GB/T 41400-2022 PDF English
Price & Delivery
US$1619.00 · In stock · Download in 9 secondsGB/T 41400-2022: Information security technology - Information security protection capability maturity model of industrial control systems
Delivery: 9 seconds. True-PDF full-copy in English & invoice will be downloaded + auto-delivered via email. See step-by-step procedure
Status: Valid
| Std ID | Version | USD | Buy | Deliver [PDF] in | Title (Description) |
| GB/T 41400-2022 | English | 1619 | Add to Cart | 9 days [Need to translate] | Information security technology - Information security protection capability maturity model of industrial control systems |
Click to Preview a similar PDF
Basic data
| Standard ID | GB/T 41400-2022 (GB/T41400-2022) |
| Description (Translated English) | Information security technology - Information security protection capability maturity model of industrial control systems |
| Sector / Industry | National Standard (Recommended) |
| Classification of Chinese Standard | L80 |
| Word Count Estimation | 84,822 |
| Issuing agency(ies) | State Administration for Market Regulation, China National Standardization Administration |
GB/T 41400-2022: Information security technology - Information security protection capability maturity model of industrial control systems
---This is a DRAFT version for illustration, not a final translation. Full copy of true-PDF in English version (including equations, symbols, images, flow-chart, tables, and figures etc.) will be manually/carefully translated upon your order.
Information security technology -- Information security protection capability maturity model of industrial control systems ICS 35.030 CCSL80 National Standards of People's Republic of China Information Security Technology Industrial Control System Information Security Defense Capability Maturity Model Published on 2022-04-15 2022-11-01 Implementation State Administration for Market Regulation Released by the National Standardization Administration directory Foreword V 1 Scope 1 2 Normative references 1 3 Terms and Definitions 1 4 Abbreviations 2 5 Industrial control system information security protection capability maturity model 3 5.1 Capability Maturity Model Architecture 3 5.2 Capability element dimension 4 5.2.1 Competency Composition 4 5.2.2 Institutional Building 4 5.2.3 Institutional Process 4 5.2.4 Technical tools 4 5.2.5 Personnel Capability 4 5.3 Capability Maturity Level Dimension 4 5.4 Dimension 5 of the capacity building process 5.4.1 PA System 5 5.4.2 Coding Rules 6 5.4.3 Relationship Description 6 6 Core Protection Object Security 7 6.1 Industrial Equipment Safety 7 6.1.1 PA01 Control Equipment Safety 7 6.1.2 PA02 On-site measurement and control equipment safety 8 6.1.3 PA03 Equipment Asset Management 9 6.1.4 PA04 Storage Media Protection 9 6.2 Industrial host security 11 6.2.1 PA05 special security software 11 6.2.2 PA06 Vulnerability and Patch Management 12 6.2.3 PA07 Peripheral Interface Management 12 6.3 Industrial Network Border Security 13 6.3.1 PA08 security area division 13 6.3.2 PA09 Network Border Protection 14 6.3.3 PA10 Remote Access Security 15 6.3.4 PA11 Authentication 16 6.4 Industrial Control Software Security 17 6.4.1 PA12 Security Configuration 17 6.4.2 PA13 configuration change 18 6.4.3 PA14 Account Management 19 6.4.4 PA15 password protection 19 6.4.5 PA16 Security Audit 20 6.5 Industrial Data Security 21 6.5.1 PA17 Data Classification and Hierarchical Management 21 6.5.2 PA18 Differential Protection 23 6.5.3 PA19 data backup and recovery 23 6.5.4 PA20 test data protection 24 7 General Security 25 7.1 Security Planning and Architecture 25 7.1.1 PA21 Security Policy and Procedure 25 7.1.2 PA22 safety mechanism settings 26 7.1.3 PA23 Security Responsibilities 27 7.2 Personnel Management and Training 27 7.2.1 PA24 Personnel Safety Management 27 7.2.2 PA25 Safety Education and Training 28 7.3 Physical and Environmental Security 29 7.3.1 PA26 physical security protection 29 7.3.2 PA27 emergency power supply 30 7.3.3 PA28 Physical Disaster Prevention 31 7.3.4 PA29 Environmental Separation 32 7.4 Monitoring, early warning and emergency response 33 7.4.1 PA30 Industrial Asset Perception 33 7.4.2 PA31 Risk Monitoring 34 7.4.3 PA32 Threat Warning 35 7.4.4 PA33 emergency plan 36 7.4.5 PA34 emergency drill 37 7.5 Supply Chain Security 37 7.5.1 PA35 product selection 37 7.5.2 PA36 Supplier Selection 38 7.5.3 PA37 Procurement Delivery 39 7.5.4 PA38 Contract Agreement Control 40 7.5.5 PA39 Source Code Audit 41 7.5.6 PA40 upgrade security 42 8 Capability Maturity Level Verification Methods 43 8.1 Industrial Equipment Safety 43 8.1.1 PA01 Control Equipment Safety 43 8.1.2 PA02 On-site measurement and control equipment safety 43 8.1.3 PA03 Equipment Asset Management 44 8.1.4 PA04 Storage Media Protection 45 8.2 Industrial host security 45 8.2.1 PA05 special security software 45 8.2.2 PA06 Vulnerability and Patch Management 46 8.2.3 PA07 Peripheral Interface Management 47 8.3 Industrial network perimeter security 47 8.3.1 PA08 Security Area Division 47 8.3.2 PA09 Network Border Protection 48 8.3.3 PA10 Remote Access Security 48 8.3.4 PA11 Authentication 49 8.4 Industrial Control Software Security 50 8.4.1 PA12 Security Configuration 50 8.4.2 PA13 configuration changes 51 8.4.3 PA14 Account Management 51 8.4.4 PA15 password protection 52 8.4.5 PA16 Security Audit 53 8.5 Industrial Data Security 54 8.5.1 PA17 Data Classification and Hierarchical Management 54 8.5.2 PA18 Differential Protection 55 8.5.3 PA19 data backup and recovery 56 8.5.4 PA20 test data protection 56 8.6 Security Planning and Architecture 57 8.6.1 PA21 Security Policies and Procedures 57 8.6.2 PA22 safety mechanism settings 57 8.6.3 PA23 Security Responsibilities 58 8.7 Personnel management and training 58 8.7.1 PA24 Personnel Safety Management 58 8.7.2 PA25 Safety Education and Training 59 8.8 Physical and Environmental Security 60 8.8.1 PA26 physical security protection 60 8.8.2 PA27 emergency power supply 61 8.8.3 PA28 Physical Disaster Prevention 61 8.8.4 PA29 Environmental Separation 63 8.9 Monitoring, early warning and emergency response 63 8.9.1 PA30 Industrial Asset Perception 63 8.9.2 PA31 Risk Monitoring 64 8.9.3 PA32 Threat Warning 65 8.9.4 PA33 emergency plan 65 8.9.5 PA34 emergency drill 66 8.10 Supply Chain Security 66 8.10.1 PA35 product selection 66 8.10.2 PA36 Supplier Selection 67 8.10.3 PA37 Procurement Delivery 68 8.10.4 PA38 Contract Agreement Control 68 8.10.5 PA39 Source Code Audit 69 8.10.6 PA40 upgrade security 70 Appendix A (Informative) Capability Maturity Level Description and GP 71 Appendix B (Informative) Capability Maturity Model Usage 74 Appendix C (Informative) Capability Maturity Level Verification Process 75 Reference 78