2025-12-5 216.73.216.21
Code of China Chinese Classification Professional Classification ICS Classification Latest News Value-added Services

Position: Chinese Standard in English/GB/T 22239-2019
GB/T 22239-2019   Information security technology—Baseline for classified protection of cybersecurity (English Version)
Standard No.: GB/T 22239-2019 Status:valid remind me the status change

Email:

Target Language:English File Format:PDF
Word Count: 41000 words Translation Price(USD):480.0 remind me the price change

Email:

Implemented on:2019-12-1 Delivery: via email in 1 business day

→ → →

,,2019-12-1,B268E50ABD1A66951557898228994
Standard No.: GB/T 22239-2019
English Name: Information security technology—Baseline for classified protection of cybersecurity
Chinese Name: 信息安全技术 网络安全等级保护基本要求
Chinese Classification: L80    Data encryption
Professional Classification: GB    National Standard
Source Content Issued by: SAMR; SAC
Issued on: 2019-05-10
Implemented on: 2019-12-1
Status: valid
Superseding:GB/T 22239-2008 Information security technology - Baseline for classified protection of information system security
Target Language: English
File Format: PDF
Word Count: 41000 words
Translation Price(USD): 480.0
Delivery: via email in 1 business day
Codeofchina.com is in charge of this English translation. In case of any doubt about the English translation, the Chinese original shall be considered authoritative. This standard is developed in accordance with the rules given in GB/T 1.1-2009. This standard replaces GB/T 22239-2008 Information security technology - Baseline for classified protection of information system security and has the following main changes with respect to GB/T 22239-2008: ——The standard name is changed to Information security technology - Baseline for classified protection of cybersecurity. ——The classification is adjusted to secure physical environment, secure communication network, secure area boundary, secure computing environment, security management center, security management system, security management organization, security management personnel, secure construction management and secure operation and maintenance management. ——The security requirements of each level are adjusted to general security requirements, special security requirements for cloud computing, special security requirements for mobile communication, special security requirements for internet of things and special security requirements for industrial control system. ——Marks S, A and G of the original security control point are deleted; Annex A is added to describe the relationship between the classification result for targets of classified security and the security requirements, stating how to select security requirements according to the classification result. ——The sequence of Annex A and Annex B is adjusted; Annex C is added to describe the general framework of classified protection of cybersecurity and put forward the requirements for the use of key technologies. Attention is drawn to the possibility that some of the elements of this document may be the subject of patent rights. The issuing body of this document shall not be held responsible for identifying any or all such patent rights. This standard was proposed by and is under the jurisdiction of the National Information Security Standardization Technical Committee (SAC/TC 260). The previous edition of this standard is as follows: ——GB/T 22239-2008. Introduction With a view to cooperating with the implementation of Cybersecurity Law of the People's Republic of China and adapting to the proceeding of classified protection of cybersecurity under new technologies and applications such as cloud computing, mobile communication, internet of things, industrial control and big data, GB/T 22239-2008 shall be revised; the revision idea and method are to adjust the contents of GB/T 22239-2008, propose general security requirements in allusion to general security protection requirements and put forward special security requirements in allusion to individualized security protection requirements of new technologies and applications such as cloud computing, mobile communication, internet of things, industrial control and big data in order to form new standard of baseline for classified protection of cybersecurity. This standard is one of the series standards related to classified protection of cybersecurity. Standards in relation to this one include: ——GB/T 25058 Information security technology - Implementation guide for classified protection of information system; ——GB/T 22240 Information security technology - Classification guide for classified protection of information system security; ——GB/T 25070 Information security technology - Technical requirements of security design for classified protection of cybersecurity; ——GB/T 28448 Information security technology - Evaluation requirement for classified protection of cybersecurity; ——GB/T 28449 Information security technology - Testing and evaluation process guide for classified protection of cybersecurity. In the text of this standard, those in bold represent requirements added or strengthened in higher level. Information security technology - Baseline for classified protection of cybersecurity 1 Scope This standard specifies the general security requirements and special security requirements for the targets of classified security from Level 1 to Level 4 under the classified protection of cybersecurity. It applies to guide the security construction and supervisory management for classified non-secret-involved targets. Note: The Level 5 targets of classified security are very important objects for supervision and management. There are special management mode and security requirements proposed for them, which are not expatiated herein. 