2025-12-5 216.73.216.21
Code of China Chinese Classification Professional Classification ICS Classification Latest News Value-added Services

Position: Chinese Standard in English/GB/T 35274-2017
GB/T 35274-2017   Information security technology—Security capability requirements for big data services (English Version)
Standard No.: GB/T 35274-2017 Status:superseded remind me the status change

Email:

Target Language:English File Format:PDF
Word Count: 14500 words Translation Price(USD):360.0 remind me the price change

Email:

Implemented on:2018-7-1 Delivery: via email in 1 business day

→ → →

,2024-3-1,2018-7-1,A5DFFAE218AC87D91531148790670
Standard No.: GB/T 35274-2017
English Name: Information security technology—Security capability requirements for big data services
Chinese Name: 信息安全技术 大数据服务安全能力要求
Chinese Classification: L80    Data encryption
Professional Classification: GB    National Standard
Source Content Issued by: AQSIQ; SAC
Issued on: 2017-12-29
Implemented on: 2018-7-1
Status: superseded
Superseded by:GB/T 35274-2023 Information security technology—Security capability requirements for big data services
Superseded on:2024-3-1
Target Language: English
File Format: PDF
Word Count: 14500 words
Translation Price(USD): 360.0
Delivery: via email in 1 business day
Codeofchina.com is in charge of this English translation. In case of any doubt about the English translation, the Chinese original shall be considered authoritative. This standard is developed in accordance with the rules given in GB/T 1.1-2009. Attention is drawn to the possibility that some of the elements of this document may be the subject of patent rights. The issuing body of this document shall not be held responsible for identifying any or all such patent rights. This standard was proposed by and is under the jurisdiction of the National Technical Committee on Information Security of Standardization Administration of China (SAC/TC 260).   Introduction Big data service is a kind of network information service that covers data activities related to the data lifecycle through scalable big data platform at the bottom layer and multiple big data applications at the upper layer, aiming at the data sets with huge quantity, diverse types, fast flow speed, changeable characteristics, etc. Big data service providers shall ensure the secure and reliable operation of big data platform and applications and meet the security objectives of big data services such as confidentiality, integrity and availability. This standard divides the security capabilities of big data service into two levels: general requirements and enhanced requirements. General requirements refer to that big data service providers are capable of resisting or dealing with common threats, controlling the losses of big data services after being damaged within a limited range and degree, and also have the basic incident traceability capability when developing big data services. Enhanced requirements refer to that the big data service providers are capable of actively identifying and preventing potential attacks, effectively dealing with security incidents and controlling their losses to a small extent, and ensuring the effectiveness of security incident tracing as well as the reliability, extendibility and scalability of big data services when the big data service is related to national security or has a greater impact on economic development and social and public interests. The security capability requirements for big data service providers are also different according to the importance of the data carried and the extent and severity of the impact that the big data service may cause when the service is not normally provided or is damaged. Information security technology - Security capability requirements for big data services 1 Scope This standard specifies the organization-related basic security capabilities and data lifecycle-related data service security capabilities that big data service providers shall have. This standard is applicable to the construction of big data service security capabilities by government departments, enterprises and institutions, as well as the review and evaluation on big data service security capabilities of big data service providers by third-party organizations. 2 Normative references The following referenced documents are indispensable for the application of this document. For dated references, only the edition cited applies. For undated references, the latest edition of the referenced document (including any amendments) applies. GB/T 22239-2008 Information security technology - Baseline for classified protection of information system security GB/T 25069-2010 Information security technology - Glossary GB/T 31168-2014 Information security technology - Security capability requirements of cloud computing services GB/T 35273-2017 Information security technology - Personal information security specification GB/T 35295-2017 Information technology - Big data - Terminology 3 Terms and definitions For the purposes of this document, the terms and definitions given in GB/T 25069-2010 and GB/T 35295-2017 as well as the following apply. 