GA/T 390-2002 General technical requirements for security level protection of computer information systems
Some standard content:
GA/T390—2002, Public Security Industry Standard of the People's Republic of China
Computer Information System Classified Security Protection
Common Technology Requirements
Common Technology Requirementsin Computer Information System Classified Security Protection2002-07-18 Issued
Implementation on 2002-07-18
Issued by the Ministry of Public Security of the People's Republic of China
Normative Reference Documents
3 Terms and Definitions
Technical Requirements for Security Functions
Physical Security.
4.1.1 Environmental Security
4.1.2 Equipment Security
4.1.3 Recording Media Security
4.2 Operation Security.
Risk Analysis
System Security Detection and Analysis
Network Security Monitoring
Security Audit,| |tt||Network antivirus
Backup and fault recovery
Emergency planning and emergency response of computer information systems 4.3 Information security.
Identification and authentication
Secure authentication of information exchange
Autonomous access control
Mandatory access control
User data confidentiality storage protection
User data confidentiality transmission protection
User data integrity protection
Residual information protection
Covered channel analysis
Trusted path between user and TSF
Cryptographic support
5 Technical requirements for security assurance Request,
5.1 TCB's own security protection
5.1.1 Safe operation test
Failure protection
Availability of output TSF data
Confidentiality of output TSF data
GA/T390-2002
GA/T390-2002
Integrity of output TSF data
TSF data transmission within TCB
Physical security protection
Trusted recovery
Replay detection.
Reference arbitration
Domain separation
State synchronization protocol||t t||Timestamp
Consistency of TSF data between TSFs
Consistency of TSF data replication within the TCB
TSF self-check
Resource utilization
TCB access control,
Trusted path/channel
5.2TCB design and implementation
Configuration management:
Distribution and operation
Development,
5.2.4 Guidance documentation
Life cycle support
5.2.6 Testing..
5.2.7 Vulnerability assessment
5.3TCB security management
5.3.1 Management of TSF functions
Management of security attributes
Management of TSF data
Definition and management of security roles
5.3.5 Termination of security attributes
5.3.6 Revocation of security attributes
6 Requirements for security protection level classification
First level
User autonomous protection level
Physical security
Operational security
Information security
TCB self-security protection
TCB design and implementation
6.1.6TCB security management
6.2 Second level system audit protection level
Physical security
6.2.2 Operational security
6.2.3 Information security
6.2.4 TCB own security protection
6.2.5 TCB design and implementation
6.2.6 TCB security management.bzxZ.net
6.3 Third level security tag protection level
Physical security
Operational security
Information security
TCB own security protection
TCB design and implementation.
TCB security management
6.4 Fourth level structured Protection level
Physical security
Operational security
Information security
TCB internal security protection
TCB design and implementation
TCB security management.
6.5 Fifth level access verification protection level
Physical security
Operational security
Information security
6.5.4TCB internal security protection
6.5.5TCB design and implementation.
6.5.6TCB security management.
A.1 Composition and mutual relationship
A.2 Classification of security levels
A.3 About subject and object.
