2025-12-15 216.73.216.89
Code of China Chinese Classification Professional Classification ICS Classification Latest News Value-added Services

Position: Chinese Standard in English/GB/Z 41290-2022
GB/Z 41290-2022   Information security techniques—Guidelines for mobile internet security audit (English Version)
Standard No.: GB/Z 41290-2022 Status:valid remind me the status change

Email:

Target Language:English File Format:PDF
Word Count: 8500 words Translation Price(USD):255.0 remind me the price change

Email:

Implemented on:2022-10-1 Delivery: via email in 1~3 business day

→ → →

,,2022-10-1,46A3EDD2E8D873431648038379692
Standard No.: GB/Z 41290-2022
English Name: Information security techniques—Guidelines for mobile internet security audit
Chinese Name: 信息安全技术 移动互联网安全审计指南
Chinese Classification: L80    Data encryption
Professional Classification: GB    National Standard
Source Content Issued by: SAMR; SAC
Issued on: 2022-03-09
Implemented on: 2022-10-1
Status: valid
Target Language: English
File Format: PDF
Word Count: 8500 words
Translation Price(USD): 255.0
Delivery: via email in 1~3 business day
GB/Z 41290-2022 Information security techniques—Guidelines for mobile internet security audit 1 Scope This document provides guidance and recommendations on role responsibilities, audit scope, and audit content for mobile Internet security auditing activities, and gives information on the framework of security auditing activities, functional tasks, and their specific content. This document applies to the activities related to mobile Internet security auditing. 2 Normative references The contents of the following documents constitute the essential provisions of this document through the normative references in the text. Among them, the reference document with the date, only the version corresponding to the date is applicable to this document; the reference document without the date, its latest version (including all revision sheets) is applicable to this document. GB/ T 17143.6 -1997 Information Technology Open System Interconnection System Management Part 6: Log Control Function GB 17859 1999 Computer information system security protection level classification guidelines GB/ T 18336.2 -2015 Information Technology Security Technology Information Technology Security Assessment Guidelines Part 2: Security Function Components GB/ T 25069 Information security technical terms GB/ T 35281 2017 Information security technology mobile Internet application server security technical requirements 3 Terminology and definitions GB/ T 17143. 6-1997, GB 17859-1999, GB/ T 18336. 2 -2015, GB/ T 25069 and GB/ T 35281-2017 defined as well as the following terms and definitions apply to this document. 3. 1 mobile internet The open basic telecommunication network where users use mobile terminals (including cell phones, Internet cards, tablet PCs, smartbooks, etc.) to obtain mobile communication network services and Internet services through the mobile network. [来源 :GB/ T 35281-2017 , 3.1.1] 3.2 mobile internet security audit Events are recorded and analyzed, and actions are taken for specific events to compare accordingly. [来源 :GB/ T 20945 2013 , 3.2 ] 3.3 security audit domain In information systems and networks, the pooling of entities that are responsible for auditing under a single security audit policy for security audit subjects. 3.4 private data Data that is privately enjoyed by the subject of the security audit and needs to be protected. GB/ Z 4 1290-2022 Note: Improper use or unauthorized modification of this data by someone can compromise the auditor's interests. 4 Abbreviations The following abbreviations apply to files. FTP:File Transfer Protocol ID :Identification P2P:Peer to Peer URL Scheme:Uniform Resource Location Scheme) 5 Audit activities 5. 1 Overview Mobile Internet security audit is an activity of enterprises to audit the security-related behaviors of mobile terminals wandering inside and outside the security audit domain, with the purpose of protecting private data and preventing violations. The scope of mobile Internet security audit activities involves the entire mobile Internet, and is a comprehensive application of multiple levels and information security technologies, including terminal, network, and application security, each divided into three layers: device/environment security, business application security, and information security. The focus includes security audit of mobile terminal access to internal data within the domain, security audit of mobile terminal access to external networks within the domain, and security audit of private data output outside the domain. The mobile Internet security audit architecture is based on the idea of "distributed collection and centralized management", which realizes in- and post-event audits inside and outside the security audit domain without changing the existing internal network structure and configuration and without affecting the network operation efficiency. Mobile Internet security audit services cannot correspond to a particular security service, and need to use other security services to support security audit activities. 