Skip to product information
1 of 12

PayPal, credit cards. Download editable-PDF & invoice In 1 second!

GB/T 20272-2019 English PDF (GBT20272-2019)

GB/T 20272-2019 English PDF (GBT20272-2019)

Regular price $350.00 USD
Regular price Sale price $350.00 USD
Sale Sold out
Shipping calculated at checkout.
Delivery: 3 seconds. Download true-PDF + Invoice.
Get QUOTATION in 1-minute: Click GB/T 20272-2019
Historical versions: GB/T 20272-2019
Preview True-PDF (Reload/Scroll if blank)

GB/T 20272-2019: Information security technology -- Security technical requirements for operating system
GB/T 20272-2019
NATIONAL STANDARD OF THE
PEOPLE’S REPUBLIC OF CHINA
ICS 35.040
L 80
Replacing GB/T 20272-2006
Information security technology -
Security technical requirements for operating system
ISSUED ON: AUGUST 30, 2019
IMPLEMENTED ON: MARCH 01, 2020
Issued by: State Administration for Market Regulation;
Standardization Administration of the PRC.
Table of Contents
Foreword ... 3 
1 Scope ... 5 
2 Normative references ... 5 
3 Terms and definitions ... 5 
4 Abbreviations ... 6 
5 Product description ... 6 
6 Security technical requirements ... 6 
6.1 Class 1: user self-protection class ... 6 
6.1.1 Security function requirements ... 6 
6.1.2 Self-security requirements ... 8 
6.1.3 Security assurance requirements ... 9 
6.2 Class 2: system audit protection class ... 13 
6.2.1 Security function requirements ... 13 
6.2.2 Self-security requirements ... 16 
6.2.3 Security assurance requirements ... 19 
6.3 Class 3: security label protection class ... 24 
6.3.1 Security function requirements ... 24 
6.3.2 Self-security requirements ... 29 
6.3.3 Security assurance requirements ... 33 
6.4 Class 4: structured protection class ... 39 
6.4.1 Security function requirements ... 39 
6.4.2 Self-security requirements ... 45 
6.4.3 Security assurance requirements ... 48 
6.5 Class 5: access verification protection class ... 55 
6.5.1 Security function requirements ... 55 
6.5.2 Self-security requirements ... 61 
6.5.3 Security assurance requirements ... 65 
Appendix A (Informative) Table for classing of security technical requirements
for operating system ... 74 
Bibliography ... 75 
Information security technology -
Security technical requirements for operating system
1 Scope
This Standard specifies the security technical requirements for operating
system of five security classes.
This Standard applies to the research and development, testing, maintenance,
and evaluation of security of operating system.
2 Normative references
The following documents are indispensable for the application of this document.
For the dated references, only the editions with the dates indicated are
applicable to this document. For the undated references, the latest edition
(including all the amendments) are applicable to this document.
GB 17859-1999 Classified criteria for security protection of computer
information system
GB/T 18336.3-2015 Information technology - Security techniques -
Evaluation criteria for IT security - Part 3: Security assurance components
GB/T 20271-2006 Information security technology - Common security
techniques requirement for information system
GB/T 29240-2012 Information security technology - General security
technique requirements and testing and evaluation method for terminal
computer
3 Terms and definitions
The terms and definitions defined in GB 17859-1999, GB/T 18336.3-2015,
GB/T 20271-2006, and GB/T 29240-2012 and the following ones apply to this
document.
3.1 Security of operating system
The confidentiality, integrity, and availability of operating system itself and of the
information it stores, transmits, and processes.
a) User identification function:
1) Before users enter the operating system, they shall be identified first.
2) The user identification of operating system should use the username
and UID.
b) User authentication function:
1) The password is used for authentication and is authenticated each time
the user logs into the system and when the system is reconnected;
2) The password shall be invisible; during storage and transmission, shall
be securely protected, to ensure that it is not accessed, modified, and
deleted without authorization;
3) By predefining the value of unsuccessful authentication attempt
(including the threshold of the number of attempts and time) and clearly
specifying the measures taken when the value is reached, achieve the
processing of authentication failure.
c) For users registered to the operating system, the user process shall be
associated with its owner user, so that the behavior of user process can
be traced back to the owner user of the process.
6.1.1.2 Discretionary access control
The discretionary access control functions of SSOOS are as follows:
a) The owner of the object shall have the right to modify its access rights for
all objects owned by it;
b) The owner of the object shall be able to set the access control attributes
of other users for the object it owns. The access control attributes include
at least: read, write, execute, etc.;
c) The subject’s access to the object shall follow the object’s discretionary
access control right attribute;
d) The granularity of the access control object is controlled in files and
directories.
6.1.1.3 Data integrity
For user data transmitted internally the operating system (such as inter-process
communication), there shall be a function of ensuring the integrity of user data.
e) Identify all possible states of SSOOS operation (including operational
failures or operational errors) and their causal relationship and connection
with maintaining secure operation;
f) Describe the security policy which shall be enforced to ensure secure
operation of SSOOS.
6.1.3.2.2 Preparation procedure
The developer shall provide the operating system and its preparation procedure.
The description of preparation procedure shall meet the following requirements:
a) Describe all the steps necessary to securely receive an operating system
consistent with the developer delivery procedure;
b) Describe all the steps necessary to securely install the operating system
and its operation environment.
6.1.3.3 Life cycle support
6.1.3.3.1 Configuration management capability
The developer’s configuration management capabilities shall meet the following
requirements:
a) Provide a unique identification for different versions of operating system;
b) Provide a configuration management document describing a method for
uniquely identifying a configuration item;
c) The configuration management system uniquely identifies all configuration
items.
6.1.3.3.2 Configuration management scope
The developer shall provide a list of SSOOS configuration items and a brief
description of the developer of the configuration item. The list of configuration
items shall contain the following:
a) SSOOS, evaluation evidence for security assurance requirements, and
components of SSOOS;
b) Unique identification of configuration item;
c) For each configuration item related to security function, the list of
configuration items briefly describes the developer of the configuration
item.
algorithms which comply with national cryptography-related regulations are
used.
6.1.3.5 Vulnerability evaluation
Based on the identified potential vulnerabilities, the operating system shall
resist attacks by attackers with a basic attack potential.
Note: The resisting to attacks by attackers with basic attack potential needs to be
comprehensively considered based on the following 5 specific factors: attack time,
attacker ability, level of understanding of the operating system, time of access to
operating system or number of attack samples, attack equipment used. See GB/T
30270-2013 Appendix A, A.8.
6.2 Class 2: system audit protection class
6.2.1 Security function requirements
6.2.1.1 Identity authentication
The identity authenticatio...
View full details