Sei sulla pagina 1di 20

Document Code

Huawei IT Product Line Cyber


Security Marketing Guide V1.0

Issue V1.0

Date 2018-01-05

HUAWEI TECHNOLOGIES CO., LTD.


Huawei IT Product Line Cyber Security Marketing Guide SECRET

Copyright © Huawei Technologies Co., Ltd. 2014. All rights reserved.


No part of this document may be reproduced or transmitted in any form or by any means without
prior written consent of Huawei Technologies Co., Ltd.

Trademarks and Permissions

and other Huawei trademarks are trademarks of Huawei Technologies Co., Ltd.
All other trademarks and trade names mentioned in this document are the property of their
respective holders.

Notice
The purchased products, services and features are stipulated by the contract made between
Huawei and the customer. All or partial products, services and features described in this document
may not be within the purchased scope or the usage scope. Unless otherwise specified in the
contract, all statements, information, and recommendations in this document are provided "AS IS"
without warranties, guarantees or representations of any kind, either express or implied.
The information in this document is subject to change without notice. Every effort has been made in
the preparation of this document to ensure accuracy of the contents, but all statements, information,
and recommendations in this document do not constitute a warranty of any kind, express or implied.

Huawei Technologies Co., Ltd.


Address: Huawei Industrial Base
Bantian, Longgang
Shenzhen 518129
People's Republic of China

Website: http://www.huawei.com

Email: support@huawei.com

Huawei Proprietary and Confidential


Issue V1.0(2018-01-05) Copyright © Huawei Technologies Co., Ltd. Page 2 of 20
Marketing Guide to IT Product Line Cyber Security SECRET

Contents

About This Document .............................................................................................................. 4


1 Overview............................................................................................................................... 7
1.1 Requirement Source ............................................................................................................................. 7
1.2 Measures .............................................................................................................................................. 7
1.3 Typical Scenarios ................................................................................................................................. 7

2 Scenarios and Security Guidance .................................................................................... 9


2.1 Scenario 1 Daily Branding Marketing.................................................................................................. 9
2.2 Scenario 2 Customer Cyber Security Communication ....................................................................... 10
2.3 Scenario 3 HQ Visit Resource ............................................................................................................ 14
2.4 Scenario 4 Security Management and Control and Decision-Making ............................................... 14
2.5 Scenario 5 Reply to Frontline Security Questions ............................................................................. 15

3 Security Resource Collection .......................................................................................... 17


3.1 Basic Security Definitions .................................................................................................................. 17
3.2 Huawei Security Documentation ....................................................................................................... 18
3.3 Cyber Security Contacts of the IT product Line................................................................................. 19

Huawei Proprietary and Confidential


Issue V1.0(2018-01-05) Copyright © Huawei Technologies Co., Ltd. Page 3 of 20
Huawei IT Product Line Cyber Security Marketing Guide SECRET

About This Document

In 2013, Huawei carrier BG declared that all marketing and sales departments of the
HQ and frontline must actively introduce Huawei cyber security strategies and
approaches and security solutions to improve cyber security transparency and
eliminate customersʹ security concerns. At Huawei Market Conference 2014, the
frontline personnel said that they did not know what and how to talk about cyber
security issues.
The Marketing Guide to Huawei IT Product Line Cyber Security (the guide for short)
is compiled to meet Huawei requirements and frontline security requirements. It
provides guidance for marketing and sales personnel on how to effectively carry out
security marketing work in actual scenarios.
This document is applicable to the following scenarios:
1. Daily brand campaign
2. Customer cyber security communication
3. HQ visit
4. Network management and control and decision-making
5. Reply to frontline security questions
In the daily branding scenario, the frontline personnel must note the following:
 Do not use the forbidden security words such as the super user and do not or
seldom use the discouraged words, such as private encryption algorithm and
monitoring.
 Do not use case materials containing sensitive customer data unless it is approved
by the customer in written form.
 Do not promote the locally-banned products, features, or solutions.
In the customer security communication scenario, the frontline personnel must note
the following:
 In the security-sensitive countries, do not be afraid to talk about security issues
with the customers who care about them.
 HQs can provide systematic security communication materials concerning
security strategies, approaches, and processes, and security promotional theme
slides and white papers.
 Do not make any promises easily about security authentication and tests.
 Do not promote products and features that are restricted by the local laws.
In the HQ visit scenario, the frontline personnel must know that there is one visit
resource available, which is Shenzhen Cyber Security War Room.

