2023-5-28 44.211.84.185
Code of China Chinese Classification Professional Classification ICS Classification Latest News Value-added Services

Position: Chinese Standard in English/GB/T 31168-2014
GB/T 31168-2014   Information Security Technology - Security Capability Requirements of Cloud Computing Services (English Version)
Standard No.: GB/T 31168-2014 Status:valid remind me the status change

Email:

Language:English File Format:PDF
Word Count: 25,000 words Price(USD):140.0 remind me the price change

Email:

Implemented on:2015-4-1 Delivery: via email in 1 business day
,,
Standard No.: GB/T 31168-2014
English Name: Information Security Technology - Security Capability Requirements of Cloud Computing Services
Chinese Name: 信息安全技术 云计算服务安全能力要求
Chinese Classification: L80    Data encryption
Professional Classification: GB    National Standard
Issued by: AQSIQ AND SAC
Issued on: 2014-09-03
Implemented on: 2015-4-1
Status: valid
Language: English
File Format: PDF
Word Count: 25,000 words
Price(USD): 140.0
Delivery: via email in 1 business day
1 Scope This standard specifies the security technology capability which the cloud service provider shall possess when providing cloud computing service for specific customer in a socialized method. This standard is applicable to the security management of cloud computing service used by government departments, and may also serve as reference for the cloud computing service used by key industries and other enterprises and institutions. It is also applicable to guide the cloud service provider to establish secure cloud computing platform and provide secure cloud computing service. 2 Normative References The following referenced documents are indispensable for the application of this document. For dated references, only the edition cited applies. For undated references, the latest edition of the normative document (including any amendments) applies. GB/T 9361-2011 Safety Requirements for Computation Center Field GB/T 25069-2010 Information Security Technology - Glossary GB 50174-2008 Code for Design of Electronic Information System Room GB/T 31167-2014 Information Security Technology - Security Guide of Cloud Computing Services 3 Terms and Definitions For the purposes of this document, the terms and definitions specified in GB/T 25069-2010 as well as those listed below apply. 3.1 Cloud computing Access to extensible, flexible physical or virtual sharing resource pool through the Internet, which may also conform to the self-help acquisition and management resource modes. Note: resource examples include the server, operation system, network, software, application and storage device. 3.2 Cloud computing service The capability to provide one or more kind(s) of resource(s) by using the defined interface and cloud computing. 3.3 Cloud service provider The provider of cloud computing service. Note: the cloud service provider manages, operate and supports the infrastructure and software of cloud computing, and delivers the cloud computing resources through the Internet. 3.4 Cloud service customer The participant entering into business relationship with the cloud service provider to use the cloud computing service. Note: the cloud service customer in this standard is referred to as the customer for short. 3.5 Cloud computing infrastructure Infrastructure composed of hardware resource and resource abstracting and controlling module and used to support the cloud computing. Note: hardware resources include all physical computing resources, including server (CPU and memory), memory module (hard disk), network module (router, fire wall, switch, network link and interface) and other basic elements of physical computing. Resource abstracting and controlling module carries out software abstracting for physical computing resource, and cloud service provider provides and manages the access to physical computing resource through these modules. 3.6 Cloud computing platform The assembly of cloud infrastructure and its service software provided by the cloud service provider. 3.7 Cloud computing environment The cloud computing platform provided by the cloud service provider, and the assembly of software and relevant modules arranged by the customer on such cloud computing platform. 3.8 Third Party Assessment Organization; 3PAO The professional assessment organization independent from the interested parties of cloud computing service. 3.9 External Information System The information system beyond the cloud computing platform. Note: generally, the ownership and control power of External Information System is not possessed by the cloud service provider, and the application or effectiveness of its security measures is not directly controlled by the cloud service provider. 4 Overview 4.1 Implementation Responsibilities for the Security Measures of Cloud Computing The cloud service provider and the customer jointly guarantee the security of cloud computing environment. In some cases, the cloud service provider still relies on other organizations for providing computing resource service, and such organizations shall also undertake security responsibilities. Thus, there are multiple executing bodies for the security measures of cloud computing, and the security responsibilities of each body are determined according to the service mode of cloud computing. There are 3 major service modes of cloud computing, namely Software as a Service (SaaS), Platform as a Service (PaaS) and Infrastructure as a Service (IaaS). The cloud service provider and customer have different control ranges for the computing resource under different service modes; the control range determines the boundary of security responsibility. As shown in Figure 1, the arrows on both sides represent the control range of the cloud service provider and the customer, see below for detail: - Under SaaS mode, the customer is only responsible for its own data security and client security while the cloud service provider shall undertake other security responsibilities. - Under PaaS mode, the security responsibilities of the software platform layer are shared by the customer and the cloud service provider. The customer is responsible for the security of the applications and their operation environment developed and arranged by itself; the cloud service provider shall be responsible for other securities.
