|
US$519.00 ยท In stock Delivery: <= 5 days. True-PDF full-copy in English will be manually translated and delivered via email. GBZ42885-2023: Information security technology - Guidance for cyber security information sharing Status: Valid
| Standard ID | Contents [version] | USD | STEP2 | [PDF] delivered in | Standard Title (Description) | Status | PDF |
| GB/Z 42885-2023 | English | 519 |
Add to Cart
|
5 days [Need to translate]
|
Information security technology - Guidance for cyber security information sharing
| Valid |
GB/Z 42885-2023
|
PDF similar to GBZ42885-2023
Basic data | Standard ID | GB/Z 42885-2023 (GB/Z42885-2023) | | Description (Translated English) | Information security technology - Guidance for cyber security information sharing | | Sector / Industry | National Standard | | Classification of Chinese Standard | L80 | | Classification of International Standard | 35.030 | | Word Count Estimation | 26,211 | | Date of Issue | 2023-08-06 | | Date of Implementation | 2024-03-01 | | Issuing agency(ies) | State Administration for Market Regulation, China National Standardization Administration |
GBZ42885-2023: Information security technology - Guidance for cyber security information sharing ---This is a DRAFT version for illustration, not a final translation. Full copy of true-PDF in English version (including equations, symbols, images, flow-chart, tables, and figures etc.) will be manually/carefully translated upon your order.
GB /Z 42885-2023.Information Security Technology Network Security Information Sharing Guidelines
ICS 35.030
CCSL80
National Standardization Guiding Technical Documents of the People's Republic of China
Information Security Technology Cybersecurity Information Sharing Guide
Published on 2023-08-06
2024-03-01 Implementation
State Administration for Market Regulation
Released by the National Standardization Administration Committee
Table of contents
Preface III
1 Scope 1
2 Normative reference documents 1
3 Terms and Definitions 1
4 Abbreviations 1
5 Sharing Activity Elements 2
5.1 Overview 2
5.2 Sharing scenario 2
5.3 Shared participation role 2
5.4 Sharing mode 3
5.5 Network security information 3
6 Basic Principles 3
6.1 Security Principle 3
6.2 Controllability principle 3
6.3 Compliance Principle 4
7 Shared scope 4
8 Sharing activity process 4
8.1 Overview 4
8.2 Preparation for sharing activities 4
8.3 Sharing activity implementation 6
8.4 Termination of sharing activities8
Appendix A (informative) Examples of cybersecurity information sharing activities 9
Appendix B (informative) Example 10 of network security information sharing model
B.1 Central sharing model10
B.2 Peer-to-peer sharing mode10
B.3 Hybrid Sharing Mode11
B.4 Group Sharing Mode 11
Appendix C (informative) Network security information description 13
C.1 Threat information description13
C.2 Security incident information description13
C.3 Vulnerability information description13
C.4 Description of countermeasure information14
C.5 Description of experience information14
C.6 Situation information description14
Appendix D (Informative) Overview of Information Exchange Technology in Sharing Activities15
D.1 Network security information exchange model15
D.2 Network security information exchange method 16
D.3 Network security information data interface description 17
Reference 18
Foreword
This document complies with the provisions of GB/T 1.1-2020 "Standardization Work Guidelines Part 1.Structure and Drafting Rules of Standardization Documents"
Drafting.
Please note that some content in this document may be subject to patents. The publisher of this document assumes no responsibility for identifying patents.
This document is proposed and coordinated by the National Information Security Standardization Technical Committee (SAC/TC260).
This document was drafted by. National Industrial Information Security Development Research Center, China Electronics Technology Standardization Institute, National Computer Network
Emergency Technology Coordination Center, China Information Security Evaluation Center, Institute of Information Engineering, Chinese Academy of Sciences, Hangzhou Anheng Information Technology Co., Ltd.
