Home Cart Quotation Policy About-Us
www.ChineseStandard.net
Database: 221581 (27 Mar 2026)
SEARCH
Path: Home > GB/T > Page206 > GB/T 43848-2024

GB/T 43848-2024 PDF English

Price & Delivery

US$359.00 · In stock · Download in 9 seconds
GB/T 43848-2024: Cybersecurity technology - Evaluation method for open source code security of software products
Delivery: 9 seconds. True-PDF full-copy in English & invoice will be downloaded + auto-delivered via email. See step-by-step procedure
Status: Valid
Std IDVersionUSDBuyDeliver [PDF] inTitle (Description)
GB/T 43848-2024English359 Add to Cart 4 days [Need to translate] Cybersecurity technology - Evaluation method for open source code security of software products

Click to Preview a similar PDF

Basic data

Standard ID GB/T 43848-2024 (GB/T43848-2024)
Description (Translated English) Cybersecurity technology - Evaluation method for open source code security of software products
Sector / Industry National Standard (Recommended)
Classification of Chinese Standard L80
Classification of International Standard 35.030
Word Count Estimation 18,151
Date of Issue 2024-04-25
Date of Implementation 2024-11-01
Issuing agency(ies) State Administration for Market Regulation, China National Standardization Administration

GB/T 43848-2024: Cybersecurity technology - Evaluation method for open source code security of software products




---This is a DRAFT version for illustration, not a final translation. Full copy of true-PDF in English version (including equations, symbols, images, flow-chart, tables, and figures etc.) will be manually/carefully translated upon your order.
ICS 35:030 CCSL80 National Standards of People's Republic of China Network security technology software products open source code security Evaluation Method Released on 2024-04-25 2024-11-01 Implementation State Administration for Market Regulation The National Standardization Administration issued

Table of Contents

Preface III 1 Scope 1 2 Normative references 1 3 Terms and Definitions 1 4 Overview 1 5 Evaluation factors 2 5:1 Evaluation Parameters 2 5:2 Open Source Code Sources 3 5:2:1 Overview 3 5:2:2 Open Source Code Scale and Proportion 3 5:2:3 Open Source Coding Language 3 5:2:4 Open Source Code Copyright Owner 3 5:2:5 Open source code contributions 3 5:2:6 Richness of open source code 3 5:2:7 Open Source Community Security Management 3 5:2:8 Open Source Code Hosting Platform 3 5:2:9 Open Source Code Download Platform 3 5:3 Open Source Code Security Quality 4 5:3:1 Overview 4 5:3:2 Open Source Code Vulnerability Rate 4 5:3:3 Severity of open source code vulnerabilities 4 5:3:4 Open Source Code Vulnerability Repair Rate 4 5:3:5 Open source code version update 4 5:4 Intellectual Property Rights of Open Source Code 4 5:4:1 Overview 4 5:4:2 Open Source License Compliance 4 5:4:3 Open Source License Standardization 4 5:4:4 Open Source License Reciprocity 4 5:4:5 Open Source License Compatibility 4 5:4:6 Open Source License Patent Situation 4 5:4:7 Scope of application of open source license 5 5:5 Open Source Code Management 5 5:5:1 Overview 5 5:5:2 Open Source Code Management Team 5 5:5:3 Open Source Code Bill of Materials 5 5:5:4 Open Source Code Design 5 5:5:5 Open Source Code Generation 5 6 Evaluation Process 5 6:1 Overview 5 6:2 Open Source Code Source Evaluation Process 5 6:2:1 Open Source Code Scale and Proportion 5 6:2:2 Open Source Coding Language 6 6:2:3 Open Source Code Copyright Owners 6 6:2:4 Open Source Code Contributions 6 6:2:5 Richness of open source code 6 6:2:6 Open Source Community Security Management 6 6:2:7 Open Source Code Hosting Platform 6 6:2:8 Open Source Code Download Platform 6 6:3 Open Source Code Security Quality Evaluation Process 7 6:3:1 Open Source Code Vulnerability Rate 7 6:3:2 Severity of open source code vulnerabilities 7 6:3:3 Open Source Code Vulnerability Repair Rate 7 6:3:4 Open Source Code Version Updates 7 6:4 Open Source Code Intellectual Property Evaluation Process 7 6:4:1 Open Source License Compliance 7 6:4:2 Open Source License Standardization 8 6:4:3 Open Source License Reciprocity 8 6:4:4 Open Source License Compatibility 8 6:4:5 Open Source License Patents 8 6:4:6 Scope of application of open source license 8 6:5 Open Source Code Management Evaluation Process 8 6:5:1 Open Source Code Management Team 8 6:5:2 Open Source Code Bill of Materials 8 6:5:3 Open Source Code Design 8 6:5:4 Open Source Code Generation 9 Appendix A (Informative) Open Source Code Security Risks 10 A:1 Open Source Cybersecurity Risks10 A:2 Open Source Intellectual Property Risks10 A:3 Open Source Continuity Risks10 Reference 11

