HOME Cart(0) Quotation About-Us Policies PDFs Standard-List
www.ChineseStandard.net Database: 221938 (17 Apr 2026)
Path: Home > GB/T > Page714 > GB/T 46334-2025 || Home > Standard_List > GB/T > Page714 > GB/T 46334-2025

GB/T 46334-2025 PDF English

Price & Delivery

US$359.00 ยท In stock
Delivery: <= 4 days. True-PDF full-copy in English will be manually translated and delivered via email.
GB/T 46334-2025: Security testing methods for critical network devices - Programmable logic controller (PLC)
Status: Valid
Std IDContents [version]USDSTEP2[PDF] delivered inStandard Title (Description)Status
GB/T 46334-2025English359 Add to Cart 4 days [Need to translate] Security testing methods for critical network devices - Programmable logic controller (PLC) Valid

Standard similar to GB/T 46334-2025

GB 46864 | GB/T 43696 | GB/T 43779 | GB/T 47020 | GB 45438 |

Basic data

Standard ID GB/T 46334-2025 (GB/T46334-2025)
Description (Translated English) Security testing methods for critical network devices - Programmable logic controller (PLC)
Sector / Industry National Standard (Recommended)
Classification of Chinese Standard L80
Classification of International Standard 35.030
Word Count Estimation 18,174
Date of Issue 2025-10-05
Date of Implementation 2026-05-01
Issuing agency(ies) State Administration for Market Regulation and Standardization Administration of China

GB/T 46334-2025: Security testing methods for critical network devices - Programmable logic controller (PLC)


---This is a DRAFT version for illustration, not a final translation. Full copy of true-PDF in English version (including equations, symbols, images, flow-chart, tables, and figures etc.) will be manually/carefully translated upon your order.
ICS 35.030 CCSL80 National Standards of the People's Republic of China Security testing methods for critical network equipment Programmable Logic Controller (PLC) Published on 2025-10-05 Implemented on May 1, 2026 State Administration for Market Regulation The State Administration for Standardization issued a statement.

Table of contents

Preface III 1.Scope 1 2 Normative References 1 3.Terms and Definitions 1 4.Abbreviations 2 5.Test Environment 2 6.Safety Function Testing Methods 3 6.1 Equipment Identification Safety 3 6.2 Redundancy, Backup Recovery, and Anomaly Detection 3 6.3 Vulnerability and Malicious Program Prevention 4 6.4 Security of Pre-installed Software Startup and Updates 4 6.5 User Identification and Authentication 5 6.6 Access Control Security 6.7 Log Audit Security 7 6.8 Communication security 8 6.9 Data Security 8 7.Security Assurance Assessment Methods 9. 7.1 Supply Chain Security 9 7.2 Design and Development 9 7.3 Production and Delivery 10 7.4 User Data Protection 11 References 12

Foreword

This document complies with the provisions of GB/T 1.1-2020 "Standardization Work Guidelines Part 1.Structure and Drafting Rules of Standardization Documents". Drafting. Please note that some content in this document may involve patents. The issuing organization of this document assumes no responsibility for identifying patents. This document was proposed by the China Machinery Industry Federation. This document is under the jurisdiction of the National Technical Committee on Standardization of Industrial Process Measurement, Control and Automation (SAC/TC124). This document was drafted by. the National Industrial Information Security Development Research Center, the Machinery Industry Instrumentation Comprehensive Technology and Economic Research Institute, and China... China Electronics Technology Standardization Institute, Supcon Technology Co., Ltd., China Electronics Intelligent Technology Co., Ltd., Aotuo Technology Co., Ltd., Mitsubishi Electrical Automation (China) Co., Ltd., Schneider Electric (China) Co., Ltd., the Third Research Institute of the Ministry of Public Security, and the National Computer Network Emergency Response Technical Team/Coordination Center. Technology Processing Coordination Center, China Cybersecurity Review and Certification and Market Supervision Big Data Center, China Academy of Information and Communications Technology, National Information Technology Security Research Center, the Sixth Research Institute of China Electronics Corporation, and the China Software Testing Center (Ministry of Industry and Information Technology Software) (in collaboration with the Integrated Circuit Promotion Center), Institute of Information Engineering, Chinese Academy of Sciences, Ningbo Hollysys Information Security Research Institute Co., Ltd., and Siemens) Rockwell Automation (China) Co., Ltd., Omron (Shanghai) Co., Ltd., Omron Automation (China) Co., Ltd. The company, Beijing Tonghe Shiyi Telecommunications Science and Technology Research Institute Co., Ltd., China Southern Power Grid Science Research Institute Co., Ltd., and the People's Liberation Army Military Strategic Support Force Information Engineering University, Guangzhou University, Zhejiang University, Antiy Labs Group Co., Ltd., Beijing Huashun Xin'an Information Technology Co., Ltd. Technology Co., Ltd., Fiberhome Technologies (Beijing) Co., Ltd., China Electric Power Research Institute Co., Ltd., Beijing Zhongguancun Laboratory, Shanghai Computer Software Technology Development Center, Beijing Tenkong Technology Co., Ltd., and Beijing Zhuoshi Network Security Technology Co., Ltd. The main drafters of this document are. Zhao Ran, Wang Yumin, Yao Xiangzhen, Cheng Xi, Liu Zihe, Lu Weijun, Huo Yuxian, Chen Sining, Cui Longcheng, and Wang Yong. Zou Chunming, Zhang Xiaoming, Shen Yongbo, Xia Ji, Guo Chunying, Zeng Zhenzhen, Huo Chaobin, Zhou Ruikang, Li Lin, Wang Xiangyu, Yan Zhaoteng, Liu Ying, Yan Tao, Pan Liang Yu Haibin, Ding Yiping, Zhang Bo, Yuan Yudong, Xu Aidong, Ma Rongkuan, Shang Wenli, Cheng Peng, Wang Naiqing, Deng Huan, Gong Lianghua, Jia Ling, Wang Zhihui Wang Yazhe, Zhang Jiawei, Li Peng, Wang Aipeng, Du Jinran, Jing Guoli, Chu Bing, Liao Jian, Pei Yuandou, Wang Yutao, He Minchao, Che Xin, Zhang Wei, Zhang Yawei Lin Hao, Ge Jianxin, Han Juan, Wei Qiang, Xiao Yufen, Wang Tiegang, Liu Ren, Xiong Junwei. Security testing methods for critical network equipment Programmable Logic Controller (PLC)

