|
US$339.00 ยท In stock Delivery: <= 4 days. True-PDF full-copy in English will be manually translated and delivered via email. GBZ41290-2022: Information security techniques - Guidelines for mobile internet security audit Status: Valid
| Standard ID | Contents [version] | USD | STEP2 | [PDF] delivered in | Standard Title (Description) | Status | PDF |
| GB/Z 41290-2022 | English | 339 |
Add to Cart
|
4 days [Need to translate]
|
Information security techniques - Guidelines for mobile internet security audit
| Valid |
GB/Z 41290-2022
|
PDF similar to GBZ41290-2022
Basic data | Standard ID | GB/Z 41290-2022 (GB/Z41290-2022) | | Description (Translated English) | Information security techniques - Guidelines for mobile internet security audit | | Sector / Industry | National Standard | | Classification of Chinese Standard | L80 | | Word Count Estimation | 17,191 | | Issuing agency(ies) | State Administration for Market Regulation, China National Standardization Administration |
GBZ41290-2022: Information security techniques - Guidelines for mobile internet security audit---This is a DRAFT version for illustration, not a final translation. Full copy of true-PDF in English version (including equations, symbols, images, flow-chart, tables, and figures etc.) will be manually/carefully translated upon your order.
GB /Z 41290-2022
Information security techniques - Guidelines for mobile internet security audit
ICS 35.030
CCSL80
National Standardization Guiding Technical Document of the People's Republic of China
Information Security Technology
Mobile Internet Security Audit Guidelines
Published on 2022-03-09
2022-10-01 Implementation
State Administration for Market Regulation
Released by the National Standardization Administration
directory
Preface III
1 Scope 1
2 Normative references 1
3 Terms and Definitions 1
4 Abbreviations 2
5 Audit activity 2
5.1 Overview 2
5.2 Security Audit Domain 2
5.3 Role Responsibilities 3
5.4 Audit Scope 4
5.5 Audit content 4
5.6 Active Framework 4
6 Activity function 4
6.1 Safety Guidelines4
6.2 Security Audit Policy Customization 5
6.3 Security Audit Trail 5
6.4 Security Audit Records 6
6.5 Secure Audit Storage 7
6.6 Security Audit Analysis 7
6.7 Security Audit Agent 8
6.8 Security Audit Response 8
6.9 Filing of Security Audit Records 8
6.10 Audit report generation 9
6.11 Security Audit Review 9
Appendix A (Informative) Mobile Internet Security Audit Process 10
Reference 13
foreword
This document is in accordance with the provisions of GB/T 1.1-2020 "Guidelines for Standardization Work Part 1.Structure and Drafting Rules of Standardization Documents"
drafted.
Please note that some content of this document may be patented. The issuing agency of this document assumes no responsibility for identifying patents.
This document is proposed and managed by the National Information Security Standardization Technical Committee (SAC/TC260).
This document was drafted by. Beijing Jiaotong University, Beijing Sifudi Information Technology Co., Ltd., Beijing Information Technology University, China Information Communication
Technology Group Co., Ltd., Inspur Software Technology Co., Ltd., China Network Security Review Technology and Certification Center, ZTE Corporation
Company, Lenovo (Beijing) Co., Ltd.
The main drafters of this document. Liu Yun, Zhang Zhenjiang, Si Xiameng, Zeng Jianjun, Han Xiaolu, Zhang Yaochen, Wu Di, Shen Bo, Zhao Yingsi, Xiong Fei,
Wang Jianwei, Zhong Hong, Li Ruxin.
Information Security Technology
Mobile Internet Security Audit Guidelines
1 Scope
This document provides guidance and suggestions on the roles and responsibilities, audit scope, and audit content of mobile Internet security audit activities.
The framework, functional tasks and specific content of security audit activities are presented.
This document applies to activities related to mobile Internet security audits.
2 Normative references
The contents of the following documents constitute essential provisions of this document through normative references in the text. Among them, dated citations
documents, only the version corresponding to that date applies to this document; for undated references, the latest edition (including all amendments) applies to
this document.
GB/T 17143.6-1997 Information Technology Open System Interconnection System Management Part 6.Log Control Function
GB 17859-1999 Criteria for classification of security protection levels of computer information systems
GB/T 18336.2-2015 Information Technology Security Technology Information Technology Security Assessment Criteria Part 2.Security Functional Components
GB/T 25069 Information Security Technical Terminology
GB/T 35281-2017 Information Security Technology Mobile Internet Application Server Security Technical Requirements
3 Terms and Definitions
GB/T 17143.6-1997, GB 17859-1999, GB/T 18336.2-2015, GB/T 25069 and GB/T 35281-
2017 and the following terms and definitions apply to this document.
3.1
mobile internet mobile internet
Users use mobile terminals (including mobile phones, network cards, tablet computers, smart books, etc.) to obtain mobile communication network services through mobile networks
An open infrastructure telecommunications network for and Internet services.
[Source. GB/T 35281-2017, 3.1.1]
3.2
Events are recorded and analyzed, and comparative actions are taken for specific events.
[Source. GB/T 20945-2013, 3.2]
3.3
securityauditdomain
In information systems and networks, under a single security audit policy, the security audit subject is responsible for the collection of audit entities.
3.4
privatedata
The data that the security audit subject privately owns and needs to protect.
Tips & Frequently Asked Questions:Question 1: How long will the true-PDF of GBZ41290-2022_English be delivered?Answer: Upon your order, we will start to translate GBZ41290-2022_English as soon as possible, and keep you informed of the progress. The lead time is typically 2 ~ 4 working days. The lengthier the document the longer the lead time. Question 2: Can I share the purchased PDF of GBZ41290-2022_English with my colleagues?Answer: Yes. The purchased PDF of GBZ41290-2022_English will be deemed to be sold to your employer/organization who actually pays for it, including your colleagues and your employer's intranet. Question 3: Does the price include tax/VAT?Answer: Yes. Our tax invoice, downloaded/delivered in 9 seconds, includes all tax/VAT and complies with 100+ countries' tax regulations (tax exempted in 100+ countries) -- See Avoidance of Double Taxation Agreements (DTAs): List of DTAs signed between Singapore and 100+ countriesQuestion 4: Do you accept my currency other than USD?Answer: Yes. If you need your currency to be printed on the invoice, please write an email to [email protected]. In 2 working-hours, we will create a special link for you to pay in any currencies. Otherwise, follow the normal steps: Add to Cart -- Checkout -- Select your currency to pay.
|