2025-12-15 216.73.216.89
Code of China Chinese Classification Professional Classification ICS Classification Latest News Value-added Services

Position: Chinese Standard in English/GB 42250-2022
GB 42250-2022   Information security technology—Security technical requirements for specialized cybersecurity products (English Version)
Standard No.: GB 42250-2022 Status:valid remind me the status change

Email:

Target Language:English File Format:PDF
Word Count: 5500 words Translation Price(USD):165.0 remind me the price change

Email:

Implemented on:2023-7-1 Delivery: via email in 1 business day

→ → →

,,2023-7-1,3E0F75BF421C21AE1673502122089
Standard No.: GB 42250-2022
English Name: Information security technology—Security technical requirements for specialized cybersecurity products
Chinese Name: 信息安全技术 网络安全专用产品安全技术要求
Chinese Classification: L80    Data encryption
Professional Classification: GB    National Standard
Source Content Issued by: SAMR; SAC
Issued on: 2022-12-29
Implemented on: 2023-7-1
Status: valid
Target Language: English
File Format: PDF
Word Count: 5500 words
Translation Price(USD): 165.0
Delivery: via email in 1 business day
Introduction This document is formulated to implement Article 23 of the Cybersecurity Law of the People's Republic of China. Specialized cybersecurity products shall be developed, produced, served and tested in accordance with the security technical requirements of this document and other technical specifications stipulated by relevant competent departments of the nation. This document gives the baseline requirements that all specialized cybersecurity products and their providers need to meet. Information security technology - Security technical requirements of specialized cybersecurity products 1 Scope This document specifies the security function requirements, self-security requirements and security assurance requirements for the specialized cybersecurity products. This document is applicable to the research, development, production, service and testing of specialized cybersecurity products to be sold or provided. 2 Normative references The following documents contain provisions which, through reference in this text, constitute provisions of this document. For dated references, only the edition cited applies. For undated references, the latest edition (including any amendments) applies. GB/T 25069 Information security techniques - Terminology 3 Terms and definitions For the purposes of this document, the terms and definitions given in GB/T 25069 and the following apply. 3.1 specialized cybersecurity products specialized hardware and software products for providing cybersecurity Note: including products that provide security protection capabilities in the form of services. 3.2 specialized cybersecurity products provider developer or producer of specialized cybersecurity products or maintenance service provider for such products 3.3 security domain collection of assets and resources that comply with common security policies [Source: GB/T 25069-2022, 3.36] 3.4 personal information all kinds of information related to an identified or identifiable natural person, recorded by electronic means, excluding information that has been anonymized 3.5 user information information recorded by electronic means generated, collected, stored, transmitted or processed while any individual, legal person or other organization installs and uses specialized cybersecurity products Note: user information includes network traffic information, security status information, security configuration data, operation process logs, as well as personal information. 3.6 malicious program program with cyber-attack functions such as destroying networks and information systems, interfering with the normal use of networks and information systems, stealing or maliciously encrypting network and system data Note: malicious programs mainly include viruses, worms, Trojans, and other programs that affect the safe and stable operation of hosts, networks or systems. 3.7 security flaw weakness introduced by errors in design, development, configuration, production, operation and maintenance, etc., which may affect the security of specialized cybersecurity products 3.8 vulnerability weakness in specialized cybersecurity products that can be threatened and exploited 4 Security function requirements 4.1 Access control Specialized cybersecurity products with access control functions shall have the following functions: a) Supporting the configuration of access control policies;   Note: different types of specialized cybersecurity products have different access control policies. For example, for network-based firewalls, access control policies are set based on source addresses, destination addresses, source ports, destination ports and network communication protocols; for virtual specialized cybersecurity products, access control policies are set based on user security attributes; for security isolation and information exchange products, access control policies are set based on application layer protocols. b) Supporting the control over access to a secure domain based on an access control policy.
Foreword II Introduction III 1 Scope 2 Normative references 3 Terms and definitions 4 Security function requirements 4.1 Access control 4.2 Intrusion prevention 4.3 Security audit 4.4 Prevention of malicious programs 5 Self-security requirements 5.1 Identification and authentication 5.2 Self-access control 5.3 Self-security audit 5.4 Communication security 5.5 Supporting system security 5.6 Product upgrade 5.7 User information security 5.8 Cryptographic requirements 6 Security assurance requirements 6.1 Supply chain security 6.2 Design and development 6.3 Production and delivery 6.4 Operation & maintenance service assurance 6.5 User information protection Bibliography
Code of China
Standard
GB 42250-2022  Information security technology—Security technical requirements for specialized cybersecurity products (English Version)
