GM/T 0038-2014 PDF English
US$160.00 · In stock · Download in 9 secondsGM/T 0038-2014: Key management of certificate authority system test specification Delivery: 9 seconds. True-PDF full-copy in English & invoice will be downloaded + auto-delivered via email. See step-by-step procedureStatus: Obsolete
Standard ID | Contents [version] | USD | STEP2 | [PDF] delivery | Name of Chinese Standard | Status |
GM/T 0038-2014 | English | 160 |
Add to Cart
|
0-9 seconds. Auto-delivery
|
Key management of certificate authority system test specification
| Obsolete |
Excerpted PDFs (Download full copy in 9 seconds upon purchase)PDF Preview: GM/T 0038-2014
GM/T 0038-2014: Key management of certificate authority system test specification---This is an excerpt. Full copy of true-PDF in English version (including equations, symbols, images, flow-chart, tables, and figures etc.), auto-downloaded/delivered in 9 seconds, can be purchased online: https://www.ChineseStandard.net/PDF.aspx/GMT0038-2014
GM
CRYPTOGRAPHY INDUSTRY STANDARD
OF THE PEOPLE’S REPUBLIC OF CHINA
ICS 35.040
L 80
File No.. 44643-2014
Key management of certificate
authority system test specification
Issued on: FEBRUARY 13, 2014
Implemented on: FEBRUARY 13, 2014
Issued by. State Cryptography Administration
Table of Contents
Foreword ... 4
1 Scope .. 5
2 Normative references ... 5
3 Terms and definitions ... 5
4 Test objects ... 6
5 Test outline .. 6
6 Test environment .. 6
7 Test content ... 6
7.1 Site .. 6
7.2 Network ... 7
7.3 Post and authority management ... 9
7.4 Security management .. 9
7.5 System initialization ... 9
7.6 System functions .. 10
7.7 System performance .. 11
7.8 Data backup and recovery ... 12
7.9 Third-party security products ... 12
7.10 Documents ... 13
8 Test method .. 13
8.1 Site ... 13
8.2 Network .. 13
8.3 Management of posts and authorization ... 14
8.4 Security management ... 15
8.5 System initialization ... 15
8.6 System functions .. 15
8.7 System performance .. 16
8.8 Data backup and recovery ... 16
8.9 Third-party security products ... 16
8.10 Documents ... 16
9 Qualification determination .. 16
9.1 Item qualification determination ... 16
9.2 Product qualification determination ... 17
Appendix A ... 18
A.1 Test objective ... 18
A.2 Physical areas and network structure of key management system .. 18
A.3 Hardware and software configuration of key management system .. 18
A.4 Module and function of key management system ... 18
A.5 Test content ... 18
Appendix B ... 23
Appendix C ... 24
C.1 Computer room layout of certificate authentication key management system
... 24
C.2 The equipment location plan in the computer room of certificate authentication
key management system ... 24
Foreword
This Standard was drafted in accordance with the rules given in GB/T 1.1-2009.
Attention is drawn to the possibility that some of the elements of this Standard
may be the subject of patent rights. The issuing authority shall not be held
responsible for identifying any or all such patent rights.
This Standard was proposed by and shall be under the jurisdiction of
Cryptography Industry Standardization Technical Committee.
Main drafting organizations of this Standard. Changchun Jida Zhengyuan
Information Technology Co., Ltd., Shanghai Gale Software Co., Ltd., National
Information Security Engineering Technology Research Center, Beijing Haitai
Fangyuan Science and Technology Co., Ltd.
Main drafters of this Standard. Liu Ping, Gao Li, Tian Jingqi, Jiang Yulin, Zhang
Baoxin, Li Weiping, Zhao Lili, Zhu Guoxin, Yuan Feng, Tan Wuzheng, an
Xiaojiang, Zhang Wantao, Wu Chenghua.
Key management of certificate
authority system test specification
1 Scope
This Standard specifies the test contents and methods of the key management of
certificate authorization system.
This Standard is applicable to providing electronic authentication service for electronic
signature. The certificate authentication key management system developed or built
according to GM/T 0034-2014 can also provide reference for the test of other certificate
authorization key management systems.
2 Normative references
The following referenced documents are indispensable for the application of this
document. For dated references, only the edition cited applies. For undated references,
the latest edition of the referenced document (including any amendments) applies.
GM/T 0034-2014 Specifications of cryptograph and related security technology for
certification system based on SM2 cryptographic algorithm
3 Terms and definitions
The following terms and definitions apply to this document.
3.1 Certificate authentication system; CA
The system of full life cycle management of digital certificates, such as the issuance,
publication, updating and revocation of digital certificates.
3.2 Key management system; KM
A system to realize key management.
3.3 SM2 algorithm
An Elliptic Curve Public key cryptographic algorithm with a key length of 256 bits.
The main security strategies of intrusion detection configured to system are.
a) Deploy intrusion detection device on the switch of key service area to ensure
detection of all external packets;
b) The intrusion detection management console shall be directly connected with the
intrusion detection device to ensure its independent management and detection;
c) Set intrusion detection to high alert level of packets detection and analysis;
d) There shall be corresponding response strategies of security events detected by
the intrusion detection devices;
e) The feature repository for intrusion detection shall be updated in a timely manner.
Note. Intrusion detection devices can also be set up as intrusion prevention devices.
