This standard specifies basis security techniques requirements necessary for network system of every security grade according to the division of five security protection grades in GB 17859-1999 and the roles of network system in information system.
This standard is applicable to design and realization of network system according to the requirements of hierarchization and for reference for testing and management of network system security as required.
2 Normative References
The provisions in the following documents, through reference in this standard, constitute the provisions of this standard. For dated reference, subsequent amendments to, excluding correction to, or revisions of, any of these publications do not apply. However, all parties coming to an agreement according to this standard are encouraged to study whether the latest editions of these documents are applicable. For undated references, the latest edition of the normative document referred to applies.
GB 17859-1999 Classified Criteria for Security Protection of Computer Information System
GB/T 20271-2006 Information Security Technology Common Security Techniques Requirement for Information System
3 Terms, Definitions and Abbreviations
3.1 Terms and definitions
For the purpose of this standard, the terms and definitions given in GB/T 17859-1999 and the following ones apply.
3.1.1
Network security
Characterization of the confidentiality, integrity and availability of information subjected to storage, transmission and treatment in the network environment.
3.1.2
Basis technology of network security
All the basis security technology necessary to realize all kinds of network system security.
3.1.3
Security subsystem of network
A generic term for safety protection system in network, including hardware, firmware, software and combination responsible for execute security policy, which establishes a basic network security environment protection and provides additional user service required by security network.
Note: SSON (security subsystem of network) is network TCB (trusted computing base) according to definition of TCB in GB 17859-1999.
3.1.4
SSON security policy
A group of rules to manage, protect and distribute SSON resource. One SSON may have one or more security policies.
GB/T 20270-2006 The following standards are cited: