ICS35.020L09中华人民共和国国家标准GB/T××××—××××信息安全技术公钥基础设施PKI系统安全等级保护评估准则Informationsecuritytechniques-Publickeyinfrastructure-EvaluationcriteriaforsecurityclassificationprotectionofPKIsystem(报批稿)××××-××-××发布××××-××-××实施国家质量监督检验检疫总局发布GB/T××××—××××目次前言................................................................................III引言.................................................................................IV1范围..................................................................................12规范性引用文件........................................................................13术语和定义............................................................................14缩略语................................................................................25评估内容..............................................................................25.1第一级..............................................................................25.1.1概述..............................................................................25.1.2物理安全..........................................................................25.1.3角色与责任........................................................................25.1.4访问控制..........................................................................25.1.5标识与鉴别........................................................................25.1.6数据输入输出......................................................................35.1.7密钥管理..........................................................................35.1.8轮廓管理..........................................................................35.1.9证书管理..........................................................................35.2第二级..............................................................................45.2.1概述..............................................................................45.2.2物理安全..........................................................................45.2.3角色与责任........................................................................45.2.4访问控制..........................................................................45.2.5标识与鉴别........................................................................45.2.6审计..............................................................................55.2.7数据输入输出......................................................................55.2.8备份与恢复........................................................................55.2.9密钥管理..........................................................................55.2.10轮廓管理.........................................................................65.2.11证书管理.........................................................................65.3第三级..............................................................................75.3.1概述..............................................................................75.3.2物理安全..........................................................................75.3.3角色与责任........................................................................75.3.4访问控制..........................................................................75.3.5标...