HOME   Cart(0)   Quotation   About-Us Tax PDFs Standard-List Powered by Google www.ChineseStandard.net Database: 189759 (20 Apr 2025)

GB/T 35282-2023 English PDF (GB/T 35282-2017: Older version)

Search result: GB/T 35282-2023 (GB/T 35282-2017 Older version)
Standard IDContents [version]USDSTEP2[PDF] delivered inStandard Title (Description)StatusPDF
GB/T 35282-2023English579 Add to Cart 5 days [Need to translate] Information security technology - Security technology specifications of mobile e-government system Valid GB/T 35282-2023
GB/T 35282-2017English559 Add to Cart 3 days [Need to translate] Information security technology -- Security technology specifications of mobile e-government system Obsolete GB/T 35282-2017


BASIC DATA
Standard ID GB/T 35282-2023 (GB/T35282-2023)
Description (Translated English) Information security technology -- Security technology specifications of mobile e-government system
Sector / Industry National Standard (Recommended)
Classification of Chinese Standard L80
Classification of International Standard 35.030
Word Count Estimation 28,247
Date of Issue 2023-05-23
Date of Implementation 2023-12-01
Older Standard (superseded by this standard) GB/T 35282-2017
Issuing agency(ies) State Administration for Market Regulation, National Standardization Management Committee


