2025-12-5 216.73.216.21
Code of China Chinese Classification Professional Classification ICS Classification Latest News Value-added Services

Position: Chinese Standard in English/GB/T 31722-2015
GB/T 31722-2015   Information technology―Security techniques―Information security risk management (English Version)
Standard No.: GB/T 31722-2015 Status:to be superseded remind me the status change

Email:

Target Language:English File Format:PDF
Word Count: 22500 words Translation Price(USD):490.0 remind me the price change

Email:

Implemented on:2016-2-1 Delivery: via email in 1 business day

→ → →

,2026-2-1,2016-2-1,F3FE4B570B24DE3E1433828312210
Standard No.: GB/T 31722-2015
English Name: Information technology―Security techniques―Information security risk management
Chinese Name: 信息技术 安全技术 信息安全风险管理
Chinese Classification: L80    Data encryption
Professional Classification: GB    National Standard
Source Content Issued by: AQSIQ; SAC
Issued on: 2015-06-02
Implemented on: 2016-2-1
Status: to be superseded
Superseded by:GB/T 31722-2025
Superseded on:2026-2-1
Target Language: English
File Format: PDF
Word Count: 22500 words
Translation Price(USD): 490.0
Delivery: via email in 1 business day
1 Scope This standard provides guidelines for information security risk management. This standard supports the general concepts specified in GB/T 22080 and is designed to assist the satisfactory implementation of information security based on a risk management approach. Knowledge of the concepts, models, processes and terminologies described in GB/T 22080 and GB/T 22081 is important for a complete understanding of this standard. This standard is applicable to all types of organizations (e.g. commercial enterprises, government agencies, non-profit organizations) which intend to manage risks that could compromise the organization’s information security. 2 Normative References The following referenced documents are indispensable for the application of this document. For dated references, only the edition cited applies. For undated references, the latest edition of the referenced document (including any amendments) applies. GB/T 22080-2008 Information Technology — Security Techniques — Information Security Management Systems — Requirements (ISO/IEC 27001:2005, IDT) GB/T 22081-2008 Information Technology — Security Techniques — Code of Practice for Information Security Management (ISO/IEC 27002:2005, IDT) 3 Terms and Definitions For the purposes of this document, the terms and definitions given in GB/T 22080-2008 and GB/T 22081-2008 and the following apply. 3.1 impact adverse change to the level of business objectives achieved 3.2 information security risk potential that a given threat will exploit vulnerabilities of an asset or group of assets and thereby cause harm to the organization Note: It is measured in terms of a combination of the likelihood of an event and its consequence. 3.3 risk avoidance decision not to become involved in, or action to withdraw from, a risk situation [ISO/IEC Guide73:2002] 3.4 risk communication exchange or sharing of information about risk between the decision-maker and other stakeholders [ISO/IEC Guide73:2002] 3.5 risk estimation process to assign values to the probability and consequences of a risk [ISO/IEC Guide73:2002] 3.6 risk identification process to find, list and characterize elements of risk [ISO/IEC Guide73:2002] 3.7 risk reduction actions taken to lessen the probability, negative consequences, or both, associated with a risk [ISO/IEC Guide73:2002] 3.8 risk retention acceptance of the burden of loss or benefit of gain from a particular risk [ISO/IEC Guide73:2002] Note: In the context of information security risks, only negative consequences (losses) are considered for risk retention. 3.9 risk transfer sharing with another party the burden of loss or benefit of gain, for a risk [ISO/IEC Guide73:2002] Note: In the context of information security risks, only negative consequences (losses) are considered for risk transfer. 4 Structure of This Standard This standard contains the description of the information security risk management process and its activities. The background information is provided in Clause 5. A general overview of the information security risk management process is given in Clause 6. All information security risk management activities as presented in Clause 6 are subsequently described in the following clauses: • Context establishment in Clause 7; • Risk assessment in Clause 8; • Risk treatment in Clause 9; • Risk acceptance in Clause 10; • Risk communication in Clause 11; • Risk monitoring and review in Clause 12.
Foreword II Introduction III 1 Scope 2 Normative References 3 Terms and Definitions 4 Structure of This Standard 5 Background 6 Overview of the Information Security Risk Management Process 7 Context Establishment 8 Information Security Risk Assessment 9 Information Security Risk Treatment 10 Information Security Risk Acceptance 11 Information Security Risk Communication 12 Information Security Risk Monitoring and Review Annex A (Informative) Defining the Scope and Boundaries of the Information Security Risk Management Process Annex B (Informative) Identification and Valuation of Assets and Impact Assessment Annex C (Informative) Examples of Typical Threats Annex D (Informative) Vulnerabilities and Methods for Vulnerability Assessment Annex E (Informative) Information Security Risk Assessment Approaches Annex F (Informative) Constraints for Risk Reduction Bibliography
GB/T 31722-2015 is referred in:
*GB/T 38628-2020 Information security technology—Cybersecurity guide for automotive electronics systems
Code of China
Standard
GB/T 31722-2015  Information technology―Security techniques―Information security risk management (English Version)
Standard No.GB/T 31722-2015
Statusto be superseded
LanguageEnglish
File FormatPDF
Word Count22500 words
Price(USD)490.0
Implemented on2016-2-1
Deliveryvia email in 1 business day
Detail of GB/T 31722-2015
Standard No.
GB/T 31722-2015
English Name
Information technology―Security techniques―Information security risk management
Chinese Name
信息技术 安全技术 信息安全风险管理
Chinese Classification
L80
Professional Classification
GB
ICS Classification
Issued by
AQSIQ; SAC
Issued on
2015-06-02
Implemented on
2016-2-1
Status
to be superseded
Superseded by
GB/T 31722-2025
Superseded on
2026-2-1
Abolished on
Superseding
Language
English
File Format
PDF
Word Count
22500 words
Price(USD)
490.0
Keywords
GB/T 31722-2015, GB 31722-2015, GBT 31722-2015, GB/T31722-2015, GB/T 31722, GB/T31722, GB31722-2015, GB 31722, GB31722, GBT31722-2015, GBT 31722, GBT31722
Introduction of GB/T 31722-2015
1 Scope This standard provides guidelines for information security risk management. This standard supports the general concepts specified in GB/T 22080 and is designed to assist the satisfactory implementation of information security based on a risk management approach. Knowledge of the concepts, models, processes and terminologies described in GB/T 22080 and GB/T 22081 is important for a complete understanding of this standard. This standard is applicable to all types of organizations (e.g. commercial enterprises, government agencies, non-profit organizations) which intend to manage risks that could compromise the organization’s information security. 2 Normative References The following referenced documents are indispensable for the application of this document. For dated references, only the edition cited applies. For undated references, the latest edition of the referenced document (including any amendments) applies. GB/T 22080-2008 Information Technology — Security Techniques — Information Security Management Systems — Requirements (ISO/IEC 27001:2005, IDT) GB/T 22081-2008 Information Technology — Security Techniques — Code of Practice for Information Security Management (ISO/IEC 27002:2005, IDT) 3 Terms and Definitions For the purposes of this document, the terms and definitions given in GB/T 22080-2008 and GB/T 22081-2008 and the following apply. 3.1 impact adverse change to the level of business objectives achieved 3.2 information security risk potential that a given threat will exploit vulnerabilities of an asset or group of assets and thereby cause harm to the organization Note: It is measured in terms of a combination of the likelihood of an event and its consequence. 3.3 risk avoidance decision not to become involved in, or action to withdraw from, a risk situation [ISO/IEC Guide73:2002] 3.4 risk communication exchange or sharing of information about risk between the decision-maker and other stakeholders [ISO/IEC Guide73:2002] 3.5 risk estimation process to assign values to the probability and consequences of a risk [ISO/IEC Guide73:2002] 3.6 risk identification process to find, list and characterize elements of risk [ISO/IEC Guide73:2002] 3.7 risk reduction actions taken to lessen the probability, negative consequences, or both, associated with a risk [ISO/IEC Guide73:2002] 3.8 risk retention acceptance of the burden of loss or benefit of gain from a particular risk [ISO/IEC Guide73:2002] Note: In the context of information security risks, only negative consequences (losses) are considered for risk retention. 3.9 risk transfer sharing with another party the burden of loss or benefit of gain, for a risk [ISO/IEC Guide73:2002] Note: In the context of information security risks, only negative consequences (losses) are considered for risk transfer. 4 Structure of This Standard This standard contains the description of the information security risk management process and its activities. The background information is provided in Clause 5. A general overview of the information security risk management process is given in Clause 6. All information security risk management activities as presented in Clause 6 are subsequently described in the following clauses: • Context establishment in Clause 7; • Risk assessment in Clause 8; • Risk treatment in Clause 9; • Risk acceptance in Clause 10; • Risk communication in Clause 11; • Risk monitoring and review in Clause 12.
Contents of GB/T 31722-2015
Foreword II Introduction III 1 Scope 2 Normative References 3 Terms and Definitions 4 Structure of This Standard 5 Background 6 Overview of the Information Security Risk Management Process 7 Context Establishment 8 Information Security Risk Assessment 9 Information Security Risk Treatment 10 Information Security Risk Acceptance 11 Information Security Risk Communication 12 Information Security Risk Monitoring and Review Annex A (Informative) Defining the Scope and Boundaries of the Information Security Risk Management Process Annex B (Informative) Identification and Valuation of Assets and Impact Assessment Annex C (Informative) Examples of Typical Threats Annex D (Informative) Vulnerabilities and Methods for Vulnerability Assessment Annex E (Informative) Information Security Risk Assessment Approaches Annex F (Informative) Constraints for Risk Reduction Bibliography
About Us   |    Contact Us   |    Terms of Service   |    Privacy   |    Cancellation & Refund Policy   |    Payment
Tel: +86-10-8572 5655 | Fax: +86-10-8581 9515 | Email: coc@codeofchina.com | QQ: 672269886
Copyright: Beijing COC Tech Co., Ltd. 2008-2040
 
 
Keywords:
GB/T 31722-2015, GB 31722-2015, GBT 31722-2015, GB/T31722-2015, GB/T 31722, GB/T31722, GB31722-2015, GB 31722, GB31722, GBT31722-2015, GBT 31722, GBT31722