2025-12-5 10.1.6.65
Code of China Chinese Classification Professional Classification ICS Classification Latest News Value-added Services

Position: Chinese Standard in English/GB/T 20271-2006
GB/T 20271-2006   Information security technology Common security techniques requirement for information system (English Version)
Standard No.: GB/T 20271-2006 Status:valid remind me the status change

Email:

Target Language:English File Format:PDF
Word Count: 50000 words Translation Price(USD):140.0 remind me the price change

Email:

Implemented on:2006-12-1 Delivery: via email in 1 business day

→ → →

,,2006-12-1,141138181823809BAFDF20B8C3DAD
Standard No.: GB/T 20271-2006
English Name: Information security technology Common security techniques requirement for information system
Chinese Name: 信息安全技术 信息系统通用安全技术要求
Chinese Classification: L80    Data encryption
Professional Classification: GB    National Standard
Source Content Issued by: AQSIQ; SAC
Issued on: 2006-5-31
Implemented on: 2006-12-1
Status: valid
Target Language: English
File Format: PDF
Word Count: 50000 words
Translation Price(USD): 140.0
Delivery: via email in 1 business day
1 Scope This standard specifies the requirements of every security grade for the security technology required for information system security according to the classification of five security protection grades in GB 17859-1999. This standard is applicable to the design and realization of security information system according to the graded requirements and serves for reference for the test and management of the information system security implemented according to graded requirements. 2 Normative References The following normative documents contain provisions which, through reference in this text, constitute provisions of this standard. For dated references, subsequent amendments to (excluding amending errors in the text), or revisions of, any of these publications do not apply. However, all parties coming to an agreement according to this standard are encouraged to study whether the latest edition of the normative document is applicable. For undated references, the latest edition of the normative document applies. GB 17859-1999 Classified Criteria for Security Protection of Computer Information System GBJ 45-1982 Specifications for the Design of Highrise Civil Buildings (Trial) - Fire Prevention TJ 16-1974 Code for Design of Building Fire Protection 3 Terms, Definitions and Abbreviations 3.1 Terms and Definitions For the purposes of this standard, the terms and definitions specified in GB 17859-1999 and those listed below apply. 3.1.1 Security of information system The representation of confidentiality, integrity and availability of information system and the information stored, transported and processed by it. 3.1.2 Common security technology of information system The security technology generally applicable for realizing various types of security of information system. 3.1.3 Security subsystem of information system A generic term for security protection devices in information system, including hardware, firmware, software and combined entity responsible for implementing security policy. It establishes a basic security protection environment for information system, and provides additional user service required for security information system. Note: according to the definition of TCB (trusted computing base) in GB 17859-1999, SSOIS (security subsystem of information system) is TCB of information system. 3.1.4 Security element The composition of security contents contained in technical requirements of security function and security assurance in this standard. 3.1.5 Security function policy The security policy adopted to realize the function required for SSOIS security element. 3.1.6 Security function
