2025-12-5 10.1.6.65
Code of China Chinese Classification Professional Classification ICS Classification Latest News Value-added Services

Position: Chinese Standard in English/GB/T 28449-2018
GB/T 28449-2018   Information security technology-Testing and evaluation process guide for classified protection of cybersecurity (English Version)
Standard No.: GB/T 28449-2018 Status:valid remind me the status change

Email:

Target Language:English File Format:PDF
Word Count: 27500 words Translation Price(USD):825.0 remind me the price change

Email:

Implemented on:2019-7-1 Delivery: via email in 1 business day

→ → →

,,2019-7-1,3E9EF06C22C2637E1546845555903
Standard No.: GB/T 28449-2018
English Name: Information security technology-Testing and evaluation process guide for classified protection of cybersecurity
Chinese Name: 信息安全技术 网络安全等级保护测评过程指南
Chinese Classification: L80    Data encryption
Professional Classification: GB    National Standard
Source Content Issued by: SAMR; SAC
Issued on: 2018-12-28
Implemented on: 2019-7-1
Status: valid
Superseding:GB/T 28449-2012 Information security technology—Testing and evaluation process guide for classified protection of information system security
Target Language: English
File Format: PDF
Word Count: 27500 words
Translation Price(USD): 825.0
Delivery: via email in 1 business day
Codeofchina.com is in charge of this English translation. In case of any doubt about the English translation, the Chinese original shall be considered authoritative. This standard is drafted in accordance with the rules given in GB/T 1.1-2009. This standard replaces GB/T 28449-2012 Information security technology—Testing and evaluation process guide for classified protection of information system security. In addition to editorial changes, the following main technical changes have been made with respect to GB/T 28449-2012: —The standard title was changed from Information security technology—Testing and evaluation process guide for classified protection of information system security to Information security technology—Testing and evaluation process guide for classified protection of cybersecurity. —The report preparation activity has been modified from 6 tasks to 7 tasks (see 4.1; 5.4 of the 2012 edition); —The responsibility for coordinating multiple parties has been added to the responsibilities of both parties in the T&E preparation activity and on-site T&E activity, and has also been articulated in some tasks involving multiple parties (see 7.4; 8.4 of the 2012 edition); —Information analysis methods has been added to information collection and analysis tasks (see 5.2.2); —Special tasks and requirements that require additional focus have been added in the security testing and evaluation of classified protection targets constructed by cloud computing, Internet of Things, mobile Internet, industrial control systems, IPv6 systems, etc. (see Annex C); —The example for T&E scheme has been canceled (see Annex D of the 2012 edition); —The template of the basic information survey form of the information system has been canceled (see Annex E of the 2012 edition). Attention is drawn to the possibility that some of the elements of this standard may be the subject of patent rights. The issuing body of this document shall not be held responsible for identifying any or all such patent rights. This standard was proposed by and is under the jurisdiction of the National Technical Committee on Information Security of Standardization Administration of China (SAC/TC 260). The previous editions of this standard are as follows: —GB/T 28449-2012. Introduction For the purpose of this standard, testing and evaluation refers to the process by which the testing and evaluation body tests and evaluates whether the security status of the rated object meets the basic requirements of the corresponding level according to technical standards such as GB/T 22239 and GB/T 28448. It is important to implement the classified protection system for cybersecurity. During construction and rectification of the rated object, the operator and user of the rated object conduct a status analysis through the testing and evaluation to determine the current status of the system's security protection and identify existing security problems and then the system's rectification security needs. During operation and maintenance of the rated object, the operator and user of the rated object regularly conduct self-inspection or the testing and evaluation on the security status of the rated object through an T&E agency, to review and evaluate information security management and control capabilities and thus to determine whether the rated object has the security protection capabilities required by the corresponding level in GB/T 22239. Therefore, the report formed through the T&E activities is an important basis for the rectification and reinforcement