GB/T 35282-2023: Information security technology e-government mobile office system security technical specification ICS 35:030 CCSL80 National Standards of People's Republic of China Replacing GB/T 35282-2017 Information Security Technology Security technical specification for e-government mobile office system Released on 2023-05-23 2023-12-01 implementation State Administration for Market Regulation Released by the National Standardization Management Committee table of contents Preface III 1 Range 1 2 Normative references 1 3 Terms and Definitions 1 4 Abbreviations 2 5 Overview 2 5:1 E-government mobile office system reference architecture 2 5:2 Security technical framework of e-government mobile office system 3 6 Mobile Terminal Security Requirements 4 6:1 Terminal basic environment security 4 6:2 Mobile government application security 5 7 Mobile Communication Security Requirements 6 7:1 Secure communication network 6 7:2 Secure Communication Protocol 6 8 Mobile access security requirements 6 8:1 Boundary protection 6 8:2 Identification 6 8:3 Access Control 7 8:4 Intrusion Prevention 7 9 Server Security Requirements 7 9:1 Identification 7 9:2 Access Control 7 9:3 Security Audit 7 9:4 Intrusion Prevention 7 9:5 Data Security 8 9:6 Security isolation and exchange 8 9:7 Mobile Terminal Virtualization 9 10 System Security Management Requirements 9 10:1 Mobile Terminal Management 9 10:2 Mobile Application Management 9 10:3 Data Security Management 9 10:4 Safety Monitoring 9 10:5 Security Audit 10 11 Test evaluation method 10 11:1 Mobile Terminal Security Requirements 10 11:2 Mobile communication security requirements 13 11:3 Mobile access security requirements 14 11:4 Server Security Requirements 15 11:5 System security management requirements 18 Appendix A (informative) Major security risks faced by e-government mobile office systems 21 Appendix B (Informative) Division of Technical Requirements for E-government Mobile Office System 22 Reference 23 foreword This document is in accordance with the provisions of GB/T 1:1-2020 "Guidelines for Standardization Work Part 1: Structure and Drafting Rules for Standardization Documents" drafting: This document replaces GB/T 35282-2017 "Information Security Technology E-Government Mobile Office System Security Technical Specifications", and Compared with GB/T 35282-2017, except for structural adjustment and editorial changes, the main technical changes are as follows: ---Changed the "Scope" chapter (see Chapter 1, Chapter 1 of the:2017 edition); ---Changed the definitions of terms such as mobile terminal, mobile terminal management, and mobile application management, and added government affairs data and mobile government affairs application Terms and definitions such as procedures (see Chapter 3, Chapter 3 of the:2017 edition); ---Changed the structure of the mobile access area and server in the "Basic Structure of E-government Mobile Office System" diagram, increasing system security Management (see Chapter 5, Chapter 5 of the:2017 edition); --- Increased the relevant content of the main security risks of the e-government mobile office system, and changed the "Security of the e-government mobile office system" "Full Technology Framework" (see Chapter 5 and Appendix A, Chapter 5 of the:2017 edition); ---Changed the specific security technical requirements in mobile terminal security, mobile communication security, mobile access security, and server security (see Section Chapter 6, Chapter 7, Chapter 8, Chapter 9, Chapter 7, Chapter 8, Chapter 9, Chapter 10 of the:2017 edition); --- Increased the chapter "System Security Management Requirements", and increased the relevant technical requirements for system office security monitoring (see Chapter 10); ---Added the chapter "Testing and Evaluation Methods", and proposed mobile terminal security, mobile communication security, mobile access security, server security The testing and evaluation methods of the overall and system safety management (see Chapter 11): This document is proposed and managed by the National Information Security Standardization Technical Committee (SAC/TC260): This document is drafted by: State Information Center, Beijing Bangbang Security Technology Co:, Ltd:, Shanghai Yinglian Information Technology Co:, Ltd:, Beijing Jingzhiyou Network Security Technology Co:, Ltd:, China Mobile Communications Group Co:, Ltd:, Huawei Technologies Co:, Ltd:, AsiaInfo Technology (Chengdu) Co:, Ltd:, Beijing Beixinyuan Software Co:, Ltd:, Tongzhi Weiye Software Co:, Ltd:, Hangzhou Ying Hi-Tech Co:, Ltd:, Shanghai Guanan Information Technology Co:, Ltd: Technology Co:, Ltd:, Xi'an Jiaotong University Jabil Network Technology Co:, Ltd:, Beijing Tianrongxin Network Security Technology Co:, Ltd:, Yuanxin Information Technology Group Co:, Ltd:, Beijing Jinshan Office Software Co:, Ltd:, China Academy of Information and Communications Technology, Fujian Provincial Economic Information Center, Zhongguancun:com Network Security and Information Industry Alliance, Sangfor Technology Co:, Ltd:, Jilin Information Security Evaluation Center, Xi'an University of Posts and Telecommunications, Wuhan Antiy Information Technology Co:, Ltd:, Shaanxi Provincial Network and Information Security Evaluation Center, Qi Anxin Wangshen Information Technology (Beijing) Co:, Ltd:, Zhengzhou Xinda Jiean Information Technology Co:, Ltd:, Shenyang Neusoft System Integration Engineering Co:, Ltd:, Shenzhen Haiyunan Network Security Technology Co:, Ltd: Company, New H3C Technology Co:, Ltd:, China Software Evaluation Center, China Trade Promotion Information Technology Co:, Ltd: The main drafters of this document: Liu Bei, Cheng Hao, Bao Lina, Xu Jin, Yan Guixun, Yuan Sen, Li Kun, Wu Aming, Han Yun, Zhao Haiyan, Huang Jing, Huang Min, Liao Shuangxiao, Jiang Guohui, Wang Yongqi, Sun Jianshan, He Tao, Liu Hao, Xie Jiang, He Jianfeng, Zhang Chao, Jiang Zhe, Zhang Shuling, Ning Hua, Liu Tao, Zhang Xiaosheng, Wang Ke, Yang Zhigang, Liu Zhanfeng, Zhang Yong, Chen Cheng, Tian Jiahao, Zhao Chunlei, Liang Songtao, Zhao Chunpeng, Xie Chaohai, Wan Xiaolan, Li Yutian, Zhao Tian: The release status of previous versions of this document and the documents it replaces are as follows: ---First published as GB/T 35282-2017 in:2017; --- This is the first revision: Information Security Technology Security technical specification for e-government mobile office system 1 Scope This document specifies the mobile terminal security, mobile communication security, mobile access security, and server security of the e-government mobile office system: And the technical requirements of each part, such as system safety management, etc:, and the test and evaluation methods are given: This document is applicable to the security design, construction implementation, security management and test evaluation of the e-government mobile office system: 2 Normative references The contents of the following documents constitute the essential provisions of this document through normative references in the text: Among them, dated references For documents, only the version corresponding to the date is applicable to this document; for undated reference documents, the latest version (including all amendments) is applicable to this document: GB/T 20279-2015 Information Security Technology Network and Terminal Isolation Product Security Technical Requirements GB/T 22239-2019 Basic Requirements for Network Security Level Protection of Information Security Technology GB/T 25069-2022 Information Security Technical Terminology GB/T 28448-2019 Information Security Technology Network Security Level Protection Evaluation Requirements GB/T 35281-2017 Information Security Technology Mobile Internet Application Server Security Technical Requirements GB/T 37952-2019 Technical requirements for information security technology mobile terminal security management platform GB/T 38636-2020 Information Security Technology Transport Layer Cryptography Protocol (TLCP) GB/T 39786 Basic Requirements for Cryptography Application in Information Security Technology Information System 3 Terms and Definitions The following terms and definitions defined in GB/T 25069-2022 apply to this document: 3:1 mobile terminalmobileterminal Mobile communication terminal products that are connected to the public mobile communication network, have an operating system, and can be installed and uninstalled by users themselves: [Source: GB/T 37952-2019, 3:1] 3:2 E-government mobile office system mobilee-governmentsystem Users use mobile terminals and mobile communication networks to access the e-government office system for mobile office information systems: 3:3 For mobile terminals, it provides remote security control and management of the whole life cycle from registration, activation, use to disposal: 3:4 For mobile application software, it provides security management for the whole process from distribution, installation, use, upgrade to uninstallation: 3:5 Government data governmentdata Various data resources collected, generated, stored, and managed by government departments at all levels and their technical support units in accordance with the law in the course of performing their duties: [Source: GB/T 38664:1-2020, 3:1] ......