7.2.2.3 Vulnerability scanning
The main security strategies of vulnerability scanning configured for the system are.
a) Conduct vulnerability scanning for critical server equipment, network equipment
and network security devices regularly;
b) There shall be corresponding response strategies for security events detected by
vulnerability scanning;
c) The vulnerability repository shall be updated in a timely manner.
7.2.2.4 Virus control
The main security strategies for the virus control configured for the system are.
a) Deploy antivirus products to key servers and operations, management terminals;
b) There shall be corresponding response strategies for security events detected by
antivirus products;
c) The virus repository shall be updated in a timely manner.
7.2.2.5 Cryptographic machine
The cryptographic machine shall be connected to the server via an independent
physical port.
The cryptographic machine shall be the product approved by the national
cryptographic management department.
7.8 Data backup and recovery
There shall be data backup and recovery strategy to realize the data backup and
recovery of key management system.
This article applies to item test only.
7.9 Third-party security products
7.9.1 Firewall
The deployment location of the firewall shall conform to the requirements of 7.1.2.
The firewall configuration strategies shall meet the requirements of 7.2.2.1.
The firewall products shall be products that qualify the inspection and certification of
the relevant national institutions.
This article applies to item testing only.
7.9.2 Intrusion detection
The deployment location of the intrusion detection product shall comply with the
requirements of the 7.1.2.
The configuration strategy of intrusion detection product shall meet the requirements
of 7.2.2.2.
Intrusion detection products shall qualify the inspection and certification of the relevant
national institutions.
This article applies to item test only.
Note. This article also applies to intrusion prevention products.
7.9.3 Vulnerability scanning
The deployment location of the vulnerability scanning product shall comply with the
requirements of 7.1.2.
The configuration strategy of vulnerability scanning product shall meet the
requirements of 7.2.2.3.
The vulnerability scanning product shall qualify the inspection and certification of the
relevant national institutions.
This article applies to item test only.
7.9.4 Virus control
Count the keys in the standby, working and history repository, and the results shall
meet the requirements of 7.6.2.5.
8.6.3 Log
Sort or search the log according to time, personnel, operation type respectively. The
results shall meet the requirements of 7.6.3.
8.6.4 Audit
Perform audit operation in the audit interface on the information of the time of the event,
the operator of the event, the type of operation, the result of the operation, the recorded
signature and others. The results shall meet the requirements of 7.6.4.
8.6.5 Authority management
Perform in the access management interface operations of add or delete business
administrators, setting business administrator access. The results shall meet the
requirements of 7.6.5.
8.7 System performance
Test according to 7.7 and record test results.
8.8 Data backup and recovery
Review backup and recovery strategies and corresponding measures, which shall
comply with requirements of 7.8.
8.9 Third-party security products
Check firewall, intrusion detection (intrusion prevention), vulnerability scanning and
virus control product deployment and corresponding product certification, which shall
meet the requirements of 7.9.
8.10 Documents
View documents accompanied to certificate authentication key management system.
They shall meet the requirements of 7.10.
9 Qualification determination
9.1 Item qualification determination
7.1.2, 7.2.1, 7.2.2.5, 7.6.2.1, 7.6.2.3 are key items. If any one of the test results does
not m...
...... Source: Above contents are excerpted from the full-copy PDF -- translated/reviewed by: www.ChineseStandard.net / Wayne Zheng et al.
Tips & Frequently Asked QuestionsQuestion 1: How long will the true-PDF of English version of GM/T 0038-2014 be delivered?Answer: The full copy PDF of English version of GM/T 0038-2014 can be downloaded in 9 seconds, and it will also be emailed to you in 9 seconds (double mechanisms to ensure the delivery reliably), with PDF-invoice. Question 2: Can I share the purchased PDF of GM/T 0038-2014_English with my colleagues?Answer: Yes. The purchased PDF of GM/T 0038-2014_English will be deemed to be sold to your employer/organization who actually paid for it, including your colleagues and your employer's intranet. Question 3: Does the price include tax/VAT?Answer: Yes. Our tax invoice, downloaded/delivered in 9 seconds, includes all tax/VAT and complies with 100+ countries' tax regulations (tax exempted in 100+ countries) -- See Avoidance of Double Taxation Agreements (DTAs): List of DTAs signed between Singapore and 100+ countriesQuestion 4: Do you accept my currency other than USD?Answer: Yes. www.ChineseStandard.us -- GM/T 0038-2014 -- Click this link and select your country/currency to pay, the exact amount in your currency will be printed on the invoice. Full PDF will also be downloaded/emailed in 9 seconds.
How to buy and download a true PDF of English version of GM/T 0038-2014?A step-by-step guide to download PDF of GM/T 0038-2014_EnglishStep 1: Visit website https://www.ChineseStandard.net (Pay in USD), or https://www.ChineseStandard.us (Pay in any currencies such as Euro, KRW, JPY, AUD). Step 2: Search keyword "GM/T 0038-2014". Step 3: Click "Add to Cart". If multiple PDFs are required, repeat steps 2 and 3 to add up to 12 PDFs to cart. Step 4: Select payment option (Via payment agents Stripe or PayPal). Step 5: Customize Tax Invoice -- Fill up your email etc. Step 6: Click "Checkout". Step 7: Make payment by credit card, PayPal, Google Pay etc. After the payment is completed and in 9 seconds, you will receive 2 emails attached with the purchased PDFs and PDF-invoice, respectively. Step 8: Optional -- Go to download PDF. Step 9: Optional -- Click Open/Download PDF to download PDFs and invoice. See screenshots for above steps: Steps 1~3 Steps 4~6 Step 7 Step 8 Step 9
|