Foreword I Introduction II 1 Scope 2 Normative References 3 Terms, Definitions and Abbreviations 3.1 Terms and Definitions 3.2 Abbreviations 4 Technical Requirements for Security Function 4.1 Physical Security 4.1.1 Environmental Security 4.1.2 Equipment Security 4.1.3 Record Medium Security 4.2 Operation Security 4.2.1 Risk Analysis 4.2.2 Test and Analysis of Information System Security 4.2.3 Information System Security Monitoring 4.2.4 Security Audit 4.2.5 Security Protection for Information System Boundary 4.2.6 Backup and Fault Recovery 4.2.7 Malicious Code Protection 4.2.8 Emergency Treatment of Information System 4.2.9 Trusted Computing and Trusted Connecting Technology 4.3 Data Security 4.3.1 Identity Authentication 4.3.2 Non-repudiation 4.3.3 Discretionary Access Control 4.3.4 Label 4.3.5 Mandatory Access Control 4.3.6 Integrity Protection for User Data 4.3.7 Confidentiality Protection for User Data 4.3.8 Data Flow Control 4.3.9 Trusted Path 4.3.10 Password Support 5 Technical Requirements of Security Assurance 5.1 SSOIS Self-security Protection 5.1.1 SSF Physical Security Protection 5.1.2 SSF Operation Security Protection 5.1.3 SSF Data Security Protection 5.1.4 SSOIS Resources Utilization 5.1.5 SSOIS Access Control 5.2 SSOIS Design and Realization 5.2.1 Configuration Management 5.2.2 Distribution and Operation 5.2.3 Development 5.2.4 Document Requirements 5.2.5 Life Cycle Support 5.2.6 Test 5.2.7 Vulnerability Assessment 5.3 SSOIS Security Management 5.3.1 SSF Function Management 5.3.2 Security Attribute Management 5.3.3 SSF Data Management 5.3.4 Definition and Management of Security Role 5.3.5 Centralized Management of SSOIS Security Mechanism 6 Graded Requirements for Security Technology of Information System 6.1 Grade 1: the User's Discretionary Protection Grade 6.1.1 Physical Security 6.1.2 Operation Security 6.1.3 Data Security 6.1.4 SSOIS Self-security Protection 6.1.5 SSOIS Design and Realization 6.1.6 SSOIS Security Management 6.2 Grade 2: System Audit Protection Grade 6.2.1 Physical Security 6.2.2 Operation Security 6.2.3 Data Security 6.2.4 SSOIS Self-security Protection 6.2.5 SSOIS Design and Realization 6.2.6 SSOIS Security Management 6.3 Grade 3: Security Label Protection Grade 6.3.1 Physical Security 6.3.2 Operation Security 6.3.3 Data Security 6.3.4 SSOIS Self-security Protection 6.3.5 SSOIS Design and Realization 6.3.6 SSOIS Security Management 6.4 Level 4: Structured Protection Grade 6.4.1 Physical Security 6.4.2 Operation Security 6.4.3 Data Security 6.4.4 SSOIS Self-security Protection 6.4.5 SSOIS Design and Realization 6.4.6 SSOIS Security Management 6.5 Level 5: Access Verification Protection Grade 6.5.1 Physical Security 6.5.2 Operation Security 6.5.3 Data Security 6.5.4 SSOIS Self-security Protection 6.5.5 SSOIS Design and Realization 6.5.6 SSOIS Security Management Appendix A (Informative) Explanation of Standard Concept A.1 Compositions and Interrelationship A.2 About Classification of Security Protection Grade A.3 About Subject and Object A.4 About SSOIS, SSF, SSP, SFP and their Interrelationship A.5 About Encryption Technology A.6 About Information Security Technology Grade and Information System Security Grade Appendix B (Informative) Security Design Reference of Graded Information System B.1 Security Demand and Graded Protection B.1.1 Basic Method for Determining Security Demand B.1.2 Basic Idea of Graded Protection B.1.3 Assumption for Classification of Security Protection Grade B.1.4 Principle and Method for Classification and Determination of Security Protection Grade B.2 Overview of the Security Design of Information System B.2.1 Overall Explanation for the Security Design of Information System B.2.2 Composition and Interrelationship of Information System Security B.2.3 Security Design of Graded Information System Appendix C (Informative) The Corresponding Relationship between the Elements and Graded Requirements of Security Technology Bibliography
Referred in GB/T 20271-2006:
* GB 17859-1999 Classified criteria for security protection of computer information system
* GBJ 45-1982
* TJ 16-1974
GB/T 20271-2006 is referred in:
* GB/T 20282-2006 Information security technology - Information system security engineering management requirements
* GB/T 20270-2006 Information security technology - Basis security techniques requirement for network
* GB/T 20272-2006 Information security technology - Security techniques requirement for operating system
* GB/T 20273-2006 Information security technology Security techniques requirement for database management system
*GB/T 28448-2019 Information security technology—Evaluation requirement for classified protection of cybersecurity
