HOME   Cart(0)   Quotation   About-Us Policy PDFs Standard-List
www.ChineseStandard.net Database: 189760 (18 Oct 2025)

GM/T 0038-2014 PDF English

US$160.00 · In stock · Download in 9 seconds
GM/T 0038-2014: Key management of certificate authority system test specification
Delivery: 9 seconds. True-PDF full-copy in English & invoice will be downloaded + auto-delivered via email. See step-by-step procedure
Status: Obsolete
Standard IDContents [version]USDSTEP2[PDF] deliveryName of Chinese StandardStatus
GM/T 0038-2014English160 Add to Cart 0-9 seconds. Auto-delivery Key management of certificate authority system test specification Obsolete

Excerpted PDFs (Download full copy in 9 seconds upon purchase)

PDF Preview: GM/T 0038-2014
      

Similar standards

GB/T 15843.1   GA/T 1389   GM/T 0033   

GM/T 0038-2014: Key management of certificate authority system test specification

---This is an excerpt. Full copy of true-PDF in English version (including equations, symbols, images, flow-chart, tables, and figures etc.), auto-downloaded/delivered in 9 seconds, can be purchased online: https://www.ChineseStandard.net/PDF.aspx/GMT0038-2014
GM CRYPTOGRAPHY INDUSTRY STANDARD OF THE PEOPLE’S REPUBLIC OF CHINA ICS 35.040 L 80 File No.. 44643-2014 Key management of certificate authority system test specification Issued on: FEBRUARY 13, 2014 Implemented on: FEBRUARY 13, 2014 Issued by. State Cryptography Administration

Table of Contents

Foreword ... 4 1 Scope .. 5 2 Normative references ... 5 3 Terms and definitions ... 5 4 Test objects ... 6 5 Test outline .. 6 6 Test environment .. 6 7 Test content ... 6 7.1 Site .. 6 7.2 Network ... 7 7.3 Post and authority management ... 9 7.4 Security management .. 9 7.5 System initialization ... 9 7.6 System functions .. 10 7.7 System performance .. 11 7.8 Data backup and recovery ... 12 7.9 Third-party security products ... 12 7.10 Documents ... 13 8 Test method .. 13 8.1 Site ... 13 8.2 Network .. 13 8.3 Management of posts and authorization ... 14 8.4 Security management ... 15 8.5 System initialization ... 15 8.6 System functions .. 15 8.7 System performance .. 16 8.8 Data backup and recovery ... 16 8.9 Third-party security products ... 16 8.10 Documents ... 16 9 Qualification determination .. 16 9.1 Item qualification determination ... 16 9.2 Product qualification determination ... 17 Appendix A ... 18 A.1 Test objective ... 18 A.2 Physical areas and network structure of key management system .. 18 A.3 Hardware and software configuration of key management system .. 18 A.4 Module and function of key management system ... 18 A.5 Test content ... 18 Appendix B ... 23 Appendix C ... 24 C.1 Computer room layout of certificate authentication key management system ... 24 C.2 The equipment location plan in the computer room of certificate authentication key management system ... 24

Foreword

This Standard was drafted in accordance with the rules given in GB/T 1.1-2009. Attention is drawn to the possibility that some of the elements of this Standard may be the subject of patent rights. The issuing authority shall not be held responsible for identifying any or all such patent rights. This Standard was proposed by and shall be under the jurisdiction of Cryptography Industry Standardization Technical Committee. Main drafting organizations of this Standard. Changchun Jida Zhengyuan Information Technology Co., Ltd., Shanghai Gale Software Co., Ltd., National Information Security Engineering Technology Research Center, Beijing Haitai Fangyuan Science and Technology Co., Ltd. Main drafters of this Standard. Liu Ping, Gao Li, Tian Jingqi, Jiang Yulin, Zhang Baoxin, Li Weiping, Zhao Lili, Zhu Guoxin, Yuan Feng, Tan Wuzheng, an Xiaojiang, Zhang Wantao, Wu Chenghua. Key management of certificate authority system test specification

1 Scope

This Standard specifies the test contents and methods of the key management of certificate authorization system. This Standard is applicable to providing electronic authentication service for electronic signature. The certificate authentication key management system developed or built according to GM/T 0034-2014 can also provide reference for the test of other certificate authorization key management systems.

2 Normative references

The following referenced documents are indispensable for the application of this document. For dated references, only the edition cited applies. For undated references, the latest edition of the referenced document (including any amendments) applies. GM/T 0034-2014 Specifications of cryptograph and related security technology for certification system based on SM2 cryptographic algorithm

