2025-12-5 10.1.6.65
Code of China Chinese Classification Professional Classification ICS Classification Latest News Value-added Services

Position: Chinese Standard in English/GB/T 20282-2006
GB/T 20282-2006   Information security technology - Information system security engineering management requirements (English Version)
Standard No.: GB/T 20282-2006 Status:valid remind me the status change

Email:

Target Language:English File Format:PDF
Word Count: 20000 words Translation Price(USD):140.0 remind me the price change

Email:

Implemented on:2006-12-1 Delivery: via email in 1 business day

→ → →

,,2006-12-1,141138181824150190F62435C3CB7
Standard No.: GB/T 20282-2006
English Name: Information security technology - Information system security engineering management requirements
Chinese Name: 信息安全技术 信息系统安全工程管理要求
Professional Classification: GB    National Standard
Source Content Issued by: AQSIQ; SAC
Issued on: 2006-5-31
Implemented on: 2006-12-1
Status: valid
Target Language: English
File Format: PDF
Word Count: 20000 words
Translation Price(USD): 140.0
Delivery: via email in 1 business day
1 Scope This standard specifies management requirements for information system security engineering (hereinafter referred to as security engineering) as the instructions for construction of information system safety engineering by the owner, the developer and the third party, upon which all parties can base security engineering management system. This standard, in accordance with five security protection levels specified in GB 17859-1999, specifies different requirements for management of information system security engineering. This standard is applicable for the owner and the developer of information system to manage security engineering, which can be referred by all parties concerned. 2 Normative References The following standards contain provisions which, through reference in this text, constitute provisions of this standard. For dated references, subsequent amendments to (excluding correction to), or revisions of, any of these publications do not apply. However, the parties to agreements based on this standard are encouraged to investigate the possibility of applying the most recent editions of the standards. For undated references, the latest edition of the normative document referred to applies. GB 17859-1999 Classified Criteria for Security Protection of Computer Information System GB/T 20269-2006 Information Security Technology - Information System Security Management Requirements GB/T 20271-2006 Information Security Technology - Common Security Techniques Requirement for Information System 3 Terminologies and Definitions For the purposes of this standard, the following terminologies and definitions apply. 3.1 Security engineering The process of system engineering to ensure confidentiality, integrity and availability of information system. 3.2 Security engineering lifecycle Activities related to security engineering throughout the lifecycle of information system include concept formation, concept development and definition, verification and validation, engineering implementation development and manufacture, production and deployment, operation and support, and termination. 3.3 Security engineering guide Guiding information defined by engineering group on how to select, design and implement engineering system structure. 3.4 Vulnerability A weakness of an asset or a group of assets, which can be exploited by certain threat. 3.5 Risk The probability for certain threat to make an asset or a group of assets lost or damaged by exploiting its or their vulnerability. 3.6 Owner The party to organize the construction of information system security engineering. 3.7 Developer The party to provide services for the construction of information system security engineering. 3.8 Third party A neutral organization or institution, independent of the owner and the developer, which is engaged in activities relating to the construction of information system security engineering.
Foreword i 1 Scope 2 Normative References 3 Terminologies and Definitions 4 Security Engineering System 4.1 Overview 4.2 Goal of Security Engineering 4.3 Fundamental Relation 5 Qualification Assurance Requirements 5.1 System Integration Qualification Requirement 5.2 Personnel Qualification Requirement 5.3 Third-party Service Requirement 5.4 Security Product Requirement 5.5 Engineering Supervision Requirement 5.6 Requirement for Compliance with Laws, Regulations and Policies 6 Organizational Assurance Requirements 6.1 Define Organizational Process of System Engineering 6.2 Improve Organizational Process of System Engineering 6.3 Manage the Evolution of Series of Products 6.4 Manage Support Environment of System Engineering 6.5 Host Training 6.6 Coordinate with Supplier 7 Engineering Implementation Requirements 7.1 Manage Security Control 7.2 Assess Impacts 7.3 Assess Security Risk 7.4 Assess Threats 7.5 Assess Vulnerability 7.6 Build Assurance Argument 7.7 Coordinate Security 7.8 Monitor Security Posture 7.9 Provide Security Input 7.10 Specify Security Requirements 7.11 Verify and Validate Security 8 Project Implementation Requirements 8.1 Quality Assurance 8.2 Manage Configuration 8.3 Manage Project Risk 8.4 Monitor Technical Activities 8.5 Plan Technical Activities 9 Grading Requirements for Security Engineering Management 9.1 Level 1: the User's Discretionary Protection Level 9.2 Level 2: System Audit Protection Level 9.3 Level 3: Security Label Protection Level 9.4 Level 4: Structured Protection Level 9.5 Level 5: Access Verification Protection Level 9.6 Comparison Table of Security Protection Level Classification and Security Engineering Requirements 10 Process and Requirements of Security Engineering 10.1 Security Engineering Process 10.2 Security Engineering Requirements of Security Engineering Process in Each Stage Appendix A (Informative) Corresponding Relationship between Security Engineering Requirements and Security Protection Level/Security Engineering Process Bibliography
Referred in GB/T 20282-2006:
* GB 17859-1999 Classified criteria for security protection of computer information system
* GB/T 20269-2006 Information security technology Information system security management requirements
* GB/T 20271-2006 Information security technology Common security techniques requirement for information system
GB/T 20282-2006 is referred in:
*GB/T 28448-2019 Information security technology—Evaluation requirement for classified protection of cybersecurity
