GB/T 20011-2005 信息安全技术 路由器安全评估准则
GB/T 20011-2005 Information security technology—Routers security evaluation criteria
基本信息
发布历史
-
2005年11月
研制信息
- 起草单位:
- 北京大学软件工程国家工程中心、公安部公共信息网络安全监察局
- 起草人:
- 王立福、张晰、葛佳、赵学志、刘学洋
- 出版信息:
- 页数:15页 | 字数:24 千字 | 开本: 大16开
内容描述
ICS35.020
L09巧臀
中华人民共和国国家标准
GB/T20011-2005
信息安全技术
路由器安全评估准则
Informationsecuritytechnology一
Routerssecurityevaluationcriteria
2005-11-11发布2006-05-01实施
中华人民共和国国家质量监督检验检疫总局发布
中国国家标准化管理委员会
GB/T20011-2005
目次
前言,,·····,·,-···········,···································,·······················,·······················,·······……m
引言·········································································································……IV
1范围······················,··············································,·······································……1
2规范性引用文件····,······,,,···4····,··········,·············4···,,·····11,··.·.……,.···一,,1
3术语和定义·····················,·······················,··········································.···········……1
4安全环境·,························································,························,·········,··········,··…1
4.1物理方面············,···········,··································,····」··········.·······················……1
4.2人员方面·····································································..········..··········.·········……1
4.3连通性方面····················,·······························..···……,·········…1
5评估内容············,···········,····,·················,··········,,·····················,,·········,,··········,,·…1
5.1用户自主保护级.·1
5.1.1自主访问控制·············,··.·……,1
5.1.2身份鉴别················································.················……,·..……,..·……1
5.1.3用户数据保护··,················································,·····‘·,,·····、、·,·····.·.·····……1
5.1.4安全管理·······,······························‘·····,·······················································,…2
5.1.5配置管理········································,···························,······,···················……2
5.1.6安全功能开发过程·1·1·,····1··,····411,,二,…,二,.,2
5.1.7指导性文档·····,···································,······················.·……,...··..……,···……2
5.1.8测试,··········,····························,···-·····················,····································,‘··…2
5.1.9交付和运行··························,···」·················……,··.·……,……,.…2
5.2系统审计保护级···································································……,.····.······……2
5.2.1自主访问控制,·············,········,···········,··········,···..····.·...··……,..····……2
5.2.2身份鉴别···························,,··········,··············································,··········,,·…2
5.2.3客体重用····-············································,…,····……,..······.·..··……2
5.2.4审计·······1····,···‘···,,,·············,,·。,·····‘····,·,···。·,,···‘·····1,·……2
5.2.5用户数据保护···························,······························,······……,..·……,.···……,..…3
5.2.6安全功能保护,··········,······················,·································,.·············……,,.…3
5.2.7安全管理······,,··········,,·····················,,·······················,······························…3
5.2.8配置管理···················································,·,··········································,··一·3
5.2.9安全功能开发过程·1······,·····】······························,,.········,··········..········……3
5.2.10指导性文档··,···········,···········,·····················,············.···……,····……,······...……4
5.2.n生存周期支持···········,···························……,,……,.卜.…4
5.2.12测试··,···········,·········,·································································一4
5.2.13脆弱性分析······························,·················································.·····……4
5.2.14交付和运行···,,·····,‘··,········、···········,························,········,······、·······一,,…4
5.3安全标记保护级································,······.·……,.…,.…4
5.3.1自主访问控制······················,·····················.····.·.……,二,..…,……4
5.3.2强制访问控制··,··········,····‘·······,,··】···············,············……4
GB/T20011-2005
5.3.3标记
5.3.4身份鉴别
5.3.5客体重用
5.3,6审计
5.3.7用户数据保护
5,38可信路径
5.3.9安全功能保护
5.3.10安全管理·········································……,二
5.3.n配置管理·······································……,……
5.3.12安全功能开发过程·,······‘··················.··········……,,
5.3.13指导性文档······························……,,..········.·……,,...
5.3.14生存周期支持·····,,·,,···111.·..……,……‘…,二,二
5.3卜15测试················,·····-····················、.···……,..…
5.3.16脆弱性分析·········,,····················..······.·……,,…
5.3.17交付和运行·······························.······……,,
附录A(资料性附录)路由器面临的威胁和对策
参考文献····················,······」·············……,.,,······……,,,,,10
GB/T20011-2005
.JJ‘.目‘~
定制服务
推荐标准
- GB/T 14522-2008 机械工业产品用塑料、涂料、橡胶材料人工气候老化试验方法 荧光紫外灯 2008-06-16
- GB/T 17360-2008 钢中低含量 Si、Mn的电子探针定量分析方法 2008-06-16
- GB/T 15964-2008 地毯 单位长度和单位面积绒簇或绒圈数目的测定方法 2008-06-16
- GB/T 15050-2008 手工打结羊毛地毯 2008-06-16
- GB/T 15965-2008 手工地毯 绒头长度的测定方法 2008-06-16
- GB/T 15074-2008 电子探针定量分析方法通则 2008-06-16
- GB/T 11049-2008 地毯燃烧性能 室温片剂试验方法 2008-06-16
- GB/T 9651-2008 单相异步电动机试验方法 2008-06-13
- GB/T 14252-2008 机织地毯 2008-06-16
- GA/T 554-2008 机动车驾驶人场地驾驶技能考试系统 2008-06-16