GB/T 31505-2015 PDF EnglishUS$510.00 · In stock · Download in 9 seconds
GB/T 31505-2015: [Replaced by GB/T 20281-2020] Information security technology -- Technique requirements and testing and evaluation approaches for host-based firewall and personal firewall Delivery: 9 seconds. True-PDF full-copy in English & invoice will be downloaded + auto-delivered via email. See step-by-step procedure Status: Obsolete
Similar standardsGB/T 31505-2015: [Replaced by GB/T 20281-2020] Information security technology -- Technique requirements and testing and evaluation approaches for host-based firewall and personal firewall---This is an excerpt. Full copy of true-PDF in English version (including equations, symbols, images, flow-chart, tables, and figures etc.), auto-downloaded/delivered in 9 seconds, can be purchased online: https://www.ChineseStandard.net/PDF.aspx/GBT31505-2015 GB NATIONAL STANDARD OF THE PEOPLE’S REPUBLIC OF CHINA ICS 35.040 L 80 Information security technology - Technique requirements and testing and evaluation approaches for host-based firewall and personal firewall Issued on. MAY 15, 2015 Implemented on. JANUARY 01, 2016 Issued by. General Administration of Quality Supervision, Inspection and Quarantine; Standardization Administration of PRC. Table of ContentsForeword... 3 1 Scope... 4 2 Normative references... 4 3 Terms and definitions... 4 4 Descriptions of host-based firewall and personal firewall... 5 5 Security technical requirements... 5 5.1 General description... 5 5.2 Basic level requirements... 6 5.3 Enhanced level requirements... 13 6 Test evaluation method... 26 6.1 Test environment... 26 6.2 Basic level test... 26 6.3 Enhanced level test... 41ForewordThis standard was drafted in accordance with the rules issued by GB/T 1.1- 2009. This standard was proposed by and shall be under the jurisdiction of the National Information Security Standardization Technical Committee (SAC/TC 260). Drafting organizations of this standard. Computer Information System Security Product Quality Supervision and Inspection Center of the Ministry of Public Security, China Electronic Technology Standardization Research Institute, Beijing Venus Technology Co., Ltd., the Third Research Institute of the Ministry of Public Security. The main drafters of this standard. Lu Zhen, Gu Jian, Wei Xiang, Yu You, Deng Qi, Luo Fengying, Xu Yuna, Zhang Xiaoxiao, Wu Qicong. Information security technology - Technique requirements and testing and evaluation approaches for host-based firewall and personal firewall1 ScopeThis standard specifies the security technical requirements, evaluation methods, security classification of host-based firewalls. This standard applies to the design, development and testing of host-based firewall and personal firewall.2 Normative referencesThe following documents are essential to the application of this document. For the dated documents, only the versions with the dates indicated are applicable to this document; for the undated documents, only the latest version (including all the amendments) are applicable to this standard. GB/T 18336.3-2008 Information technology - Security techniques - Evaluation criteria for IT security - Part 3.Security assurance requirements GB/T 25069 Information security technology - Glossary3 Terms and definitionsThe terms and definitions as defined in GB/T 25069 as well as the following terms and definitions apply to this document. 3.1 Host-based firewall and personal firewall It is also known the host-based firewall or personal firewall, which is a software which runs on standalone computer. 3.2 Security policy It refers to provisions and policies related to management and protection of security domain routines.4 Descriptions of host-based firewall and personal firewallThe host-based firewall and personal firewall is installed in the form of software on the end user's computer (including personal computers and servers), to prevent threats from the outside to the inside and from the inside to the outside. The host-based firewall and personal firewall can not only monitor and control the network-level data flow, but also monitor and control the program, to compensate the insufficiency of traditional defense methods such as gateway firewall and antivirus software. Generally, the host-based firewall and personal firewall on the server can also perform unified control over all nodes; implement unified security policies and responses.5 Security technical requirements5.1 General description 5.1.1 Classification of security technical requirements This standard divides the security technical requirements of host-based firewall and personal firewall into two major categories. 5.1.2 Security level This standard divides the level of security function requirements according to the strength of the host-based firewall security function; divides the level of security assurance requirements according to GB/T 18336.3-2008. 5.2 Basic level requirements 5.2.1 Security function requirements 5.2.1.2 Security policy revision Products shall provide standardized security policies, which can be revised by users. 5.2.1.3 Application network access control The security function of the product shall be able to control the permission of each application on the host to use the network; the control of the application's access to the network shall include the following three methods. 5.2.1.5 Identity authentication 5.2.1.5.1 Basic authentication Before performing any functions related to the administrator, the product shall authenticate the user's identity. 