of the rated object, and is also an important attachment for the filing of the rated object above the third level. The T&E conclusion of the rated object is expressed by either “non-conforming” or “basically conforming”, and its operator and user shall formulate a plan for rectification based on the T&E report. This standard is one of the series standards related to classified protection of cybersecurity. Information security technology— Testing and evaluation process guide for classified protection of cybersecurity 1 Scope This standard regulates the working processes of testing and evaluation for classified protection of cybersecurity (hereinafter referred to as "testing and evaluation" and “T&E”), and specifies the testing and evaluation activities and their tasks. This standard is applicable to T&E works for classified protection of cybersecurity performed by T&E agency, and competent authority, operator and user of the rated object. 2 Normative references The following referenced documents are indispensable for the application of this document. For dated references, only the edition cited applies. For undated references, the latest edition of the referenced document (including any amendments) applies. GB 17859 Classified Criteria for Security Protection of Computer Information System GB/T 22239 Information security technology—Baseline for classified protection of information system security GB/T 25069 Information security technology—Glossary GB/T 28448 Information security technology—Testing and evaluation requirement for classified protection of information system 3 Terms and definitions For the purpose of this document, the terms and definitions given in GB 17859, GB 22239 and GB/T 28448 apply. 4 General about testing and evaluation 4.1 General about T&E process The T&E work processes and tasks in this standard are based on the initial testing and evaluation of the rated object by the commissioned T&E agency. Where the self-inspection of the operator and user or the commissioned T&E agency has performed more than one testing and evaluation, the T&E agency and staff shall adapt some of their work tasks to the actual situation (see Annex A). The T&E agency shall carry out related works strictly in accordance with the requirements of the T&E works given in Annex B. The T&E process consists of four basic activities: T&E preparation, scheme preparation, on-site testing and evaluation, and report preparation. The communication and negotiation between the parties involved in the testing and evaluation shall run through the entire T&E process. Each testing and evaluation has a defined set of tasks, as detailed in Table 1.
Foreword i Introduction iii 1 Scope 2 Normative references 3 Terms and definitions 4 General about testing and evaluation 4.1 General about T&E process 4.2 T&E risks 4.3 T&E risk aversion 5 T&E preparation 5.1 Workflow of T&E preparation 5.2 Major tasks of T&E preparation 5.3 Output documents for T&E preparation 5.4 Responsibilities of both parties in T&E preparation 6 Scheme preparation 6.1 Workflow of scheme preparation 6.2 Major tasks of scheme preparation 6.3 Output document of scheme preparation activity 6.4 Responsibilities of both parties in the scheme preparation activity 7 On-site testing and evaluation 7.1 Workflow of on-site testing and evaluation 7.2 Major tasks of on-site T&E activity 7.3 On-site T&E activity output documents 7.4 Responsibilities of both parties in on-site T&E activity 8 Report preparation 8.1 Workflow of report preparation 8.2 Major tasks of report preparation 8.3 Output document of report preparation activity 8.4 Responsibilities of both parties in the report preparation activity Annex A (Normative) T&E workflow Annex B (Normative) T&E work requirements Annex C (Normative) Supplement to T&E implementation for new technologies and new applications Annex D (Normative) Criteria and examples for determining the T&E targets Annex E (Informative) On-site T&E methods and tasks for T&E Annex F (Informative) Format of T&E report Bibliography
Referred in GB/T 28449-2018:
*GB 17859-1999 Classified criteria for security protection of computer information system
*GB/T 22239-2019 Information security technology—Baseline for classified protection of cybersecurity
*GB/T 25069-2022 Information security techniques—Terminology
*GB/T 28448-2019 Information security technology—Evaluation requirement for classified protection of cybersecurity
*GB/T 30976.1-2014 Industrial control system security―Part 1:Assessment specification
*GB/T 30976.2-2014 Industrial control system security―Part 2:Acceptance specification
*GB/T 31167-2014 Information security technology—Security guide of cloud computing services
*GB/T 31168-2014 Information Security Technology - Security Capability Requirements of Cloud Computing Services
*YDB 101-2012 Security requirements of internet of things