GB/T 35282-2017 Information security technology - Security technology specifications of mobile e-government system ICS 35.040 L80 National Standards of People's Republic of China Information Security Technology E-Government Mobile Office system security technical specifications Securitytechnology specifications for mobilee-government system 2017-12-29 Posted 2018-07-01 implementation General Administration of Quality Supervision, Inspection and Quarantine of People's Republic of China China National Standardization Administration released Directory Preface Ⅰ 1 range 1 2 Normative references 1 3 Terms and definitions 1 4 Abbreviations 2 5 e-government mobile office system basic structure 2 6 e-government mobile office system security framework 3 6.1 The main system security risks 3 6.2 System Security Technical Framework 4 7 Mobile Terminal Security 4 7.1 General Configuration 4 7.2 digital certificate 5 7.3 VPN Client 5 7.4 MDM Client 5 7.5 MAM client 5 7.6 MCM Client 5 7.7 Mobile Security Application Support Client 6 7.8 Identification 6 7.9 Data Security Storage 6 7.10 Security 6 7.11 Operating environment isolation 6 Channel Security 7 9 Access Security 7 9.1 Access Authentication Gateway 7 9.2 MDM platform 7 9.3 Mobile Security Application Support Platform 8 10 server-side security 8 10.1 MAM platform 8 10.2 MCM platform 9 Reference 10 Foreword This standard was drafted in accordance with the rules given in GB/T 1.1-2009. This standard by the National Information Security Standardization Technical Committee (SAC/TC260) and focal point. This standard was drafted unit. National Information Center, Huawei Technologies Co., Ltd., Shenzhen City, Yanshan Mobile Technology Co., Ltd., Qingdao Economic Development Exhibition Institute, Xinjiang Uygur Autonomous Region Information Center, Guangxi Zhuang Autonomous Region Economic Information Center, Tianjin e-government information and network center, China National Offshore Oil Corporation, China Communications Construction Co., Ltd., Beijing North letter Source Software Co., Ltd., Shandong Qian Yun Kai Chong Information Technology Co., Ltd., Beijing Sanwei Xin'an Technology Development Co., Ltd., ZTE Corporation. The main drafters of this standard. Li Xinyou, Liu Bei, Fu Hongyan, Wu Yafi, Liu Yi, Zhou Huadong, Caodao Gang, Yang Xingyi, Wen Na, Ma Ming, Zhao Ruoping, Zhao Jun, Zhou Ming, Jin Fang, Tan Chaohong, Wen Jing, Xu Changjiang, Xu Jinbao, Hou Xiaofeng, Zhou Bin, Feng Xue, Pan Ziyi, Liu Xin, Zhong Li, Liu Xiaodong. Information Security Technology E-Government Mobile Office system security technical specifications 1 Scope This standard specifies the basic structure of the e-government mobile office system, security framework, and mobile terminal security, channel security, mobile access Security and service-side security should meet the technical requirements. This standard applies to non-confidential e-government mobile office system security design, product development, project implementation and operation management, but also for For non-confidential e-government mobile office system for safety evaluation basis. The enhanced requirements of this standard apply to a higher level of safety Mobile office systems, such as security level three or more information systems. 2 Normative references The following documents for the application of this document is essential. For dated references, only the dated version applies to this article Pieces. For undated references, the latest edition (including all amendments) applies to this document. Information technology - Computerized terminal computer core configuration specifications GB/T 30284-2013 mobile communication intelligent terminal operating system security technology requirements (EAL2 level) 3 Terms and definitions The following terms and definitions apply to this document. 3.1 Mobile terminal mobileterminal Portable, removable computing device. Note.Mobile terminals include smart phones, tablets, laptops, with wireless Internet access. 3.2 E-government mobile office system mobilee-governmentystem Use of mobile terminals, anytime, anywhere through the wireless network access e-government office system for online office applications. 3.3 Mobile terminal management mobiledevicemanagement For mobile terminals, it provides full life-cycle management from registration, activation, use to discard, such as configuration management of mobile terminals, security Management, Asset Management, etc., referred to as MDM. 3.4 Mobile app management mobileapplicationmanagement For mobile applications, it provides monitoring and management of processes and behaviors such as distribution, installation, use, upgrade and uninstallation, or MAM for short. 3.5 Mobile content management mobilecontentmanagement For mobile terminal access, storage, transmission or processing of data content, providing information filtering, access control, data encryption, security isolation, Remaining information and other management measures, referred to as MCM. ......

Similar standards: GB/T 34953.4   GB/T 35273   GB/T 34953.2   GB/T 35290   GB/T 35274