5.2 Security audit domain The scope of the security audit domain is outside the confidential domain, which is less than or equal to the scope of the wireless LAN. When entering the security audit domain, mobile terminal users can choose whether to accept the audit or not. Only those who accept the audit and comply with the audit rules defined by the security audit policy can access the security audit domain. The audit in the security audit domain includes general behavior audit, private data online operation audit, private data local operation audit and private data extra-domain operation record afterwards; the audit outside the security audit domain is mainly private data online operation audit and private data local operation record afterwards. When the mobile terminal is in the security audit domain, it is appropriate to divide into the following cases. a) user behavior within the scope of the audit rules can be submitted directly from the mobile application through the audit trail in real time to the security audit center for an audit in progress, the audit center will return the audit results to the audit trail, if it passes continue to execute, if not interrupt the execution and alarm;. b ) When the mobile terminal wants to download private data, it needs to install the security audit agent first, otherwise the download is rejected. c) When operating private data online, it is submitted to the security audit center in real time through the audit trail for in-service audit, and the security audit center judges the legality of the behavior. d ) When operating private data locally, the audit agent audits the operation and judges whether it is legal; if it is legal, the operation is allowed to continue, and if it is not legal, the local operation of private data is interrupted and reported to the security audit center. e) The audit records related to private data outside the security audit domain are uploaded to the security audit center for record through audit trail at the first time after the mobile terminal enters the security domain. When the mobile terminal is outside the security audit domain, the behavior of the mobile application is not subject to security audit, and only the private data related to the security audit subject
Foreword………………………………………………………………………………………III 1 Scope……………………………………………………………………………………… 2 Normative Citation……………………………………………………………………… 3 Terms and Definitions…………………………………………………………………… 4 Abbreviations…………………………………………………………………………… 5 Audit activities…………………………………………………………………………… 5.1 Overview …………………………………………………………………………… 5.2 Security Audit Domain……………………………………………………………… 5.3 Role responsibilities ……………………………………………………………… 5.4 Audit scope………………………………………………………………………… 5.5 Audit content……………………………………………………………………… 5.6 Activity framework………………………………………………………………… 6 Activity functions………………………………………………………………………… 6.1 Security guidelines…………………………………………………………………… 6.2 Security Audit Policy Customization………………………………………………… 6.3 Security Audit Trail ………………………………………………………………… 6.4 Security Audit Trail…………………………………………………………………… 6.5 Security Audit Storage……………………………………………………………… 6.6 Security Audit Analysis……………………………………………………………… 6.7 Security Audit Agent………………………………………………………………… 6.8 Security Audit Response……………………………………………………………… 6.9 Archiving Security Audit Records…………………………………………………… 6.10 Audit report generation…………………………………………………………… 6.11 Security audit access………………………………………………………………… Appendix A (Informative) Mobile Internet Security Audit Process ………………………… References……………………………………………………………………………………
Code of China
Standard
GB/Z 41290-2022  Information security techniques—Guidelines for mobile internet security audit (English Version)
Standard No.GB/Z 41290-2022
Statusvalid
LanguageEnglish
File FormatPDF
Word Count8500 words
Price(USD)255.0
Implemented on2022-10-1
Deliveryvia email in 1~3 business day
Detail of GB/Z 41290-2022
Standard No.
GB/Z 41290-2022
English Name
Information security techniques—Guidelines for mobile internet security audit
Chinese Name
信息安全技术 移动互联网安全审计指南
Chinese Classification
L80
Professional Classification
GB
ICS Classification
Issued by
SAMR; SAC
Issued on
2022-03-09
Implemented on
2022-10-1
Status
valid
Superseded by
Superseded on
Abolished on
Superseding
Language
English
File Format
PDF
Word Count
8500 words
Price(USD)
255.0
Keywords
GB/Z 41290-2022, GB/ZT 41290-2022, GBZT 41290-2022, GB/Z41290-2022, GB/Z 41290, GB/Z41290, GB/ZT41290-2022, GB/ZT 41290, GB/ZT41290, GBZT41290-2022, GBZT 41290, GBZT41290
Introduction of GB/Z 41290-2022
GB/Z 41290-2022 Information security techniques—Guidelines for mobile internet security audit 1 Scope This document provides guidance and recommendations on role responsibilities, audit scope, and audit content for mobile Internet security auditing activities, and gives information on the framework of security auditing activities, functional tasks, and their specific content. This document applies to the activities related to mobile Internet security auditing. 2 Normative references The contents of the following documents constitute the essential provisions of this document through the normative references in the text. Among them, the reference document with the date, only the version corresponding to the date is applicable to this document; the reference document without the date, its latest version (including all revision sheets) is applicable to this document. GB/ T 17143.6 -1997 Information Technology Open System Interconnection System Management Part 6: Log Control Function GB 17859 1999 Computer information system security protection level classification guidelines GB/ T 18336.2 -2015 Information Technology Security Technology Information Technology Security Assessment Guidelines Part 2: Security Function Components GB/ T 25069 Information security technical terms GB/ T 35281 2017 Information security technology mobile Internet application server security technical requirements 3 Terminology and definitions GB/ T 17143. 6-1997, GB 17859-1999, GB/ T 18336. 2 -2015, GB/ T 25069 and GB/ T 35281-2017 defined as well as the following terms and definitions apply to this document. 3. 1 mobile internet The open basic telecommunication network where users use mobile terminals (including cell phones, Internet cards, tablet PCs, smartbooks, etc.) to obtain mobile communication network services and Internet services through the mobile network. [来源 :GB/ T 35281-2017 , 3.1.1] 3.2 mobile internet security audit Events are recorded and analyzed, and actions are taken for specific events to compare accordingly. [来源 :GB/ T 20945 2013 , 3.2 ] 3.3 security audit domain In information systems and networks, the pooling of entities that are responsible for auditing under a single security audit policy for security audit subjects. 