Path:
Home >
GB/T >
Page207 > GB/T 43557-2023
Home >
Standard_List >
GB/T >
Page207 > GB/T 43557-2023
US$369.00 ยท In stock
Delivery: <= 4 days. True-PDF full-copy in English will be manually translated and delivered via email.
GB/T 43557-2023: Information security technology - Guidelines for cyber security information submission
Status: Valid
| Standard ID | Contents [version] | USD | STEP2 | [PDF] delivered in | Standard Title (Description) | Status | PDF |
| GB/T 43557-2023 | English | 369 |
Add to Cart
|
4 days [Need to translate]
|
Information security technology - Guidelines for cyber security information submission
| Valid |
GB/T 43557-2023
|
PDF similar to GB/T 43557-2023
Basic data
| Standard ID | GB/T 43557-2023 (GB/T43557-2023) |
| Description (Translated English) | Information security technology - Guidelines for cyber security information submission |
| Sector / Industry | National Standard (Recommended) |
| Classification of Chinese Standard | L80 |
| Classification of International Standard | 35.030 |
| Word Count Estimation | 18,152 |
| Date of Issue | 2023-12-28 |
| Date of Implementation | 2024-07-01 |
| Issuing agency(ies) | State Administration for Market Regulation, China National Standardization Administration |
GB/T 43557-2023: Information security technology - Guidelines for cyber security information submission
---This is a DRAFT version for illustration, not a final translation. Full copy of true-PDF in English version (including equations, symbols, images, flow-chart, tables, and figures etc.) will be manually/carefully translated upon your order.
ICS 35:030
CCSL80
National Standards of People's Republic of China
Information Security Technology Network Security Information Submission Guide
Published on 2023-12-28
2024-07-01 Implementation
State Administration for Market Regulation
Released by the National Standardization Administration Committee
Table of contents
Preface III
1 Scope 1
2 Normative references 1
3 Terms and Definitions 1
4 Contents of network security information submission 2
4:1 Information type 2
4:2 Information elements 2
5 Network security information reporting activities 7
5:1 Elements and relationships 7
5:2 Basic process 8
5:3 Submission method 10
5:4 Timeliness10
5:5 Accuracy11
5:6 Security11
Appendix A (informative) Correspondence between types of network security reporting information and categories of network security shared information 12
Reference 13
Foreword
This document complies with the provisions of GB/T 1:1-2020 "Standardization Work Guidelines Part 1: Structure and Drafting Rules of Standardization Documents"
Drafting:
Please note that some content in this document may be subject to patents: The publisher of this document assumes no responsibility for identifying patents:
This document is proposed and coordinated by the National Information Security Standardization Technical Committee (SAC/TC260):
This document was drafted by: Zhejiang Branch of the National Computer Network Emergency Response Technology Coordination Center, National Computer Network Emergency Technology Division
Coordination Center, China Electronics Technology Standardization Institute, National Computer Network Emergency Response Technology Coordination Center Jiangsu Branch, China Information Technology
Information Security Research Institute Co:, Ltd:, Shanghai Guanan Information Technology Co:, Ltd:, Venus Information Technology Group Co:, Ltd:, Beijing
Antiy Network Security Technology Co:, Ltd:, Beijing Dongfangtong Network Technology Co:, Ltd:, Hangzhou Hikvision Digital Technology Co:, Ltd:, Harbin
Erbin Engineering University, Xi'an Jiaotong University Jabil Network Technology Co:, Ltd:, Sangfor Technology Co:, Ltd:, Yuanjiang Shengbang (Beijing) Network Security
Technology Co:, Ltd:, Nanjing Juming Network Technology Co:, Ltd:, Shaanxi Provincial Network and Information Security Evaluation Center, Shanghai 30 Guardian Information
Security Co:, Ltd:, Beijing Tianrongxin Network Security Technology Co:, Ltd:, Institute of Information Engineering, Chinese Academy of Sciences, Third Research Institute of the Ministry of Public Security, Shanxi
Shuling Network Technology Co:, Ltd:, Huaxin Consulting and Design Institute Co:, Ltd:, Beijing China Green League Technology Co:, Ltd:, Zhejiang University Computer
