2025-12-5 216.73.216.21
Code of China Chinese Classification Professional Classification ICS Classification Latest News Value-added Services

Position: Chinese Standard in English/GB/T 25068.3-2022
GB/T 25068.3-2022   Information technology—Security techniques—Network security—Part 3: Threats, design techniques and control for network access scenarios (English Version)
Standard No.: GB/T 25068.3-2022 Status:valid remind me the status change

Email:

Target Language:English File Format:PDF
Word Count: 18500 words Translation Price(USD):555.0 remind me the price change

Email:

Implemented on:2023-5-1 Delivery: via email in 1~5 business day

→ → →

,,2023-5-1,5C696F3E904FFEE51668060395155
Standard No.: GB/T 25068.3-2022
English Name: Information technology—Security techniques—Network security—Part 3: Threats, design techniques and control for network access scenarios
Chinese Name: 信息技术 安全技术 网络安全 第3部分:面向网络接入场景的威胁、设计技术和控制
Chinese Classification: L80    Data encryption
Professional Classification: GB    National Standard
Source Content Issued by: SAMR; SAC
Issued on: 2022-10-12
Implemented on: 2023-5-1
Status: valid
Superseding:GB/T 25068.4-2010 Information technology—Security techniques—IT network security—Part 4:Securing remote access
Target Language: English
File Format: PDF
Word Count: 18500 words
Translation Price(USD): 555.0
Delivery: via email in 1~5 business day
Introduction The purpose of GB/T 25068 is to provide detailed guidance on the security aspects of the management, operation, use and interconnection of information systems networks and to facilitate the adoption of this document by those responsible for information security, particularly network security, within an organization to meet its specific needs. It is intended to consist of six parts. --Part 1: Overview and Concepts. The purpose is to present concepts related to network security and provide management guidance. --Part 2; Cybersecurity Design and Implementation Guidelines. The purpose is to provide guidance for organizations on how to plan, design, and implement a high-quality network security system to ensure that network security is appropriate for the appropriate business environment. --Part 3; network access scenario-oriented threats, design techniques and controls. The purpose is to list the specific risks associated with typical network access scenarios, design techniques and controls, applicable to all involved in the planning, design and implementation of network security architecture. --Part 4: Inter-network communication security protection using secure gateways. The purpose is to ensure the use of security gateways for inter-network communication security. --Part 5: The use of virtual private network cross-network communications security protection. The purpose is to define the specific risks, design techniques, and control elements for establishing secure connections using virtual private networks. --Part 6:Wireless Network Access Security. The purpose is to provide guidance for the selection, implementation and monitoring of technical controls necessary to provide secure communications using wireless networks, and for the review and selection of technical security architecture or design options in part peal involving the use of wireless networks. GB/T 25068 is in GB/T 22081 "information technology security technology and plant information security control practice guide" on the basis of the further network security controls to provide detailed implementation guidance. GB/T 25068 only emphasizes the importance of business types and other factors affecting network security without specific instructions. This document involves the use of cryptographic technology to address the confidentiality, integrity, authenticity, resistance to repudiation needs, follow the password-related national standards and industry standards. 1 Scope This document describes the threats, design techniques and control issues associated with network access scenarios, providing a detailed guide to the three elements of security threats, security design techniques and controls that can reduce the risks associated with each network access scenario. This document applies to the review of technical security architecture and design in accordance with GB/T 25068.2, as well as the selection and documentation of preferred technical security architecture, design, and related control options. The characteristics of the network environment under review determine the selection of specific information (including information selected from GB/T 25068.4, GB/T 25068,5 and ISO/IEC 27033-6), i.e., the selection of specific information related to specific network access scenarios and "technical" topics. 2 Normative references The contents of the following documents constitute essential provisions of this document through the normative references in the text. Among them, note the date of the reference document, only the date of the corresponding version applies to this document; do not note the date of the reference document, its latest version (including all the change orders) applies to this document. GB/T 29246 Information technology security technology Information security management system Overview and vocabulary (GB/T 29246-2017, ISO/IEC 27000:2016,IDT) GB/T 25068.1 Information technology Security technology network security Part 1: Overview and concepts (GB/T 25068.1-2020,ISO/IEC 27033-1:2015,IDT) 3 Terms and definitions GB/T 29246,GB/T 25068.1 defined as well as the following terms and definitions apply to this document. 