Huawei Proprietary and Confidential


Issue V1.0(2018-01-05) Copyright © Huawei Technologies Co., Ltd. Page 4 of 20
Marketing Guide to IT Product Line Cyber Security SECRET

 In the security management and control and decision-making scenario, the


frontline personnel must note the following:
 Strictly comply with the local security management and control requirements for
sales
 If customers ask for security-sensitive features or products, make decisions under
the condition that no local laws are violated and customers are willing to sign a
disclaimer agreement
In the frontline question reply scenario, the frontline personnel must note the
following:
 Ask the Bidding Office to reply to bidding-related questions.
 Submit iCare trouble tickets (ITR) to reply to security-related questions.
Additionally, this guide also provides links for Huawei security collection, related
security definitions and terms, company documents, security-related documents, and
upcoming security documents.
This guide is intended for Huawei frontline marketing/sales personnel and cannot be
disclosed to customers.
This guide plans to be updated every half a year. If you have any questions or
suggestions, contact Tang Renpeng/00239061.

Huawei Proprietary and Confidential


Issue V1.0(2018-01-05) Copyright © Huawei Technologies Co., Ltd. Page 5 of 20
Marketing Guide to IT Product Line Cyber Security SECRET

Change History

Date Version Description Prepared By


2014-11-05 1.0 Completed the initial draft. Tang Renpeng

Huawei Proprietary and Confidential


Issue V1.0(2018-01-05) Copyright © Huawei Technologies Co., Ltd. Page 6 of 20
Huawei IT Product Line Cyber Security Marketing Guide SECRET

1 Overview

1.1 Requirement Source


In 2013, Huawei carrier BG declared that all marketing and sales departments of the
HQ and the frontline must actively introduce strategies, approaches, and solutions of
Huawei cyber security to improve cyber security transparency and eliminate
customersʹ security concerns. For details, see the Carrier BG Doc. No. [2013] 003
Specifications for Further Clarifying Cyber Security Responsibilities of Managers.

NOTE
Active communication about cyber security is recommended in security-sensitive countries and is
not recommended in security-insensitive countries.

1.2 Measures
This document is compiled to meet the company requirements and frontline
requirements and is used to instruct marketing and sales personnel on how to carry out
marketing activities in a variety of typical scenarios.
To meet the frontlineʹs urgent need for the security marketing guide, MO and IT
production line cyber security cooperated to compile this guide in 2014 Q4.

1.3 Typical Scenarios


This guide instructs the frontline personnel on how to carry out security marketing
activities in the following scenarios:
1. Daily brand campaign
2. Customer cyber security communication
3. HQ visit
4. Security management and control and decision-making
5. Reply to frontline security questions

Huawei Proprietary and Confidential


Issue V1.0(2018-01-05) Copyright © Huawei Technologies Co., Ltd. Page 7 of 20
Marketing Guide to IT Product Line Cyber Security SECRET

Figure 1-1 Five typical scenarios

The following details the guidance and suggestions on the preceding five scenarios.

Huawei Proprietary and Confidential


Issue V1.0(2018-01-05) Copyright © Huawei Technologies Co., Ltd. Page 8 of 20
Huawei IT Product Line Cyber Security Marketing Guide SECRET

2 Scenarios and Security Guidance

2.1 Scenario 1 Daily Branding Marketing


2.1.1 Description
This scenario includes but is not limited to daily brand marketing activities (including
exhibitions, auto exhibition, exhibition halls, summits, and keynote speeches)
organized or participated in by the frontline, and routine customer communication
activities.
In this scenario, the frontline personnel must note what things cannot be talked about
to avoid security violation.

