GB/T 20011-2005 信息安全技术 路由器安全评估准则

GB/T 20011-2005 Information security technology—Routers security evaluation criteria

国家标准 中文简体 现行 页数:15页 | 格式:PDF

基本信息

标准号
GB/T 20011-2005
相关服务
标准类型
国家标准
标准状态
现行
中国标准分类号(CCS)
国际标准分类号(ICS)
发布日期
2005-11-11
实施日期
2006-05-01
发布单位/组织
中华人民共和国国家质量监督检验检疫总局、中国国家标准化管理委员会
归口单位
全国信息安全标准化技术委员会
适用范围
-

发布历史

研制信息

起草单位:
北京大学软件工程国家工程中心、公安部公共信息网络安全监察局
起草人:
王立福、张晰、葛佳、赵学志、刘学洋
出版信息:
页数:15页 | 字数:24 千字 | 开本: 大16开

内容描述

ICS35.020

L09巧臀

中华人民共和国国家标准

GB/T20011-2005

信息安全技术

路由器安全评估准则

Informationsecuritytechnology一

Routerssecurityevaluationcriteria

2005-11-11发布2006-05-01实施

中华人民共和国国家质量监督检验检疫总局发布

中国国家标准化管理委员会

GB/T20011-2005

目次

前言,,·····,·,-···········,···································,·······················,·······················,·······……m

引言·········································································································……IV

1范围······················,··············································,·······································……1

2规范性引用文件····,······,,,···4····,··········,·············4···,,·····11,··.·.……,.···一,,1

3术语和定义·····················,·······················,··········································.···········……1

4安全环境·,························································,························,·········,··········,··…1

4.1物理方面············,···········,··································,····」··········.·······················……1

4.2人员方面·····································································..········..··········.·········……1

4.3连通性方面····················,·······························..···……,·········…1

5评估内容············,···········,····,·················,··········,,·····················,,·········,,··········,,·…1

5.1用户自主保护级.·1

5.1.1自主访问控制·············,··.·……,1

5.1.2身份鉴别················································.················……,·..……,..·……1

5.1.3用户数据保护··,················································,·····‘·,,·····、、·,·····.·.·····……1

5.1.4安全管理·······,······························‘·····,·······················································,…2

5.1.5配置管理········································,···························,······,···················……2

5.1.6安全功能开发过程·1·1·,····1··,····411,,二,…,二,.,2

5.1.7指导性文档·····,···································,······················.·……,...··..……,···……2

5.1.8测试,··········,····························,···-·····················,····································,‘··…2

5.1.9交付和运行··························,···」·················……,··.·……,……,.…2

5.2系统审计保护级···································································……,.····.······……2

5.2.1自主访问控制,·············,········,···········,··········,···..····.·...··……,..····……2

5.2.2身份鉴别···························,,··········,··············································,··········,,·…2

5.2.3客体重用····-············································,…,····……,..······.·..··……2

5.2.4审计·······1····,···‘···,,,·············,,·。,·····‘····,·,···。·,,···‘·····1,·……2

5.2.5用户数据保护···························,······························,······……,..·……,.···……,..…3

5.2.6安全功能保护,··········,······················,·································,.·············……,,.…3

5.2.7安全管理······,,··········,,·····················,,·······················,······························…3

5.2.8配置管理···················································,·,··········································,··一·3

5.2.9安全功能开发过程·1······,·····】······························,,.········,··········..········……3

5.2.10指导性文档··,···········,···········,·····················,············.···……,····……,······...……4

5.2.n生存周期支持···········,···························……,,……,.卜.…4

5.2.12测试··,···········,·········,·································································一4

5.2.13脆弱性分析······························,·················································.·····……4

5.2.14交付和运行···,,·····,‘··,········、···········,························,········,······、·······一,,…4

5.3安全标记保护级································,······.·……,.…,.…4

5.3.1自主访问控制······················,·····················.····.·.……,二,..…,……4

5.3.2强制访问控制··,··········,····‘·······,,··】···············,············……4

GB/T20011-2005

5.3.3标记

5.3.4身份鉴别

5.3.5客体重用

5.3,6审计

5.3.7用户数据保护

5,38可信路径

5.3.9安全功能保护

5.3.10安全管理·········································……,二

5.3.n配置管理·······································……,……

5.3.12安全功能开发过程·,······‘··················.··········……,,

5.3.13指导性文档······························……,,..········.·……,,...

5.3.14生存周期支持·····,,·,,···111.·..……,……‘…,二,二

5.3卜15测试················,·····-····················、.···……,..…

5.3.16脆弱性分析·········,,····················..······.·……,,…

5.3.17交付和运行·······························.······……,,

附录A(资料性附录)路由器面临的威胁和对策

参考文献····················,······」·············……,.,,······……,,,,,10

GB/T20011-2005

.JJ‘.目‘~

定制服务