Foreword I Introduction II 1 Scope 2 Normative References 3 Terms and Definitions 4 Overview 4.1 Implementation Responsibilities for the Security Measures of Cloud Computing 4.2 Action Range for the Security Measures of Cloud Computing 4.3 Classification of Security Requirements 4.4 Expression Form of Security Requirements 4.5 Adjustment of Security Requirements 4.6 Security Plan 4.7 Structure of This Standard 5 Security of System Development and Supply Chain 5.1 Strategy and Code 5.2 Resource Distribution 5.3 System Life Cycle 5.4 Procurement Process 5.5 System Documentation 5.6 Security Engineering Principle 5.7 Critical Analysis 5.8 External Information System Service and Relevant Service 5.9 Security System Framework of Developer 5.10 Development Process, Standards and Tools 5.11 Developer Configuration Management 5.12 Security Test and Assessment of Developer 5.13 Training Provided by the Developer 5.14 Tamper Resistance 5.15 Module Factuality 5.16 Unsupported System Module 5.17 Supply Chain Protection 6 Protection of System and Communication 6.1 Strategies and Codes 6.2 Boundary Protection 6.3 Transmission Security and Integrity 6.4 Network Interruption 6.5 Trusted Path 6.6 Password Usage and Management 6.7 Coordinated Computing Device 6.8 Mobile Code 6.9 Session Certification 6.10 Physical Connection of Mobile Device 6.11 Malicious Code Protection 6.12 Memory Protection 6.13 System Virtualization Security 6.14 Network Virtualization Security 6.15 Storage Virtualization Security 7 Access Control 7.1 Strategies and Codes 7.2 User Identification and Authentication 7.3 Device Identification and Authentication 7.4 Identifier Management 7.5 Authentication Certificate Management 7.6 Feedback of Authentication Certificate 7.7 Authentication of Cryptographic Module 7.8 Account Management 7.9 Implementation of Access Control 7.10 Control of Information Flow 7.11 Minimum Privilege 7.12 Unsuccessful Log-in Try 7.13 Notice on Use of System 7.14 Notice on Last Visit 7.15 Concurrent Session Control 7.16 Session Lock-in 7.17 Actions May be Taken in Case of Lacking Identification and Authentication 7.18 Security Attribute 7.19 Remote Access 7.20 Wireless Access 7.21 Use of External Information System 7.22 Information Sharing 7.23 Content accessible to the Public 7.24 Data Excavation Protection 7.25 Medium Access and Use 7.26 Service Closure and Data Migration 8 Configuration Management 8.1 Strategies and Codes 8.2 Configuration Management Plan 8.3 Base Line Configuration 8.4 Change Control 8.5 Setting of Configuration Parameters 8.6 Minimum Functional Principle 8.7 Information System Module List 9 Maintenance 9.1 Strategies and Codes 9.2 Controlled Maintenance 9.3 Maintenance Tool 9.4 Remote Maintenance 9.5 Maintenance Personnel 9.6 Timely Maintenance 9.7 Defect Repair 9.8 Security Function Verification 9.9 Integrity of Software, Firmware and Information 10 Emergency Response and Disaster Preparation 10.1 Strategies and Codes 10.2 Event Handling Plan 10.3 Event Handling 10.4 Event Report 10.5 Event Handling Support 10.6 Security Alarm 10.7 Error Handling 10.8 Emergency Response Plan 10.9 Emergency Training 10.10 Emergency Drilling 10.11 Information System Backup 10.12 Supporting the Service Continuity Plan of the Customer 10.13 Telecommunication Service 11 Audit 11.1 Strategies and Codes 11.2 Auditable Event 11.3 Audit Record Contents 11.4 Storage Capacity of Audit Record 11.5 Response upon Audit Process Failure 11.6 Examination, Analysis and Report of Audit 11.7 Audit Treatment and Report Generation 11.8 Time Stamp 11.9 Audit Information Protection 11.10 Non-repudiation 11.11 Audit Record Retention 12 Risk Assessment and Persistent Monitoring 12.1 Strategies and Codes 12.2 Risk Assessment 12.3 Vulnerability Scanning 12.4 Persistent Monitoring 12.5 Information System Monitoring 12.6 Junk Information Monitoring 13 Security Organization and Personnel 13.1 Strategies and Codes 13.2 Security Organization 13.3 Security Resource 13.4 Security Regulations System 13.5 Post Risks and Responsibilities 13.6 Personnel Screening 13.7 Personnel Dimission 13.8 Personnel Deployment 13.9 Access Protocol 13.10 Third Party Personnel Security 13.11 Personnel Punishment 13.12 Security Training 14 Physical and Environmental Security 14.1 Strategies and Codes 14.2 Physical Facilities and Devices Site Selection 14.3 Physical and Environmental Planning 14.4 Physical Environment Access Authorization 14.5 Physical Environment Access Control 14.6 Communication Capacity Protection 14.7 Output Device Access Control 14.8 Physical Access Monitoring 14.9 Visitor Access Record 14.10 Power Device and Cable Security Assurance 14.11 Emergency Lighting Capability 14.12 Fire-fighting Capability 14.13 Temperature and Humidity Control Capabilities 14.14 Water-proof Capability 14.15 Device Transportation and Remove Appendix A (Informative) Template for System Security Plan Bibliography