1 Scope

This document describes the methods for testing the safety functions of programmable logic controllers and for evaluating their safety assurance. This document applies to the research, development, testing, and other work related to programmable logic controllers that meet the requirements of network critical equipment. Note. Meeting the scope of network critical equipment refers to the equipment's performance indicators or specifications conforming to the provisions of the "Catalogue of Network Critical Equipment and Network Security Dedicated Products". The range.

2 Normative references

The contents of the following documents, through normative references within the text, constitute essential provisions of this document. Dated citations are not included. For references to documents, only the version corresponding to that date applies to this document; for undated references, the latest version (including all amendments) applies. This document. GB/T 25069 Information Security Technical Terminology GB/T 45406-2025 Security Technical Requirements for Critical Network Equipment - Programmable Logic Controllers (PLCs)

3 Terms and Definitions

The terms and definitions defined in GB/T 25069 and the following terms and definitions apply to this document. 3.1 Electronic systems for digital operation in industrial environments. The system uses programmable memory as internal registers for user-instruction-oriented operation. Devices perform specified functions, such as logic, sequencing, timing, counting, and arithmetic, and control various types of machinery or equipment through digital or analog I/O. process. [Source. GB/T 15969.1-2007, 3.5, with modifications] 3.2 Pre-installed software Software installed or provided at the time of manufacture that is necessary to ensure the normal operation of the equipment. Note. The pre-installed software of a programmable logic controller is usually the device firmware. [Source. GB 40050-2021, 3.10, with modifications] 3.3 Read Upload the pre-installed software, programs, status parameters, and other data from the programmable logic controller. 3.4 Write The pre-installed software, programs, status parameters and other data are downloaded to the programmable logic controller. 3.5 Vulnerability Vulnerabilities in assets or controls that could be threatened or exploited.
GB/T 46334-2025 English cover page

Tips & Frequently Asked Questions:

Question 1: How long will the true-PDF of GB/T 46334-2025_English be delivered?

Answer: Upon your order, we will start to translate GB/T 46334-2025_English as soon as possible, and keep you informed of the progress. The lead time is typically 2 ~ 4 working days. The lengthier the document the longer the lead time.

Question 2: Can I share the purchased PDF of GB/T 46334-2025_English with my colleagues?

Answer: Yes. The purchased PDF of GB/T 46334-2025_English will be deemed to be sold to your employer/organization who actually pays for it, including your colleagues and your employer's intranet.

Question 3: Does the price include tax/VAT?

Answer: Yes. Our tax invoice, downloaded/delivered in 9 seconds, includes all tax/VAT and complies with 100+ countries' tax regulations (tax exempted in 100+ countries) -- See Avoidance of Double Taxation Agreements (DTAs): List of DTAs signed between Singapore and 100+ countries

Question 4: Do you accept my currency other than USD?

Answer: Yes. If you need your currency to be printed on the invoice, please write an email to Sales@ChineseStandard.net. In 2 working-hours, we will create a special link for you to pay in any currencies. Otherwise, follow the normal steps: Add to Cart -- Checkout -- Select your currency to pay.
Terms of Service | Contact Information | Privacy Policy | Refund Policy | Shipping Policy