A.4 About TCB, TSF, TSP, SFP and their mutual relationshipA.5 About the way of causing information flow
A.6 About cryptographic technology:
A.7 About the development method of secure computer information systemReferences
GA/T390-2002
GA/T390-2002
GB17859-1999 "Guidelines for Classification of Computer Information System Security Protection Levels" is an important standard for computer information system security level management in my country. It was issued on September 13, 1999. In order to promote the normal and orderly development of security level management, a series of relevant standards are formulated, including:
A series of standards for technical requirements of computer information system security level protection: Management requirements for computer information system security level protection: A series of standards for implementation of computer information system security level protection projects: A series of standards for computer information system security level protection implementation management methods: A series of standards for computer information system security level protection evaluation Among them, the computer information system security level protection technical requirements series standards mainly include the following five standards: GA×X1-X××× General technical requirements for computer information system security level protection: GA××2-×××× network technical requirements for computer information system security level protection: GA××3-×××× technical requirements for computer information system security level protection operating system; GAXX4-×XX× technical requirements for computer information system security level protection database management system: GA××5-X××× technical requirements for computer information system security level protection application system. "General Technical Requirements for Computer Information System Security Level Protection" is the basic standard of the computer information system security level protection technical requirements series standards, which details the general security technologies that computer information systems should adopt to achieve the security level protection requirements proposed by GB17859, as well as the guarantee measures taken to ensure that the security functions achieved by these security technologies reach the security they should have, and describes the requirements of GB17859 for each of the five security protection levels of computer information systems in detail from the technical requirements. This standard provides reference and quotation content for other standards in this series of standards. This standard was proposed by the Information System Security Standardization Committee of the Ministry of Public Security of the People's Republic of China. This standard is under the jurisdiction of the Information System Security Standardization Committee of the Ministry of Public Security of the People's Republic of China. Drafting unit of this standard: Jiangnan Institute of Computing Technology Main drafter of this standard:
GA/T390-2002
General Technical Requirements for Computer Information System Security Level Protection is the basic standard of the series of technical requirements for computer information system security level protection, which is used to guide designers on how to design and implement computer information systems with the required security level. It mainly explains its technical requirements from the perspective of dividing the security protection level of computer information systems, that is, it mainly explains the security technical measures that should be taken to achieve the security requirements of each protection level in the "Computer Information System Security Level Division Criteria", as well as the differences in the specific implementation of each security technical requirement in different security levels. This standard first makes a relatively comprehensive description of the security function technical requirements and security assurance technical requirements involved in the computer information system security level protection, and then makes a detailed description of the security function technical requirements and security assurance technical requirements for each security level according to the five security levels of GB17859. The main documents referenced by this standard are: GB17859-1999 Criteria for Classification of Computer Information System Security Protection Levels: - IS0/IEc15408:1999 Information technology Security techniques - Criteria for IT Security, Version 2.0. Evaluation
1 Scope
GA/T390-2002
General Technical Requirements for Security Level Protection of Computer Information Systems This standard specifies the general technical requirements for security level protection of computer information systems, and gives different technical requirements for each security level.
This standard applies to the design and implementation of computer information systems in accordance with the security level protection requirements of the "Guidelines for Classification of Security Levels of Computer Information Systems" (hereinafter referred to as the "Guidelines"). It can also be used as a reference for the testing and management of computer information systems in accordance with the security level protection requirements of the "Guidelines". 2 Normative References
The clauses in the following documents become clauses of this standard through reference in this standard. For any dated referenced document, all subsequent amendments (excluding errata) or revisions are not applicable to this standard. However, the parties to an agreement based on this standard are encouraged to study whether to use the latest versions of these documents. For any undated referenced document, the latest version shall apply to this standard. GBJ45-82 Fire protection regulations for high-rise civil building design GB9361-1988 Computer site security requirements GB17859-1999 Computer information system security protection level classification criteria TJ16-74 Building design fire protection code
3 Terms and definitions
GB17859-1999 and the following terms and definitions are applicable to this standard. 3.1
Security element securityelement
In the "Guidelines", the components of the security content contained in each security level. There are 10 security elements. Each security element can have different specific contents in different security levels. 3.2
Security function policy (SFP) securityfunctionpolicy is the security policy adopted to realize the functions required by the security element. 3.3
Security function security function
To realize the content of security elements, correctly implement the functions provided by the corresponding security function policy, 3.4
Security assurance security assurance
Methods and measures taken to ensure that the security functions of security elements meet the required security goals. 3.5
