GA/T 1390.2-2017 PDF English
Price & Delivery
US$789.00 · In stock · Download in 9 secondsGA/T 1390.2-2017: Information security technology—General requirements for classified protection of cyber security—Part 2: Special security requirements for cloud computing
Delivery: 9 seconds. True-PDF full-copy in English & invoice will be downloaded + auto-delivered via email. See step-by-step procedure
Status: Valid
| Std ID | Version | USD | Buy | Deliver [PDF] in | Title (Description) |
| GA/T 1390.2-2017 | English | 789 | Add to Cart | 7 days [Need to translate] | Information security technology—General requirements for classified protection of cyber security—Part 2: Special security requirements for cloud computing |
Click to Preview a similar PDF
Basic data
| Standard ID | GA/T 1390.2-2017 (GA/T1390.2-2017) |
| Description (Translated English) | Information security technology��General requirements for classified protection of cyber security��Part 2: Special security requirements for cloud computing |
| Sector / Industry | Public Security (Police) Industry Standard (Recommended) |
| Classification of Chinese Standard | L80 |
| Classification of International Standard | 35.40 |
| Word Count Estimation | 34,350 |
| Date of Issue | 2017-05-08 |
| Date of Implementation | 2017-05-08 |
| Issuing agency(ies) | Ministry of Public Security |
GA/T 1390.2-2017: Information security technology—General requirements for classified protection of cyber security—Part 2: Special security requirements for cloud computing
---This is a DRAFT version for illustration, not a final translation. Full copy of true-PDF in English version (including equations, symbols, images, flow-chart, tables, and figures etc.) will be manually/carefully translated upon your order.
Information security technology-General requirements for classified protection of cyber security-Part 2. Special security requirements for cloud computing ICS 35.40 L80 People's Republic of China public safety industry standards Information Security Technology Network Security Level Protection Basics Requirements Part 2. Cloud Computing Security Extensions Requirements cybersecurity-Part 2.Specialsecurityrequirementsforcloudcomputing 2017-05-08 Posted 2017-05-08 Implementation Ministry of Public Security of People's Republic of China released Directory Foreword V. Introduction Ⅵ 1 Scope 1 2 Normative references 1 3 Terms and definitions 1 4 Cloud Computing Security Overview 2 4.1 cloud computing platform 2 4.2 cloud computing platform rating 3 5 Level 1 safety requirements 3 5.1 Technical Requirements 3 5.1.1 Physical and Environmental Safety 3 5.1.2 Network and Communication Security 3 5.1.2.1 Network Architecture 3 5.1.2.2 Access Control 3 5.1.2.3 intrusion prevention 4 5.1.2.4 Security Audit 4 5.1.3 equipment and computing security 4 5.1.3.1 Identification 4 5.1.3.2 Access Control 4 5.1.3.3 Security Audit 4 5.1.3.4 intrusion prevention 4 5.1.3.5 Resource Control 4 5.1.3.6 Mirroring and Snapshot Protection 4 5.1.4 Application and Data Security 4 5.1.4.1 Security Audit 4 5.1.4.2 Resource Control 5 5.1.4.3 Interface Security 5 5.1.4.4 Data Integrity 5 5.1.4.5 Data Confidentiality 5 5.1.4.6 Data backup and recovery 5 5.1.4.7 Residual Information Protection 5 5.2 Management Requirements 5 5.2.1 Security management agencies and personnel 5 5.2.1.1 Authorization 5 5.2.1.2 Personnel recruitment 5 5.2.2 Safety Construction Management 5 5.2.2.1 test and acceptance 5 5.2.2.2 Cloud service provider choice 5.2.2.3 Supply Chain Management 6 5.2.3 Safe Operation Management 6 5.2.3.1 Environmental Management 5.2.3.2 Monitoring and Audit Management 6 6 Level 2 safety requirements 6 6.1 Technical Requirements 6 6.1.1 Physical and Environmental Safety 6 6.1.2 