours, we will create a special link for you to pay in any currencies. Otherwise, follow the normal steps: Add to Cart -- Checkout -- Select your currency to pay.

Question 5: Should I purchase the latest version GB/T 31722-2025?

Answer: Yes. Unless special scenarios such as technical constraints or academic study, you should always prioritize to purchase the latest version GB/T 31722-2025 even if the enforcement date is in future. Complying with the latest version means that, by default, it also complies with all the earlier versions, technically.

Refund Policy     Privacy Policy     Terms of Service     Shipping Policy     Contact Information