2.1.2 Security Guidance


In this scenario, the frontline personnel must note three points:
 Do not use forbidden security words such as the super user and do not or seldom
use the discouraged words.
 Do not use case materials containing sensitive customer data unless it is approved
by the customer in written form.
 Do not promote the locally-banned products, features, or solutions.
1. Do not use forbidden security words such as the super user and do not or seldom
use the discouraged words.
The frontline personnel must use cyber security-sensitive words with caution,
cannot use the company-prohibited words such as the super user, do not or
seldom use the discouraged words during communication, such as privacy
information and tracing.
To obtain more information about cyber security- sensitive words, click the following
link:

Category Security Marketing Document Release Date


Joint Statement of the Enterprise
Business Group, Marketing &
Security-sensitive Solutions Dept, Quality & Operation 2013-01 released;
vocabulary Dept, and Legal Affairs Dept. – 2013-10 updated
Guidelines on Using Forbidden
Words and Discouraged Words
Huawei Proprietary and Confidential
Issue V1.0(2018-01-05) Copyright © Huawei Technologies Co., Ltd. Page 9 of 20
Marketing Guide to IT Product Line Cyber Security SECRET

Concerning Cyber Security

2. Do not use case materials containing sensitive customer data.


In the customer-oriented marketing cases, do not use customer network data and
information without their written consent of the customer.
To obtain more information about customer data management regulations, click the
following link:

Category Security Marketing Document Release Date


User data Notice on Issuing the Customer Network 2013-02
management Data Security Regulations V1.0

3. Do not promote the locally-banned products, features, or solutions.


In the customer-oriented product promotion materials, do not include any
security-sensitive features and security-violation products.
Category Security Marketing Document Release Date
Sales
IT Product Line Horizontal Solution Sales
management & 2014-11
List (2014Q4) V1.0
control
Sales
IT Product Line Products Sales List (2014Q4)
management & 2014-11
V1.0
control

2.2 Scenario 2 Customer Cyber Security


Communication
2.2.1 Description
This scenario includes but is not limited to technical communication activities between
customers and frontline personnel or Huawei headquarters, such as strategic summits,
strategic alignment, Deepdive activity, solution communication, technical clarification
and communication during bidding.
In this scenario, the issues that the frontline personnel are concerned about include:
 Basic strategies about cyber security communication
 Security communication taboos
 Common topics during security communication
 Security communication precautions

Huawei Proprietary and Confidential


Issue V1.0(2018-01-05) Copyright © Huawei Technologies Co., Ltd. Page 10 of 20
Marketing Guide to IT Product Line Cyber Security SECRET

2.2.2 Security Guidance


In this scenario, the frontline personnel must note four points:
 In security-sensitive countries, do not be afraid to talk about security issues,
actively collect security requirements, and eliminate customersʹ security concerns.
In security-insensitive countries, do not actively communicate security issues.
 HQs can provide systematic security communication materials concerning
security strategies, approaches, and processes, and security promotional theme
slides and white papers.
 Do not make any promises easily about security authentication and tests.
 Do not promote products and features that are restricted by the local laws.
1. Basic strategy
In security-sensitive countries, the frontline personnel should actively collect
security requirements and communicate with customers to help eliminate their
security concerns. In security-insensitive countries, do not talk about cyber
security issues.
2. Security communication taboos
Security communication takes place in two scenarios:
 Communication with top executives of customers
When communicating with top executives of customers, the frontline personnel
can introduce Huawei cyber security strategies, approaches, and processes in
virtue of Security Promotional Theme Slides in each field of the IT product line.
Customer Focus Security Marketing Document Release Date
Huawei security Huawei Cyber Security — Strategy 2014-03
strategy, method, and Approach
and method
Cyber Security Perspectives — 100 2014-11
Top 100 cyber
requirements when considering
security
end-to-end cyber security with your
requirements
technology vendors
Cyber security Huawei IT Product Line Cyber 2014-12
Security Marketing Brief V1.0
Storage Huawei Storage Security Promotional 2014-12
Theme Slides (Chinese document)
Server Huawei Server Security Promotional 2014-11
Theme Slides (Chinese document)
Cloud computing Huawei Cloud Computing Security 2014-08
Solutions
Data center DC² Data Center Security Solution 2014-11
High-Level Presentation_V1 (Chinese
document)

You can also provide Huawei white paper materials for customers in advance to
eliminate customers' concerns. Huawei has released two issues of cyber security white

Huawei Proprietary and Confidential


Issue V1.0(2018-01-05) Copyright © Huawei Technologies Co., Ltd. Page 11 of 20
Marketing Guide to IT Product Line Cyber Security SECRET

papers. They mainly introduce the Huaweiʹs basic ideas and countermeasures about
cyber security, and Huawei security system construction.