Trusted computing base (TCB) trusted computing base The general term for protection devices in computer information systems, including hardware, firmware, software and a combination responsible for executing security policies. It establishes a basic protection environment and provides additional services required by a trusted computing system. 3.6
TCB security policy (TSP) TCB security policy 1
GA/T390-2002
A set of rules for managing, protecting and allocating resources in the TCB. There can be one or more security policies in a TCB. 3.7
TCB security function (TSF)TCB security function - TSFThe functions provided by all hardware, firmware, and software to correctly implement the TCB security policy. The implementation of each security policy constitutes a security function module. All security function modules of a TCB together constitute the security function of the TCB3.8
TSF scope of control (TSC)TSF scope of controlThe subjects and objects involved in the operation of the TCB. 3.9
User identificationuser identification
Used to identify the identity of the user and ensure the uniqueness and identifiability of the user in the system. Generally, a name and user identifier (UID) are used to identify a user in the system. The name and identifier are both public plain text information. Identification is the basis for the effective implementation of other security policies (such as user data protection, security auditing, etc.). By providing users with unique identification, the TCB can make users responsible for their own behavior. 3.10
User authenticationuser authentication
Use specific information to confirm the authenticity of the user's identity. The information used for identification is generally non-public and difficult to forge. Commonly used identification information includes: password (commonly known as "password") information, biometric information, smart IC card information, etc. User authentication is the basis for the effective implementation of other security policies (such as user data protection, security audit, etc.). 3.11
User-subject binding user-subject binding uses a certain method to associate the security attributes of a specified user with the subject (such as a process) that serves it in whole or in part. 3.12
Label of subject and object specifies sensitive information (security attributes) for the subject and object. These label information is a combination of hierarchical classification and non-hierarchical classification, and is the basis for implementing mandatory access control.
Trusted channel trustedchannel
In order to perform key security operations, a communication path established and maintained between TSF and other trusted IT products to protect communication data from modification and leakage.
Trusted path
To achieve trusted communication between users and TSF, a communication path established and maintained between TSF and users to protect communication data from modification and exposure.
Fault tolerance
Through a series of fault handling measures, the effectiveness and availability of the security functions provided by TCB in the event of a fault is ensured: 3.16
Priority of service
Through a limited control strategy for resource use, the completion of high-priority tasks in TCB is ensured to be free from interference and delays from low-priority tasks, thereby ensuring the security of TCB security functions; 2
Resource allocation
GA/T390-2002
Through the reasonable management and scheduling of resources within the control scope of TCB security functions, the security functions of TCB are ensured not to be affected by resource use.
Configuration management (CM) configuration management A method of establishing functional requirements and specifications. The functional requirements and specifications are implemented in the execution of the TCB. 3.19
Configuration Management System (CMS) configurationmanagementsystem ensures the integrity of each part of the TCB by providing a method to track any changes and ensure that all modifications are authorized. 3.20
Protection Profile (PP) protectionprofile A document that details the security protection requirements of a computer information system, that is, the usual security requirements, which are generally written by the user. 3.21
Security Target (ST) securitytarget A document that describes the security functions and trust of a computer information system, that is, the usual security solution, which is generally written by the developer. 3.22
TCB Security Management securitymanagement refers to the management of aspects related to TCB security, including the definition of different management roles and their interactions (such as separation of capabilities), and the handling of issues such as the propagation of security attributes of multiple physically separated components, and the modification of TSF data and functions. 4 Technical requirements for security functions
4.1 Physical security
4.1.1 Environmental security
4.1.1.1 Security protection of the central computer room
4.1.1.1.1. Site selection for the computer room
a) Basic requirements
Select the site for the computer room according to the requirements of general buildings. b)
Higher requirements
Avoid areas prone to fire and high risk, such as oil depots and areas near other flammable materials; avoid areas with environmental pollution such as dust, toxic gases, corrosive gases, salt spray corrosion, etc.; avoid low-lying, humid and lightning-struck areas;
Avoid areas with strong vibration sources and strong noise sources; avoid areas with strong electric fields and strong magnetic fields;
Avoid areas with earthquake and flood hazards: avoid high-rise buildings and the lower floors or next to water-using equipment. c) Strict requirements
Avoid areas prone to fire and high risk, such as oil depots and areas near other flammable materials; avoid areas with environmental pollution such as dust, toxic gas, corrosive gas, salt spray corrosion; avoid low-lying, humid and lightning-struck areas;
Avoid areas with strong vibration and noise sources: 3
GA/T390--2002
Avoid areas with strong electric and magnetic fields:
-Avoid areas with earthquake and flood hazards;-Avoid being on high floors of buildings and on the lower floors or next to water-using equipment;-Avoid being close to public areas, such as mail transportation channels, parking lots or restaurants, etc. 4.1.1.1.2 Internal security protection of the computer room
a) Basic requirements
There should be a dedicated person in charge of the entrance and exit of the computer room, and no one without permission is allowed to enter the computer room; without the explicit permission of the designated management personnel, no recording media, document materials and various protected items are allowed to be taken out of the computer room,
and brought into the computer room.