3.1 Malware A category of software with malicious design, containing features or functions that may directly or indirectly cause potential harm to the user or the user's computer system. [Source: ISO/IEC 27032:2012, 4.35] 3.2 Opaquenessopacity The information that may be obtained by monitoring network activity (e.g., obtaining the address of an endpoint in a VoIP call over the Internet) is given 4 Abbreviations The following acronyms apply to this document. 5 Document structure The structure of this document includes: --Provides an overview of network security protection methods for each reference network access scenario (see Chapter 6 for details) --Provides a detailed description of each reference scenario (see Chapter 1 to Chapter 15): -Describes the threats present in the reference scenario -Describes possible security controls and techniques based on the approach in Chapter 6. 6 Overview This document provides guidance for each of the identified reference network access scenarios based on the following methodology: -- Reviewing the background information and scope of the network access scenario; --Describing the threats associated with the network access scenario --Risk analysis of the identified vulnerabilities --Analysis of the business impact of potential vulnerabilities; --Identify implementation recommendations to protect the network. 7 Employee Internet Access Services 7.1 Background When organizations need to provide Internet access services for employees, the network access scenarios provided in this chapter can be used to ensure that employee access to the Internet is clear and has been authorized, rather than general open access. Organizations need to consider how to manage access rights to avoid the loss of network bandwidth due to uncontrolled access to the Internet by employees, and may even bear joint and several legal liability. 8 Business-to-Business Services 8.1 Background Organizations transacting with other organizations (such as manufacturers, wholesalers, retailers) are advised to consider the network access scenarios provided in this chapter. Generally, business-to-business services are achieved through leased private lines or network segments. The Internet and related technologies do provide more options, but the implementation of such services also introduces new security risks. The evolving B2B e-commerce model allows organizations to conduct business over the Internet, and applications focus on improving business partnerships (mutually known and registered) through the use of the Internet, extranets, or both, unlike in the case of business-to-customers. 9 Business-to-customer services 9.1 Context It is appropriate for organizations to consider the netro access scenarios provided in this chapter when transacting with customers. 10 Enhanced Collaboration Services 11Network segmentation 11.1 Context It is appropriate to consider the network access scenarios provided in this chapter when the organization divides its intranet into multiple domains according to its organizational structure. 12 Provide network gi line for home office and small business office 12.1 Context The network access scenarios provided in this chapter are appropriate to consider when organizations need to provide access to internal resources for employees in home offices or small offices. 13 Mobile Communications 13.1 Background The network access scenarios provided in this chapter are appropriate to consider when organizations allow employees to use mobile devices to access the network. This scenario is concerned with security issues when organizations use and deploy mobile devices and applications. While the consumer market is the primary driver for the rapid development of new features on mobile devices such as smartphones or PDAs, these features are equally applicable to business environments. Mobile devices are often private objects, but they are also used for business purposes. Sometimes agencies provide mobile devices, but also for personal use. Because device vendors want to get as much business as possible in a competitive market, devices for the business sector also need to introduce features that are available in the consumer market. 14 Network support for mobile users 15 Outsourcing services Appendix A (Informational) Threat Inventory Appendix B (Informative) Examples of Internet Usage Strategies Bibliography
Introduction 1 Scope 2 Normative references 3 Terms and definitions 4 Abbreviations 5 Document structure 6 Overview 7 Employee Internet Access Services 8 Business-to-Business Services 9 Business-to-customer services 10 Enhanced Collaboration Services 11Network segmentation 12 Provide network gi line for home office and small business office 13 Mobile Communications 14 Network support for mobile users 15 Outsourcing services Appendix A (Informational) Threat Inventory Appendix B (Informative) Examples of Internet Usage Strategies Bibliography
Referred in GB/T 25068.3-2022:
*GB/T 29246-2017 Information technology―Security techniques―Information security management systems―Overview and vocabulary
*GB/T 25068.1-2020 Information technology—Security techniques—Network security—Part 1:Overview and concepts
Code of China
Standard