3.1 big data the data set that is featured by huge quantity, diverse types, fast flow speed, changeable characteristics, etc., and is difficult to be effectively organized, stored, computed, analyzed and managed by using the traditional data architecture and data processing technology 3.2 data lifecycle an evolution process of data including various survival forms from data generation, through acquisition, transmission, storage, processing (including computing, analysis, visualization, etc.), interchange, and to destruction, etc. 3.3 data service a kind of network information service providing evolution of data survival forms such as data acquisition, transmission, storage, processing (including computing, analysis, visualization, etc.), interchange and destruction 3.4 big data service various data lifecycle-related data services and system services supporting organizations or individuals to collect, store, use and discover the value of big data Note: Big data service generally faces structured, semi-structured and unstructured data services that are massive, heterogeneous and rapidly changing, and is provided through scalable big data platform at the bottom layer and multiple big data applications at the upper layer 3.5 big data application various application systems operating on the big data platform to perform various data lifecycle-related data activities such as data acquisition, transmission, storage, processing (including computing, analysis, visualization, etc.), interchange and destruction and to provide big data services 3.6 big data platform a set of software and hardware with distributed storage and computing technologies to provide access to and processing of big data and to support secure and efficient operation of big data applications, including monitoring the software and hardware infrastructure of big data services such as storage, input/output (I/O), and operation control of big data 3.7 big data service provider organizations that provide big data services through big data platforms and applications 3.8 big data consumer end users and other information technology systems or intelligent sensing devices using big data platforms or applications 3.9 big data system information system including big data consumers, big data service providers, big data applications and big data platforms 3.10 data supply chain a chain-like structure formed by available data resources required for planning, coordinating, operating, controlling and optimizing the data collection, preprocessing, aggregation, interchange, access and other related data activities of big data service providers Note: The goal of the data supply chain is to make the big data service providers deliver all kinds of data and system assets required for big data services to the right big data consumers at the right time and in accordance with the right data service agreement by data activities such as planning, coordination, operating, controlling and optimizing. 3.11 data interchange a process of realizing flow of data resources between different platforms and applications with corresponding technologies according to certain principles so as to meet the needs of transmission and processing of data resources between different platforms or applications 3.12 data sharing a kind of technology allowing different big data consumers to have access to various data resources integrated by big data service and also carry out relevant computing, analysis, visualization and other processing on these data resources through big data service or data interchange technology 3.13 important data data collected and generated by Chinese organizations and individuals within the territory of PRC which do not involve state secrets, but are closely related to national security, economic development and public interests Note: Important data usually refer to the data (including original data and derivative data) collected and generated by various organizations in important industries and fields such as public communication and information services, energy, transportation, water conservancy, finance, public service and e-government in the course of their business activities, which do not involve state secrets, but once leaked, tampered or abused, will adversely affect national security, economic development and social and public interests. 