Referred in GB/T 31168-2014:
* GB/T 9361-2011 Safety requirements for computer field
* GB/T 25069-2010 Information security technology—Glossary
* GB 50174-2008 Code for Design of Electronic Information System Room
* GB/T 31167-2014 Information security technology—Security guide of cloud computing services
GB/T 31168-2014 is referred in:
*GB/T 22239-2019 Information security technology—Baseline for classified protection of cybersecurity
*GB/T 35274-2017 Information security technology—Security capability requirements for big data services
*GB/T 38628-2020 Information security technology—Cybersecurity guide for automotive electronics systems
*GB/T 28448-2019 Information security technology—Evaluation requirement for classified protection of cybersecurity
*GB/T 39725-2020 Information security technology—Guide for health data security
*GB/T 25070-2019 Information security technology—Technical requirements of security design for classified protection of cybersecurity
Code of China
Standard
GB/T 31168-2014  Information Security Technology - Security Capability Requirements of Cloud Computing Services (English Version)
Standard No.GB/T 31168-2014
Statusvalid
LanguageEnglish
File FormatPDF
Word Count25,000 words
Price(USD)140.0
Implemented on2015-4-1
Deliveryvia email in 1 business day
Detail of GB/T 31168-2014
Standard No.
GB/T 31168-2014
English Name
Information Security Technology - Security Capability Requirements of Cloud Computing Services
Chinese Name
信息安全技术 云计算服务安全能力要求
Chinese Classification
L80
Professional Classification
GB
ICS Classification
Issued by
AQSIQ AND SAC
Issued on
2014-09-03
Implemented on
2015-4-1
Status
valid
Superseded by
Superseded on
Abolished on
Superseding
Language
English
File Format
PDF
Word Count
25,000 words
Price(USD)
140.0
Keywords
GB/T 31168-2014, GB 31168-2014, GBT 31168-2014, GB/T31168-2014, GB/T 31168, GB/T31168, GB31168-2014, GB 31168, GB31168, GBT31168-2014, GBT 31168, GBT31168
Introduction of GB/T 31168-2014
1 Scope This standard specifies the security technology capability which the cloud service provider shall possess when providing cloud computing service for specific customer in a socialized method. This standard is applicable to the security management of cloud computing service used by government departments, and may also serve as reference for the cloud computing service used by key industries and other enterprises and institutions. It is also applicable to guide the cloud service provider to establish secure cloud computing platform and provide secure cloud computing service. 2 Normative References The following referenced documents are indispensable for the application of this document. For dated references, only the edition cited applies. For undated references, the latest edition of the normative document (including any amendments) applies. GB/T 9361-2011 Safety Requirements for Computation Center Field GB/T 25069-2010 Information Security Technology - Glossary GB 50174-2008 Code for Design of Electronic Information System Room GB/T 31167-2014 Information Security Technology - Security Guide of Cloud Computing Services 3 Terms and Definitions For the purposes of this document, the terms and definitions specified in GB/T 25069-2010 as well as those listed below apply. 3.1 Cloud computing Access to extensible, flexible physical or virtual sharing resource pool through the Internet, which may also conform to the self-help acquisition and management resource modes. Note: resource examples include the server, operation system, network, software, application and storage device. 3.2 Cloud computing service The capability to provide one or more kind(s) of resource(s) by using the defined interface and cloud computing. 3.3 Cloud service provider The provider of cloud computing service. Note: the cloud service provider manages, operate and supports the infrastructure and software of cloud computing, and delivers the cloud computing resources through the Internet. 