2 Normative references The following referenced documents are indispensable for the application of this document. For dated references, only the referenced edition is applicable. For undated references, the latest edition of the referenced document (including all amendments) is applicable. GB 17859 Classified criteria for security protection of computer information system GB/T 22240 Information security technology - Classification guide for classified protection of information system security GB/T 25069 Information security technology - Glossary GB/T 31167-2014 Information security technology - Security guide of cloud computing services GB/T 31168-2014 Information security technology - Security capability requirements of cloud computing services GB/T 32919-2016 Information security technology - Application guide to industrial control system security control 3 Terms and definitions For the purpose of this document, terms and definitions given in GB 17859, GB/T 22240, GB/T 25069, GB/T 31167-2014, GB/T 31168-2014 and GB/T 32919-2016 as well as the following ones are applicable to this document. For ease of use, some terms and definitions in GB/T 31167-2014, GB/T 31168-2014 and GB/T 32919-2016 are relisted as follows. 3.1 cybersecurity abilities to keep the network away from attack, intrusion, interference, damage, illegal use and unexpected accident, enable the network to operate stably and reliably and ensure the integrity, confidentiality and availability of network data by taking necessary measures 3.2 security protection ability extent for being protected against threat, detecting security incident, restoring to the previous state after damage, etc. 3.3 cloud computing mode of gaining access to extensible, flexible and shareable physical or virtual resource pools and acquiring, managing resources through on-demand self-service through Internet Note: Resource examples include the server, operating system, network, software, application, storage device, etc. [GB/T 31167-2014, definition 3.1] 3.4 cloud service provider provider of cloud computing service Note: The cloud service provider manages, operates and supports the computing infrastructure and software for cloud computing, and delivers cloud computing resources through Internet. [GB/T 31167-2014, definition 3.3] 3.5 cloud service customer participant entering into business relationship with the cloud service provider for cloud computing service [GB/T 31168-2014, definition 3.4] 3.6 cloud computing platform/system collection of cloud computing infrastructure and service software on it offered by the cloud service provider 3.7 hypervisor intermediate software layer running between the basic physical server and the operating system, which allow hardware sharing among multiple operating systems and applications 3.8 host machine physical server that runs the hypervisor 3.9 mobile communication process of connecting mobile devices to a wired network through wireless communication technology 3.10 mobile device terminal devices used in mobile services, including general terminal and special terminal devices such as smartphones, tablet computers and personal computers 3.11 wireless access device communication device that connects mobile devices to a wired network though wireless communication technology 3.12 wireless access gateway device deployed between a wireless network and a wired network to safeguard the wired network 3.13 mobile application application developed for mobile devices 3.14 mobile device management system specialized software for mobile device management, application management and content management, including client software and server software 3.15 internet of things system formed by connecting sensor nodes via Internet or other networks 3.16 sensor node device capable of acquiring information from and/or executing operation on objects or environment, as well as conducting network communication 3.17 sensor layer gateway device for summarizing, properly processing or integrating and forwarding the data collected from sensor node
Foreword i Introduction iii 1 Scope 2 Normative references 3 Terms and definitions 4 Abbreviations 5 Overview on classified protection of cybersecurity 5.1 Target of classified security 5.2 Different levels of security protection abilities 5.3 General security requirements and special security requirements 6 Level 1 security requirements 6.1 General security requirements 6.2 Special security requirements for cloud computing 6.3 Special security requirements for mobile communication 6.4 Special security requirements for IoT 6.5 Special security requirements for industrial control system 7 Level 2 security requirements 7.1 General security requirements 7.2 Special security requirements for cloud computing 7.3 Special security requirements for mobile communication 7.4 Special security requirements for IoT 7.5 Special security requirements for industrial control system 8 Level 3 security requirements 8.1 General security requirements 8.2 Special security requirements for cloud computing 8.3 Special security requirements for mobile communication 8.4 Special security requirements for IoT 8.5 Special security requirements for industrial control system 9 Level 4 security requirements 9.1 General security requirements 9.2 Special security requirements for cloud computing 9.3 Special security requirements for mobile interconnection 9.4 Special security requirements for IoT 9.5 Special security requirements for industrial control system 10 Level 5 security requirements Annex A (Normative) Selection and application for general security requirements and special security requirements Annex B (Normative) Requirements for the integral security protection ability of targets of classified security Annex C (Normative) Security framework of classified protection and operating requirements of key technology Annex D (Informative) Description of the application scenarios of cloud computing Annex E (Informative) Description of the application scenarios of mobile communication Annex F (Informative) Description of the application scenarios of IoT Annex G (Informative) Description of the application scenarios of industrial control system Annex H (Informative) Description of the application scenarios of big data Bibliography