Co., Ltd., Beijing Shenzhou Green League Technology Co., Ltd., Sichuan University, Beijing Tianrongxin Network Security Technology Co., Ltd., China Electronic Information Industry
The Sixth Research Institute of Industrial Group Co., Ltd., Electric Power Research Institute of State Grid Xinjiang Electric Power Co., Ltd., China Aerospace Science and Industry Aviation Technology Research Institute,
Guoneng Information Technology Co., Ltd., China Southern Power Grid Digital Grid Group Co., Ltd., Tencent Cloud Computing (Beijing) Co., Ltd., Shaanxi Provincial Network
Network and Information Security Assessment Center.
The main drafters of this document. Zhang Ge, Zhang Zheyu, Wang Shirui, Sun Jun, Yu Meng, Xiao Junfang, Hao Zhiqiang, Wang Huili, Guo Jing, Du Yuge, Jiang Zhengwei,
Liang Wei, Wu Hao, Wang Junfeng, Tang Binhui, An Gaofeng, Yang Peng, Guo Li, Liu Zhilei, Li Mingxuan, Pei Yanchun, Zhang Liguang, Han Pengjun, Lu Huahui, Li Yang,
Cheng Xi, Yang Zitao, Fan Kai, Qin Xiaowei, Ren Zejun, Wang Rui, Wang Zun, Xie Chengyun, Gao Rui, Jiang Jun.
Information Security Technology Cybersecurity Information Sharing Guide
1 Scope
This document establishes the elements and basic principles of network security information sharing activities, and describes the scope and process of sharing activities.
This document applies to network security information sharing activities between various organizations or individuals.
2 Normative reference documents
The contents of the following documents constitute essential provisions of this document through normative references in the text. Among them, the dated quotations
For undated referenced documents, only the version corresponding to that date applies to this document; for undated referenced documents, the latest version (including all amendments) applies to
this document.
GB/T 25069-2022 Information security technical terms
3 Terms and definitions
The terms and definitions defined in GB/T 25069-2022 and the following apply to this document.
3.1
Information describing network security (i.e. cyberspace security)-related situations.
Note. Network security information mainly includes threat information, security event information, vulnerability information, countermeasure information, experience information, situation information, etc.
3.2
sharing activities sharing activities
By adopting effective organizational mechanisms and technical means, network security information can be reused among participants.
Note. Network security information in sharing activities can be shared one-way, two-way or multi-way.
3.3
sharingmodesharingmode
Behavioral patterns of information sharing among participants.
Note. Sharing modes are mainly divided into central sharing mode, point-to-point sharing mode, hybrid sharing mode and group sharing mode.
4 Abbreviations
The following abbreviations apply to this document.
P2P. peer-to-peer technology (peer-to-peer)
Tips & Frequently Asked Questions:Question 1: How long will the true-PDF of GBZ42885-2023_English be delivered?Answer: Upon your order, we will start to translate GBZ42885-2023_English as soon as possible, and keep you informed of the progress. The lead time is typically 3 ~ 5 working days. The lengthier the document the longer the lead time. Question 2: Can I share the purchased PDF of GBZ42885-2023_English with my colleagues?Answer: Yes. The purchased PDF of GBZ42885-2023_English will be deemed to be sold to your employer/organization who actually pays for it, including your colleagues and your employer's intranet. Question 3: Does the price include tax/VAT?Answer: Yes. Our tax invoice, downloaded/delivered in 9 seconds, includes all tax/VAT and complies with 100+ countries' tax regulations (tax exempted in 100+ countries) -- See Avoidance of Double Taxation Agreements (DTAs): List of DTAs signed between Singapore and 100+ countriesQuestion 4: Do you accept my currency other than USD?Answer: Yes. If you need your currency to be printed on the invoice, please write an email to [email protected]. In 2 working-hours, we will create a special link for you to pay in any currencies. Otherwise, follow the normal steps: Add to Cart -- Checkout -- Select your currency to pay.
|