Innovation Technology Research Institute, Zhijiang Laboratory, AsiaInfo Technology (Chengdu) Co:, Ltd:, Hangzhou Anheng Information Technology Co:, Ltd:, Hengan Jiaxin
(Beijing) Technology Co:, Ltd:
The main drafters of this document: Yan Hanbing, Guo Jing, Luo Liang, Long Quan, Ding Li, He Nengqiang, Wen Senhao, Lei Jun, Ma Yang, Zhong Sichao, Li Zhong,
Xie Jiang, Lu Ming, Wang Cambridge, Cui Tingting, Wan Li, Zhuang Zhuang, He Jianfeng, Chen Yangguo, Wang Jing, Chen Hu, Ju Tengfei, Gan Lu, Yang Jian, Liu Song, Chen Yan,
Bai Xiaoyu, Sun Xiaoping, Zhang Yuna, Jiang Bowen, Wu Shaoyong, He Zhongxu, Li Yujia, Han Xiaozhe, Li Guangli, Ma Minyan, Wang Lihua, Wang Xiaolong,
Liao Shuangxiao, Miao Chunyu, Zhang Yu:
Information Security Technology Network Security Information Submission Guide
1 Scope
This document gives the information types and elements for network security information reporting, as well as the elements, relationships, and basics of network security information reporting activities:
This process, submission method, etc:
This document is applicable to network security information reporting activities between various organizations:
2 Normative reference documents
The contents of the following documents constitute essential provisions of this document through normative references in the text: Among them, the dated quotations
For undated referenced documents, only the version corresponding to that date applies to this document; for undated referenced documents, the latest version (including all amendments) applies to
this document:
GB/T 20984 Information Security Technology Information Security Risk Assessment Method
GB/T 20986 Information Security Technology Network Security Incident Classification and Grading Guidelines
GB/T 25069-2022 Information security technical terms
GB/T 30279 Information Security Technology Network Security Vulnerability Classification and Grading Guidelines
GB/T 36643 Information security technology network security threat information format specification
3 Terms and definitions
GB/T 20984, GB/T 20986, GB/T 25069-2022, GB/T 30279, GB/T 36643 and the following terms
and definitions apply to this document:
3:1
Information describing network security (i:e: cyberspace security)-related situations:
Note: Network security information mainly includes threat information, vulnerability information, network security event information, network security situation information, etc:
[Source: GB /Z 42885-2023,3:1]
3:2
vulnerabilityvulnerability
A weakness in an asset or control that could be exploited by one or more threats:
[Source: GB/T 25069-2022,3:91]
3:3
Threat
Potential factors that could cause undesired events that could harm a system or organization:
[Source: GB/T 25069-2022,3:628]
3:4
Cybersecurity event cybersecurityevent
Indicates the occurrence of a possible information security breach or failure of certain controls:
Tips & Frequently Asked Questions:
Question 1: How long will the true-PDF of GB/T 43557-2023_English be delivered?
Answer: Upon your order, we will start to translate GB/T 43557-2023_English as soon as possible, and keep you informed of the progress. The lead time is typically 2 ~ 4 working days. The lengthier the document the longer the lead time.
Question 2: Can I share the purchased PDF of GB/T 43557-2023_English with my colleagues?
Answer: Yes. The purchased PDF of GB/T 43557-2023_English will be deemed to be sold to your employer/organization who actually pays for it, including your colleagues and your employer's intranet.
Question 3: Does the price include tax/VAT?
Answer: Yes. Our tax invoice, downloaded/delivered in 9 seconds, includes all tax/VAT and complies with 100+ countries' tax regulations (tax exempted in 100+ countries) -- See Avoidance of Double Taxation Agreements (DTAs):
List of DTAs signed between Singapore and 100+ countriesQuestion 4: Do you accept my currency other than USD?
Answer: Yes. If you need your currency to be printed on the invoice, please write an email to
[email protected]. In 2 working-hours, we will create a special link for you to pay in any currencies. Otherwise, follow the normal steps: Add to Cart -- Checkout -- Select your currency to pay.