|
US$279.00 ยท In stock Delivery: <= 3 days. True-PDF full-copy in English will be manually translated and delivered via email. GBZ41288-2022: Information security technology - Guidelines of cyber security protection for important industrial control system Status: Valid
| Standard ID | Contents [version] | USD | STEP2 | [PDF] delivered in | Standard Title (Description) | Status | PDF |
| GB/Z 41288-2022 | English | 279 |
Add to Cart
|
3 days [Need to translate]
|
Information security technology - Guidelines of cyber security protection for important industrial control system
| Valid |
GB/Z 41288-2022
|
PDF similar to GBZ41288-2022
Basic data | Standard ID | GB/Z 41288-2022 (GB/Z41288-2022) | | Description (Translated English) | Information security technology - Guidelines of cyber security protection for important industrial control system | | Sector / Industry | National Standard | | Classification of Chinese Standard | L80 | | Word Count Estimation | 14,111 | | Issuing agency(ies) | State Administration for Market Regulation, China National Standardization Administration |
GBZ41288-2022: Information security technology - Guidelines of cyber security protection for important industrial control system ---This is a DRAFT version for illustration, not a final translation. Full copy of true-PDF in English version (including equations, symbols, images, flow-chart, tables, and figures etc.) will be manually/carefully translated upon your order.
GB /Z 41288-2022
Information security technology - Guidelines of cyber security protection for important industrial control system
ICS 35.030
CCSL80
National Standardization Guiding Technical Document of the People's Republic of China
Information Security Technology
Guidelines for Network Security Protection of Important Industrial Control Systems
Published on 2022-03-09
2022-10-01 Implementation
State Administration for Market Regulation
Released by the National Standardization Administration
directory
Preface I
1 Scope 1
2 Normative references 1
3 Terms and Definitions 1
4 Abbreviations 3
5 Important industrial control system characteristics and safety protection principles 3
5.1 Important Industrial Control System Features 3
5.2 Important Industrial Control System Network Security Protection Principles 4
5.3 Network Security Protection System of Important Industrial Control System 4
6 Safety Protection Technology 6
6.1 Infrastructure Security 6
6.2 Architecture Security 6
6.3 System Safety 8
6.4 Safe and Trustworthy Protection 9
7 Emergency backup measures9
7.1 Redundant Standby 9
7.2 Multiple lines of defense 9
7.3 Emergency Response 10
8 Safety management 11
8.1 Integration into the safety production management system 11
8.2 Safety management of all personnel 11
8.3 Security management of all equipment 11
8.4 Full life cycle security management 11
foreword
This document is in accordance with the provisions of GB/T 1.1-2020 "Guidelines for Standardization Work Part 1.Structure and Drafting Rules of Standardization Documents"
drafted.
Please note that some content of this document may be patented. The issuing agency of this document assumes no responsibility for identifying patents.
This document is proposed and managed by the National Information Security Standardization Technical Committee (SAC/TC260).
This document is drafted by. Global Energy Internet Research Institute Co., Ltd., State Grid Corporation of China, National Information Technology Security Research Center
Heart, National Energy Administration, NARI Group Co., Ltd., China Electric Power Research Institute Co., Ltd., China Southern Power Grid Co., Ltd., China
Huaneng Group Co., Ltd., China Information Security Evaluation Center, 11th Bureau of the Ministry of Public Security, China Electronics Standardization Institute, China Aerospace Science and Industry Corporation
Group Co., Ltd., Machinery Industry Instrumentation Comprehensive Technology and Economic Research Institute, the Third Research Institute of the Ministry of Public Security, National Industrial Information Security Development Research Institute
Research Center, Shenyang Institute of Automation, Chinese Academy of Sciences, Shenyang Institute of Computing Technology, Chinese Academy of Sciences, Xuji Group Co., Ltd.,
China National Railway Group Co., Ltd., China General Nuclear Power Corporation, China Three Gorges Corporation, China National Offshore Oil Corporation
Co., Ltd., China Shipbuilding Industry Corporation, State Grid Fujian Electric Power Co., Ltd., Beijing Sifang Relay Automation Co., Ltd.,
China Railway Research Institute Group Co., Ltd., Dongfang Electronics Co., Ltd., Beijing Hollysys Intelligent Technology Co., Ltd., Zhejiang University,
State Grid Corporation of East China Branch, State Grid Jiangxi Electric Power Co., Ltd. Electric Power Research Institute, Beijing Qixingchen Information Security Technology Co., Ltd.
Company, Guoneng Zhishen Control Technology Co., Ltd., China Electricity Council Technology Development Service Center, Shanghai Electric Power University, Hangzhou Silan Microelectronics
Subsidiary Co., Ltd., Hunan Qilin Xin'an Technology Co., Ltd., Beijing Xinda Explorer Technology Co., Ltd., Qingdao Haier Technology Co., Ltd.
Company, Qi Anxin Technology Group Co., Ltd.