Customer Focus Security Marketing Document Release Date


Huawei security Cyber Security Perspectives — 21 st 2012-09
white paper century technology and security-a
difficult marriage
Huawei security Cyber Security Perspectives — 2013-10
white paper Making cyber security a part of a
companyʹs DNA-A set of integrated
processes, policies and standards

 Communication with technical personnel of customers


The frontline personnel can select appropriate materials from the following
security solution slides/security white papers to help technical personnel of
customers learn about technical points. You can also provide appropriate product
security white papers for customers according to their requirements in advance to
help them understand Huawei IT product security solutions.
Customer Security Marketing Document Release Date
Focus
Storage HUAWEI OceanStor Enterprise Unified 2014-08
Storage System Technical White Paper
Huawei OceanStor UDS Massive Storage 2014-06
System Security Technical White Paper
v1.1_201406

Server
Cloud Technical White Paper for Huawei 2014-08
computing FusionSphere Security Solution
Huawei FusionCloud Desktop Solution 5.1 2014-08
Security Technical White Paper V1.0
(Internal)
Huawei FusionSphere 5.0 Technical White 2014-10
Paper on Security (Server Consolidation)

Data center Huawei Data Center Solution Security 2014-08


Technical White Paper V1.0 (Internal)

For further security solution communication, contact Ye Sihai/00266267.


3. Communication topics
 Security strategy and process issues

Huawei Proprietary and Confidential


Issue V1.0(2018-01-05) Copyright © Huawei Technologies Co., Ltd. Page 12 of 20
Marketing Guide to IT Product Line Cyber Security SECRET

For details bout Huawei cyber security strategy and process issues, see the
Huawei Cyber Security White Paper 2012/2013 document and the Huawei Cyber
Security — Strategy and Approach slides.
 Security authentication and tests
The frontline personnel must note that they cannot easily make any promises
about cyber security authentication and test and must especially pay attention to
the following:
− Do not encourage third-party authentication. If customers require Huawei to
provide third-party security authentication materials, CC authentication is
recommended (authentication of storage and cloud computing are under way).
− Do not popularize, discuss, promote, and mention source code-level security
test.
− When customers require a third party to carry out a security test (excluding
source codes):
1. Give priority to Huawei self-test.
2. If customers insist on a third-party test, tell customers to wait for HQ
decision.
3. If a third party carries out the security test, require the test report to be
sent to Huawei first.
− When customers require a third party to carry out a security test (on source
codes):
1. Any individual, subsidiary, branch, BG, or SBG has no right to make any
commitment about the open source codes without related approval or written
authorization.
2. It is recommended that customers carry out the security test at Huawei
headquarters. If customers insist on carrying on the test at their place, the test
must be approved by the CEO in charge.
− Do not actively mention the third-party source code security
test/authentication report.
 Customer request response
− When discovering cyber security problems on the customer network, the
customer interface personnel must first report them to the security contact
person. The security contact person forwards them to the minister of the
Account Dept. and Huawei security emergency response team, and then works
out countermeasures according to the comments.
− The frontline personnel report the cyber security problems from the customers
to the security contact or the director of the Account Dept. They are
responsible for resolving the problems and outputting response measures. The
(unclear) security problems are forbidden from being explained or
handled privately.
 It is prohibited to spread misleading cyber security cases such as security baseline
cases and security warning cases.
 It is prohibited to promote or deliver security-sensitive features to class A
countries (that are comprehensively sanctioned by America, including A2-Iran,
A5-North Sudan, A6-Cuba, A7-Syria, and A9-North Korea).