4 Overview 4.1 General requirements Big data service providers shall take necessary security control measures for big data service infrastructure from the perspective of information technology (IT) according to GB/T 31168-2014 and GB/T 22239-2008 to ensure the secure and reliable operation of system services of big data platforms and applications and the business mission of big data services. This standard only specifies the basic security requirements and data service security requirements that the organizations providing big data services through big data platforms and applications shall have: a) Basic security requirements: Big data service providers shall create big data service security policies and procedures, establish system and data asset lists, organizations and personnel positions, and form metadata structures that satisfy big data services, data supply chain structures and data service interface specifications that meet business processes, and basic security capability requirements for big data services that meet the requirements of laws, regulations and related standards through security planning and demand analysis of big data services. b) Data service security requirements: Big data service providers shall form security requirements for data services such as data acquisition, transmission, storage, processing, interchange and destruction according to the data lifecycle-related data activities, so as to reduce security risks related to data lifecycle security management in big data services and ensure the business mission and data security of big data services. Big data service providers shall select the big data service security capability requirements listed herein for construction and evaluation according to the data protection value and types of big data services, and in combination with their own big data service modes, roles, objectives and supporting infrastructure (see Annex A). Note: The data resources involved in big data services may depend on the data services or system services of other organizations, then big data service providers shall stipulate and implement the corresponding security responsibilities of all participants in the supply chain through contracts, agreements or other means, requiring them to have the security protection capability equivalent to that of big data service providers. 4.2 Classification of requirements This standard divides the security capabilities of big data service into general requirements and enhanced requirements. Big data service providers shall follow the following protection requirements according to the importance of the data carried by big data systems and the extent and severity of impact that big data service anomalies may cause:
Foreword II Introduction III 1 Scope 2 Normative references 3 Terms and definitions 4 Overview 4.1 General requirements 4.2 Classification of requirements 5 Basic security requirements 5.1 Policies and procedures 5.2 Data and system assets 5.3 Organization and personnel management 5.4 Service planning and management 5.5 Data supply chain management 5.6 Compliance management 6 Data service security requirements 6.1 Data acquisition 6.2 Data transmission 6.3 Data storage 6.4 Data processing 6.5 Data interchange 6.6 Data destruction Annex A (Informative) Big data service model, user roles and business objectives Bibliography
Referred in GB/T 35274-2017:
*GB/T 22239-2008 Information security technology - Baseline for classified protection of information system security
*GB/T 25069-2010 Information security technology—Glossary
*GB/T 31168-2014 Information Security Technology - Security Capability Requirements of Cloud Computing Services
*GB/T 35273-2017 Information security technology—Personal information security specification
*GB/T 35295-2017 Information technology—Big data—Terminology
*GB 2762-2022 National Food Safety Standard - Maximum Levels of Contaminants in Foods
*GB/T 8897.2-2021 Primary batteries—Part 2: Physical and electrical specifications
*FZ/T 81007-2003 Casual wear
*GB 8898-2011 Audio,video and similar electronic apparatus—Safety requirements
*GB/T 22849-2014 Knitted T-shirt
*FZ/T 81007-2012 Casual wear
*GB/T 8163-2018 Seamless steel pipes for liquid service
*GA 374-2019 Burglary-resistant electronic locks
*GB 50009-2012 Load Code for the Design of Building Structures
*GB/T 26572-2011 Requirements of concentration limits for certain restricted substances in electrical and electronic products
*GB 4806.7-2016 National Food Safety Standard - Food Contact Plastic Materials and Articles
*GB/T 1591-2018 High strength low alloy structural steels
*FZ/T 81006-2017 Jeanswear
*GB 2763-2021 National Food Safety Standard-Maximum Residue Limits for Pesticides in Food
*GB 9706.1-2020 Medical electrical equipment—Part 1: General requirements for basic safety and essential performance
*SJ/T 11364-2014/XG1-2017 Marking for the restriction of the use of hazardous substances in electrical and electronic product,including Amendment 1
*GB/T 32960.1-2016 Technical specifications of remote service and management system for electric vehicles—Part 1: General principle
*GB/T 22849-2014 Knitted T-shirt
GB/T 35274-2017 is referred in:
*GB/T 38961-2020 Personal health information code-Reference model
*GB/T 39725-2020 Information security technology—Guide for health data security
*GB/T 42755-2023 Artificial intelligence—Code of practice for data labeling of machine learning
Code of China
Standard
GB/T 35274-2017  Information security technology—Security capability requirements for big data services (English Version)
Standard No.GB/T 35274-2017
Statussuperseded
LanguageEnglish
File FormatPDF
Word Count14500 words
Price(USD)360.0
Implemented on2018-7-1
Deliveryvia email in 1 business day
Detail of GB/T 35274-2017
Standard No.