Network and Communication Security 6 6.1.2.1 Network Architecture 6 6.1.2.2 Access Control 7 6.1.2.3 Intrusion Prevention 7 6.1.2.4 Security Audit 7 6.1.3 Equipment and Computing Security 7 6.1.3.1 Identification 7 6.1.3.2 Access Control 7 6.1.3.3 Security Audit 7 6.1.3.4 Intrusion Prevention 7 6.1.3.5 Resource Control 7 6.1.3.6 Mirroring and Snapshot Protection 7 6.1.4 Application and Data Security 8 6.1.4.1 Security Audit 8 6.1.4.2 Resource Control 8 6.1.4.3 Interface Security 8 6.1.4.4 Data Integrity 8 6.1.4.5 Data Confidentiality 8 6.1.4.6 Data backup and recovery 8 6.1.4.7 Residual Information Protection 8 6.2 Management Requirements 8 6.2.1 Security management agencies and personnel 8 6.2.1.1 Authorization 8 6.2.1.2 Personnel recruitment 8 6.2.2 Safety Construction Management 9 6.2.2.1 Test acceptance 9 6.2.2.2 Cloud service provider choice 6.2.2.3 Supply Chain Management 9 6.2.3 Safe Operation Management 9 6.2.3.1 Environmental Management 9 6.2.3.2 Monitoring and Audit Management 9 7 Level 3 Safety Requirements 9 7.1 Technical Requirements 9 7.1.1 Physical and Environmental Safety 9 7.1.2 Network and Communication Security 10 7.1.2.1 Network Architecture 10 7.1.2.2 Access Control 10 7.1.2.3 Intrusion Prevention 10 7.1.2.4 Security Audit 10 7.1.3 Equipment and Computing Security 10 7.1.3.1 Identification 10 7.1.3.2 Access Control 11 7.1.3.3 Security Audit 11 7.1.3.4 Intrusion Prevention 11 7.1.3.5 Malicious Code Prevention 11 7.1.3.6 Resource Control 11 7.1.3.7 Mirroring and Snapshot Protection 11 7.1.4 Application and Data Security 11 7.1.4.1 Security Audit 11 7.1.4.2 Resource Control 12 7.1.4.3 Interface Security 12 7.1.4.4 Data Integrity 12 7.1.4.5 Data Confidentiality 12 7.1.4.6 Data backup and recovery 12 7.1.4.7 Residual Information Protection 12 7.2 Management Requirements 12 7.2.1 Security management agencies and personnel 12 7.2.1.1 Authorization 12 7.2.1.2 Personnel recruitment 12 7.2.2 Security Construction Management 13 7.2.2.1 Security Program Design 13 7.2.2.2 Test acceptance 13 7.2.2.3 Cloud Service Provider Selection 13 7.2.2.4 Supply Chain Management 13 7.2.3 Safe Operation Management 13 7.2.3.1 Environmental Management 13 7.2.3.2 Configuration Management 13 7.2.3.3 Monitoring and Audit Management 14 Level 4 Safety Requirements 14 8.1 Technical Requirements 8.1.1 Physical and Environmental Safety 14 8.1.2 Network and Communication Security 14 8.1.2.1 Network Architecture 14 8.1.2.2 Access Control 14 8.1.2.3 Intrusion Prevention 15 8.1.2.4 Security Audit 15 8.1.3 Equipment and Computing Security 15 8.1.3.1 Identification 15 8.1.3.2 Access Control 15 8.1.3.3 Security Audit 15 8.1.3.4 Intrusion Prevention 15 8.1.3.5 Malicious Code Prevention 15 8.1.3.6 Resource Control 16 8.1.3.7 Mirroring and Snapshot Protection 16 8.1.4 Application and Data Security 16 8.1.4.1 Security Audit 16 8.1.4.2 Resource Control 16 8.1.4.3 Interface Security 16 8.1.4.4 Data Integrity 16 8.1.4.5 Data Confidentiality 16 8.1.4.6 Data backup and recovery 17 8.1.4.7 Residual Information Protection 17 8.2 Management Requirements 17 8.2.1 Security Management Agency and Personnel 17 8.2.1.1 Authorization 17 8.2.1.2 Personnel Recruitment 17 8.2.2 Security Construction Management 17 8.2.2.1 Security Program Design 17 8.2.2.2 Test Acceptance 17 8.2.2.3 Cloud Provider Selection 17 8.2.2.4 Supply Chain Management 18 8.2.3 Safe Operation Management 18 8.2.3.1 Environmental Management 18 8.2.3.2 Configuration Management 18 8.2.3.3 Monitoring and Audit Management 18 Appendix A (Informative) Cloud Computing Platform Security Threats 19 Appendix B (normative) security management responsibilities of different service models 21 Appendix C (normative) This part of the object is applicable 24 References 25