Huawei Proprietary and Confidential


Issue V1.0(2018-01-05) Copyright © Huawei Technologies Co., Ltd. Page 13 of 20
Marketing Guide to IT Product Line Cyber Security SECRET

2.3 Scenario 3 HQ Visit Resource


2.3.1 Description
This scenario includes but is not limited to the customersʹ visit to Huawei headquarters
in Shenzhen, where they hope to learn about Huawei cyber security organizations and
related departments.
In this scenario, the frontline personnel must know the available cyber security visit
resource in Shenzhen.

2.3.2 Security Guidance


In the HQ visit scenario, the frontline personnel must note that one visit resource is
available: Shenzhen Cyber Security War Room.
 Shenzhen Cyber Security War Room presents Huawei cyber security strategies
and approaches, E2E security guarantee systems, security solutions, and security
capability, and is open for medium-and high-level customers. The visit contact
person is Xie Bijiao/00279627. The commentator is arranged by the service
department. In principle, the director at each level is required to act as the
commentator.

2.4 Scenario 4 Security Management and Control and


Decision-Making
2.4.1 Description
During bidding or solution communication between the customers and frontline
personnel, the frontline personnel must know which IT products and features are
controlled or cannot be sold in the countries or regions where the frontline personnel
reside, and how they make decisions when customers pose major security
requirements.

2.4.2 Security Guidance


In this scenario, the frontline personnel must note the following:
 Strictly comply with the local security management and control requirements for
sales
 If customers ask for security sensitive features or products, make decisions under
the condition that do not violate the local laws and customers are willing to sign a
disclaimer agreement.
1. Management and control of IT product security sales
For details about the management and control issues of the IT product cyber
security sales, the frontline personnel can refer to the IT Product Line Product
Marketability List.
The list is released quarterly and will be completed in the configurator by the end
of 2014.
2. Customer requirements for security-sensitive features and security violation
versions
Huawei Proprietary and Confidential
Issue V1.0(2018-01-05) Copyright © Huawei Technologies Co., Ltd. Page 14 of 20
Marketing Guide to IT Product Line Cyber Security SECRET

 Decision-making process:
1. The business department submits an application.
2. BMT/IPMT reviews and approves the application.
3. BG IRB reviews and approves the application.
4. GCSO reviews and approves the application.
 Decision-making focuses:
1. Do not violate local laws.
2. Observe the fair and nondiscriminatory principles.
3. Do not violate Huawei security requirements.
4. Customers have signed the disclaimer agreement.
5. Customized versions/patches have been provided for specific countries.
3. Customer requirements for opening source codes
 Decision-making process:
1. The frontline personnel submit a security authentication applicant.
2. The representative in the Rep Office/the minister of the tier-1 Account Dept
reviews and approves the application.
3. The BU president reviews and approves the application.
4. The BG/SBG president reviews and approves the application.
5. The minister of the Quality & Information Security Dept. reviews and
approves the application.
6. GCSC reviews and approves the application.
7. The CEO in charge reviews and approves the application.
 Decision-making focuses:
1. Observer the fair, reasonable, and nondiscriminatory principles.
2. Do no use security guarantee as marketing means.
3. Huawei security authentication center is preferably selected as the security
authentication institution.
4. In principle, do not open ASIC and FPGA source codes.
5. Do not make any promises about opening source codes to customers and
government agencies including America and India.
6. Security authentication is independent of product development and delivery.
7. The platform source codes can be used only when the SBG present of the 2012
Laboratories approves.

2.5 Scenario 5 Reply to Frontline Security Questions


2.5.1 Description
In this scenario, the frontline personnel need to reply to different network questions
that are asked by customers during daily solution communication or bidding. These
security problems are classified into bidding security problems and communication
security problems.