*GB/T 25070-2019 Information security technology—Technical requirements of security design for classified protection of cybersecurity
*GB/T 41388-2022 Information security technology—Trusted execution environment—Basic security specification
*GB/T 43528-2023 Communication technical requirements for electrochemical energy storage battery management
Code of China
Standard
GB/T 20271-2006  Information security technology Common security techniques requirement for information system (English Version)
Standard No.GB/T 20271-2006
Statusvalid
LanguageEnglish
File FormatPDF
Word Count50000 words
Price(USD)140.0
Implemented on2006-12-1
Deliveryvia email in 1 business day
Detail of GB/T 20271-2006
Standard No.
GB/T 20271-2006
English Name
Information security technology Common security techniques requirement for information system
Chinese Name
信息安全技术 信息系统通用安全技术要求
Chinese Classification
L80
Professional Classification
GB
ICS Classification
Issued by
AQSIQ; SAC
Issued on
2006-5-31
Implemented on
2006-12-1
Status
valid
Superseded by
Superseded on
Abolished on
Superseding
Language
English
File Format
PDF
Word Count
50000 words
Price(USD)
140.0
Keywords
GB/T 20271-2006, GB 20271-2006, GBT 20271-2006, GB/T20271-2006, GB/T 20271, GB/T20271, GB20271-2006, GB 20271, GB20271, GBT20271-2006, GBT 20271, GBT20271
Introduction of GB/T 20271-2006
1 Scope This standard specifies the requirements of every security grade for the security technology required for information system security according to the classification of five security protection grades in GB 17859-1999. This standard is applicable to the design and realization of security information system according to the graded requirements and serves for reference for the test and management of the information system security implemented according to graded requirements. 2 Normative References The following normative documents contain provisions which, through reference in this text, constitute provisions of this standard. For dated references, subsequent amendments to (excluding amending errors in the text), or revisions of, any of these publications do not apply. However, all parties coming to an agreement according to this standard are encouraged to study whether the latest edition of the normative document is applicable. For undated references, the latest edition of the normative document applies. GB 17859-1999 Classified Criteria for Security Protection of Computer Information System GBJ 45-1982 Specifications for the Design of Highrise Civil Buildings (Trial) - Fire Prevention TJ 16-1974 Code for Design of Building Fire Protection 3 Terms, Definitions and Abbreviations 3.1 Terms and Definitions For the purposes of this standard, the terms and definitions specified in GB 17859-1999 and those listed below apply. 3.1.1 Security of information system The representation of confidentiality, integrity and availability of information system and the information stored, transported and processed by it. 3.1.2 Common security technology of information system The security technology generally applicable for realizing various types of security of information system. 3.1.3 Security subsystem of information system A generic term for security protection devices in information system, including hardware, firmware, software and combined entity responsible for implementing security policy. It establishes a basic security protection environment for information system, and provides additional user service required for security information system. Note: according to the definition of TCB (trusted computing base) in GB 17859-1999, SSOIS (security subsystem of information system) is TCB of information system. 3.1.4 Security element The composition of security contents contained in technical requirements of security function and security assurance in this standard. 3.1.5 Security function policy The security policy adopted to realize the function required for SSOIS security element. 3.1.6 Security function
Contents of GB/T 20271-2006