GB/T 35274-2017
English Name
Information security technology—Security capability requirements for big data services
Chinese Name
信息安全技术 大数据服务安全能力要求
Chinese Classification
L80
Professional Classification
GB
ICS Classification
Issued by
AQSIQ; SAC
Issued on
2017-12-29
Implemented on
2018-7-1
Status
superseded
Superseded by
GB/T 35274-2023 Information security technology—Security capability requirements for big data services
Superseded on
2024-3-1
Abolished on
Superseding
Language
English
File Format
PDF
Word Count
14500 words
Price(USD)
360.0
Keywords
GB/T 35274-2017, GB 35274-2017, GBT 35274-2017, GB/T35274-2017, GB/T 35274, GB/T35274, GB35274-2017, GB 35274, GB35274, GBT35274-2017, GBT 35274, GBT35274
Introduction of GB/T 35274-2017
Codeofchina.com is in charge of this English translation. In case of any doubt about the English translation, the Chinese original shall be considered authoritative. This standard is developed in accordance with the rules given in GB/T 1.1-2009. Attention is drawn to the possibility that some of the elements of this document may be the subject of patent rights. The issuing body of this document shall not be held responsible for identifying any or all such patent rights. This standard was proposed by and is under the jurisdiction of the National Technical Committee on Information Security of Standardization Administration of China (SAC/TC 260).   Introduction Big data service is a kind of network information service that covers data activities related to the data lifecycle through scalable big data platform at the bottom layer and multiple big data applications at the upper layer, aiming at the data sets with huge quantity, diverse types, fast flow speed, changeable characteristics, etc. Big data service providers shall ensure the secure and reliable operation of big data platform and applications and meet the security objectives of big data services such as confidentiality, integrity and availability. This standard divides the security capabilities of big data service into two levels: general requirements and enhanced requirements. General requirements refer to that big data service providers are capable of resisting or dealing with common threats, controlling the losses of big data services after being damaged within a limited range and degree, and also have the basic incident traceability capability when developing big data services. Enhanced requirements refer to that the big data service providers are capable of actively identifying and preventing potential attacks, effectively dealing with security incidents and controlling their losses to a small extent, and ensuring the effectiveness of security incident tracing as well as the reliability, extendibility and scalability of big data services when the big data service is related to national security or has a greater impact on economic development and social and public interests. The security capability requirements for big data service providers are also different according to the importance of the data carried and the extent and severity of the impact that the big data service may cause when the service is not normally provided or is damaged. Information security technology - Security capability requirements for big data services 1 Scope This standard specifies the organization-related basic security capabilities and data lifecycle-related data service security capabilities that big data service providers shall have. This standard is applicable to the construction of big data service security capabilities by government departments, enterprises and institutions, as well as the review and evaluation on big data service security capabilities of big data service providers by third-party organizations. 2 Normative references The following referenced documents are indispensable for the application of this document. For dated references, only the edition cited applies. For undated references, the latest edition of the referenced document (including any amendments) applies. GB/T 22239-2008 Information security technology - Baseline for classified protection of information system security GB/T 25069-2010 Information security technology - Glossary GB/T 31168-2014 Information security technology - Security capability requirements of cloud computing services GB/T 35273-2017 Information security technology - Personal information security specification GB/T 35295-2017 Information technology - Big data - Terminology 3 Terms and definitions For the purposes of this document, the terms and definitions given in GB/T 25069-2010 and GB/T 35295-2017 as well as the following apply. 3.1 big data the data set that is featured by huge quantity, diverse types, fast flow speed, changeable characteristics, etc., and is difficult to be effectively organized, stored, computed, analyzed and managed by using the traditional data architecture and data processing technology 3.2 data lifecycle an evolution process of data including various survival forms from data generation, through acquisition, transmission, storage, processing (including computing, analysis, visualization, etc.), interchange, and to destruction, etc. 3.3 data service a kind of network information service providing evolution of data survival forms such as data acquisition, transmission, storage, processing (including computing, analysis, visualization, etc.), interchange and destruction 3.4 big data service various data lifecycle-related data services and system services supporting organizations or individuals to collect, store, use and discover the value of big data Note: Big data service generally faces structured, semi-structured and unstructured data services that are massive, heterogeneous and rapidly changing, and is provided through scalable big data platform at the bottom layer and multiple big data applications at the upper layer 3.5 big data application various application systems operating on the big data platform to perform various data lifecycle-related data activities such as data acquisition, transmission, storage, processing (including computing, analysis, visualization, etc.), interchange and destruction and to provide big data services 3.6 big data platform a set of software and hardware with distributed storage and computing technologies to provide access to and processing of big data and to support secure and efficient operation of big data