Foreword

This document is in accordance with the provisions of GB/T 1:1-2020 "Guidelines for standardization work Part 1: Structure and drafting rules for standardization documents" Drafting: Please note that some of the contents of this document may involve patents: The issuing organization of this document does not assume the responsibility for identifying patents: This document was proposed and coordinated by the National Cybersecurity Standardization Technical Committee (SAC/TC260): This document was drafted by: China Academy of Information and Communications Technology, Ant Group Co:, Ltd:, Huawei Technologies Co:, Ltd:, ZTE Corporation Co:, Ltd:, Shandong Inspur Science Research Institute Co:, Ltd:, Alibaba Cloud Computing Co:, Ltd:, Sangfor Technologies Co:, Ltd:, Tencent Cloud Computing (Beijing) Co:, Ltd:, Hangzhou Moan Technology Co:, Ltd:, Shenzhen Open Source Internet Security Technology Co:, Ltd:, Beijing Baidu Netcom Technology Co:, Ltd:, Shenzhen Tencent Computer Systems Co:, Ltd:, Beijing Topsec Network Security Technology Co:, Ltd:, Qi'anxin Wangshen Information Technology (Beijing) Co:, Ltd:, Inspur Electronic Information Industry Co:, Ltd:, Beijing Xiaomi Mobile Software Co:, Ltd:, Beijing Jingdong Shang Information Technology Co:, Ltd:, Beijing Kingsoft Cloud Network Technology Co:, Ltd:, Beijing Volcano Engine Technology Co:, Ltd:, Hengan Jiaxin (Beijing) Technology Technology Co:, Ltd:, Venusstar Information Technology Group Co:, Ltd:, UFIDA Network Technology Co:, Ltd:, Hangzhou Anheng Information Technology Co:, Ltd: Co:, Ltd:, Beijing Knowsec Information Technology Co:, Ltd:, Changyang Technology (Beijing) Co:, Ltd:, Transwarp Information Technology (Shanghai) Co:, Ltd:, Zhejiang Dahua Technology Co:, Ltd:, Super Fusion Digital Technology Co:, Ltd:, Midea Group Co:, Ltd:, Mashang Consumer Finance Co:, Ltd:, Taikang Insurance Group Co:, Ltd:, Dopu Information Technology Co:, Ltd:, China Electronics Technology Group Corporation Network Security Science and Technology Co:, Ltd: Technology Co:, Ltd:, State Grid Blockchain Technology (Beijing) Co:, Ltd:, Beijing Ampno Information Technology Co:, Ltd:, China Information Security Evaluation Center, China Software Testing Center, China Electronics Technology Group Corporation Mimic Security Technology Co:, Ltd:, Hangzhou Xiaodao Technology Co:, Ltd:, Beijing Luoan Technology Co:, Ltd: Shenzhen Huada Life Sciences Institute, Xingtang Communication Technology Co:, Ltd:, Murphy Future Technology (Beijing) Co:, Ltd:, Beijing Kudezhu Mu Niao Information Technology Co:, Ltd:, Institute of Software, Chinese Academy of Sciences, China Cyberspace Research Institute, National Computer Network Emergency Response Technology Processing Co:, Ltd: Coordination Center, National Information Technology Security Research Center, Institute of Information Engineering, Chinese Academy of Sciences, Zhejiang Electronic Information Product Inspection Institute, The Sixth Research Institute of China Electronics Information Industry Group Co:, Ltd:, Boding Shihua (Beijing) Technology Co:, Ltd:, ABB (China) Co:, Ltd:, Six Zero Technology Group Co:, Ltd:, Beijing Shenzhou Green Alliance Technology Co:, Ltd:, Xi'an Jiaotong University Jabil Network Technology Co:, Ltd:, Shenzhen Nengxinan Technology Co:, Ltd:, Lenovo (Beijing) Co:, Ltd:, Beijing Changting Future Technology Co:, Ltd:, Beijing Hillstone Network Technology Co:, Ltd: Guangdong Yunbai Technology Co:, Ltd:, Wuhan Antiy Information Technology Co:, Ltd:, Beijing Zhiyou Network Security Technology Co:, Ltd:, Beijing Jiuzhang Cloud Ji Technology Co:, Ltd:, Kylin Software Co:, Ltd:, H3C Technologies Co:, Ltd:, Tianyi Cloud Technology Co:, Ltd:, OPPO Guangdong Mobile LICENSING LIMITED: The main drafters of this document are: Li Wei, Guo Xue, Li Xiaoming, Wu Jiangwei, Cheng Yan, Bai Xiaoyuan, Cui Jinguo, Gao Kun, Zhang Ruigang, Xiang Shuming, Li Xiang, Wei Zizhong, Fang Qiang, Zeng Linqing, Zhao Zhenyang, Ye Runguo, Zheng Jianfeng, Shen Xiyong, Meng Jin, Nie Wanquan, Wang Jie, Guo Jianling, Dai Wei, Yang Jian, Dong Guowei, Cao Zhu, Qian Jiayu, Li Xinbo, Li Xiaochuan, Zhang Zhiwen, Li Pengchao, Zhao Junkai, Ji Shengyu, Yuan Mingkun, Zhou Jingping, Fan Lei, Liu Wanggen, Zhang Jianqing, Hui Jing, Zhang Liangliang, Liu Zhiqiang, An Bingchun, Han Mingjun, Wang Huibo, Yang Ke, Zhang Tao, Wang Xiaomeng, Yuan Wei, Hou Dapeng, Xie Guomiao, Yan Peng, Cai Guoyu, Hao Gaojian, Ouyang Qiangbin, Shi Mingchao, Yan Min, Jiang Wei, Wu Wei, Wu Qian, Liu Nan, Xu Lili, Yin Xiaodong, Wang Shaojie, Dong Ji, Wang Zhui, Zhang Jie, Zhang Fan, He Jianfeng, Li Deqing, Liu Jun, Zhai Yujia, Rong Yu, Liu Chao, Yu Lina, Han Yun, Fang Lei, Liu Min, Wan Xiaolan, Hong Junhuang, and Julia: Network security technology software products open source code security Evaluation Method