3.4 Cloud service customer The participant entering into business relationship with the cloud service provider to use the cloud computing service. Note: the cloud service customer in this standard is referred to as the customer for short. 3.5 Cloud computing infrastructure Infrastructure composed of hardware resource and resource abstracting and controlling module and used to support the cloud computing. Note: hardware resources include all physical computing resources, including server (CPU and memory), memory module (hard disk), network module (router, fire wall, switch, network link and interface) and other basic elements of physical computing. Resource abstracting and controlling module carries out software abstracting for physical computing resource, and cloud service provider provides and manages the access to physical computing resource through these modules. 3.6 Cloud computing platform The assembly of cloud infrastructure and its service software provided by the cloud service provider. 3.7 Cloud computing environment The cloud computing platform provided by the cloud service provider, and the assembly of software and relevant modules arranged by the customer on such cloud computing platform. 3.8 Third Party Assessment Organization; 3PAO The professional assessment organization independent from the interested parties of cloud computing service. 3.9 External Information System The information system beyond the cloud computing platform. Note: generally, the ownership and control power of External Information System is not possessed by the cloud service provider, and the application or effectiveness of its security measures is not directly controlled by the cloud service provider. 4 Overview 4.1 Implementation Responsibilities for the Security Measures of Cloud Computing The cloud service provider and the customer jointly guarantee the security of cloud computing environment. In some cases, the cloud service provider still relies on other organizations for providing computing resource service, and such organizations shall also undertake security responsibilities. Thus, there are multiple executing bodies for the security measures of cloud computing, and the security responsibilities of each body are determined according to the service mode of cloud computing. There are 3 major service modes of cloud computing, namely Software as a Service (SaaS), Platform as a Service (PaaS) and Infrastructure as a Service (IaaS). The cloud service provider and customer have different control ranges for the computing resource under different service modes; the control range determines the boundary of security responsibility. As shown in Figure 1, the arrows on both sides represent the control range of the cloud service provider and the customer, see below for detail: - Under SaaS mode, the customer is only responsible for its own data security and client security while the cloud service provider shall undertake other security responsibilities. - Under PaaS mode, the security responsibilities of the software platform layer are shared by the customer and the cloud service provider. The customer is responsible for the security of the applications and their operation environment developed and arranged by itself; the cloud service provider shall be responsible for other securities.
Contents of GB/T 31168-2014
Foreword I Introduction II 1 Scope 2 Normative References 3 Terms and Definitions 4 Overview 4.1 Implementation Responsibilities for the Security Measures of Cloud Computing 4.2 Action Range for the Security Measures of Cloud Computing 4.3 Classification of Security Requirements 4.4 Expression Form of Security Requirements 4.5 Adjustment of Security Requirements 4.6 Security Plan 4.7 Structure of This Standard 5 Security of System Development and Supply Chain 5.1 Strategy and Code 5.2 Resource Distribution 5.3 System Life Cycle 5.4 Procurement Process 5.5 System Documentation 5.6 Security Engineering Principle 5.7 Critical Analysis 5.8 External Information System Service and Relevant Service 5.9 Security System Framework of Developer 5.10 Development Process, Standards and Tools 5.11 Developer Configuration Management 5.12 Security Test and Assessment of Developer 5.13 Training Provided by the Developer 5.14 Tamper Resistance 5.15 