3 Terms and definitions

The following terms and definitions apply to this document. 3.1 Certificate authentication system; CA The system of full life cycle management of digital certificates, such as the issuance, publication, updating and revocation of digital certificates. 3.2 Key management system; KM A system to realize key management. 3.3 SM2 algorithm An Elliptic Curve Public key cryptographic algorithm with a key length of 256 bits. The main security strategies of intrusion detection configured to system are. a) Deploy intrusion detection device on the switch of key service area to ensure detection of all external packets; b) The intrusion detection management console shall be directly connected with the intrusion detection device to ensure its independent management and detection; c) Set intrusion detection to high alert level of packets detection and analysis; d) There shall be corresponding response strategies of security events detected by the intrusion detection devices; e) The feature repository for intrusion detection shall be updated in a timely manner. Note. Intrusion detection devices can also be set up as intrusion prevention devices. 7.2.2.3 Vulnerability scanning The main security strategies of vulnerability scanning configured for the system are. a) Conduct vulnerability scanning for critical server equipment, network equipment and network security devices regularly; b) There shall be corresponding response strategies for security events detected by vulnerability scanning; c) The vulnerability repository shall be updated in a timely manner. 7.2.2.4 Virus control The main security strategies for the virus control configured for the system are. a) Deploy antivirus products to key servers and operations, management terminals; b) There shall be corresponding response strategies for security events detected by antivirus products; c) The virus repository shall be updated in a timely manner. 7.2.2.5 Cryptographic machine The cryptographic machine shall be connected to the server via an independent physical port. The cryptographic machine shall be the product approved by the national cryptographic management department. 7.8 Data backup and recovery There shall be data backup and recovery strategy to realize the data backup and recovery of key management system. This article applies to item test only. 7.9 Third-party security products 7.9.1 Firewall The deployment location of the firewall shall conform to the requirements of 7.1.2. The firewall configuration strategies shall meet the requirements of 7.2.2.1. The firewall products shall be products that qualify the inspection and certification of the relevant national institutions. This article applies to item testing only. 7.9.2 Intrusion detection The deployment location of the intrusion detection product shall comply with the requirements of the 7.1.2. The configuration strategy of intrusion detection product shall meet the requirements of 7.2.2.2. Intrusion detection products shall qualify the inspection and certification of the relevant national institutions. This article applies to item test only. Note. This article also applies to intrusion prevention products. 7.9.3 Vulnerability scanning The deployment location of the vulnerability scanning product shall comply with the requirements of 7.1.2. The configuration strategy of vulnerability scanning product shall meet the requirements of 7.2.2.3. The vulnerability scanning product shall qualify the inspection and certification of the relevant national institutions. This article applies to item test only. 7.9.4 Virus control Count the keys in the standby, working and history repository, and the results shall meet the requirements of 7.6.2.5. 8.6.3 Log Sort or search the log according to time, personnel, operation type respectively. The results shall meet the requirements of 7.6.3. 8.6.4 Audit Perform audit operation in the audit interface on the information of the time of the event, the operator of the event, the type of operation, the result of the operation, the recorded signature and others. The results shall meet the requirements of 7.6.4. 8.6.5 Authority management Perform in the access management interface operations of add or delete business administrators, setting business administrator access. The results shall meet the requirements of 7.6.5. 8.7 System performance Test according to 7.7 and record test results. 8.8 Data backup and recovery Review backup and recovery strategies and corresponding measures, which shall comply with requirements of 7.8. 8.9 Third-party security products Check firewall, intrusion detection (intrusion prevention), vulnerability scanning and virus control product deployment and corresponding product certification, which shall meet the requirements of 7.9. 8.10 Documents View documents accompanied to certificate authentication key management system. They shall meet the requirements of 7.10.

9 Qualification determination

9.1 Item qualification determination 7.1.2, 7.2.1, 7.2.2.5, 7.6.2.1, 7.6.2.3 are key items. If any one of the test results does not m... ......
Source: Above contents are excerpted from the full-copy PDF -- translated/reviewed by: www.ChineseStandard.net / Wayne Zheng et al.


      

Tips & Frequently Asked Questions

Question 1: How long will the true-PDF of English version of GM/T 0038-2014 be delivered?

Answer: The full copy PDF of English version of GM/T 0038-2014 can be downloaded in 9 seconds, and it will also be emailed to you in 9 seconds (double mechanisms to ensure the delivery reliably), with PDF-invoice.

Question 2: Can I share the purchased PDF of GM/T 0038-2014_English with my colleagues?

Answer: Yes. The purchased PDF of GM/T 0038-2014_English will be deemed to be sold to your employer/organization who actually paid for it, including your colleagues and your employer's intranet.

Question 3: Does the price include tax/VAT?

Answer: Yes. Our tax invoice, downloaded/delivered in 9 seconds, includes all tax/VAT and complies with 100+ countries' tax regulations (tax exempted in 100+ countries) -- See Avoidance of Double Taxation Agreements (DTAs): List of DTAs signed between Singapore and 100+ countries

Question 4: Do you accept my currency other than USD?

Answer: Yes. www.ChineseStandard.us -- GM/T 0038-2014 -- Click this link and select your country/currency to pay, the exact amount in your currency will be printed on the invoice. Full PDF will also be downloaded/emailed in 9 seconds.

How to buy and download a true PDF of English version of GM/T 0038-2014?

A step-by-step guide to download PDF of GM/T 0038-2014_EnglishStep 1: Visit website https://www.ChineseStandard.net (Pay in USD), or https://www.ChineseStandard.us (Pay in any currencies such as Euro, KRW, JPY, AUD).
Step 2: Search keyword "GM/T 0038-2014".
Step 3: Click "Add to Cart". If multiple PDFs are required, repeat steps 2 and 3 to add up to 12 PDFs to cart.
Step 4: Select payment option (Via payment agents Stripe or PayPal).
Step 5: Customize Tax Invoice -- Fill up your email etc.
Step 6: Click "Checkout".
Step 7: Make payment by credit card, PayPal, Google Pay etc. After the payment is completed and in 9 seconds, you will receive 2 emails attached with the purchased PDFs and PDF-invoice, respectively.
Step 8: Optional -- Go to download PDF.
Step 9: Optional -- Click Open/Download PDF to download PDFs and invoice.
See screenshots for above steps: Steps 1~3    Steps 4~6    Step 7    Step 8    Step 9