HOME   Cart(0)   Quotation   About-Us Policy PDFs Standard-List
www.ChineseStandard.net Database: 189759 (26 Oct 2025)

GB/T 37002-2018 English PDF

US$439.00 ยท In stock
Delivery: <= 4 days. True-PDF full-copy in English will be manually translated and delivered via email.
GB/T 37002-2018: Information security technology -- Security techniques requirement for electronic mail system
Status: Valid
Standard IDContents [version]USDSTEP2[PDF] delivered inStandard Title (Description)StatusPDF
GB/T 37002-2018English439 Add to Cart 4 days [Need to translate] Information security technology -- Security techniques requirement for electronic mail system Valid GB/T 37002-2018

PDF similar to GB/T 37002-2018


Standard similar to GB/T 37002-2018

GB/T 37092   GB/T 36651   GB/T 36958   GB/T 37027   GB/T 19713   

Basic data

Standard ID GB/T 37002-2018 (GB/T37002-2018)
Description (Translated English) Information security technology -- Security techniques requirement for electronic mail system
Sector / Industry National Standard (Recommended)
Classification of Chinese Standard L80
Classification of International Standard 35.040
Word Count Estimation 22,288
Date of Issue 2018-12-28
Date of Implementation 2019-07-01
Issuing agency(ies) State Administration for Market Regulation, China National Standardization Administration

GB/T 37002-2018: Information security technology -- Security techniques requirement for electronic mail system


---This is a DRAFT version for illustration, not a final translation. Full copy of true-PDF in English version (including equations, symbols, images, flow-chart, tables, and figures etc.) will be manually/carefully translated upon your order.
Information security technology--Security techniques requirement for electronic mail system ICS 35.040 L80 National Standards of People's Republic of China Information security technology Email system security technical requirements Published on.2018-12-28 2019-07-01 implementation State market supervision and administration China National Standardization Administration issued

Content

Foreword I 1 Scope 1 2 Normative references 1 3 Terms and Definitions 1 4 Abbreviations 2 5 Overview 3 5.1 Security Framework 3 5.2 Security Objective 4 5.3 Security Level 4 6 Basic level safety requirements 4 6.1 Technical requirements 4 6.2 Management Requirements 8 6.3 Operation requirements 10 7 Enhanced Security Requirements 12 7.1 Technical requirements 12 7.2 Management Requirements 15 7.3 Operational requirements 15 Appendix A (informative) Email system composition 16 Appendix B (informative) Security Level Selection 17 Appendix C (informative) Safety Technology Application Model 18

Foreword

This standard was drafted in accordance with the rules given in GB/T 1.1-2009. Please note that some of the contents of this document may involve patents. The issuing organization of this document is not responsible for identifying these patents. This standard is proposed and managed by the National Information Security Standardization Technical Committee (SAC/TC260). This standard was drafted. National Information Technology Security Research Center, China Electronics Technology Standardization Institute, Shenzhen Olympics Information Security Technology Technology Co., Ltd., National Information Center, China Information Security Evaluation Center. The main drafters of this standard. Li Jingchun, Gao Lin, Liang Li, Cheng Zhaohui, Zhou Min, Liu Yanzhen, Li Bing, Liu Nan, Tang Lingli, Yang Lan, Zhou Dejian, Yao Jiaming, Cai Xianyong, Dan Bo, Luo Haining, Lu Pin, Rao Huayi. Information security technology Email system security technical requirements

1 Scope

This standard specifies the information security requirements for e-mail systems, including technical security requirements for e-mail systems, management security requirements, and Line security requirements. This standard applies to all levels of government departments, research institutions, enterprises and institutions, such as Internet mail systems, e-government external mail system, The design, construction, use and test evaluation of the e-government intranet mail system or the unit private network mail system are also applicable to the design of related products. Manufacturing, testing, management and service.

2 Normative references

The following documents are indispensable for the application of this document. For dated references, only dated versions apply to this article. Pieces. For undated references, the latest edition (including all amendments) applies to this document. GB/T 21028-2007 Information security technology server security technical requirements GB/T 25069-2010 Information Security Technology Terminology GB/T 30282-2013 Information security technology anti-spam product technical requirements and test evaluation methods GB/T 32915-2016 Information security technology binary sequence randomness detection method GM/T 0012-2012 Trusted Computing Trusted Cryptographic Module Interface Specification GM/T 0013-2012 Trusted Computing Trusted Cryptographic Module Compliance Detection Specification GM/T 0016-2012 Smart Password Key Password Application Interface Specification GM/T 0017-2012 Smart Password Key Password Application Interface Data Format Specification GM/T 0018-2012 cryptographic device application interface specification GM/T 0021-2012 Dynamic Password Password Application Technical Specification

3 Terms and definitions

The following terms and definitions as defined in GB/T 25069-2010 apply to this document. 3.1 Email system electronicmailsystem An information system that supports users' use of email services. Note. The e-mail system consists of an e-mail client and an e-mail server, and the peripheral security device protects the operating environment of the system. safety. See Appendix A for a schematic diagram of the structure of the email system. 3.2 Email server electronicmailserver A computer system that provides mail application services to clients, consisting of server hardware, operating system, and support system (WEB services, middleware) And database) and mail application system. 3.3 Application service security isolation mechanism securityisolationmechanismofapplicationserver Through virtualization or para-virtualization technology, each application service runs on a separate operating system environment, and each application service is logically implemented. Completely isolated.

Tips & Frequently Asked Questions:

Question 1: How long will the true-PDF of GB/T 37002-2018_English be delivered?

Answer: Upon your order, we will start to translate GB/T 37002-2018_English as soon as possible, and keep you informed of the progress. The lead time is typically 2 ~ 4 working days. The lengthier the document the longer the lead time.

Question 2: Can I share the purchased PDF of GB/T 37002-2018_English with my colleagues?

Answer: Yes. The purchased PDF of GB/T 37002-2018_English will be deemed to be sold to your employer/organization who actually pays for it, including your colleagues and your employer's intranet.

Question 3: Does the price include tax/VAT?

Answer: Yes. Our tax invoice, downloaded/delivered in 9 seconds, includes all tax/VAT and complies with 100+ countries' tax regulations (tax exempted in 100+ countries) -- See Avoidance of Double Taxation Agreements (DTAs): List of DTAs signed between Singapore and 100+ countries

Question 4: Do you accept my currency other than USD?

Answer: Yes. If you need your currency to be printed on the invoice, please write an email to [email protected]. In 2 working-hours, we will create a special link for you to pay in any currencies. Otherwise, follow the normal steps: Add to Cart -- Checkout -- Select your currency to pay.

Refund Policy     Privacy Policy     Terms of Service     Shipping Policy     Contact Information