HOME   Cart(1)   Quotation   About-Us Policy PDFs Standard-List
www.ChineseStandard.net Database: 189760 (1 Nov 2025)

SFT0036-2019 English PDF

US$439.00 ยท In stock
Delivery: <= 4 days. True-PDF full-copy in English will be manually translated and delivered via email.
SFT0036-2019: (Notary information security technical specifications)
Status: Valid
Standard IDContents [version]USDSTEP2[PDF] delivered inStandard Title (Description)StatusPDF
SF/T 0036-2019English439 Add to Cart 4 days [Need to translate] (Notary information security technical specifications) Valid SF/T 0036-2019

PDF similar to SFT0036-2019


Standard similar to SFT0036-2019

WB/T 1120   GB/T 36088   GB/T 26992   SF/T 0034   SF/T 0035   SF/T 0033   

Basic data

Standard ID SF/T 0036-2019 (SF/T0036-2019)
Description (Translated English) (Notary information security technical specifications)
Sector / Industry Chinese Industry Standard (Recommended)
Classification of Chinese Standard A16
Classification of International Standard 35.240.01
Word Count Estimation 19,164
Date of Issue 2019
Date of Implementation 2019-05-20
Issuing agency(ies) Ministry of Justice of the People's Republic of China

SFT0036-2019: (Notary information security technical specifications)

---This is a DRAFT version for illustration, not a final translation. Full copy of true-PDF in English version (including equations, symbols, images, flow-chart, tables, and figures etc.) will be manually/carefully translated upon your order.
Technical specification for notarization information security The People's Republic of China Judicial Administration Industry Standard Notarization Information Security Technical Specifications 2019-5-5 release 2019-5 -20 Implementation Issued by the Ministry of Justice of the People's Republic of China 1 Scope...1 2 Normative references...1 3 Terms, definitions and abbreviations...1 4 Notarized information security objects and content...3 5 Notarization Information Security Construction...3 6 Physical Security...4 7 Cyber Security...5 8 System Security...5 9 Application Security...7 10 Data Security and Backup and Recovery...9 11 Security Protection Requirements for Notarized PKI System...11 References...16

Foreword

This standard was drafted in accordance with the rules given in GB/T 1.1-2009. Please note that some of the contents of this document may involve patents. The issuing agency of this document is not responsible for identifying these patents. This standard was proposed by the Public Legal Service Administration of the Ministry of Justice and the Chinese Notary Association. This standard is under the jurisdiction of the Information Center of the Ministry of Justice. Drafting organization of this standard. China Notary Association. Notarization Information Security Technical Specifications

1 Scope

This standard specifies notarized information security objects and content, information security construction, physical security, network security, system security, application security Complete, data security and backup recovery and notarization PKI system security protection requirements. This standard applies to the planning, design, and construction of notarization information security by judicial administrative notarization management departments, notary associations and various notary institutions And management.

2 Normative references

The following documents are indispensable for the application of this document. For dated reference documents, only the dated version applies to this document. For undated reference documents, the latest version (including all amendments) is applicable to this document. GB/T 17859 Computer Information System Security Protection Classification Criteria GB/T 19713 Information Technology Security Technology Public Key Infrastructure Online Certificate Status Protocol GB/T 20269 Information Security Technology Information System Security Management Requirements GB/T 20271-2006 Information Security Technology Information System General Security Technical Requirements GB/T 20518 Information Security Technology Public Key Infrastructure Digital Certificate Format GB/T 22239-2008 Information Security Technology Information System Security Level Protection Basic Requirements GB/T 22240-2008 Information Security Technology Information System Security Level Protection Rating Guidelines GB/T 50052 Code for Design of Power Supply and Distribution System SF/T 0034-2019 Notarized data requirements and specifications 3 Terms, definitions and abbreviations 3.1 Terms and definitions The following terms and definitions apply to this document. 3.1.1 Notarization According to the application of a natural person, legal person or other organization, a notary institution shall, in accordance with legal procedures, deal with civil legal acts and matters of legal significance. Activities that prove the authenticity and legality of documents and documents. 3.1.2 Notarial institutions A certification agency established in accordance with the law, not for profit, independently performing notarization functions in accordance with the law, and assuming civil liabilities. 3.1.3 Notarized matters According to the provisions of Article 11 of the "Notarization Law of the People's Republic of China", the notary institution shall conduct the notarization business in accordance with the notarization certification object The detailed classification. 3.1.4 Notarial affairs According to the provisions of Article 12 of the "Notarization Law of the People's Republic of China", non-certification business handled by a notary institution. 3.1.5 Notarization information security The security of notarized data and information facilities. 3.1.6 Data confidentiality Unauthorized users, entities, or processes have no access rights to the information, thereby ensuring that confidential information is not stolen or used. 3.1.7 Message-digest algorithm An encryption process does not require a key, and the encrypted data cannot be decrypted. Only the same plaintext data is entered after the same The algorithm can get the same ciphertext algorithm. 3.1.8 Block chain In a peer-to-peer network environment, through transparent and trustworthy rules, a block chain data structure that cannot be forged, tampered and traceable is constructed Structuring, implementing and managing the transaction processing model. Note. Transaction processing includes but is not limited to the generation, access and use of trusted data. [GB/T 37043-2018, definition 2.5.8] 3.1.9 Digital signature Some data attached to the data unit, or the cryptographic exchange of the data unit (see "cryptography"), this data may change The change allows the recipient of the data unit to confirm the source of the data unit and the integrity of the data unit, and to protect the data to prevent others (such as receiving Recipient) forgery. [GB/T 9387.2-1995, definition 3.3.26] 3.1.10 Asymmetric cryptographic technique Two cryptographic techniques with related transformations are used. Note. One is the public transformation defined by the public key, and the other is the private transformation defined by the private key. 3.2 Abbreviations The following abbreviations apply to this document. CA certificate certification authority (Certificate Authority) CRL certificate revocation list (Certificate Revocation List) IDS Intrusion Detection Systems (Intrusion Detection Systems) IPSec Internet Protocol Security (Internet Protocol Security) OCSP Online Certificate Status Protocol (Online Certificate Status Protocol) PKI Public Key Infrastructure (Public Key Infrastructure) RA Certificate Registration Authority (Registration Authority) SSL Secure Sockets Layer (Secure Sockets Layer)

