|
US$339.00 · In stock Delivery: <= 4 days. True-PDF full-copy in English will be manually translated and delivered via email. GB/T 39403-2020: Security protection management requirements of cloud manufacturing service platform Status: Valid
| Standard ID | Contents [version] | USD | STEP2 | [PDF] delivered in | Standard Title (Description) | Status | PDF |
| GB/T 39403-2020 | English | 339 |
Add to Cart
|
4 days [Need to translate]
|
Security protection management requirements of cloud manufacturing service platform
| Valid |
GB/T 39403-2020
|
PDF similar to GB/T 39403-2020
Basic data | Standard ID | GB/T 39403-2020 (GB/T39403-2020) | | Description (Translated English) | Security protection management requirements of cloud manufacturing service platform | | Sector / Industry | National Standard (Recommended) | | Classification of Chinese Standard | J07 | | Classification of International Standard | 35.240.50 | | Word Count Estimation | 18,127 | | Date of Issue | 2020-11-19 | | Date of Implementation | 2021-06-01 | | Regulation (derived from) | National Standard Announcement No. 26 of 2020 | | Issuing agency(ies) | State Administration for Market Regulation, China National Standardization Administration |
GB/T 39403-2020: Security protection management requirements of cloud manufacturing service platform ---This is a DRAFT version for illustration, not a final translation. Full copy of true-PDF in English version (including equations, symbols, images, flow-chart, tables, and figures etc.) will be manually/carefully translated upon your order.
(Cloud manufacturing service platform security protection management requirements)
ICS 35.240.50
J07
National Standards of People's Republic of China
Cloud manufacturing service platform security protection management requirements
2020-11-19 released
2021-06-01 implementation
State Administration for Market Regulation
Issued by the National Standardization Management Committee
Table of contents
Preface Ⅲ
1 Scope 1
2 Normative references 1
3 Terms and definitions 1
4 Abbreviations 2
5 General overview 2
6 Resource layer security protection requirements 3
6.1 Security requirements for device access control 3
6.2 Equipment safety requirements 3
6.3 Security requirements for border protection 4
6.4 Network transmission security requirements 4
7 Cloud platform layer security protection requirements 4
7.1 IAAS layer security protection requirements 4
7.2 PAAS layer security protection requirements 7
7.3 SAAS layer security protection requirements 9
Foreword
This standard was drafted in accordance with the rules given in GB/T 1.1-2009.
Please note that certain contents of this document may involve patents. The issuing agency of this document is not responsible for identifying these patents.
This standard was proposed by China Machinery Industry Federation.
This standard is under the jurisdiction of the National Automation System and Integration Standardization Technical Committee (SAC/TC159).
Drafting organizations of this standard. Beijing Aerospace Intelligent Manufacturing Technology Development Co., Ltd., Guizhou Aerospace Cloud Network Technology Co., Ltd., Aerospace Cloud Network Data Research Institute
Research Institute (Guangdong) Co., Ltd., Aerospace Cloud Network Technology Development Co., Ltd., Sichuan Zhongying Smart Quality Engineering Technology Research Institute Co., Ltd.,
Beijing Institute of Electronic Engineering, Beijing Institute of Mechanical Industry Automation Co., Ltd., Beijing University of Aeronautics and Astronautics, Beijing Aerospace Ziguang Branch
Technology Co., Ltd., Industrial Cloud Manufacturing (Sichuan) Innovation Center Co., Ltd., Tsinghua University, Siemens (China) Co., Ltd.
The main drafters of this standard. Chai Xudong, Zou Ping, Li Xiaodong, Yu Wentao, Hou Baocun, Wang Lin, Yang Lingyun, He Hao, Gao Jing, Zhou Han, Wang Mei,
Wang Haidan, Zhang Lin, Li Yunpeng, Jin Xin, Liu Gang, Liu Botao, Xu Peiyan, Yu Jianhua, Liu Kui.
Cloud manufacturing service platform security protection management requirements
1 Scope
This standard specifies the resource layer, IAAS layer, PAAS layer and SAAS layer security protection management in the cloud manufacturing service platform security protection system.
Management requirements.
This standard applies to the management of the security protection system of the cloud manufacturing service platform.
2 Normative references
The following documents are indispensable for the quotation of this document. For dated reference documents, only the dated version applies to this article
Pieces. For undated references, the latest version (including all amendments) applies to this document.
GB 50174-2017 Data Center Design Specification
3 Terms and definitions
The following terms and definitions apply to this document.
3.1
Cloud Manufacturing Service Platform
Support various activities throughout the product life cycle, and support the perception and access of various manufacturing resources and manufacturing capabilities, virtualization, servitization, search,
Discovery, matching, combination, transaction, execution, scheduling, settlement, evaluation, etc., support the universal use of users, support decentralized manufacturing resources and manufacturing
Support environment and tool set for centralized management of capabilities, centralized manufacturing resources, and decentralized manufacturing capabilities.
[GB/T 29826-2013, definition 2.1.5]
3.2
cyber security
Protect the hardware, software and data in the network system from damage due to accidental or malicious reasons,
Changes and leaks ensure the continuous, reliable and normal operation of the system and the uninterrupted process of network services.
3.3
Platform security
Strategies and practices to protect the entire cloud manufacturing service platform environment and infrastructure, applications, data and information to prevent unauthorized
The process of using/accessing, distributed denial of service (DDoS), malware and other threats.
3.4
Application security
In the application, by finding, fixing and preventing security vulnerabilities and developing, adding and testing security functions, to prevent the application from being affected.
Threats such as unauthorized access and tampering make the application more secure.
3.5
Data Security
The process of protecting data in the whole life cycle of data, so as to prevent unauthorized access to data and data damage.
3.6
Infrastructure as a service
The service provided to consumers is the use of all computing infrastructure
Tips & Frequently Asked Questions:Question 1: How long will the true-PDF of GB/T 39403-2020_English be delivered?Answer: Upon your order, we will start to translate GB/T 39403-2020_English as soon as possible, and keep you informed of the progress. The lead time is typically 2 ~ 4 working days. The lengthier the document the longer the lead time. Question 2: Can I share the purchased PDF of GB/T 39403-2020_English with my colleagues?Answer: Yes. The purchased PDF of GB/T 39403-2020_English will be deemed to be sold to your employer/organization who actually pays for it, including your colleagues and your employer's intranet. Question 3: Does the price include tax/VAT?Answer: Yes. Our tax invoice, downloaded/delivered in 9 seconds, includes all tax/VAT and complies with 100+ countries' tax regulations (tax exempted in 100+ countries) -- See Avoidance of Double Taxation Agreements (DTAs): List of DTAs signed between Singapore and 100+ countriesQuestion 4: Do you accept my currency other than USD?Answer: Yes. If you need your currency to be printed on the invoice, please write an email to [email protected]. In 2 working-hours, we will create a special link for you to pay in any currencies. Otherwise, follow the normal steps: Add to Cart -- Checkout -- Select your currency to pay.
|