HOME   Cart(0)   Quotation   About-Us Policy PDFs Standard-List
www.ChineseStandard.net Database: 189759 (19 Oct 2025)

GBZ29830.3-2013 English PDF

US$1014.00 · In stock
Delivery: <= 6 days. True-PDF full-copy in English will be manually translated and delivered via email.
GBZ29830.3-2013: Information technology -- Security technology -- A framework for IT security assurance -- Part 3: Analysis of assurance methods
Status: Valid
Standard IDContents [version]USDSTEP2[PDF] delivered inStandard Title (Description)StatusPDF
GB/Z 29830.3-2013English1014 Add to Cart 6 days [Need to translate] Information technology -- Security technology -- A framework for IT security assurance -- Part 3: Analysis of assurance methods Valid GB/Z 29830.3-2013

PDF similar to GBZ29830.3-2013


Standard similar to GBZ29830.3-2013

GB/T 29246   GB/T 30279   GB/T 30276   GB/T 29829   GB/T 29828   GB/Z 29830.2   

Basic data

Standard ID GB/Z 29830.3-2013 (GB/Z29830.3-2013)
Description (Translated English) Information technology -- Security technology -- A framework for IT security assurance -- Part 3: Analysis of assurance methods
Sector / Industry National Standard
Classification of Chinese Standard L80
Classification of International Standard 35.040
Word Count Estimation 51,516
Adopted Standard ISO/IEC TR 15443-3-2007, IDT
Regulation (derived from) National Standards Bulletin No. 22 of 2013
Issuing agency(ies) Ministry of Health of the People's Republic of China
Summary This standard applies to the development of ICT products and ICT systems with security requirements, implementation, and operation. Security requirements may be complex, a variety of security methods, resources, and culture, and between organizations are

GBZ29830.3-2013: Information technology -- Security technology -- A framework for IT security assurance -- Part 3: Analysis of assurance methods


---This is a DRAFT version for illustration, not a final translation. Full copy of true-PDF in English version (including equations, symbols, images, flow-chart, tables, and figures etc.) will be manually/carefully translated upon your order.
Information technology. Security technology .A framework for IT security assurance. Part 3. Analysis of assurance methods ICS 35.040 L80 People's Republic of China national standardization of technical guidance documents Information Technology Security Technology Information Technology Security Framework Part 3. Analysis of safeguard methods assurance-Part 3.Analysisofassurancemethods (ISO /IEC TR15443-3.2007, IDT) Posted on.2013-11-12 2014-02-01 Implementation General Administration of Quality Supervision, Inspection and Quarantine of People's Republic of China China National Standardization Administration released Directory Foreword Ⅲ Introduction IV 1 Scope 1 1.1 Intention 1 1.2 Application 1 1.3 Application 1 1.4 restrictions 1 2 Terms and definitions 1 3 Abbreviations 3 4 Understanding of Safeguards 4 4.1 Security objectives set 4 4.2 Application of the safeguard method 6 4.3 Evaluation of safeguard results 10 4.4 Example 11 5 Guarantee Comparison, Selection and Combination 11 5.1 Selection of safeguards 11 5.2 Combination of safeguard methods 13 5.3 Comparison of safeguard methods 13 5.4 concerned about the security features 14 6 Guidance 18 6.1 Development Assurance (DA) 19 6.2 Integration Assurance (IA) 20 6.3 Operation Support (OA) 23 Appendix A (informative) list comparison 26 Appendix B (informative) security features of the selected method Appendix C (informative) Combination of safeguards 43 References 45 Figure 1 to protect the supply 5 Figure 2 life cycle process management 9 Figure 3 available methods 13 Figure 4 matrix comparison principle 14 Figure 5 guarantees attention Figure 6 System Testing and Evaluation 22 Figure B.1 Test Requirements Evolution 31 Table 1 Type of protection provided 5 Table 2 Safeguarding the Use of Supplies 6 Table 3 Strictness of protection 7 Table 4 coverage of the scope of application 7 Table 5 life cycle guarantee model 8 Table 6 Safeguards Approach 10 Table 7 Key aspects of comparison 15 Table 8 Security Domains 24 Table 9 Safety Management Features 24 Table 10 Maturity of the whole OA 25 Table A.1 Method and Target Users 26 Table A.2 Basic Authentication Modes Table A.3 Available Security Measures 27

Foreword

GB /Z 29830 "Information Technology Security Technology Information Technology Security Framework" is divided into the following three sections. --- Part 1. Overview and framework; --- Part 2. Safeguard methods; --- Part 3. Safeguard method analysis. This section GB /Z 29830 Part 3. This section drafted in accordance with GB/T 1.1-2009 given rules. This section uses the translation method identical with ISO /IEC TR15443-3.2007 "Information Technology Security Technology Information Technology Security Barrier Framework Part 3. Safeguard Method Analysis. " This section made the following editorial changes. --- International Standards in Appendix D, Appendix E is an informative annex, to be deleted when the transcript. This part of the National Information Security Standardization Technical Committee (SAC/TC260) and focal point. This part of the main drafting unit. China Electronics Standardization Institute, Beijing University of Chemical Technology. The main drafters of this section. Wang Jing, Zhang Mingtian, Luo Feng surplus, Wang Yanming, Chen Xing, Yang Jianjun.