Module Factuality 5.16 Unsupported System Module 5.17 Supply Chain Protection 6 Protection of System and Communication 6.1 Strategies and Codes 6.2 Boundary Protection 6.3 Transmission Security and Integrity 6.4 Network Interruption 6.5 Trusted Path 6.6 Password Usage and Management 6.7 Coordinated Computing Device 6.8 Mobile Code 6.9 Session Certification 6.10 Physical Connection of Mobile Device 6.11 Malicious Code Protection 6.12 Memory Protection 6.13 System Virtualization Security 6.14 Network Virtualization Security 6.15 Storage Virtualization Security 7 Access Control 7.1 Strategies and Codes 7.2 User Identification and Authentication 7.3 Device Identification and Authentication 7.4 Identifier Management 7.5 Authentication Certificate Management 7.6 Feedback of Authentication Certificate 7.7 Authentication of Cryptographic Module 7.8 Account Management 7.9 Implementation of Access Control 7.10 Control of Information Flow 7.11 Minimum Privilege 7.12 Unsuccessful Log-in Try 7.13 Notice on Use of System 7.14 Notice on Last Visit 7.15 Concurrent Session Control 7.16 Session Lock-in 7.17 Actions May be Taken in Case of Lacking Identification and Authentication 7.18 Security Attribute 7.19 Remote Access 7.20 Wireless Access 7.21 Use of External Information System 7.22 Information Sharing 7.23 Content accessible to the Public 7.24 Data Excavation Protection 7.25 Medium Access and Use 7.26 Service Closure and Data Migration 8 Configuration Management 8.1 Strategies and Codes 8.2 Configuration Management Plan 8.3 Base Line Configuration 8.4 Change Control 8.5 Setting of Configuration Parameters 8.6 Minimum Functional Principle 8.7 Information System Module List 9 Maintenance 9.1 Strategies and Codes 9.2 Controlled Maintenance 9.3 Maintenance Tool 9.4 Remote Maintenance 9.5 Maintenance Personnel 9.6 Timely Maintenance 9.7 Defect Repair 9.8 Security Function Verification 9.9 Integrity of Software, Firmware and Information 10 Emergency Response and Disaster Preparation 10.1 Strategies and Codes 10.2 Event Handling Plan 10.3 Event Handling 10.4 Event Report 10.5 Event Handling Support 10.6 Security Alarm 10.7 Error Handling 10.8 Emergency Response Plan 10.9 Emergency Training 10.10 Emergency Drilling 10.11 Information System Backup 10.12 Supporting the Service Continuity Plan of the Customer 10.13 Telecommunication Service 11 Audit 11.1 Strategies and Codes 11.2 Auditable Event 11.3 Audit Record Contents 11.4 Storage Capacity of Audit Record 11.5 Response upon Audit Process Failure 11.6 Examination, Analysis and Report of Audit 11.7 Audit Treatment and Report Generation 11.8 Time Stamp 11.9 Audit Information Protection 11.10 Non-repudiation 11.11 Audit Record Retention 12 Risk Assessment and Persistent Monitoring 12.1 Strategies and Codes 12.2 Risk Assessment 12.3 Vulnerability Scanning 12.4 Persistent Monitoring 12.5 Information System Monitoring 12.6 Junk Information Monitoring 13 Security Organization and Personnel 13.1 Strategies and Codes 13.2 Security Organization 13.3 Security Resource 13.4 Security Regulations System 13.5 Post Risks and Responsibilities 13.6 Personnel Screening 13.7 Personnel Dimission 13.8 Personnel Deployment 13.9 Access Protocol 13.10 Third Party Personnel Security 13.11 Personnel Punishment 13.12 Security Training 14 Physical and Environmental Security 14.1 Strategies and Codes 14.2 Physical Facilities and Devices Site Selection 14.3 Physical and Environmental Planning 14.4 Physical Environment Access Authorization 14.5 Physical Environment Access Control 14.6 Communication Capacity Protection 14.7 Output Device Access Control 14.8 Physical Access Monitoring 14.9 Visitor Access Record 14.10 Power Device and Cable Security Assurance 14.11 Emergency Lighting Capability 14.12 Fire-fighting Capability 14.13 Temperature and Humidity Control Capabilities 14.14 Water-proof Capability 14.15 Device Transportation and Remove Appendix A (Informative) Template for System Security Plan Bibliography
About Us   |    Contact Us   |    Terms of Service   |    Privacy   |    Cancellation & Refund Policy   |    Payment
Tel: +86-10-8572 5655 | Fax: +86-10-8581 9515 | Email: coc@codeofchina.com | QQ: 672269886
Copyright: Foryou Tech Co., Ltd. 2008-2040
 
 
Keywords:
GB/T 31168-2014, GB 31168-2014, GBT 31168-2014, GB/T31168-2014, GB/T 31168, GB/T31168, GB31168-2014, GB 31168, GB31168, GBT31168-2014, GBT 31168, GBT31168