|
US$539.00 ยท In stock Delivery: <= 5 days. True-PDF full-copy in English will be manually translated and delivered via email. GB/T 41241-2022: Management requirements for cybersecurity of industrial control systems in nuclear power plant Status: Valid
| Standard ID | Contents [version] | USD | STEP2 | [PDF] delivered in | Standard Title (Description) | Status | PDF |
| GB/T 41241-2022 | English | 539 |
Add to Cart
|
5 days [Need to translate]
|
Management requirements for cybersecurity of industrial control systems in nuclear power plant
| Valid |
GB/T 41241-2022
|
PDF similar to GB/T 41241-2022
Basic data | Standard ID | GB/T 41241-2022 (GB/T41241-2022) | | Description (Translated English) | Management requirements for cybersecurity of industrial control systems in nuclear power plant | | Sector / Industry | National Standard (Recommended) | | Classification of Chinese Standard | N18 | | Word Count Estimation | 27,277 | | Issuing agency(ies) | State Administration for Market Regulation, China National Standardization Administration |
GB/T 41241-2022: Management requirements for cybersecurity of industrial control systems in nuclear power plant ---This is a DRAFT version for illustration, not a final translation. Full copy of true-PDF in English version (including equations, symbols, images, flow-chart, tables, and figures etc.) will be manually/carefully translated upon your order.
Management requirements for cybersecurity of industrial control systems in nuclear power plant
ICS 27.120.20
CCSN18
National Standards of People's Republic of China
Nuclear power plant industrial control system network security management requirements
2022-10-01 Implementation
State Administration for Market Regulation
Released by the National Standardization Administration
directory
Preface III
Introduction IV
1 Scope 1
2 Normative references 1
3 Terms and Definitions 1
4 Abbreviations 4
5 Nuclear Power Plant Industrial Control System Network Security Management 4
6 Network security technical protection of nuclear power plant industrial control system 13
7 Nuclear Power Plant Industrial Control System Network Security Emergency Management 15
Appendix A (Informative) Description of Cybersecurity Rating for Industrial Control System of Nuclear Power Plant 19
Reference 21
Figure A.1 Nuclear Power Plant Industrial Control System Cybersecurity Defense Model 19
Table A.1 Example of cyber security fortification level of industrial control system of nuclear power plant 20
foreword
This document is in accordance with the provisions of GB/T 1.1-2020 "Guidelines for Standardization Work Part 1.Structure and Drafting Rules of Standardization Documents"
drafted.
Please note that some content of this document may be patented. The issuing agency of this document assumes no responsibility for identifying patents.
This document is proposed and managed by the National Standardization Technical Committee of Nuclear Instrumentation (SAC/TC30).
This document was drafted by. China General Nuclear Power Engineering Co., Ltd., China General Nuclear Power Co., Ltd., Shanghai Nuclear Engineering Research and Design Institute Co., Ltd.
Company, Jiangsu Nuclear Power Co., Ltd., Institute of Nuclear Industry Standardization, Tsinghua University, CNNC Wuhan Nuclear Power Operation Technology Co., Ltd., Fujian
Fuqing Nuclear Power Co., Ltd., Beijing Guangli Nuclear System Engineering Co., Ltd., Daya Bay Nuclear Power Operation Management Co., Ltd., Liaoning Hongyanhe Nuclear Power Co., Ltd.
Electric Co., Ltd., Qi Anxin Technology Group Co., Ltd., Hillstone Network Technology Co., Ltd., Sangfor Technology Co., Ltd.
Division, China Nuclear Power Development Center.
