HOME   Cart(0)   Quotation   About-Us Policy PDFs Standard-List
www.ChineseStandard.net Database: 189760 (18 Oct 2025)

GB/T 42884-2023 English PDF

US$499.00 ยท In stock
Delivery: <= 5 days. True-PDF full-copy in English will be manually translated and delivered via email.
GB/T 42884-2023: Information security technology - Guidelines for life cycle security management of mobile Internet applications(App)
Status: Valid
Standard IDContents [version]USDSTEP2[PDF] delivered inStandard Title (Description)StatusPDF
GB/T 42884-2023English499 Add to Cart 5 days [Need to translate] Information security technology - Guidelines for life cycle security management of mobile Internet applications(App) Valid GB/T 42884-2023

PDF similar to GB/T 42884-2023


Standard similar to GB/T 42884-2023

GB/T 42453   GB/T 42447   GB/T 42460   GB/Z 42885   GB/T 42888   

Basic data

Standard ID GB/T 42884-2023 (GB/T42884-2023)
Description (Translated English) Information security technology - Guidelines for life cycle security management of mobile Internet applications(App)
Sector / Industry National Standard (Recommended)
Classification of Chinese Standard L80
Classification of International Standard 35.030
Word Count Estimation 26,243
Date of Issue 2023-08-06
Date of Implementation 2024-03-01
Issuing agency(ies) State Administration for Market Regulation, China National Standardization Administration

GB/T 42884-2023: Information security technology - Guidelines for life cycle security management of mobile Internet applications(App)


---This is a DRAFT version for illustration, not a final translation. Full copy of true-PDF in English version (including equations, symbols, images, flow-chart, tables, and figures etc.) will be manually/carefully translated upon your order.
ICS 35.030 CCSL80 National Standards of People's Republic of China Information Security Technology Mobile Internet Application (App) Lifecycle Security Management Guide Published on 2023-08-06 2024-03-01 Implementation State Administration for Market Regulation Released by the National Standardization Administration Committee

Table of contents

Preface III 1 Scope 1 2 Normative reference documents 1 3 Terms and Definitions 1 4 Abbreviations 2 5 Overview 2 5.1 Security issues in App 2 5.2 App life cycle security management 2 6 Life cycle stage management process 3 6.1 Requirements Analysis Phase 3 6.2 Development and design stage 4 6.3 Test verification phase 5 6.4 Shelf release stage 6 6.5 Installation and operation phase 7 6.6 Update Maintenance Phase 7 6.7 Termination of Operations Phase 8 6.8 Other security support processes 8 7 Risk Monitoring and Management Process 9 7.1 Risk data management9 7.2 Security vulnerability management 10 Appendix A (informative) Classification and description of security issues in App 13 A.1 Classification and description of malicious programs13 A.2 Classification and description of personal information risks13 A.3 Classification and description of application behavior risks14 A.4 Classification and description of security vulnerabilities15 Appendix B (informative) The relationship between the security issues existing in the App and the response to security management activities 16 Appendix C (Informative) Security Development 17 C.1 Program safety17 C.2 Security 20 Reference 21

Foreword

This document complies with the provisions of GB/T 1.1-2020 "Standardization Work Guidelines Part 1.Structure and Drafting Rules of Standardization Documents" Drafting. Please note that some content in this document may be subject to patents. The publisher of this document assumes no responsibility for identifying patents. This document is proposed and coordinated by the National Information Security Standardization Technical Committee (SAC/TC260). This document was drafted by. Wuhan Antiy Information Technology Co., Ltd., Beijing Saixi Technology Development Co., Ltd., China Information Communications Information Research Institute, Huawei Technologies Co., Ltd., Vivo Mobile Communications Co., Ltd., 360 Technology Group Co., Ltd., OPPO Guangdong Mobile Communications Xin Co., Ltd., Beijing Xiaomi Mobile Software Co., Ltd., Third Research Institute of the Ministry of Public Security, National Computer Virus Emergency Response Center, China Software Evaluation Center, National Computer Network Emergency Technology Coordination Center, Institute of Information Engineering, Chinese Academy of Sciences, Venus Information Technology Center Tuan Group Co., Ltd., Lenovo (Beijing) Co., Ltd., Midea Group Co., Ltd., Hisense Group Holdings Co., Ltd., Ant Technology Group Co., Ltd., China Southern Power Grid Digital Grid Research Institute Co., Ltd., Beijing Zhiyou Network Security Technology Co., Ltd., Hangzhou Anheng Information Technology Technology Co., Ltd., Beijing Zhizhangyi Technology Co., Ltd., Beijing Baidu Netcom Technology Co., Ltd., Beijing Edition Information and Communication Technology Co., Ltd., Beijing Jingkuaishou Technology Co., Ltd., Shaanxi Information Engineering Research Institute, Beijing Bangbang Security Technology Co., Ltd. The main drafters of this document. Pan Xuanchen, Xu Yuna, Chen Cheng, Wang Songhe, Yuan Zhongju, Cheng Mingjiang, Yao Yinan, Li Teng, Lu Wei, Chen Jialin, Zhang Yan, Tian Yuan, Liu Yan, Cai Yiming, Qin Xiaolei, He Nengqiang, Lu Zhigang, Yu Lina, Sun Haiyan, Shi Jing, Li Ruxin, Yang Kun, Zhang Jueyi, Wang Xin, Bai Xiaoyuan, Mu Tianshi, Han Yun, Li Xianzhen, Li Biao, Tang Jiawei, Dong Hong, Pan Zhengtai, Fang Ning, Yi Qiang, Du Dan, Jia Ke, Luo Hongwei, Yang Minghui, Xu Xiangzhi, Bi Kaifeng. Information Security Technology Mobile Internet Application (App) Lifecycle Security Management Guide

1 Scope

This document provides security management of the mobile Internet application (App) life cycle stage management process and risk monitoring management process. guide. This document is applicable to life cycle security management of App development and operation by App providers, App distribution platform managers and mobile Intelligent terminal manufacturers and other reference use.

2 Normative reference documents

The contents of the following documents constitute essential provisions of this document through normative references in the text. Among them, the dated quotations For undated referenced documents, only the version corresponding to that date applies to this document; for undated referenced documents, the latest version (including all amendments) applies to this document. GB/T 25069-2022 Information security technical terms GB/T 28458-2020 Information security technology network security vulnerability identification and description specifications GB/T 38674-2020 Information Security Technology Application Software Security Programming Guide GB/T 39720-2020 Information security technology mobile intelligent terminal security technical requirements and test evaluation methods GB/T 41391-2022 Information Security Technology Basic Requirements for Mobile Internet Applications (Apps) to Collect Personal Information

3 Terms and definitions

GB/T 25069-2022, GB/T 38674-2020, GB/T 39720-2020 and GB/T 41391-2022 and The following terms and definitions apply to this document. 3.1 smart mobile terminal smart mobile terminal A mobile terminal that has an open system that can provide application development interfaces and can install and run third-party application software. [Source. GB/T 39720-2020,3.1] 3.2 Application software that runs on mobile smart terminals to provide information services to users. Note. Including downloaded, installed and run applications and small programs, referred to as App. [Source. GB/T 41391-2022, 3.1, with modifications] 3.3 The process of app evolution over time from demand analysis to termination of operation. 3.4 An organization or individual who designs, develops or operates an App.