b) Higher requirements
Magnets, personal computers or electrical equipment, food and beverages, cigarettes, smoking utensils, etc. are not allowed. The computer room should have only one entrance and exit, and several emergency evacuation exits, with marked evacuation routes and directions, and there should be a dedicated person in charge. No one without permission is allowed to enter the computer room: 1. Special security personnel may be assigned to manage the personnel entering and leaving the computer room. Without the explicit permission of the designated management personnel, no recording media, document materials and various protected items are allowed to be taken out of the computer room: Magnets, personal computers or electronic equipment, food and beverages, cigarettes, smoking utensils, etc. are not allowed to be brought into the computer room: 1. Visitors who are allowed to enter the computer room should have their range of activities restricted and be accompanied by reception staff: If an information system security management center is set up in the computer room, its security protection should be strengthened, such as wearing badges with different marks when entering different areas, and setting electronic locks and fingerprint locks at the entrances and exits of important parts. c) Strict requirements
The computer room should have only one entrance and exit, and several emergency exits with marked evacuation routes and directions. There should be a dedicated person in charge, and no one without permission is allowed to enter the computer room; special security personnel can be assigned to manage the personnel entering and leaving the computer room. Without the explicit permission of the designated management personnel, no recording media, document materials and various protected items are allowed to be taken out of the computer room; magnets, personal computers or electronic equipment, food and beverages, cigarettes, smoking utensils, etc. are not allowed to be brought into the computer room: the interior of the computer room should be managed by divisions, generally divided into the mainframe area, data processing operation area, auxiliary area, etc. The area that each staff member can enter should be determined according to their actual work needs: the range of activities of visitors who are allowed to enter the computer room should be restricted, and they should be accompanied by reception staff; if there is an information system security management center in the computer room, its security protection should be strengthened, such as wearing badges with different marks when entering different areas, setting electronic locks and fingerprint locks at the entrances and exits of important parts, and setting up a video surveillance system when necessary.
4.1.1.1.3 Fire prevention in computer room
a) Basic requirements
1. Fire prevention of building materials. The fire resistance level of building materials in computer room and recording medium storage room shall comply with the second-level fire resistance level specified in TJ16; the fire resistance level of building materials in other basic working rooms and auxiliary rooms related to computer room shall not be lower than the third-level fire resistance level specified in TJ16: 1. Area isolation fire prevention. The layout of computer room shall isolate vulnerable areas and dangerous areas to prevent external fire from entering computer room, especially important equipment areas, install fire doors, use flame-retardant materials for decoration, etc. 1. Alarm and fire extinguishing system. It is required to set up a fire alarm system, and the fire extinguishing equipment shall be operated by people, and there are certain requirements for the efficiency, toxicity, dosage and damage of the fire extinguishing equipment. 4
Tip: This standard content only shows part of the intercepted content of the complete standard. If you need the complete standard, please go to the top to download the complete standard document for free.