applications, including monitoring the software and hardware infrastructure of big data services such as storage, input/output (I/O), and operation control of big data 3.7 big data service provider organizations that provide big data services through big data platforms and applications 3.8 big data consumer end users and other information technology systems or intelligent sensing devices using big data platforms or applications 3.9 big data system information system including big data consumers, big data service providers, big data applications and big data platforms 3.10 data supply chain a chain-like structure formed by available data resources required for planning, coordinating, operating, controlling and optimizing the data collection, preprocessing, aggregation, interchange, access and other related data activities of big data service providers Note: The goal of the data supply chain is to make the big data service providers deliver all kinds of data and system assets required for big data services to the right big data consumers at the right time and in accordance with the right data service agreement by data activities such as planning, coordination, operating, controlling and optimizing. 3.11 data interchange a process of realizing flow of data resources between different platforms and applications with corresponding technologies according to certain principles so as to meet the needs of transmission and processing of data resources between different platforms or applications 3.12 data sharing a kind of technology allowing different big data consumers to have access to various data resources integrated by big data service and also carry out relevant computing, analysis, visualization and other processing on these data resources through big data service or data interchange technology 3.13 important data data collected and generated by Chinese organizations and individuals within the territory of PRC which do not involve state secrets, but are closely related to national security, economic development and public interests Note: Important data usually refer to the data (including original data and derivative data) collected and generated by various organizations in important industries and fields such as public communication and information services, energy, transportation, water conservancy, finance, public service and e-government in the course of their business activities, which do not involve state secrets, but once leaked, tampered or abused, will adversely affect national security, economic development and social and public interests. 4 Overview 4.1 General requirements Big data service providers shall take necessary security control measures for big data service infrastructure from the perspective of information technology (IT) according to GB/T 31168-2014 and GB/T 22239-2008 to ensure the secure and reliable operation of system services of big data platforms and applications and the business mission of big data services. This standard only specifies the basic security requirements and data service security requirements that the organizations providing big data services through big data platforms and applications shall have: a) Basic security requirements: Big data service providers shall create big data service security policies and procedures, establish system and data asset lists, organizations and personnel positions, and form metadata structures that satisfy big data services, data supply chain structures and data service interface specifications that meet business processes, and basic security capability requirements for big data services that meet the requirements of laws, regulations and related standards through security planning and demand analysis of big data services. b) Data service security requirements: Big data service providers shall form security requirements for data services such as data acquisition, transmission, storage, processing, interchange and destruction according to the data lifecycle-related data activities, so as to reduce security risks related to data lifecycle security management in big data services and ensure the business mission and data security of big data services. Big data service providers shall select the big data service security capability requirements listed herein for construction and evaluation according to the data protection value and types of big data services, and in combination with their own big data service modes, roles, objectives and supporting infrastructure (see Annex A). Note: The data resources involved in big data services may depend on the data services or system services of other organizations, then big data service providers shall stipulate and implement the corresponding security responsibilities of all participants in the supply chain through contracts, agreements or other means, requiring them to have the security protection capability equivalent to that of big data service providers. 4.2 Classification of requirements This standard divides the security capabilities of big data service into general requirements and enhanced requirements. Big data service providers shall follow the following protection requirements according to the importance of the data carried by big data systems and the extent and severity of impact that big data service anomalies may cause:
Contents of GB/T 35274-2017
Foreword II Introduction III 1 Scope 2 Normative references 3 Terms and definitions 4 Overview 4.1 General requirements 4.2 Classification of requirements 5 Basic security requirements 5.1 Policies and procedures 5.2 Data and system assets 5.3 Organization and personnel management 5.4 Service planning and management 5.5 Data supply chain management 5.6 Compliance management 6 Data service security requirements 6.1 Data acquisition 6.2 Data transmission 6.3 Data storage 6.4 Data processing 6.5 Data interchange 6.6 Data destruction Annex A (Informative) Big data service model, user roles and business objectives Bibliography
About Us   |    Contact Us   |    Terms of Service   |    Privacy   |    Cancellation & Refund Policy   |    Payment
Tel: +86-10-8572 5655 | Fax: +86-10-8581 9515 | Email: coc@codeofchina.com | QQ: 672269886
Copyright: Beijing COC Tech Co., Ltd. 2008-2040
 
 
Keywords:
GB/T 35274-2017, GB 35274-2017, GBT 35274-2017, GB/T35274-2017, GB/T 35274, GB/T35274, GB35274-2017, GB 35274, GB35274, GBT35274-2017, GBT 35274, GBT35274