4 Notarized information security objects and content

4.1 Information Security Object Information security objects include notarization matters, notarization affairs, notarization data and notarization information facilities. 4.2 Information security content Information security includes technical security and management security. among them. a) Technical security includes physical security, network security, system security, application security, data security, PKI security, etc. as follows. 1) Physical security. Notarization data centers and electronic notarization information facilities, including computer rooms, servers, network equipment, storage devices Protect equipment, PCs, mobile devices, etc. from illegal physical access, natural disasters and environmental disasters; 2) Network security. identity authentication, confidentiality, integrity, availability, controllability, authenticity and availability of data in the communication process Examination guarantee, etc.; 3) System security. operating system, database, middleware, etc.; 4) Application security. Notarization information related systems, platforms, tools and applications, such as notarization business certification system, notarization business Management system, notarized electronic file management system, notarized online acceptance system, notarized electronic data storage tool, screen record Like tools, etc.; 5) Data security. Notarized data storage security, communication security, and authority security (see SF/T 0034-2019 for details), And the staff data, user data and other data stored in the electronic notarization; 6) PKI security. PKI system security and security management in the notarization industry. b) Management security should follow the content of GB/T 20269, the specific content is as follows. 1) The formulation of safety rules and regulations; 2) Organization and personnel management content; 3) Risk and emergency management content; 4) Operation and maintenance management content; 5) Supervise and inspect management content; 6) Safety education and training content.

5 Notarization information security construction

5.1 Basic requirements for information security construction Information security construction requirements are as follows. a) It shall follow the relevant regulations of GB/T 17859, GB/T 22240, GB/T 22239 and Gongtongzi [2007] No. 43, and comply with the notarization Other requirements required by the industry; b) According to the importance and different types of information, different protection measures should be adopted to implement classified protection; c) According to the importance of the information system and data, storage in different domains shall be carried out, domain protection and security exchange between domains shall be implemented, control. 5.2 Implementation methods of information security construction Information security construction should follow the following implementation methods. a) Determine the security level of electronic notarization information in accordance with the grading rules of information security level protection; b) According to the information security level protection requirements, determine the basic security requirements corresponding to the electronic notarization information security level; c) According to the basic security requirements of the information system, and integrate the electronic notarization information security technical requirements, the risks faced by the information system and the implementation The cost of security protection measures, the formulation of security protection measures, and the determination of security protection measures applicable to electronic notarization information, And complete the planning, design, implementation, acceptance and operation work in accordance with the relevant requirements of this standard. 5.3 Information security protection level The information security protection level shall be planned and constructed in accordance with the third level requirements in GB/T 22239-2008.