*GB/T 25070-2019 Information security technology—Technical requirements of security design for classified protection of cybersecurity
*GB/T 36627-2018 Information security technology—Testing and evaluation technical guide for classified cybersecurity protection
Code of China
Standard
GB/T 20282-2006  Information security technology - Information system security engineering management requirements (English Version)
Standard No.GB/T 20282-2006
Statusvalid
LanguageEnglish
File FormatPDF
Word Count20000 words
Price(USD)140.0
Implemented on2006-12-1
Deliveryvia email in 1 business day
Detail of GB/T 20282-2006
Standard No.
GB/T 20282-2006
English Name
Information security technology - Information system security engineering management requirements
Chinese Name
信息安全技术 信息系统安全工程管理要求
Chinese Classification
Professional Classification
GB
ICS Classification
Issued by
AQSIQ; SAC
Issued on
2006-5-31
Implemented on
2006-12-1
Status
valid
Superseded by
Superseded on
Abolished on
Superseding
Language
English
File Format
PDF
Word Count
20000 words
Price(USD)
140.0
Keywords
GB/T 20282-2006, GB 20282-2006, GBT 20282-2006, GB/T20282-2006, GB/T 20282, GB/T20282, GB20282-2006, GB 20282, GB20282, GBT20282-2006, GBT 20282, GBT20282
Introduction of GB/T 20282-2006
1 Scope This standard specifies management requirements for information system security engineering (hereinafter referred to as security engineering) as the instructions for construction of information system safety engineering by the owner, the developer and the third party, upon which all parties can base security engineering management system. This standard, in accordance with five security protection levels specified in GB 17859-1999, specifies different requirements for management of information system security engineering. This standard is applicable for the owner and the developer of information system to manage security engineering, which can be referred by all parties concerned. 2 Normative References The following standards contain provisions which, through reference in this text, constitute provisions of this standard. For dated references, subsequent amendments to (excluding correction to), or revisions of, any of these publications do not apply. However, the parties to agreements based on this standard are encouraged to investigate the possibility of applying the most recent editions of the standards. For undated references, the latest edition of the normative document referred to applies. GB 17859-1999 Classified Criteria for Security Protection of Computer Information System GB/T 20269-2006 Information Security Technology - Information System Security Management Requirements GB/T 20271-2006 Information Security Technology - Common Security Techniques Requirement for Information System 3 Terminologies and Definitions For the purposes of this standard, the following terminologies and definitions apply. 3.1 Security engineering The process of system engineering to ensure confidentiality, integrity and availability of information system. 3.2 Security engineering lifecycle Activities related to security engineering throughout the lifecycle of information system include concept formation, concept development and definition, verification and validation, engineering implementation development and manufacture, production and deployment, operation and support, and termination. 3.3 Security engineering guide Guiding information defined by engineering group on how to select, design and implement engineering system structure. 3.4 Vulnerability A weakness of an asset or a group of assets, which can be exploited by certain threat. 3.5 Risk The probability for certain threat to make an asset or a group of assets lost or damaged by exploiting its or their vulnerability. 3.6 Owner The party to organize the construction of information system security engineering. 3.7 Developer The party to provide services for the construction of information system security engineering. 3.8 Third party A neutral organization or institution, independent of the owner and the developer, which is engaged in activities relating to the construction of information system security engineering.
Contents of GB/T 20282-2006
Foreword i 1 Scope 2 Normative References 3 Terminologies and Definitions 4 Security Engineering System 4.1 Overview 4.2 Goal of Security Engineering 4.3 Fundamental Relation 5 Qualification Assurance Requirements 5.1 System Integration Qualification Requirement 5.2 Personnel Qualification Requirement 5.3 Third-party Service Requirement 5.4 Security Product Requirement 5.5 Engineering Supervision Requirement 5.6 Requirement for Compliance with Laws, Regulations and Policies 6 Organizational Assurance Requirements 6.1 Define Organizational Process of System Engineering 6.2 Improve Organizational Process of System Engineering 6.3 Manage the Evolution of Series of Products 6.4 Manage Support Environment of System Engineering 6.5 Host Training 6.6 Coordinate with Supplier 7 Engineering Implementation Requirements 7.1 Manage Security Control 7.2 Assess Impacts 7.3 Assess Security Risk 7.4 Assess Threats 7.5 Assess Vulnerability 7.6 Build Assurance Argument 7.7 Coordinate Security 7.8 Monitor Security Posture 7.9 Provide Security Input 7.10 Specify Security Requirements 7.11 Verify and Validate Security 8 Project Implementation Requirements 8.1 Quality Assurance 8.2 Manage Configuration 8.3 Manage Project Risk 8.4 Monitor Technical Activities 8.5 Plan Technical Activities 9 Grading Requirements for Security Engineering Management 9.1 Level 1: the User's Discretionary Protection Level 9.2 Level 2: System Audit Protection Level 9.3 Level 3: Security Label Protection Level 9.4 Level 4: Structured Protection Level 9.5 Level 5: Access Verification Protection Level 9.6 Comparison Table of Security Protection Level Classification and Security Engineering Requirements 10 Process and Requirements of Security Engineering 10.1 Security Engineering Process 10.2 Security Engineering Requirements of Security Engineering Process in Each Stage Appendix A (Informative) Corresponding Relationship between Security Engineering Requirements and Security Protection Level/Security Engineering Process Bibliography
About Us   |    Contact Us   |    Terms of Service   |    Privacy   |    Cancellation & Refund Policy   |    Payment
Tel: +86-10-8572 5655 | Fax: +86-10-8581 9515 | Email: coc@codeofchina.com | QQ: 672269886
Copyright: Beijing COC Tech Co., Ltd. 2008-2040
 
 
Keywords:
GB/T 20282-2006, GB 20282-2006, GBT 20282-2006, GB/T20282-2006, GB/T 20282, GB/T20282, GB20282-2006, GB 20282, GB20282, GBT20282-2006, GBT 20282, GBT20282