Foreword I Introduction II 1 Scope 2 Normative References 3 Terms, Definitions and Abbreviations 3.1 Terms and Definitions 3.2 Abbreviations 4 Technical Requirements for Security Function 4.1 Physical Security 4.1.1 Environmental Security 4.1.2 Equipment Security 4.1.3 Record Medium Security 4.2 Operation Security 4.2.1 Risk Analysis 4.2.2 Test and Analysis of Information System Security 4.2.3 Information System Security Monitoring 4.2.4 Security Audit 4.2.5 Security Protection for Information System Boundary 4.2.6 Backup and Fault Recovery 4.2.7 Malicious Code Protection 4.2.8 Emergency Treatment of Information System 4.2.9 Trusted Computing and Trusted Connecting Technology 4.3 Data Security 4.3.1 Identity Authentication 4.3.2 Non-repudiation 4.3.3 Discretionary Access Control 4.3.4 Label 4.3.5 Mandatory Access Control 4.3.6 Integrity Protection for User Data 4.3.7 Confidentiality Protection for User Data 4.3.8 Data Flow Control 4.3.9 Trusted Path 4.3.10 Password Support 5 Technical Requirements of Security Assurance 5.1 SSOIS Self-security Protection 5.1.1 SSF Physical Security Protection 5.1.2 SSF Operation Security Protection 5.1.3 SSF Data Security Protection 5.1.4 SSOIS Resources Utilization 5.1.5 SSOIS Access Control 5.2 SSOIS Design and Realization 5.2.1 Configuration Management 5.2.2 Distribution and Operation 5.2.3 Development 5.2.4 Document Requirements 5.2.5 Life Cycle Support 5.2.6 Test 5.2.7 Vulnerability Assessment 5.3 SSOIS Security Management 5.3.1 SSF Function Management 5.3.2 Security Attribute Management 5.3.3 SSF Data Management 5.3.4 Definition and Management of Security Role 5.3.5 Centralized Management of SSOIS Security Mechanism 6 Graded Requirements for Security Technology of Information System 6.1 Grade 1: the User's Discretionary Protection Grade 6.1.1 Physical Security 6.1.2 Operation Security 6.1.3 Data Security 6.1.4 SSOIS Self-security Protection 6.1.5 SSOIS Design and Realization 6.1.6 SSOIS Security Management 6.2 Grade 2: System Audit Protection Grade 6.2.1 Physical Security 6.2.2 Operation Security 6.2.3 Data Security 6.2.4 SSOIS Self-security Protection 6.2.5 SSOIS Design and Realization 6.2.6 SSOIS Security Management 6.3 Grade 3: Security Label Protection Grade 6.3.1 Physical Security 6.3.2 Operation Security 6.3.3 Data Security 6.3.4 SSOIS Self-security Protection 6.3.5 SSOIS Design and Realization 6.3.6 SSOIS Security Management 6.4 Level 4: Structured Protection Grade 6.4.1 Physical Security 6.4.2 Operation Security 6.4.3 Data Security 6.4.4 SSOIS Self-security Protection 6.4.5 SSOIS Design and Realization 6.4.6 SSOIS Security Management 6.5 Level 5: Access Verification Protection Grade 6.5.1 Physical Security 6.5.2 Operation Security 6.5.3 Data Security 6.5.4 SSOIS Self-security Protection 6.5.5 SSOIS Design and Realization 6.5.6 SSOIS Security Management Appendix A (Informative) Explanation of Standard Concept A.1 Compositions and Interrelationship A.2 About Classification of Security Protection Grade A.3 About Subject and Object A.4 About SSOIS, SSF, SSP, SFP and their Interrelationship A.5 About Encryption Technology A.6 About Information Security Technology Grade and Information System Security Grade Appendix B (Informative) Security Design Reference of Graded Information System B.1 Security Demand and Graded Protection B.1.1 Basic Method for Determining Security Demand B.1.2 Basic Idea of Graded Protection B.1.3 Assumption for Classification of Security Protection Grade B.1.4 Principle and Method for Classification and Determination of Security Protection Grade B.2 Overview of the Security Design of Information System B.2.1 Overall Explanation for the Security Design of Information System B.2.2 Composition and Interrelationship of Information System Security B.2.3 Security Design of Graded Information System Appendix C (Informative) The Corresponding Relationship between the Elements and Graded Requirements of Security Technology Bibliography
About Us   |    Contact Us   |    Terms of Service   |    Privacy   |    Cancellation & Refund Policy   |    Payment
Tel: +86-10-8572 5655 | Fax: +86-10-8581 9515 | Email: coc@codeofchina.com | QQ: 672269886
Copyright: Beijing COC Tech Co., Ltd. 2008-2040
 
 
Keywords:
GB/T 20271-2006, GB 20271-2006, GBT 20271-2006, GB/T20271-2006, GB/T 20271, GB/T20271, GB20271-2006, GB 20271, GB20271, GBT20271-2006, GBT 20271, GBT20271