*YD/T 2437-2012 General framework and technical requirements of IoT (Internet of Things)
*YD/T 2694-2014 Security protection Requirements for Networked Application over Mobile Internet
*YD/T 2695-2014 Security protection test requirements for networked application over mobile internet
GB/T 28449-2018 is referred in:
*GB/T 28448-2019 Information security technology—Evaluation requirement for classified protection of cybersecurity
*GB/T 36627-2018 Information security technology—Testing and evaluation technical guide for classified cybersecurity protection
Code of China
Standard
GB/T 28449-2018  Information security technology-Testing and evaluation process guide for classified protection of cybersecurity (English Version)
Standard No.GB/T 28449-2018
Statusvalid
LanguageEnglish
File FormatPDF
Word Count27500 words
Price(USD)825.0
Implemented on2019-7-1
Deliveryvia email in 1 business day
Detail of GB/T 28449-2018
Standard No.
GB/T 28449-2018
English Name
Information security technology-Testing and evaluation process guide for classified protection of cybersecurity
Chinese Name
信息安全技术 网络安全等级保护测评过程指南
Chinese Classification
L80
Professional Classification
GB
ICS Classification
Issued by
SAMR; SAC
Issued on
2018-12-28
Implemented on
2019-7-1
Status
valid
Superseded by
Superseded on
Abolished on
Superseding
GB/T 28449-2012 Information security technology—Testing and evaluation process guide for classified protection of information system security
Language
English
File Format
PDF
Word Count
27500 words
Price(USD)
825.0
Keywords
GB/T 28449-2018, GB 28449-2018, GBT 28449-2018, GB/T28449-2018, GB/T 28449, GB/T28449, GB28449-2018, GB 28449, GB28449, GBT28449-2018, GBT 28449, GBT28449
Introduction of GB/T 28449-2018
Codeofchina.com is in charge of this English translation. In case of any doubt about the English translation, the Chinese original shall be considered authoritative. This standard is drafted in accordance with the rules given in GB/T 1.1-2009. This standard replaces GB/T 28449-2012 Information security technology—Testing and evaluation process guide for classified protection of information system security. In addition to editorial changes, the following main technical changes have been made with respect to GB/T 28449-2012: —The standard title was changed from Information security technology—Testing and evaluation process guide for classified protection of information system security to Information security technology—Testing and evaluation process guide for classified protection of cybersecurity. —The report preparation activity has been modified from 6 tasks to 7 tasks (see 4.1; 5.4 of the 2012 edition); —The responsibility for coordinating multiple parties has been added to the responsibilities of both parties in the T&E preparation activity and on-site T&E activity, and has also been articulated in some tasks involving multiple parties (see 7.4; 8.4 of the 2012 edition); —Information analysis methods has been added to information collection and analysis tasks (see 5.2.2); —Special tasks and requirements that require additional focus have been added in the security testing and evaluation of classified protection targets constructed by cloud computing, Internet of Things, mobile Internet, industrial control systems, IPv6 systems, etc. (see Annex C); —The example for T&E scheme has been canceled (see Annex D of the 2012 edition); —The template of the basic information survey form of the information system has been canceled (see Annex E of the 2012 edition). Attention is drawn to the possibility that some of the elements of this standard may be the subject of patent rights. The issuing body of this document shall not be held responsible for identifying any or all such patent rights. This standard was proposed by and is under the jurisdiction of the National Technical Committee on Information Security of Standardization Administration of China (SAC/TC 260). The previous editions of this standard are as follows: —GB/T 28449-2012. Introduction For the purpose of this standard, testing and evaluation refers to the process by which the testing and evaluation body tests and evaluates whether the security status of the rated object meets the basic requirements of the corresponding level according to technical standards such as GB/T 22239 and GB/T 28448. It is important to implement the classified protection system for cybersecurity. During construction and rectification of the rated object, the operator and user of the rated object conduct a status analysis through the testing and evaluation to determine the current status of the system's security protection and identify existing security problems and then the system's rectification security needs. During operation and maintenance of the rated object, the operator and user of the rated object regularly conduct self-inspection or the testing and evaluation on the security