Introduction

The purpose of this guidance document is that in order to obtain the confidence that a given deliverable satisfies the information security assurance it has identified, Provide a variety of security methods, and instruct information security professionals how to choose a suitable security method (or a combination of some). This refers to The guidance document examines the safeguards and approaches proposed by different types of organizations, including approved standards and de facto standards. In order to achieve this goal, this guidance document consists of the following seven aspects. a) A framework model for locating existing safeguards and giving the relationship between them; b) a set of safeguards and descriptions and references to them; c) the generality and individuality of the specific safeguards approach; d) qualitative comparison of existing safeguards methods, where quantitative comparison is as possible; e) the identity of the safeguards pattern associated with the current safeguards method; f) a description of the relationship between different safeguards methods; and g) Guidance on the application, combination and perception of safeguards methods. This Guidance Document consists of three parts and deals with the ways of assurance, analysis and mutual relations as follows. Part 1. Overview and framework. Some basic concepts are outlined, such as safeguards, safeguards frameworks and more. And gives the method of security General description. Its purpose is to help understand Part 2 and Part 3 of this guidance document. Part 1 is for information Safety managers and others, including those responsible for developing safety assurance procedures, determining the safety and security of their deliverables, participating in safety Assess people who audit or participate in other safeguards activities. Part 2. Safeguards. Describe a variety of IT security assurance methods and approaches proposed and used by different types of organizations, regardless of their They are generally accepted, de facto recognized or standard; and relate these safeguards to the security model in Part 1. weight Points are qualitative features that identify the safeguards method that has an impact on assurance and, where possible, the level of assurance. This material is for IT security Professionals help understand how to be assured during a specific life cycle of a product or service. GB /Z 29830.2-2013 use the terms and definitions defined in GB /Z 29830.1-2013. This part should be used together with GB /Z 29830.1-2013. Part 3. Analysis of safeguard methods. The security features of various security methods are analyzed. This analysis helps the agency in determining each one A way of ensuring the relative value of ways and determining ways to ensure that these approaches provide the best fit for the specific context of the operating environment Barrier results. Moreover, this analysis helps to ensure that the results of the safeguards approach are applied by the organization to achieve the level of assurance envisioned by the deliverable. this part Materials are geared toward IT security professionals who must choose how to approach and safeguard them. This part should be used together with GB /Z 29830.1-2013. This guidance document analyzes some of the safeguards that may not be specific to IT security; however, in the guidance document Guidance given will be limited to IT security needs. Only provide the corresponding guidance in the field of IT security, and do not expect this guide to the general quality Management, assessment or IT compliance is instructive. Information Technology Security Technology Information Technology Security Framework Part 3. Analysis of safeguard methods

1 Scope

1.1 Intent GB /Z 29830 in this section is intended to provide the means for the protection agencies to choose the appropriate type of ICT (information and communication technology) Guide and provide a framework for the analysis of specific safeguards methods for a given environment. 1.2 application This section enables users to compare specific assurance needs and/or typical safeguards with the general performance provided by some of the available safeguards approaches Features match. 1.3 areas of application The guidance in this section applies to the development, implementation and operation of ICT products and ICT systems that have security needs. 1.4 restrictions Security needs can be complex, security approaches varied, and the resources and culture of the organization vary widely. because In this regard, the recommendations given in this section are qualitative and general and may require the user to analyze which of the methods in Part 2 are best suited to self Specific deliverables and organizational security needs.

2 Terms and definitions

ISO /IEC TR15443-1 and ISO /IEC TR15443-2 define the following terms and definitions apply to this document. 2.1 Asset asset Anything that is valuable to the organization. 2.2 Assessment Systematically check the extent to which an entity is capable of meeting its stated requirements; evaluations are evalua- tions when dealing with a deliverable synonymous. [ISO /IEC 14598-1] 2.3 Assessmentmethod To determine whether a deliverable is acceptable or to be released, apply a specific documented evaluation criterion to the actions of a deliverable. 2.4 Assurance agency assuranceauthority The persons and organizations entrusted with making decisions (ie selection, specification, acceptance, enhancement) on the security of a deliverable, which of these decisions

Tips & Frequently Asked Questions:

Question 1: How long will the true-PDF of GBZ29830.3-2013_English be delivered?

Answer: Upon your order, we will start to translate GBZ29830.3-2013_English as soon as possible, and keep you informed of the progress. The lead time is typically 4 ~ 6 working days. The lengthier the document the longer the lead time.

Question 2: Can I share the purchased PDF of GBZ29830.3-2013_English with my colleagues?

Answer: Yes. The purchased PDF of GBZ29830.3-2013_English will be deemed to be sold to your employer/organization who actually pays for it, including your colleagues and your employer's intranet.

Question 3: Does the price include tax/VAT?

Answer: Yes. Our tax invoice, downloaded/delivered in 9 seconds, includes all tax/VAT and complies with 100+ countries' tax regulations (tax exempted in 100+ countries) -- See Avoidance of Double Taxation Agreements (DTAs): List of DTAs signed between Singapore and 100+ countries

Question 4: Do you accept my currency other than USD?

Answer: Yes. If you need your currency to be printed on the invoice, please write an email to [email protected]. In 2 working-hours, we will create a special link for you to pay in any currencies. Otherwise, follow the normal steps: Add to Cart -- Checkout -- Select your currency to pay.