5.2.1.5.2 Authentication failure handling The product shall provide certain authentication failure handling measures, to prevent violent code cracking. The product shall have a security audit function; the specific technical requirements are as follows. 5.2.2 Security assurance requirements 5.2.2.1 Configuration management 5.2.2.1.1 Version number Developers shall provide unique identifiers for different versions of the product. 5.2.2.3 Development 5.2.2.3.1 Description of informal function specification The developer shall provide a functional specification, which shall meet the following requirements. 5.2.2.3.3 Informal correspondence verification The developer shall provide a correspondence analysis between all adjacent pairs of product security function representations. For each adjacent pair represented by the product security function, the analysis shall explain that all related security functions represented by relatively abstract security functions shall be correctly and completely refined in the more specific security function representation.6 Test evaluation method6.1 Test environment The test environment is as shown in Figure 1. 6.2 Basic level test 6.2.1 Security function test 6.2.1.1 IP packet filtering The test evaluation methods and expected results of IP packet filtering of host- based firewall and personal firewall products are as follows. 6.2.1.3 Application network access control The test evaluation methods and expected results of application network access control of host-based firewall and personal firewall products are as follows. 6.2.1.4 Intrusion prevention The test evaluation methods and expected results of the intrusion prevention of host-based firewall and personal firewall products are as follows. 6.2.1.5 Identity authentication 6.2.1.6 Security management 6.2.1.6.3 Remote management encryption The test evaluation methods and expected results of remote management encryption for host-based firewall and personal firewall products are as follows. 6.2.1.7 Security audit The test evaluation methods and expected results of the security audit of host- based firewall and personal firewall products are as follows. 6.2.2 Security assurance evaluation 6.2.2.1 Configuration management 6.2.2.1.1 Version number The test evaluation methods and expected results of the version number are as follows. 6.3.1.5 Intrusion prevention The test evaluation methods and expected results of the intrusion prevention of host-based firewall and personal firewall products are as follows. 6.3.2.7.1.2 Analysis confirmation The test evaluation methods and expected results of analysis confirmation are as follows. 6.3.2.7.2 Assessment of product security function strength The test evaluation methods and expected results of the assessment of product security function strength are as follows. 6.3.2.7.3 Vulnerability analysis 6.3.2.7.3.1 Developer vulnerability analysis The test evaluation methods and expected results of developer vulnerability analysis are as follows. 6.3.2.7.3.2 Independent vulnerability analysis The test evaluation methods and expected results of the independent vulnerability analysis are as follows. 6.3.2.7.3.3 Intermediate resistance The test evaluation methods and expected results of intermediate resistance are as follows. ......Source: Above contents are excerpted from the full-copy PDF -- translated/reviewed by: www.ChineseStandard.net / Wayne Zheng et al. Tips & Frequently Asked Questions:Question 1: How long will the true-PDF of English version of GB/T 31505-2015 be delivered?Answer: The full copy PDF of English version of GB/T 31505-2015 can be downloaded in 9 seconds, and it will also be emailed to you in 9 seconds (double mechanisms to ensure the delivery reliably), with PDF-invoice.Question 2: Can I share the purchased PDF of GB/T 31505-2015_English with my colleagues?Answer: Yes. The purchased PDF of GB/T 31505-2015_English will be deemed to be sold to your employer/organization who actually paid for it, including your colleagues and your employer's intranet.Question 3: Does the price include tax/VAT?Answer: Yes. Our tax invoice, downloaded/delivered in 9 seconds, includes all tax/VAT and complies with 100+ countries' tax regulations (tax exempted in 100+ countries) -- See Avoidance of Double Taxation Agreements (DTAs): List of DTAs signed between Singapore and 100+ countriesQuestion 4: Do you accept my currency other than USD?Answer: Yes. www.ChineseStandard.us -- GB/T 31505-2015 -- Click this link and select your country/currency to pay, the exact amount in your currency will be printed on the invoice. Full PDF will also be downloaded/emailed in 9 seconds.How to buy and download a true PDF of English version of GB/T 31505-2015?A step-by-step guide to download PDF of GB/T 31505-2015_EnglishStep 1: Visit website https://www.ChineseStandard.net (Pay in USD), or https://www.ChineseStandard.us (Pay in any currencies such as Euro, KRW, JPY, AUD).Step 2: Search keyword "GB/T 31505-2015". Step 3: Click "Add to Cart". If multiple PDFs are required, repeat steps 2 and 3 to add up to 12 PDFs to cart. Step 4: Select payment option (Via payment agents Stripe or PayPal). Step 5: Customize Tax Invoice -- Fill up your email etc. Step 6: Click "Checkout". Step 7: Make payment by credit card, PayPal, Google Pay etc. After the payment is completed and in 9 seconds, you will receive 2 emails attached with the purchased PDFs and PDF-invoice, respectively. Step 8: Optional -- Go to download PDF. Step 9: Optional -- Click Open/Download PDF to download PDFs and invoice. See screenshots for above steps: Steps 1~3 Steps 4~6 Step 7 Step 8 Step 9 |