Standard No.GB 42250-2022
Statusvalid
LanguageEnglish
File FormatPDF
Word Count5500 words
Price(USD)165.0
Implemented on2023-7-1
Deliveryvia email in 1 business day
Detail of GB 42250-2022
Standard No.
GB 42250-2022
English Name
Information security technology—Security technical requirements for specialized cybersecurity products
Chinese Name
信息安全技术 网络安全专用产品安全技术要求
Chinese Classification
L80
Professional Classification
GB
ICS Classification
Issued by
SAMR; SAC
Issued on
2022-12-29
Implemented on
2023-7-1
Status
valid
Superseded by
Superseded on
Abolished on
Superseding
Language
English
File Format
PDF
Word Count
5500 words
Price(USD)
165.0
Keywords
GB 42250-2022, GB/T 42250-2022, GBT 42250-2022, GB42250-2022, GB 42250, GB42250, GB/T42250-2022, GB/T 42250, GB/T42250, GBT42250-2022, GBT 42250, GBT42250
Introduction of GB 42250-2022
Introduction This document is formulated to implement Article 23 of the Cybersecurity Law of the People's Republic of China. Specialized cybersecurity products shall be developed, produced, served and tested in accordance with the security technical requirements of this document and other technical specifications stipulated by relevant competent departments of the nation. This document gives the baseline requirements that all specialized cybersecurity products and their providers need to meet. Information security technology - Security technical requirements of specialized cybersecurity products 1 Scope This document specifies the security function requirements, self-security requirements and security assurance requirements for the specialized cybersecurity products. This document is applicable to the research, development, production, service and testing of specialized cybersecurity products to be sold or provided. 2 Normative references The following documents contain provisions which, through reference in this text, constitute provisions of this document. For dated references, only the edition cited applies. For undated references, the latest edition (including any amendments) applies. GB/T 25069 Information security techniques - Terminology 3 Terms and definitions For the purposes of this document, the terms and definitions given in GB/T 25069 and the following apply. 3.1 specialized cybersecurity products specialized hardware and software products for providing cybersecurity Note: including products that provide security protection capabilities in the form of services. 3.2 specialized cybersecurity products provider developer or producer of specialized cybersecurity products or maintenance service provider for such products 3.3 security domain collection of assets and resources that comply with common security policies [Source: GB/T 25069-2022, 3.36] 3.4 personal information all kinds of information related to an identified or identifiable natural person, recorded by electronic means, excluding information that has been anonymized 3.5 user information information recorded by electronic means generated, collected, stored, transmitted or processed while any individual, legal person or other organization installs and uses specialized cybersecurity products Note: user information includes network traffic information, security status information, security configuration data, operation process logs, as well as personal information. 3.6 malicious program program with cyber-attack functions such as destroying networks and information systems, interfering with the normal use of networks and information systems, stealing or maliciously encrypting network and system data Note: malicious programs mainly include viruses, worms, Trojans, and other programs that affect the safe and stable operation of hosts, networks or systems. 3.7 security flaw weakness introduced by errors in design, development, configuration, production, operation and maintenance, etc., which may affect the security of specialized cybersecurity products 3.8 vulnerability weakness in specialized cybersecurity products that can be threatened and exploited 4 Security function requirements 4.1 Access control Specialized cybersecurity products with access control functions shall have the following functions: a) Supporting the configuration of access control policies;   Note: different types of specialized cybersecurity products have different access control policies. For example, for network-based firewalls, access control policies are set based on source addresses, destination addresses, source ports, destination ports and network communication protocols; for virtual specialized cybersecurity products, access control policies are set based on user security attributes; for security isolation and information exchange products, access control policies are set based on application layer protocols. b) Supporting the control over access to a secure domain based on an access control policy.
Contents of GB 42250-2022
Foreword II Introduction III 1 Scope 2 Normative references 3 Terms and definitions 4 Security function requirements 4.1 Access control 4.2 Intrusion prevention 4.3 Security audit 4.4 Prevention of malicious programs 5 Self-security requirements 5.1 Identification and authentication 5.2 Self-access control 5.3 Self-security audit 5.4 Communication security 5.5 Supporting system security 5.6 Product upgrade 5.7 User information security 5.8 Cryptographic requirements 6 Security assurance requirements 6.1 Supply chain security 6.2 Design and development 6.3 Production and delivery 6.4 Operation & maintenance service assurance 6.5 User information protection Bibliography
About Us   |    Contact Us   |    Terms of Service   |    Privacy   |    Cancellation & Refund Policy   |    Payment
Tel: +86-10-8572 5655 | Fax: +86-10-8581 9515 | Email: coc@codeofchina.com | QQ: 672269886
Copyright: Beijing COC Tech Co., Ltd. 2008-2040
 
 
Keywords:
GB 42250-2022, GB/T 42250-2022, GBT 42250-2022, GB42250-2022, GB 42250, GB42250, GB/T42250-2022, GB/T 42250, GB/T42250, GBT42250-2022, GBT 42250, GBT42250