The main drafters of this document. Tan Ke, Wu Ting, Huang Weijun, Yan Zhenyu, Li Xianmin, Xie Hongyun, Liu Gaojun, Chun Zengjun, Yang Xiaochen, Li Ruolan,
Guo Zhiwu, Zhou Liang, Peng Huaqing, Zhang Shuhui, Mao Lei, Zheng Wei, Xu Xiajun, Wang Lue, Zhao Lei, Liu Keke, Liang Xueyuan, Jin Wujian, Li Zhizhong, Zhang Renyou,
Gao Hanjun, Qu Ming, Cai Hongwei, Lu Jun, Liu Yuan, Shi Qin, Li Shi, Li Guangfeng, Guan Junfeng, Zhang Tianyuan, Yan Pei, Liu Taihong, Luo Dongping, Hu Bing,
Chen Wei.
Introduction
In order to improve and standardize the network security protection capability of the industrial control system of nuclear power plants, according to the national network security protection of power monitoring system
requirements and regulations, the basic requirements for the security level protection of information systems in the power industry, the nuclear safety guidelines related to the instrumentation and control systems of nuclear power plants, etc.
To meet the requirements of this document, this document was developed.
Nuclear power plant industrial control system network security management requirements
1 Scope
This document specifies the management, technical protection and emergency management requirements for the cyber security of the industrial control system of the nuclear power plant.
This document applies to all phases of the life cycle of industrial control systems in the field of nuclear power plants (including design, development, engineering implementation, operation and maintenance
protection, decommissioning, etc.) network security activities, and it is also suitable for guiding users of the industrial control system of nuclear power plants to improve and improve the network security protection in the production system.
system maintenance activities to protect the capability.
2 Normative references
The contents of the following documents constitute essential provisions of this document through normative references in the text. Among them, dated citations
documents, only the version corresponding to that date applies to this document; for undated references, the latest edition (including all amendments) applies to
this document.
GB/T 22240 Information Security Technology Network Security Graded Protection Grading Guide
GB/T 25058 Implementation Guide for Information Security Technology Network Security Level Protection
GB/T 28448 Information Security Technology Network Security Level Protection Evaluation Requirements
GB/T 28449 Information Security Technology Network Security Level Protection Evaluation Process Guide
3 Terms and Definitions
The following terms and definitions apply to this document.
3.1
Acceptance acceptance
A method used to end project implementation in risk assessment activities, mainly organized by the assessed party to check the assessment activities item by item.
The acceptance criteria are whether the assessment objectives are met.
[Source. GB/T 30976.1-2014, 3.1.4]
3.2
access control accesscontrol
A means of ensuring that the resources of a data processing system can only be accessed by authorized subjects in an authorized manner.
[Source. GB/T 25069-2010, 2.2.1.42]
3.3
authentication authentication
The act of verifying the purported identity of an entity.
[Source. GB/T 33009.1-2016, 3.1.2]
3.4
availability
Characteristics of data or resources that can be accessed and used by authorized entities as required.
[Source. GB/T 20984-2007, 3.3]
Tips & Frequently Asked Questions:Question 1: How long will the true-PDF of GB/T 41241-2022_English be delivered?Answer: Upon your order, we will start to translate GB/T 41241-2022_English as soon as possible, and keep you informed of the progress. The lead time is typically 3 ~ 5 working days. The lengthier the document the longer the lead time. Question 2: Can I share the purchased PDF of GB/T 41241-2022_English with my colleagues?Answer: Yes. The purchased PDF of GB/T 41241-2022_English will be deemed to be sold to your employer/organization who actually pays for it, including your colleagues and your employer's intranet. Question 3: Does the price include tax/VAT?Answer: Yes. Our tax invoice, downloaded/delivered in 9 seconds, includes all tax/VAT and complies with 100+ countries' tax regulations (tax exempted in 100+ countries) -- See Avoidance of Double Taxation Agreements (DTAs): List of DTAs signed between Singapore and 100+ countriesQuestion 4: Do you accept my currency other than USD?Answer: Yes. If you need your currency to be printed on the invoice, please write an email to [email protected]. In 2 working-hours, we will create a special link for you to pay in any currencies. Otherwise, follow the normal steps: Add to Cart -- Checkout -- Select your currency to pay.
|