GB/T 25068.3-2022  Information technology—Security techniques—Network security—Part 3: Threats, design techniques and control for network access scenarios (English Version)
Standard No.GB/T 25068.3-2022
Statusvalid
LanguageEnglish
File FormatPDF
Word Count18500 words
Price(USD)555.0
Implemented on2023-5-1
Deliveryvia email in 1~5 business day
Detail of GB/T 25068.3-2022
Standard No.
GB/T 25068.3-2022
English Name
Information technology—Security techniques—Network security—Part 3: Threats, design techniques and control for network access scenarios
Chinese Name
信息技术 安全技术 网络安全 第3部分:面向网络接入场景的威胁、设计技术和控制
Chinese Classification
L80
Professional Classification
GB
ICS Classification
Issued by
SAMR; SAC
Issued on
2022-10-12
Implemented on
2023-5-1
Status
valid
Superseded by
Superseded on
Abolished on
Superseding
GB/T 25068.4-2010 Information technology—Security techniques—IT network security—Part 4:Securing remote access
Language
English
File Format
PDF
Word Count
18500 words
Price(USD)
555.0
Keywords
GB/T 25068.3-2022, GB 25068.3-2022, GBT 25068.3-2022, GB/T25068.3-2022, GB/T 25068.3, GB/T25068.3, GB25068.3-2022, GB 25068.3, GB25068.3, GBT25068.3-2022, GBT 25068.3, GBT25068.3
Introduction of GB/T 25068.3-2022
Introduction The purpose of GB/T 25068 is to provide detailed guidance on the security aspects of the management, operation, use and interconnection of information systems networks and to facilitate the adoption of this document by those responsible for information security, particularly network security, within an organization to meet its specific needs. It is intended to consist of six parts. --Part 1: Overview and Concepts. The purpose is to present concepts related to network security and provide management guidance. --Part 2; Cybersecurity Design and Implementation Guidelines. The purpose is to provide guidance for organizations on how to plan, design, and implement a high-quality network security system to ensure that network security is appropriate for the appropriate business environment. --Part 3; network access scenario-oriented threats, design techniques and controls. The purpose is to list the specific risks associated with typical network access scenarios, design techniques and controls, applicable to all involved in the planning, design and implementation of network security architecture. --Part 4: Inter-network communication security protection using secure gateways. The purpose is to ensure the use of security gateways for inter-network communication security. --Part 5: The use of virtual private network cross-network communications security protection. The purpose is to define the specific risks, design techniques, and control elements for establishing secure connections using virtual private networks. --Part 6:Wireless Network Access Security. The purpose is to provide guidance for the selection, implementation and monitoring of technical controls necessary to provide secure communications using wireless networks, and for the review and selection of technical security architecture or design options in part peal involving the use of wireless networks. GB/T 25068 is in GB/T 22081 "information technology security technology and plant information security control practice guide" on the basis of the further network security controls to provide detailed implementation guidance. GB/T 25068 only emphasizes the importance of business types and other factors affecting network security without specific instructions. This document involves the use of cryptographic technology to address the confidentiality, integrity, authenticity, resistance to repudiation needs, follow the password-related national standards and industry standards. 1 Scope This document describes the threats, design techniques and control issues associated with network access scenarios, providing a detailed guide to the three elements of security threats, security design techniques and controls that can reduce the risks associated with each network access scenario. This document applies to the review of technical security architecture and design in accordance with GB/T 25068.2, as well as the selection and documentation of preferred technical security architecture, design, and related control options. The characteristics of the network environment under review determine the selection of specific information (including information selected from GB/T 25068.4, GB/T 25068,5 and ISO/IEC 27033-6), i.e., the selection of specific information related to specific network access scenarios and "technical" topics. 2 Normative references The contents of the following documents constitute essential provisions of this document through the normative references in the text. Among them, note the date of the reference document, only the date of the corresponding version applies to this document; do not note the date of the reference document, its latest version (including all the change orders) applies to this document. GB/T 29246 Information technology security technology Information security management system Overview and vocabulary (GB/T 29246-2017, ISO/IEC 27000:2016,IDT) GB/T 25068.1 Information technology Security technology network security Part 1: Overview and concepts (GB/T 25068.1-2020,ISO/IEC 27033-1:2015,IDT) 3 Terms and definitions GB/T 29246,GB/T 25068.1 defined as well as the following terms and definitions apply to this document. 