Huawei Proprietary and Confidential


Issue V1.0(2018-01-05) Copyright © Huawei Technologies Co., Ltd. Page 15 of 20
Marketing Guide to IT Product Line Cyber Security SECRET

2.5.2 Security Guidance


In this scenario, the frontline personnel must note the following:
 Ask the Bidding Office to reply to bidding-related questions.
 Submit ITRs to reply to security-related questions.
1. Reply to bid security questions
The frontline personnel should ask the Bidding Office to reply to bidding-related
questions.
 To answer the daily security questions, the Bidding Office can refer to the replies
to IT product cyber security questions in the SOC database.
 The help channel for security technical questions is:
Frontline > Bidding Office > IT product MO > IT product security SE
The help channel for security process and company policy questions is:
Frontline > Bidding Office > IT product MO > IT CSO > PSST CSO
2. Reply to daily security questions
For details about common questions about the company security process, see the
Huawei Cyber Security — Strategy and Approach.
For common communication technical questions, submit ITRs. For emergency,
contact Tang Renpeng/239061 of IT Cyber Security Office for assistance.

Huawei Proprietary and Confidential


Issue V1.0(2018-01-05) Copyright © Huawei Technologies Co., Ltd. Page 16 of 20
Huawei IT Product Line Cyber Security Marketing Guide SECRET

3 Security Resource Collection

3.1 Basic Security Definitions


1. Security-sensitive countries
Security-sensitive countries refer to the countries that are sensitive to cyber
security. This is an in-house term. Such countries and regions total 35+1,
including Europe (31 countries), USA, Canada, Australia, New Zealand, and
Japan. Their territories and possessions are also included.
2. Class A countries
Class A countries are the countries that are comprehensively sanctioned by
America, including A2- Iran, A5- North Sudan, A6- Cuba, A7- Syria, and A9-
North Korea.
3. Cyber security requirements
Cyber security requirements refer to the basic, universal, and mandatory
requirements that meet the standards of a majority of customers and countries.
This is an in-house term and cannot be promoted to customers.
4. Security-sensitive features
If certain feature requirements of governments and customers, although they
comply with related laws, may invade communication freedom/privacy, disturb
or limit objective information flow, or locate user positions, a management and
control mechanism covering identification, decision-making, development, and
sales must be established. Development of the security-sensitive features and
sales is determined by BG IRB. GCSC has the veto power. At the same time, the
responsibilities of customers and Huawei must be clarified in written form to
minimize risks that Huawei has to run.
 The basic product package cannot contain cyber security-sensitive features
(sensitive features for short).
 In principle, sensitive features shall not be sold in the sanctioned countries.
However, the products that have the lawful interception interface that meets the
ETSI/3GPP mainstream standards (excluding the LIG) or the products for which
Huawei acts the actual controller of the end user data can be sold under the
approval of the BG IRB or its authorized organizations.
 If customers require to purchase sensitive features, their requirements can be
fulfilled only when all the following conditions are met
− The local Legal Affairs Dept. confirms that the requirements comply with
local laws.

Huawei Proprietary and Confidential


Issue V1.0(2018-01-05) Copyright © Huawei Technologies Co., Ltd. Page 17 of 20
Marketing Guide to IT Product Line Cyber Security SECRET

− The service departments confirm that the requirements comply with the
special requirements of local governments and Huawei.
− The customer requirements are open.
− The customer requirements are approved by the BG IRB or its authorized
organizations.
− The responsibilities of customers and Huawei must be clarified in written
form (for example, include exclusion clauses into the contract signed with
customers, sign a disclaimer with customers, keep exclusion emails
recognized by local laws) to eliminate the risks that Huawei may run.

