|
US$439.00 ยท In stock Delivery: <= 4 days. True-PDF full-copy in English will be manually translated and delivered via email. GB/T 37002-2018: Information security technology -- Security techniques requirement for electronic mail system Status: Valid
| Standard ID | Contents [version] | USD | STEP2 | [PDF] delivered in | Standard Title (Description) | Status | PDF |
| GB/T 37002-2018 | English | 439 |
Add to Cart
|
4 days [Need to translate]
|
Information security technology -- Security techniques requirement for electronic mail system
| Valid |
GB/T 37002-2018
|
PDF similar to GB/T 37002-2018
Basic data | Standard ID | GB/T 37002-2018 (GB/T37002-2018) | | Description (Translated English) | Information security technology -- Security techniques requirement for electronic mail system | | Sector / Industry | National Standard (Recommended) | | Classification of Chinese Standard | L80 | | Classification of International Standard | 35.040 | | Word Count Estimation | 22,288 | | Date of Issue | 2018-12-28 | | Date of Implementation | 2019-07-01 | | Issuing agency(ies) | State Administration for Market Regulation, China National Standardization Administration |
GB/T 37002-2018: Information security technology -- Security techniques requirement for electronic mail system ---This is a DRAFT version for illustration, not a final translation. Full copy of true-PDF in English version (including equations, symbols, images, flow-chart, tables, and figures etc.) will be manually/carefully translated upon your order.
Information security technology--Security techniques requirement for electronic mail system
ICS 35.040
L80
National Standards of People's Republic of China
Information security technology
Email system security technical requirements
Published on.2018-12-28
2019-07-01 implementation
State market supervision and administration
China National Standardization Administration issued
Content
Foreword I
1 Scope 1
2 Normative references 1
3 Terms and Definitions 1
4 Abbreviations 2
5 Overview 3
5.1 Security Framework 3
5.2 Security Objective 4
5.3 Security Level 4
6 Basic level safety requirements 4
6.1 Technical requirements 4
6.2 Management Requirements 8
6.3 Operation requirements 10
7 Enhanced Security Requirements 12
7.1 Technical requirements 12
7.2 Management Requirements 15
7.3 Operational requirements 15
Appendix A (informative) Email system composition 16
Appendix B (informative) Security Level Selection 17
Appendix C (informative) Safety Technology Application Model 18
Foreword
This standard was drafted in accordance with the rules given in GB/T 1.1-2009.
Please note that some of the contents of this document may involve patents. The issuing organization of this document is not responsible for identifying these patents.
This standard is proposed and managed by the National Information Security Standardization Technical Committee (SAC/TC260).
This standard was drafted. National Information Technology Security Research Center, China Electronics Technology Standardization Institute, Shenzhen Olympics Information Security Technology
Technology Co., Ltd., National Information Center, China Information Security Evaluation Center.
The main drafters of this standard. Li Jingchun, Gao Lin, Liang Li, Cheng Zhaohui, Zhou Min, Liu Yanzhen, Li Bing, Liu Nan, Tang Lingli, Yang Lan, Zhou Dejian,
Yao Jiaming, Cai Xianyong, Dan Bo, Luo Haining, Lu Pin, Rao Huayi.
Information security technology
Email system security technical requirements
1 Scope
This standard specifies the information security requirements for e-mail systems, including technical security requirements for e-mail systems, management security requirements, and
Line security requirements.
This standard applies to all levels of government departments, research institutions, enterprises and institutions, such as Internet mail systems, e-government external mail system,
The design, construction, use and test evaluation of the e-government intranet mail system or the unit private network mail system are also applicable to the design of related products.
Manufacturing, testing, management and service.
2 Normative references
The following documents are indispensable for the application of this document. For dated references, only dated versions apply to this article.
Pieces. For undated references, the latest edition (including all amendments) applies to this document.
GB/T 21028-2007 Information security technology server security technical requirements
GB/T 25069-2010 Information Security Technology Terminology
GB/T 30282-2013 Information security technology anti-spam product technical requirements and test evaluation methods
GB/T 32915-2016 Information security technology binary sequence randomness detection method
GM/T 0012-2012 Trusted Computing Trusted Cryptographic Module Interface Specification
GM/T 0013-2012 Trusted Computing Trusted Cryptographic Module Compliance Detection Specification
GM/T 0016-2012 Smart Password Key Password Application Interface Specification
GM/T 0017-2012 Smart Password Key Password Application Interface Data Format Specification
GM/T 0018-2012 cryptographic device application interface specification
GM/T 0021-2012 Dynamic Password Password Application Technical Specification
3 Terms and definitions
The following terms and definitions as defined in GB/T 25069-2010 apply to this document.
3.1
Email system electronicmailsystem
An information system that supports users' use of email services.
Note. The e-mail system consists of an e-mail client and an e-mail server, and the peripheral security device protects the operating environment of the system.
safety. See Appendix A for a schematic diagram of the structure of the email system.
3.2
Email server electronicmailserver
A computer system that provides mail application services to clients, consisting of server hardware, operating system, and support system (WEB services, middleware)
And database) and mail application system.
3.3
Application service security isolation mechanism securityisolationmechanismofapplicationserver
Through virtualization or para-virtualization technology, each application service runs on a separate operating system environment, and each application service is logically implemented.
Completely isolated.
Tips & Frequently Asked Questions:Question 1: How long will the true-PDF of GB/T 37002-2018_English be delivered?Answer: Upon your order, we will start to translate GB/T 37002-2018_English as soon as possible, and keep you informed of the progress. The lead time is typically 2 ~ 4 working days. The lengthier the document the longer the lead time. Question 2: Can I share the purchased PDF of GB/T 37002-2018_English with my colleagues?Answer: Yes. The purchased PDF of GB/T 37002-2018_English will be deemed to be sold to your employer/organization who actually pays for it, including your colleagues and your employer's intranet. Question 3: Does the price include tax/VAT?Answer: Yes. Our tax invoice, downloaded/delivered in 9 seconds, includes all tax/VAT and complies with 100+ countries' tax regulations (tax exempted in 100+ countries) -- See Avoidance of Double Taxation Agreements (DTAs): List of DTAs signed between Singapore and 100+ countriesQuestion 4: Do you accept my currency other than USD?Answer: Yes. If you need your currency to be printed on the invoice, please write an email to [email protected]. In 2 working-hours, we will create a special link for you to pay in any currencies. Otherwise, follow the normal steps: Add to Cart -- Checkout -- Select your currency to pay.
|