3.1 Malware A category of software with malicious design, containing features or functions that may directly or indirectly cause potential harm to the user or the user's computer system. [Source: ISO/IEC 27032:2012, 4.35] 3.2 Opaquenessopacity The information that may be obtained by monitoring network activity (e.g., obtaining the address of an endpoint in a VoIP call over the Internet) is given 4 Abbreviations The following acronyms apply to this document. 5 Document structure The structure of this document includes: --Provides an overview of network security protection methods for each reference network access scenario (see Chapter 6 for details) --Provides a detailed description of each reference scenario (see Chapter 1 to Chapter 15): -Describes the threats present in the reference scenario -Describes possible security controls and techniques based on the approach in Chapter 6. 6 Overview This document provides guidance for each of the identified reference network access scenarios based on the following methodology: -- Reviewing the background information and scope of the network access scenario; --Describing the threats associated with the network access scenario --Risk analysis of the identified vulnerabilities --Analysis of the business impact of potential vulnerabilities; --Identify implementation recommendations to protect the network. 7 Employee Internet Access Services 7.1 Background When organizations need to provide Internet access services for employees, the network access scenarios provided in this chapter can be used to ensure that employee access to the Internet is clear and has been authorized, rather than general open access. Organizations need to consider how to manage access rights to avoid the loss of network bandwidth due to uncontrolled access to the Internet by employees, and may even bear joint and several legal liability. 8 Business-to-Business Services 8.1 Background Organizations transacting with other organizations (such as manufacturers, wholesalers, retailers) are advised to consider the network access scenarios provided in this chapter. Generally, business-to-business services are achieved through leased private lines or network segments. The Internet and related technologies do provide more options, but the implementation of such services also introduces new security risks. The evolving B2B e-commerce model allows organizations to conduct business over the Internet, and applications focus on improving business partnerships (mutually known and registered) through the use of the Internet, extranets, or both, unlike in the case of business-to-customers. 9 Business-to-customer services 9.1 Context It is appropriate for organizations to consider the netro access scenarios provided in this chapter when transacting with customers. 10 Enhanced Collaboration Services 11Network segmentation 11.1 Context It is appropriate to consider the network access scenarios provided in this chapter when the organization divides its intranet into multiple domains according to its organizational structure. 12 Provide network gi line for home office and small business office 12.1 Context The network access scenarios provided in this chapter are appropriate to consider when organizations need to provide access to internal resources for employees in home offices or small offices. 13 Mobile Communications 13.1 Background The network access scenarios provided in this chapter are appropriate to consider when organizations allow employees to use mobile devices to access the network. This scenario is concerned with security issues when organizations use and deploy mobile devices and applications. While the consumer market is the primary driver for the rapid development of new features on mobile devices such as smartphones or PDAs, these features are equally applicable to business environments. Mobile devices are often private objects, but they are also used for business purposes. Sometimes agencies provide mobile devices, but also for personal use. Because device vendors want to get as much business as possible in a competitive market, devices for the business sector also need to introduce features that are available in the consumer market. 14 Network support for mobile users 15 Outsourcing services Appendix A (Informational) Threat Inventory Appendix B (Informative) Examples of Internet Usage Strategies Bibliography
Contents of GB/T 25068.3-2022
Introduction 1 Scope 2 Normative references 3 Terms and definitions 4 Abbreviations 5 Document structure 6 Overview 7 Employee Internet Access Services 8 Business-to-Business Services 9 Business-to-customer services 10 Enhanced Collaboration Services 11Network segmentation 12 Provide network gi line for home office and small business office 13 Mobile Communications 14 Network support for mobile users 15 Outsourcing services Appendix A (Informational) Threat Inventory Appendix B (Informative) Examples of Internet Usage Strategies Bibliography
About Us   |    Contact Us   |    Terms of Service   |    Privacy   |    Cancellation & Refund Policy   |    Payment
Tel: +86-10-8572 5655 | Fax: +86-10-8581 9515 | Email: coc@codeofchina.com | QQ: 672269886
Copyright: Beijing COC Tech Co., Ltd. 2008-2040
 
 
Keywords:
GB/T 25068.3-2022, GB 25068.3-2022, GBT 25068.3-2022, GB/T25068.3-2022, GB/T 25068.3, GB/T25068.3, GB25068.3-2022, GB 25068.3, GB25068.3, GBT25068.3-2022, GBT 25068.3, GBT25068.3