GB/T 20011-2005 信息安全技术 路由器安全评估准则
GB/T 20011-2005 Information security technology—Routers security evaluation criteria
基本信息
发布历史
-
2005年11月
研制信息
- 起草单位:
- 北京大学软件工程国家工程中心、公安部公共信息网络安全监察局
- 起草人:
- 王立福、张晰、葛佳、赵学志、刘学洋
- 出版信息:
- 页数:15页 | 字数:24 千字 | 开本: 大16开
内容描述
ICS35.020
L09巧臀
中华人民共和国国家标准
GB/T20011-2005
信息安全技术
路由器安全评估准则
Informationsecuritytechnology一
Routerssecurityevaluationcriteria
2005-11-11发布2006-05-01实施
中华人民共和国国家质量监督检验检疫总局发布
中国国家标准化管理委员会
GB/T20011-2005
目次
前言,,·····,·,-···········,···································,·······················,·······················,·······……m
引言·········································································································……IV
1范围······················,··············································,·······································……1
2规范性引用文件····,······,,,···4····,··········,·············4···,,·····11,··.·.……,.···一,,1
3术语和定义·····················,·······················,··········································.···········……1
4安全环境·,························································,························,·········,··········,··…1
4.1物理方面············,···········,··································,····」··········.·······················……1
4.2人员方面·····································································..········..··········.·········……1
4.3连通性方面····················,·······························..···……,·········…1
5评估内容············,···········,····,·················,··········,,·····················,,·········,,··········,,·…1
5.1用户自主保护级.·1
5.1.1自主访问控制·············,··.·……,1
5.1.2身份鉴别················································.················……,·..……,..·……1
5.1.3用户数据保护··,················································,·····‘·,,·····、、·,·····.·.·····……1
5.1.4安全管理·······,······························‘·····,·······················································,…2
5.1.5配置管理········································,···························,······,···················……2
5.1.6安全功能开发过程·1·1·,····1··,····411,,二,…,二,.,2
5.1.7指导性文档·····,···································,······················.·……,...··..……,···……2
5.1.8测试,··········,····························,···-·····················,····································,‘··…2
5.1.9交付和运行··························,···」·················……,··.·……,……,.…2
5.2系统审计保护级···································································……,.····.······……2
5.2.1自主访问控制,·············,········,···········,··········,···..····.·...··……,..····……2
5.2.2身份鉴别···························,,··········,··············································,··········,,·…2
5.2.3客体重用····-············································,…,····……,..······.·..··……2
5.2.4审计·······1····,···‘···,,,·············,,·。,·····‘····,·,···。·,,···‘·····1,·……2
5.2.5用户数据保护···························,······························,······……,..·……,.···……,..…3
5.2.6安全功能保护,··········,······················,·································,.·············……,,.…3
5.2.7安全管理······,,··········,,·····················,,·······················,······························…3
5.2.8配置管理···················································,·,··········································,··一·3
5.2.9安全功能开发过程·1······,·····】······························,,.········,··········..········……3
5.2.10指导性文档··,···········,···········,·····················,············.···……,····……,······...……4
5.2.n生存周期支持···········,···························……,,……,.卜.…4
5.2.12测试··,···········,·········,·································································一4
5.2.13脆弱性分析······························,·················································.·····……4
5.2.14交付和运行···,,·····,‘··,········、···········,························,········,······、·······一,,…4
5.3安全标记保护级································,······.·……,.…,.…4
5.3.1自主访问控制······················,·····················.····.·.……,二,..…,……4
5.3.2强制访问控制··,··········,····‘·······,,··】···············,············……4
GB/T20011-2005
5.3.3标记
5.3.4身份鉴别
5.3.5客体重用
5.3,6审计
5.3.7用户数据保护
5,38可信路径
5.3.9安全功能保护
5.3.10安全管理·········································……,二
5.3.n配置管理·······································……,……
5.3.12安全功能开发过程·,······‘··················.··········……,,
5.3.13指导性文档······························……,,..········.·……,,...
5.3.14生存周期支持·····,,·,,···111.·..……,……‘…,二,二
5.3卜15测试················,·····-····················、.···……,..…
5.3.16脆弱性分析·········,,····················..······.·……,,…
5.3.17交付和运行·······························.······……,,
附录A(资料性附录)路由器面临的威胁和对策
参考文献····················,······」·············……,.,,······……,,,,,10
GB/T20011-2005
.JJ‘.目‘~
定制服务
推荐标准
- T/ACCEM 589-2025 单相多表位预付费电能计量箱 2025-05-28
- T/CAIEC 103-2025 城市道路地面塌陷检测与修复技术规程 2025-05-28
- T/CAIEC 109-2025 幕墙装饰施工安全操作规程 2025-05-28
- T/EJCCCSE 391-2025 施工过程中关键节点质量控制与检验规程 2025-05-28
- T/CAIEC 106-2025 钢结构装配式低层民用住宅技术规程 2025-05-28
- T/CAIEC 108-2025 铝板幕墙施工规范 2025-05-28
- T/CAIEC 110-2025 建筑幕墙工程设计与施工质量管理标准 2025-05-28
- T/EJCCCSE 414-2025 装配式复合围挡系统单元件施工规程 2025-05-28
- T/CAIEC 102-2025 装配式复杂钢结构智能建造管理规范 2025-05-28
- T/CAIEC 107-2025 建筑施工周期管理和全过程咨询控制规范 2025-05-28