3.4 private data Data that is privately enjoyed by the subject of the security audit and needs to be protected. GB/ Z 4 1290-2022 Note: Improper use or unauthorized modification of this data by someone can compromise the auditor's interests. 4 Abbreviations The following abbreviations apply to files. FTP:File Transfer Protocol ID :Identification P2P:Peer to Peer URL Scheme:Uniform Resource Location Scheme) 5 Audit activities 5. 1 Overview Mobile Internet security audit is an activity of enterprises to audit the security-related behaviors of mobile terminals wandering inside and outside the security audit domain, with the purpose of protecting private data and preventing violations. The scope of mobile Internet security audit activities involves the entire mobile Internet, and is a comprehensive application of multiple levels and information security technologies, including terminal, network, and application security, each divided into three layers: device/environment security, business application security, and information security. The focus includes security audit of mobile terminal access to internal data within the domain, security audit of mobile terminal access to external networks within the domain, and security audit of private data output outside the domain. The mobile Internet security audit architecture is based on the idea of "distributed collection and centralized management", which realizes in- and post-event audits inside and outside the security audit domain without changing the existing internal network structure and configuration and without affecting the network operation efficiency. Mobile Internet security audit services cannot correspond to a particular security service, and need to use other security services to support security audit activities. 5.2 Security audit domain The scope of the security audit domain is outside the confidential domain, which is less than or equal to the scope of the wireless LAN. When entering the security audit domain, mobile terminal users can choose whether to accept the audit or not. Only those who accept the audit and comply with the audit rules defined by the security audit policy can access the security audit domain. The audit in the security audit domain includes general behavior audit, private data online operation audit, private data local operation audit and private data extra-domain operation record afterwards; the audit outside the security audit domain is mainly private data online operation audit and private data local operation record afterwards. When the mobile terminal is in the security audit domain, it is appropriate to divide into the following cases. a) user behavior within the scope of the audit rules can be submitted directly from the mobile application through the audit trail in real time to the security audit center for an audit in progress, the audit center will return the audit results to the audit trail, if it passes continue to execute, if not interrupt the execution and alarm;. b ) When the mobile terminal wants to download private data, it needs to install the security audit agent first, otherwise the download is rejected. c) When operating private data online, it is submitted to the security audit center in real time through the audit trail for in-service audit, and the security audit center judges the legality of the behavior. d ) When operating private data locally, the audit agent audits the operation and judges whether it is legal; if it is legal, the operation is allowed to continue, and if it is not legal, the local operation of private data is interrupted and reported to the security audit center. e) The audit records related to private data outside the security audit domain are uploaded to the security audit center for record through audit trail at the first time after the mobile terminal enters the security domain. When the mobile terminal is outside the security audit domain, the behavior of the mobile application is not subject to security audit, and only the private data related to the security audit subject
Contents of GB/Z 41290-2022
Foreword………………………………………………………………………………………III 1 Scope……………………………………………………………………………………… 2 Normative Citation……………………………………………………………………… 3 Terms and Definitions…………………………………………………………………… 4 Abbreviations…………………………………………………………………………… 5 Audit activities…………………………………………………………………………… 5.1 Overview …………………………………………………………………………… 5.2 Security Audit Domain……………………………………………………………… 5.3 Role responsibilities ……………………………………………………………… 5.4 Audit scope………………………………………………………………………… 5.5 Audit content……………………………………………………………………… 5.6 Activity framework………………………………………………………………… 6 Activity functions………………………………………………………………………… 6.1 Security guidelines…………………………………………………………………… 6.2 Security Audit Policy Customization………………………………………………… 6.3 Security Audit Trail ………………………………………………………………… 6.4 Security Audit Trail…………………………………………………………………… 6.5 Security Audit Storage……………………………………………………………… 6.6 Security Audit Analysis……………………………………………………………… 6.7 Security Audit Agent………………………………………………………………… 6.8 Security Audit Response……………………………………………………………… 6.9 Archiving Security Audit Records…………………………………………………… 6.10 Audit report generation…………………………………………………………… 6.11 Security audit access………………………………………………………………… Appendix A (Informative) Mobile Internet Security Audit Process ………………………… References……………………………………………………………………………………
About Us   |    Contact Us   |    Terms of Service   |    Privacy   |    Cancellation & Refund Policy   |    Payment
Tel: +86-10-8572 5655 | Fax: +86-10-8581 9515 | Email: coc@codeofchina.com | QQ: 672269886
Copyright: Beijing COC Tech Co., Ltd. 2008-2040
 
 
Keywords:
GB/Z 41290-2022, GB/ZT 41290-2022, GBZT 41290-2022, GB/Z41290-2022, GB/Z 41290, GB/Z41290, GB/ZT41290-2022, GB/ZT 41290, GB/ZT41290, GBZT41290-2022, GBZT 41290, GBZT41290