1 Scope

This document specifies the security evaluation elements and evaluation process for open source code components in software products: This document is applicable to the static security evaluation of the open source code components contained in software products, and provides a reference for each unit to evaluate the open source code components in software products: It provides a basis for self-assessment of the security of source code components and a reference for third-party organizations to carry out such work:

2 Normative references

The contents of the following documents constitute the essential clauses of this document through normative references in this document: For referenced documents without a date, only the version corresponding to that date applies to this document; for referenced documents without a date, the latest version (including all amendments) applies to This document: GB/T 25069-2022 Information Security Technical Terminology

3 Terms and definitions

The terms and definitions defined in GB/T 25069-2022 and the following apply to this document: 3:1 Software Productsoftwareproduct Computer software, software embedded in information systems or equipment, or provided when providing technical services such as computer information system integration and application Computer software provided by the Company is in the form of a set of computer codes, procedures and possibly related documentation and data: [Source: GB/T 36475-2018, 3:1, modified] 3:2 Open source codeopensourcecode Source code is available to the public: Note: The copyright owner has made the rights to copy, modify and redistribute the code available to the public through an open source license: 3:3 Open source licenseopensourcelicense An authorization agreement that allows public users to use, modify, copy and distribute open source code according to the content of the agreement: 3:4 open source community The open source code contributors are the main body, and the specific culture, organizational structure, and operating mechanism are formed in the process of open source code contribution: community:

4 Overview

Currently, when open source code is widely used in software products, there are open source code network security risks, intellectual property risks and sustainability risks: (See Appendix A):
...

Tips & Frequently Asked Questions:

Question 1: How long will the true-PDF of GB/T 43848-2024_English be delivered?


Answer: Upon your order, we will start to translate GB/T 43848-2024_English as soon as possible, and keep you informed of the progress. The lead time is typically 2 ~ 4 working days. The lengthier the document the longer the lead time.

Question 2: Can I share the purchased PDF of GB/T 43848-2024_English with my colleagues?


Answer: Yes. The purchased PDF of GB/T 43848-2024_English will be deemed to be sold to your employer/organization who actually pays for it, including your colleagues and your employer's intranet.

Question 3: Does the price include tax/VAT?

Answer: Yes. Our tax invoice, downloaded/delivered in 9 seconds, includes all tax/VAT and complies with 100+ countries' tax regulations (tax exempted in 100+ countries) -- See Avoidance of Double Taxation Agreements (DTAs): List of DTAs signed between Singapore and 100+ countries

Question 4: Do you accept my currency other than USD?

Answer: Yes. If you need your currency to be printed on the invoice, please write an email to Sales@ChineseStandard.net. In 2 working-hours, we will create a special link for you to pay in any currencies. Otherwise, follow the normal steps: Add to Cart -- Checkout -- Select your currency to pay.
Refund Policy Privacy Policy Terms of Service