3.2 Huawei Security Documentation


Category Description
Laws and Huawei GCSC Doc. No. [2012] 02 Compliance Policy of Privacy
regulations Protection & Cyber Security
Huawei Doc. No. [2012] 014 Compliance Requirements of
Privacy Protection & Cyber Security
Sales Huawei EMT Resolution No. [2013] 001 Resolution on
management & Standardizing Sales of Monitoring Products Used for
control Telecommunications Network and Internet; GCSC Minute [2012]
01; [2011] 03, 04; [2013] 02
Huawei Net Letter No. [2013] 016 Guide to Sorting and
Reviewing 2013 Security Marketability Products/Features Lists
Meeting Minute of GCSC Security Requirement Report and
Rectification of the Routine Approval Group 2013.05.22
Huawei Carrier BG IRB Letter No. [2013] 05 Approval and
Authorization Principles of Cyber Security-Sensitive Feature
Requirements
R&D security Huawei GCSC Minute No. [2011] 03 and Huawei GCSC Minute
No. [2012] 02; Huawei Doc. No. [2013] 001 Management
Requirements for Checking and Killing Product Software Viruses
Cyber Security Engineering Technology Committee Letter No.
[2013] 03 & Product Package Technology Committee Letter No.
[2012] 02 Document Integration Policies and Requirements for
Third-Party Components (Including Open-Source Software)
Huawei EBG Quality and Operation Dept. Notification No. [2013]
014 Requirements for Performing Secure Programming
Specifications
Service Huawei GCSC Minute No. [2011] 03 and 04; Huawei GCSC
delivery Minute No. [2012] 01
Huawei Carrier BG Doc. No. [2013] 034/Huawei GCSO Doc. No.
[2013] 001 Notification for Issuing Security Management
Regulations of Customer Cyber Data Security

Huawei Proprietary and Confidential


Issue V1.0(2018-01-05) Copyright © Huawei Technologies Co., Ltd. Page 18 of 20
Marketing Guide to IT Product Line Cyber Security SECRET

Category Description
Emergency Joint Statement of Huawei Public Affairs and Communications
response Dept. Doc. No. [2013] 14 and Huawei Legal Affairs Dept. Doc.
No. [2013] 005 Cyber Security Crisis Management Requirements
Huawei Doc. No. [201] 014 Management Requirements of Product
Security Vulnerability Response
Security Huawei EMT Resolution No. [2013] 020 Resolution on Enhancing
authentication Source Code Management; Huawei GCSC Minute No. [2011] 03;
Huawei GCSC Minute No. [2012] 02 and 03
Huawei GCSO Office Doc. No. [2011] 03 Regulations for Using
the Cyber Security Evaluation Center
Huawei Doc. No. [2013] 05 Notification for Verifying Security
Requirements of the Products to Be Delivered to
Security-Sensitive Countries in the Internal Cyber Security Lab
External Huawei Doc. No. [2011] 099 Declaration of Building Global
communication Cyber Security Assurance System and Issuing 2012 Cyber
Security White Paper
Huawei GCSC Doc. No. [2012]
01--Policy_of_External_Open_&_Transparent_Cooperation_on_C
yber_Security
Cyber Security — Strategy and Approach (promotional theme
slides); Huawei 2013 Cyber Security White Paper Edition 2
HR Huawei Doc. No. [2013] 104 Employee Business Conduct
Guidelines (V2.0)
HRC Doc. No. [2012] 09/GCSC Doc. No. [2012] 05
Accountability System of Cyber Security Violation (Provisional)
GCSC Doc. No. [2012] 03 and 04 Comments on Employee
Education and Security Violation Accountability
Huawei Doc. No. [2013] 006 Notification on Carrying Out Cyber
Security Education and Learning of All Employees
Organizational Huawei GCSC Doc. No. [2012] 06 Resolution on the Setting of
construction Cyber Security Organization
Huawei GCSC Doc. No. [2011] 01
Management_Requirements_on_Cyber_Security_Baseline
Huawei GCSC Minute No. [2012] 02; [2013] 03 EMT Minute
[2013] 021

3.3 Cyber Security Contacts of the IT product Line


IT product line cyber security website: http://3ms.huawei.com/hi/group/7549
Cyber Security Office of the IT product line

Huawei Proprietary and Confidential


Issue V1.0(2018-01-05) Copyright © Huawei Technologies Co., Ltd. Page 19 of 20
Marketing Guide to IT Product Line Cyber Security SECRET

Liu Bo/119425(director), Zhu Yunxuan/114382 (engineer), Tang Renpeng/239061


(engineer), Ou Rijun246947 (engineer), Tu Feiyan/274679 (engineer), and Luo
Chaogen/90002064 (engineer)

Huawei Proprietary and Confidential


Issue V1.0(2018-01-05) Copyright © Huawei Technologies Co., Ltd. Page 20 of 20

Potrebbero piacerti anche