GB/Z 20283-2006
Information security technology. Guide for the production of Protection Profiles and Security Targets (English Version)

GB/Z 20283-2006
Standard No.
GB/Z 20283-2006
Language
Chinese, Available in English version
Release Date
2006
Published By
General Administration of Quality Supervision, Inspection and Quarantine of the People‘s Republic of China
Status
 2021-04
Replace By
GB/T 20283-2020
Latest
GB/T 20283-2020
Scope
This guidance technical document describes the contents of the protection profile (PP) and the safety target (ST) and the interrelationship between the contents of each part, and gives some examples in the appendix for the reference of interested readers. This guiding technical document gives an overview of the content of PP and ST documents, a list of sample directories and other content that target users are most concerned about, and states the relationship between PP and ST, as well as the development and writing process of PP and ST, for users Writing PP and ST provides guidance.

GB/Z 20283-2006 Referenced Document

  • GB/T 18336.1-2001 Information technology--Security techniques--Evaluation criteria for IT security Part 1: Introduction and general model
  • GB/T 18336.2-2001 Information technology--Security techniques--Evaluation criteria for IT security Part 2: Security functional requirements
  • GB/T 18336.3-2001 Information technology--Security technology--Evaluation criteria for IT security Part 3: Security assurance requirements
  • GB/T 5271.8-2001 Information technology-Vocabulary Part 8: Security

GB/Z 20283-2006 history

  • 2020 GB/T 20283-2020 Information security technology—Guide for the production of protection profiles and security targets
  • 2006 GB/Z 20283-2006 Information security technology. Guide for the production of Protection Profiles and Security Targets

GB/Z 20283-2006 Information security technology. Guide for the production of Protection Profiles and Security Targets was changed to GB/T 20283-2020 Information security technology—Guide for the production of protection profiles and security targets.




Copyright ©2007-2023 ANTPEDIA, All Rights Reserved