status of the rated object through an T&E agency, to review and evaluate information security management and control capabilities and thus to determine whether the rated object has the security protection capabilities required by the corresponding level in GB/T 22239. Therefore, the report formed through the T&E activities is an important basis for the rectification and reinforcement of the rated object, and is also an important attachment for the filing of the rated object above the third level. The T&E conclusion of the rated object is expressed by either “non-conforming” or “basically conforming”, and its operator and user shall formulate a plan for rectification based on the T&E report. This standard is one of the series standards related to classified protection of cybersecurity. Information security technology— Testing and evaluation process guide for classified protection of cybersecurity 1 Scope This standard regulates the working processes of testing and evaluation for classified protection of cybersecurity (hereinafter referred to as "testing and evaluation" and “T&E”), and specifies the testing and evaluation activities and their tasks. This standard is applicable to T&E works for classified protection of cybersecurity performed by T&E agency, and competent authority, operator and user of the rated object. 2 Normative references The following referenced documents are indispensable for the application of this document. For dated references, only the edition cited applies. For undated references, the latest edition of the referenced document (including any amendments) applies. GB 17859 Classified Criteria for Security Protection of Computer Information System GB/T 22239 Information security technology—Baseline for classified protection of information system security GB/T 25069 Information security technology—Glossary GB/T 28448 Information security technology—Testing and evaluation requirement for classified protection of information system 3 Terms and definitions For the purpose of this document, the terms and definitions given in GB 17859, GB 22239 and GB/T 28448 apply. 4 General about testing and evaluation 4.1 General about T&E process The T&E work processes and tasks in this standard are based on the initial testing and evaluation of the rated object by the commissioned T&E agency. Where the self-inspection of the operator and user or the commissioned T&E agency has performed more than one testing and evaluation, the T&E agency and staff shall adapt some of their work tasks to the actual situation (see Annex A). The T&E agency shall carry out related works strictly in accordance with the requirements of the T&E works given in Annex B. The T&E process consists of four basic activities: T&E preparation, scheme preparation, on-site testing and evaluation, and report preparation. The communication and negotiation between the parties involved in the testing and evaluation shall run through the entire T&E process. Each testing and evaluation has a defined set of tasks, as detailed in Table 1.
Contents of GB/T 28449-2018
Foreword i Introduction iii 1 Scope 2 Normative references 3 Terms and definitions 4 General about testing and evaluation 4.1 General about T&E process 4.2 T&E risks 4.3 T&E risk aversion 5 T&E preparation 5.1 Workflow of T&E preparation 5.2 Major tasks of T&E preparation 5.3 Output documents for T&E preparation 5.4 Responsibilities of both parties in T&E preparation 6 Scheme preparation 6.1 Workflow of scheme preparation 6.2 Major tasks of scheme preparation 6.3 Output document of scheme preparation activity 6.4 Responsibilities of both parties in the scheme preparation activity 7 On-site testing and evaluation 7.1 Workflow of on-site testing and evaluation 7.2 Major tasks of on-site T&E activity 7.3 On-site T&E activity output documents 7.4 Responsibilities of both parties in on-site T&E activity 8 Report preparation 8.1 Workflow of report preparation 8.2 Major tasks of report preparation 8.3 Output document of report preparation activity 8.4 Responsibilities of both parties in the report preparation activity Annex A (Normative) T&E workflow Annex B (Normative) T&E work requirements Annex C (Normative) Supplement to T&E implementation for new technologies and new applications Annex D (Normative) Criteria and examples for determining the T&E targets Annex E (Informative) On-site T&E methods and tasks for T&E Annex F (Informative) Format of T&E report Bibliography
About Us   |    Contact Us   |    Terms of Service   |    Privacy   |    Cancellation & Refund Policy   |    Payment
Tel: +86-10-8572 5655 | Fax: +86-10-8581 9515 | Email: coc@codeofchina.com | QQ: 672269886
Copyright: Beijing COC Tech Co., Ltd. 2008-2040
 
 
Keywords:
GB/T 28449-2018, GB 28449-2018, GBT 28449-2018, GB/T28449-2018, GB/T 28449, GB/T28449, GB28449-2018, GB 28449, GB28449, GBT28449-2018, GBT 28449, GBT28449