Referred in GB/T 22239-2019:
*GB 17859-1999 Classified criteria for security protection of computer information system
*GB/T 22240-2020 Information security technology-Classification guide for classified protection of cy bersecurity
*GB/T 25069-2022 Information security techniques—Terminology
*GB/T 31167-2014 Information security technology—Security guide of cloud computing services
*GB/T 31168-2014 Information Security Technology - Security Capability Requirements of Cloud Computing Services
*GB/T 32919-2016 Information security - Industrial control systems - Guidelines for the application of security controls
*GB 3565-2005 Safety requirements for bicycles
*TSG 21-2016/XG1-2020 Supervision Regulation on Safety Technology for Stationary Pressure Vessel,includes Amendment 1
*GB 14748-2006 Safety Requirements for Wheeled Child Conveyances
*GB 2763-2021 National Food Safety Standard-Maximum Residue Limits for Pesticides in Food
*GB/T 22849-2014 Knitted T-shirt
*GB 4943.1-2011 Information technology equipment -Safety - Part 1: General requirements
*GB/T 95-2002 Plain washers - Product grade C
*GB/T 35590-2017 Information technology―General specification for portable digital equipments used power bank
*GB/T 2662-2008 Cotton wadded clothes
*GB/T 2662-2017 Clothes with fillings
*GB/T 14048.5-2017 Low-voltage switchgear and controlgear-Part 5-1:Control circuit devices and switching element-Electromechanical control circuit devices
*GB/T 18455-2022 Packaging recycling marking
*GB/T 2664-2009 Mens suits and coats
*GB/T 14272-2011 Down Garments
*GB/T 14272-2021 Down garments
*GB 4706.1-2005 Household and Similar Electrical Appliances – Safety - Part 1: General Requirements
*GB 4806.7-2016 National Food Safety Standard - Food Contact Plastic Materials and Articles
*GB 18401-2003 National General Safety Technical Code for Textile Products
*GB 18401-2010 National general safety technical code for textile products
GB/T 22239-2019 is referred in:
*GA/T 1688-2020 Specifications for maintenance of inspection and monitoring systems for police supervision areas
*GB/T 38961-2020 Personal health information code-Reference model
*GB/T 28448-2019 Information security technology—Evaluation requirement for classified protection of cybersecurity
*GB/T 25058-2019 Information security technology—Implementation guide for classified protection of cybersecurity
*JT/T 1417-2022 Baseline for classified protection of cybersecurity of transportation
*JT/T 1418-2022 Technical specification for cybersecurity monitoring and warning system of transportation
*GB/T 39725-2020 Information security technology—Guide for health data security
*GB/T 37372-2019 Communication technology requirements for traffic data broadcasting
*GB/T 25070-2019 Information security technology—Technical requirements of security design for classified protection of cybersecurity
*GB/T 41594-2022 Technical requirements for comprehensive emergency command system of urban rail transit network
*GB/T 42154-2022 Technical guideline for power quality monitoring in distribution network
*GB/T 42322-2023 Energy internet system—Interconnection of active distribution network
*GB/T 22240-2020 Information security technology-Classification guide for classified protection of cy bersecurity
*GB/T 28449-2018 Information security technology-Testing and evaluation process guide for classified protection of cybersecurity
*GB/T 36627-2018 Information security technology—Testing and evaluation technical guide for classified cybersecurity protection
*GB/T 43758.1-2024 Technical specifications for driving safety test environment for intelligent and connected vehicles—Part 1: Public road
*GB/T 43526-2023 Technical requirements for connecting user-side electrochemical energy storage system to distribution network
*GB/T 43528-2023 Communication technical requirements for electrochemical energy storage battery management
*GB/T 42726-2023 Specification of supervision and control system for electrochemical energy storage station
*GB/T 44163-2024 Information technology—Technical requirements for online game minor guardianship system
*GB/T 36547-2024 Technical requirements for connecting electrochemical energy storage station to power grid
*GB/T 19964-2024 Technical requirements for connecting photovoltaic power station to power system
*GB/T 44638-2024 Specification for interaction between energy internet and electric vehicle
*GB/T 19963.1-2021 Technical specification for connecting wind farm to power system—Part 1: On shore wind power
*GB/T 45132-2025 Tires intelligent manufacturing—Interconnection network architecture—General specification
Code of China
Standard
GB/T 22239-2019  Information security technology—Baseline for classified protection of cybersecurity (English Version)
Standard No.GB/T 22239-2019
Statusvalid
LanguageEnglish
File FormatPDF
Word Count41000 words
Price(USD)480.0
Implemented on2019-12-1
Deliveryvia email in 1 business day
Detail of GB/T 22239-2019
Standard No.