The main drafters of this document. Xin Yaozhong, Yu Yong, Li Bing, Hu Hongsheng, Xu Haiming, Yisu, Zhu Shishun, Guo Jiancheng, Nan Guilin, Tao Hongzhu,
Sun Wei, Tao Wenwei, Guo Sen, Li Jingchun, Guo Qiquan, Liu Xiangang, Li Bin, Zhu Guobang, Zhang Tao, Fan Chunling, Shi Congcong, Li Ming, Guo Qian, Bi Lidong,
Wang Yumin, Chen Xuehong, Ma Yue, Yang Weiyong, Gao Kunlun, Deng Zhaoyun, Zhang Xiaojian, Wang Changbao, Yu Pengfei, Ma Xiao, Li Ling, Liang Shouyu, Shang Wenli,
Yang Hao, Yin Zhenyu, Cao Wantian, Mao Jiang, Shi Yanping, Zheng Sheng, Zou Lailong, Mao Yunping, Wang Qiang, Ren Yanming, Wang Yong, Wang Wanqi, Zhang Yan, Ci Guoxing,
Feng Dongqin, Zhang Liang, Yang Ruxia, Meng Yahui, Zhu Jingling, Liu Sen, Zhu Yiming, Zhao Guanghuan, Chen Songzheng, Liu Wenqing, Xie Dong, Xu Zhifang, Zuo Yingnan.
Information Security Technology
Guidelines for Network Security Protection of Important Industrial Control Systems
1 Scope
This document specifies the basic principles, security protection technologies, emergency backup measures and security management of important industrial control systems.
In order to establish a network security protection system for important industrial control systems.
This document is applicable to the planning and design, research and development, operation management, upgrading and transformation of important industrial control systems, and other business systems.
Also available for reference.
2 Normative references
The contents of the following documents constitute essential provisions of this document through normative references in the text. Among them, dated citations
documents, only the version corresponding to that date applies to this document; for undated references, the latest edition (including all amendments) applies to
this document.
GB/T 9361 Computer Site Safety Requirements
GB 17859 Criteria for classification of security protection levels of computer information systems
GB/T 18336.2 Information Technology Security Technology Information Technology Security Assessment Criteria Part 2.Security Functional Components
GB/T 20272 Information Security Technology Operating System Security Technical Requirements
GB/T 20984 Information Security Technology Information Security Risk Assessment Specification
GB/T 21028 Information Security Technology Server Security Technical Requirements
GB/T 21050 Information Security Technology Network Switch Security Technical Requirements
GB/T 22239 Basic requirements for classified protection of information security technology network security
GB/T 25068.3 Information Technology Security Technology IT Network Security Part 3.Internet Communication Security Using Security Gateways
Protect
GB/T 25069 Information Security Technical Terminology
GB /Z 25320 (all parts) Power system management and its information exchange data and communication security
GB/T 30976.1 Industrial Control System Information Security Part 1.Evaluation Specification
GB/T 31504 Information Security Technology Authentication and Authorization Digital Identity Information Service Framework Specification
GB/T 32919 Information Security Technology Industrial Control System Security Control Application Guide
GB/T 36323 Basic Requirements for Safety Management of Information Security Technology Industrial Control System
GB/T 36324 Information Security Classification Specification for Information Security Technology Industrial Control System
GB/T 36466 Implementation Guide for Risk Assessment of Information Security Technology Industrial Control System
GB/T 36572 Guidelines for Network Security Protection of Electric Power Monitoring System
GB/T 37092 Information Security Technology Cryptographic Module Security Requirements
GB/T 37962 Information Security Technology Industrial Control System Product Information Security General Evaluation Criteria
GB/T 37980 Information Security Technology Industrial Control System Safety Inspection Guide
3 Terms and Definitions
The terms and definitions defined in GB 17859, GB/T 25069, GB/T 31504 and GB/T 36572 and the following terms and definitions apply to this document.
Tips & Frequently Asked Questions:Question 1: How long will the true-PDF of GBZ41288-2022_English be delivered?Answer: Upon your order, we will start to translate GBZ41288-2022_English as soon as possible, and keep you informed of the progress. The lead time is typically 1 ~ 3 working days. The lengthier the document the longer the lead time. Question 2: Can I share the purchased PDF of GBZ41288-2022_English with my colleagues?Answer: Yes. The purchased PDF of GBZ41288-2022_English will be deemed to be sold to your employer/organization who actually pays for it, including your colleagues and your employer's intranet. Question 3: Does the price include tax/VAT?Answer: Yes. Our tax invoice, downloaded/delivered in 9 seconds, includes all tax/VAT and complies with 100+ countries' tax regulations (tax exempted in 100+ countries) -- See Avoidance of Double Taxation Agreements (DTAs): List of DTAs signed between Singapore and 100+ countriesQuestion 4: Do you accept my currency other than USD?Answer: Yes. If you need your currency to be printed on the invoice, please write an email to [email protected]. In 2 working-hours, we will create a special link for you to pay in any currencies. Otherwise, follow the normal steps: Add to Cart -- Checkout -- Select your currency to pay.
|