6 Physical security

6.1 Basic requirements for physical security It shall follow the relevant regulations in 7.1.1 of GB/T 22240-2008, and meet other requirements required by the notary industry; 6.2 Environmental safety Environmental safety mainly provides the following requirements for the environment of the computer room. a) It should meet the requirements of fire prevention, pollution prevention, moisture prevention, lightning prevention, vibration prevention, strong electric field, strong magnetic field, earthquake prevention, waterproof disaster prevention, and Requirements for public interference; b) There should be only one entrance and exit, unauthorized personnel are not allowed to enter the computer room; Magnets, personal computers or electrical equipment, food and other irrelevant items are brought into the computer room. The computer room should be equipped with access control equipment, all entering and leaving the computer room The personnel should be identified by the access control system; c) Air-conditioning equipment should be provided to make the temperature of the computer room reach the allowable range of computer operation; d) The safety of communication lines shall be ensured, and necessary measures shall be taken to prevent the occurrence of line interception incidents; e) Reliable power supply should be provided. The power supply should meet the requirements of GB/T 50052, adopt a variety of power supply methods, and maintain and inspect regularly. Check the power supply equipment. If there is a planned power outage, the relevant department should be notified in advance of the power outage plan. 6.3 Equipment safety The equipment safety requirements are as follows. a) The computer and network infrastructure should be properly placed. The computer room should be equipped with TV monitoring and dedicated personnel should be on duty to strengthen protection to reduce the damage. Low risk of damage and prevent illegal intrusion; b) Reliable operation support should be provided for the equipment, and the information system should be supported to realize uninterrupted operation through measures such as fault tolerance and failure recovery; c) Strict protection measures should be taken to store various types of recording media for core data to prevent theft, destruction and damage. Core data should be long Keep it for a period of time and take effective measures to prevent illegal copying.

7 Cybersecurity

7.1 Basic requirements for network security It shall follow the relevant regulations in 7.1.2 of GB/T 22240-2008 and meet other requirements required by the notary industry; 7.2 Network access control The network access control requirements are as follows. a) Authorized network services should be used to prevent insecure network connections from affecting the security of electronic notarization; b) Strategies for the use of networks and network services should be formulated and consistent with access control strategies. The specific strategy should stipulate the following Content. 1) The network and network services that users are allowed to access should be clear; 2) Procedures for authorizing users to access the network and network services should be specified; 3) There should be management control measures and procedures to protect network connections and network service access; 4) A log of access to network services should be kept, and the specific content of the log should be determined according to the sensitivity of the information. c) Should be based on access control strategies and access requirements, according to different businesses, applications and the sensitivity and importance of the information processed, And in accordance with the national information security level protection requirements, the network and information system are divided into different logical security areas, and key points are adopted. The method of protection and border isolation focuses on strengthening the security protection and monitoring of the key borders of the security domain. At the same time through isolation measures, over Filter inter-domain services and control inter-domain communications; d) Effective port protection measures should be formulated and implemented to protect the ports used for remote operation and management of networks and information systems to prevent Ports are accessed unauthorized or illegally, and access logs of each port are recorded. 7.3 Network transmission security The network transmission security requirements are as follows. a) Encryption control measures such as SSL and IPSec should be adopted to ensure the confidentiality and integrity of data transmitted through public networks; b) The security status of the network should be continuously monitored, and relevant errors, failures and remedial measures should be recorded. 7.4 Network security audit and monitoring The network security audit and monitoring requirements are as follows. a) Audit and monitor network access and usage to detect activities that violate access control policies; b) Relevant evidence should be recorded. 7.5 Security Management of Network Equipment The security management requirements for network equipment are as follows. a) Equipment management authority should be clearly permitted, otherwise it should be prohibited; b) The change of equipment management authority should be clearly defined...

Tips & Frequently Asked Questions:

Question 1: How long will the true-PDF of SFT0036-2019_English be delivered?

Answer: Upon your order, we will start to translate SFT0036-2019_English as soon as possible, and keep you informed of the progress. The lead time is typically 2 ~ 4 working days. The lengthier the document the longer the lead time.

Question 2: Can I share the purchased PDF of SFT0036-2019_English with my colleagues?

Answer: Yes. The purchased PDF of SFT0036-2019_English will be deemed to be sold to your employer/organization who actually pays for it, including your colleagues and your employer's intranet.

Question 3: Does the price include tax/VAT?

Answer: Yes. Our tax invoice, downloaded/delivered in 9 seconds, includes all tax/VAT and complies with 100+ countries' tax regulations (tax exempted in 100+ countries) -- See Avoidance of Double Taxation Agreements (DTAs): List of DTAs signed between Singapore and 100+ countries

Question 4: Do you accept my currency other than USD?

Answer: Yes. If you need your currency to be printed on the invoice, please write an email to [email protected]. In 2 working-hours, we will create a special link for you to pay in any currencies. Otherwise, follow the normal steps: Add to Cart -- Checkout -- Select your currency to pay.

Refund Policy     Privacy Policy     Terms of Service     Shipping Policy     Contact Information