GB/T 22239-2019
English Name
Information security technology—Baseline for classified protection of cybersecurity
Chinese Name
信息安全技术 网络安全等级保护基本要求
Chinese Classification
L80
Professional Classification
GB
ICS Classification
Issued by
SAMR; SAC
Issued on
2019-05-10
Implemented on
2019-12-1
Status
valid
Superseded by
Superseded on
Abolished on
Superseding
GB/T 22239-2008 Information security technology - Baseline for classified protection of information system security
Language
English
File Format
PDF
Word Count
41000 words
Price(USD)
480.0
Keywords
GB/T 22239-2019, GB 22239-2019, GBT 22239-2019, GB/T22239-2019, GB/T 22239, GB/T22239, GB22239-2019, GB 22239, GB22239, GBT22239-2019, GBT 22239, GBT22239
Introduction of GB/T 22239-2019
Codeofchina.com is in charge of this English translation. In case of any doubt about the English translation, the Chinese original shall be considered authoritative. This standard is developed in accordance with the rules given in GB/T 1.1-2009. This standard replaces GB/T 22239-2008 Information security technology - Baseline for classified protection of information system security and has the following main changes with respect to GB/T 22239-2008: ——The standard name is changed to Information security technology - Baseline for classified protection of cybersecurity. ——The classification is adjusted to secure physical environment, secure communication network, secure area boundary, secure computing environment, security management center, security management system, security management organization, security management personnel, secure construction management and secure operation and maintenance management. ——The security requirements of each level are adjusted to general security requirements, special security requirements for cloud computing, special security requirements for mobile communication, special security requirements for internet of things and special security requirements for industrial control system. ——Marks S, A and G of the original security control point are deleted; Annex A is added to describe the relationship between the classification result for targets of classified security and the security requirements, stating how to select security requirements according to the classification result. ——The sequence of Annex A and Annex B is adjusted; Annex C is added to describe the general framework of classified protection of cybersecurity and put forward the requirements for the use of key technologies. Attention is drawn to the possibility that some of the elements of this document may be the subject of patent rights. The issuing body of this document shall not be held responsible for identifying any or all such patent rights. This standard was proposed by and is under the jurisdiction of the National Information Security Standardization Technical Committee (SAC/TC 260). The previous edition of this standard is as follows: ——GB/T 22239-2008. Introduction With a view to cooperating with the implementation of Cybersecurity Law of the People's Republic of China and adapting to the proceeding of classified protection of cybersecurity under new technologies and applications such as cloud computing, mobile communication, internet of things, industrial control and big data, GB/T 22239-2008 shall be revised; the revision idea and method are to adjust the contents of GB/T 22239-2008, propose general security requirements in allusion to general security protection requirements and put forward special security requirements in allusion to individualized security protection requirements of new technologies and applications such as cloud computing, mobile communication, internet of things, industrial control and big data in order to form new standard of baseline for classified protection of cybersecurity. This standard is one of the series standards related to classified protection of cybersecurity. Standards in relation to this one include: ——GB/T 25058 Information security technology - Implementation guide for classified protection of information system; ——GB/T 22240 Information security technology - Classification guide for classified protection of information system security; ——GB/T 25070 Information security technology - Technical requirements of security design for classified protection of cybersecurity; ——GB/T 28448 Information security technology - Evaluation requirement for classified protection of cybersecurity; ——GB/T 28449 Information security technology - Testing and evaluation process guide for classified protection of cybersecurity. In the text of this standard, those in bold represent requirements added or strengthened in higher level. Information security technology - Baseline for classified protection of cybersecurity 1 Scope This standard specifies the general security requirements and special security requirements for the targets of classified security from Level 1 to Level 4 under the classified protection of cybersecurity. It applies to guide the security construction and supervisory management for classified non-secret-involved targets. Note: The Level 5 targets of classified security are very important objects for supervision and management. There are special management mode and security requirements proposed for them, which are not expatiated herein. 2 Normative references The following referenced documents are indispensable for the application of this document. For dated references, only the referenced edition is applicable. For undated references, the latest edition of the referenced document (including all amendments) is applicable. GB 17859 Classified criteria for security protection of computer information system GB/T 22240 Information security technology - Classification guide for classified protection of information system security GB/T 25069 Information security technology - Glossary GB/T 31167-2014 Information security technology - Security guide of cloud computing services GB/T 31168-2014 Information security technology - Security capability requirements of cloud computing services GB/T 32919-2016 Information security technology - Application guide to industrial control system security control 3 Terms and definitions For the purpose of this document, terms and definitions given in GB 17859, GB/T 22240, GB/T 25069, GB/T 31167-2014, GB/T 31168-2014 and GB/T 32919-2016 as well as the following ones are applicable to this document. For ease of use, some terms and definitions in GB/T 31167-2014, GB/T 31168-2014 and GB/T 32919-2016 are relisted as follows. 