|
US$469.00 ยท In stock Delivery: <= 3 days. True-PDF full-copy in English will be manually translated and delivered via email. RB/T 201-2013: Evaluation requirements for service capability certification-of information-system security integration Status: Valid
| Standard ID | Contents [version] | USD | STEP2 | [PDF] delivered in | Standard Title (Description) | Status | PDF |
| RB/T 201-2013 | English | 469 |
Add to Cart
|
3 days [Need to translate]
|
Evaluation requirements for service capability certification-of information-system security integration
| Valid |
RB/T 201-2013
|
PDF similar to RB/T 201-2013
Standard similar to RB/T 201-2013 GB/T 23899 GB 29446 GB/T 35986 RB/T 202
Basic data | Standard ID | RB/T 201-2013 (RB/T201-2013) | | Description (Translated English) | Evaluation requirements for service capability certification-of information-system security integration | | Sector / Industry | Chinese Industry Standard (Recommended) | | Classification of Chinese Standard | F10;F19 | | Classification of International Standard | 01.040.35 | | Word Count Estimation | 18,192 | | Date of Issue | 12/2/2013 | | Date of Implementation | 6/15/2014 | | Quoted Standard | GB/T 5271.8-2001; GB/T 20261-2006 | | Regulation (derived from) | The industry standard for the record Notice 2014 No. 2 (No. 170 overall) | | Issuing agency(ies) | National Certification and Accreditation Administration | | Summary | This standard specifies the information system security integration (hereinafter referred to as "SI") service provider should have the basic requirements, service requirements and the specific requirements of the process at all levels. This standard appli |
RB/T 201-2013: Evaluation requirements for service capability certification-of information-system security integration ---This is a DRAFT version for illustration, not a final translation. Full copy of true-PDF in English version (including equations, symbols, images, flow-chart, tables, and figures etc.) will be manually/carefully translated upon your order.
Evaluation requirements for service capability certification-of information-system security integration
ICS 01.040.35
F10/19
Record number. 43669
People's Republic of China certification and recognition of industry standards
Information System Security Integration Service Qualification
Certification evaluation requirements
Released.2013-12-02
2014-06-15 implementation
China National Certification and Accreditation Administration issued
Content
Foreword I
1 Scope 1
2 Normative references 1
3 Terms, definitions and abbreviations 1
3.1 Terms and Definitions 1
3.2 Abbreviations 1
4 Basic requirements 1
4.1 Basic conditions 1
4.2 Basic Management Capabilities 2
4.3 Basic technical capabilities 2
5 Service Process Requirements 2
5.1 Security Integration Service Process Overview 2
5.2 Integration Preparation 5
5.3 Scheme Design 6
5.4 Construction Implementation 6
5.5 Security 7
6 Evaluation requirements at all levels 8
6.1 Overview 8
6.2 Level 3 Requirements 8
6.3 Secondary requirements 9
6.4 Level 1 requirements 10
7 Evaluation Requirements 11
Appendix A (informative) Information System Security Integration Service Qualification Certification Requirements Form 12
Reference 14
Foreword
This standard was drafted in accordance with the rules given in GB/T 1.1-2009.
This standard is proposed and managed by the National Certification and Accreditation Administration.
This standard was drafted. China Information Security Certification Center, National Quality Supervision, Inspection and Quarantine Bureau of Standards and Regulations, Huawei Technologies
Limited company.
The main drafters of this standard. Yan Yahong, Cao Yabin, Chen Xiaohua, Zhang Bin, Zhang Zhijun, Song Zhigang, Li Qiang, Lu Ming, Li Zongyang.
Information System Security Integration Service Qualification
Certification evaluation requirements
1 Scope
This standard specifies the basic requirements and service procedures that information system security integration (hereinafter referred to as "security integration") service providers should have.
Requirements and specific requirements at each level.
This standard is applicable to the evaluation agency's evaluation of the service provider's service capability, and also applies to the information system owner's choice of service.
The provider, the management department manages the service provider, and the service provider's self-ability improvement.
2 Normative references
The following documents are indispensable for the application of this document. For dated references, only the dated version applies to this article.
Pieces. For undated references, the latest edition (including all amendments) applies to this document.
GB/T 5271.8-2001 Information technology -- Part 8. Safety
GB/T 20261-2006 information technology system security engineering capability maturity model
3 Terms, definitions and abbreviations
GB/T 5271.8-2001 "Information Technology Vocabulary Part 8. Security", GB/T 20261-2006 "Information Technology System Security"
The following terms, definitions and abbreviations defined in the Engineering Capability Maturity Model apply to this document.
3.1 Terms and definitions
Security integration securityintegration
In accordance with the security requirements of information system construction, the security system and product components are implemented using the methods and theories of information system security engineering.
The process of integration. Safety integration includes considering information security factors in the structural design of the new information system, thus completing the construction.
The post-information system meets the security needs of the builder or the user. Also includes additional additions based on existing information systems
Adding information security subsystems or information security devices is often referred to as security optimization or security hardening. Security integration services usually include calculations
Machine application system engineering and network system engineering security requirements determination, program design, construction implementation, security and other activities.
3.2 Abbreviations
CISAW Information Security Practitioner Certification (certifiedinformationsecurityassuranceworker)
CISSP registration information system security expert (certifiedinformationsystemsecurityprofessional)
CISA registered information security auditor (certifiedinformationsecurityauditor)
PMP project management professional qualification (projectmanagementprofessional)
4 basic requirements
4.1 Basic conditions
The service provider should.
a) Having the status of an independent legal person within the territory of the People's Republic of China and the legal business qualification issued by the relevant department, with independent undertakings
Tips & Frequently Asked Questions:Question 1: How long will the true-PDF of RB/T 201-2013_English be delivered?Answer: Upon your order, we will start to translate RB/T 201-2013_English as soon as possible, and keep you informed of the progress. The lead time is typically 1 ~ 3 working days. The lengthier the document the longer the lead time. Question 2: Can I share the purchased PDF of RB/T 201-2013_English with my colleagues?Answer: Yes. The purchased PDF of RB/T 201-2013_English will be deemed to be sold to your employer/organization who actually pays for it, including your colleagues and your employer's intranet. Question 3: Does the price include tax/VAT?Answer: Yes. Our tax invoice, downloaded/delivered in 9 seconds, includes all tax/VAT and complies with 100+ countries' tax regulations (tax exempted in 100+ countries) -- See Avoidance of Double Taxation Agreements (DTAs): List of DTAs signed between Singapore and 100+ countriesQuestion 4: Do you accept my currency other than USD?Answer: Yes. If you need your currency to be printed on the invoice, please write an email to [email protected]. In 2 working-hours, we will create a special link for you to pay in any currencies. Otherwise, follow the normal steps: Add to Cart -- Checkout -- Select your currency to pay.
|