3.1 cybersecurity abilities to keep the network away from attack, intrusion, interference, damage, illegal use and unexpected accident, enable the network to operate stably and reliably and ensure the integrity, confidentiality and availability of network data by taking necessary measures 3.2 security protection ability extent for being protected against threat, detecting security incident, restoring to the previous state after damage, etc. 3.3 cloud computing mode of gaining access to extensible, flexible and shareable physical or virtual resource pools and acquiring, managing resources through on-demand self-service through Internet Note: Resource examples include the server, operating system, network, software, application, storage device, etc. [GB/T 31167-2014, definition 3.1] 3.4 cloud service provider provider of cloud computing service Note: The cloud service provider manages, operates and supports the computing infrastructure and software for cloud computing, and delivers cloud computing resources through Internet. [GB/T 31167-2014, definition 3.3] 3.5 cloud service customer participant entering into business relationship with the cloud service provider for cloud computing service [GB/T 31168-2014, definition 3.4] 3.6 cloud computing platform/system collection of cloud computing infrastructure and service software on it offered by the cloud service provider 3.7 hypervisor intermediate software layer running between the basic physical server and the operating system, which allow hardware sharing among multiple operating systems and applications 3.8 host machine physical server that runs the hypervisor 3.9 mobile communication process of connecting mobile devices to a wired network through wireless communication technology 3.10 mobile device terminal devices used in mobile services, including general terminal and special terminal devices such as smartphones, tablet computers and personal computers 3.11 wireless access device communication device that connects mobile devices to a wired network though wireless communication technology 3.12 wireless access gateway device deployed between a wireless network and a wired network to safeguard the wired network 3.13 mobile application application developed for mobile devices 3.14 mobile device management system specialized software for mobile device management, application management and content management, including client software and server software 3.15 internet of things system formed by connecting sensor nodes via Internet or other networks 3.16 sensor node device capable of acquiring information from and/or executing operation on objects or environment, as well as conducting network communication 3.17 sensor layer gateway device for summarizing, properly processing or integrating and forwarding the data collected from sensor node
Contents of GB/T 22239-2019
Foreword i Introduction iii 1 Scope 2 Normative references 3 Terms and definitions 4 Abbreviations 5 Overview on classified protection of cybersecurity 5.1 Target of classified security 5.2 Different levels of security protection abilities 5.3 General security requirements and special security requirements 6 Level 1 security requirements 6.1 General security requirements 6.2 Special security requirements for cloud computing 6.3 Special security requirements for mobile communication 6.4 Special security requirements for IoT 6.5 Special security requirements for industrial control system 7 Level 2 security requirements 7.1 General security requirements 7.2 Special security requirements for cloud computing 7.3 Special security requirements for mobile communication 7.4 Special security requirements for IoT 7.5 Special security requirements for industrial control system 8 Level 3 security requirements 8.1 General security requirements 8.2 Special security requirements for cloud computing 8.3 Special security requirements for mobile communication 8.4 Special security requirements for IoT 8.5 Special security requirements for industrial control system 9 Level 4 security requirements 9.1 General security requirements 9.2 Special security requirements for cloud computing 9.3 Special security requirements for mobile interconnection 9.4 Special security requirements for IoT 9.5 Special security requirements for industrial control system 10 Level 5 security requirements Annex A (Normative) Selection and application for general security requirements and special security requirements Annex B (Normative) Requirements for the integral security protection ability of targets of classified security Annex C (Normative) Security framework of classified protection and operating requirements of key technology Annex D (Informative) Description of the application scenarios of cloud computing Annex E (Informative) Description of the application scenarios of mobile communication Annex F (Informative) Description of the application scenarios of IoT Annex G (Informative) Description of the application scenarios of industrial control system Annex H (Informative) Description of the application scenarios of big data Bibliography
About Us   |    Contact Us   |    Terms of Service   |    Privacy   |    Cancellation & Refund Policy   |    Payment
Tel: +86-10-8572 5655 | Fax: +86-10-8581 9515 | Email: coc@codeofchina.com | QQ: 672269886
Copyright: Beijing COC Tech Co., Ltd. 2008-2040
 
 
Keywords:
GB/T 22239-2019, GB 22239-2019, GBT 22239-2019, GB/T22239-2019, GB/T 22239, GB/T22239, GB22239-2019, GB 22239, GB22239, GBT22239-2019, GBT 22239, GBT22239