当前位置:网站首页>Interpretation of basic requirements for classified protection of network security (GBT 22239-2019)
Interpretation of basic requirements for classified protection of network security (GBT 22239-2019)
2022-06-22 11:35:00 【CNRio】
《 Basic requirements for network security level protection 》(GB/T 22239-2019) Standard interpretation
0 introduction
《 Information security technology Basic requirements for information system security level protection 》(GB/T 22239-2008) It has played a very important role in the process of implementing the classified protection system of information security in China , It is widely used in various industries or fields , Guide users to carry out construction and rectification of information system security level protection 、 Grade evaluation and other work [1]. With the development of information technology , existing 10 Year history 《GB/T 22239-2008》 In timeliness 、 Ease of use 、 The operability needs to be further improved .2017 year 《 Network security law of the people's Republic of China 》[2] The implementation of , In order to cooperate with the state to implement the network security classification protection system [3], It also needs to be revised 《GB/T 22239-2008》.
2014 year , National Information Security Standardization Technical Committee ( Hereinafter referred to as safety standard committee ) Issued the right 《GB/T 22239-2008》 The task of making revisions . The Third Research Institute of the Ministry of public security is mainly responsible for the revision of the standard ( Evaluation Center for classified protection of information security of the Ministry of public security ), 20 Many enterprises and institutions sent personnel to participate in the revision of the standard . The standard preparation group was established on 2014 Founded in , We have investigated international and domestic cloud computing platforms 、 Big data applications 、 Mobile Internet access 、 New technologies such as Internet of things and industrial control system 、 Usage of new applications , The safety concerns and safety control elements in new technologies and applications are analyzed and summarized , The first draft of the basic requirements has been completed .
2015 year 2 Month to 2016 year 7 month , The standard preparation group is based on the first draft of the draft , Widely solicit industrial users 、 Safety service organizations and various industries / Opinions of experts in the field , And adjust and improve the standard draft according to the opinions , Have successively formed 7 A draft of the standard .2016 year 9 month , The standard preparation team participated in the safety standard committee WG5 The working group is working on the standard promotion meeting , According to the modification suggestions put forward by experts and member units , The draft has been revised , A draft of the standard has been formed .2017 year 4 month , The standard preparation team participated in the safety standard committee again WG5 The working group is working on the standard promotion meeting , Revision suggestions collected according to the exposure draft , Revised the exposure draft , The standard draft for review has been formed .2017 year 10 month , The standard preparation team once again participated in the safety standard committee WG5 The working group is working on the standard promotion meeting , At the meeting, the contents of the draft for review were introduced , And solicit the opinions of member units , According to the collected modification suggestions , Revised and improved the draft submitted for review , The standard draft for approval has been formed .
2019 year 《 Information security technology Basic requirements for network security level protection 》(GB/T 22239-2019) To be formally implemented . In this paper, 《GB/T 22239-2019》 Comparison 《GB/T 22239-2008》 Major changes have taken place , Interpret the main contents of its general security requirements and security extension requirements , So that readers can better understand and master 《GB/T 22239-2019》 The content of .
1 Changes in the overall structure
1.1 Main changes
《GB/T 22239-2019》 Compare with 《GB/T 22239-2008》, Changes have taken place in both the overall structure and the details [4]. The main changes in the overall structure are :
1) To adapt to the network security law , Cooperate to implement the network security level protection system , The name of the standard is changed from 《 Basic requirements for information system security level protection 》 Change it to 《 Basic requirements for network security level protection 》.
2) The level protection object is adjusted from the original information system to the basic information network 、 The information system ( Including systems using mobile Internet technology )、 Cloud computing platform / System 、 Big data applications / platform / resources 、 Internet of things and industrial control system .
3) The original security requirements at all levels are divided into general security requirements and security extension requirements , Security extension requirements include cloud computing security extension requirements 、 Mobile internet security extension requirements 、 Internet of things security expansion requirements and industrial control system security expansion requirements . The general requirements for safety are the requirements that must be met regardless of the form of the protected object ; For Cloud Computing 、 Mobile Internet 、 The special requirements put forward by the Internet of things and industrial control systems are called security extension requirements .
4) Technical requirements at all levels in the original basic requirements “ Physical security ” 、“ Network security ” 、“ Host security ” 、“ Application security ” and “ Backup and recovery of data ” Amend to “ Secure physical environment ” 、“ Secure communication network ” 、“ Security zone boundary ” 、“ Secure computing environment ” and “ Safety Management Center ” ; Required by the original management at all levels “ Safety management system ” 、“ Safety management organization ” 、“ Personnel safety management ” 、“ System construction management ” and “ System operation and maintenance management ” Amend to “ Safety management system ” 、“ Safety management organization ” 、“ Safety management personnel ” 、“ Safety construction management ” and “ Safety operation and maintenance management ” [5].
5) Cloud computing security extension requirements are proposed according to the characteristics of cloud computing environment . The main contents include “ Location of infrastructure ” 、“ Virtualization security ” 、“ Mirror and snapshot protection ” 、“ Cloud computing environment management ” and “ Cloud service providers choose ” etc. .
6) Mobile internet security extension requirements are proposed according to the characteristics of mobile Internet . The main contents include “ The physical location of the wireless access point ” 、“ Mobile terminal control ” 、“ Mobile application control ” 、“ Mobile application software procurement ” and “ Mobile application software development ” etc. .
7) The security expansion requirements of the Internet of things are put forward according to the characteristics of the Internet of things . The main contents include “ Sensing the physical protection of nodes ” 、“ Sense node device security ” 、“ Gateway node device security ” 、“ Aware node management ” and “ Data fusion processing ” etc. .
8) The safety expansion requirements of industrial control system are put forward according to the characteristics of industrial control system . The main contents include “ Protection of outdoor control equipment ” 、“ Industrial control system network architecture security ” 、“ Dial up usage control ” 、“ Wireless usage control ” and “ Control equipment safety ” etc. .
9) Cancel the original security control point S、A、G mark , Add appendix A“ Selection and use of general safety requirements and safety extension requirements ” , Describe the relationship between the grading result of the graded protection object and the safety requirements , Explain how to grade according to S、A As a result, select the relevant provisions of safety requirements , Simplified the content of the main body of the standard .
10) Add appendix C Describe the security framework and key technologies of hierarchical protection 、 appendix D Describe cloud computing application scenarios 、 appendix E Describe the mobile Internet application scenario 、 appendix F Describe the Internet of things application scenario 、 appendix G Describe the application scenario of industrial control system 、 appendix H Describe big data application scenarios [6, 7].
1.2 The meaning and function of change
《GB/T 22239-2019》 The division of general security requirements and security extension requirements makes the use of the standard more flexible and targeted . Due to the different information technologies adopted by different levels of protection objects , The protection measures adopted will also be different . for example , There are differences in protection measures between traditional information systems and cloud computing platforms , There are also differences in protection measures between cloud computing platforms and industrial control systems . In order to reflect the protection differences of different objects , 《GB/T 22239-2019》 The safety requirements are divided into general safety requirements and extended safety requirements .
The general requirements for safety are put forward according to the common protection requirements , No matter what form the protected object appears , It is necessary to realize the general safety requirements of the corresponding level according to the safety protection level . Security extension requirements are proposed for personalized protection requirements , Level protection objects need to be protected according to the safety protection level 、 Use specific technologies or specific application scenarios to achieve security extension requirements . The security protection measures for the classified protection objects need to realize both the general security requirements and the security extension requirements , So as to protect the objects with different levels more effectively . for example , The traditional information system may only need to adopt the protection measures proposed by the general security requirements , The cloud computing platform not only needs to adopt the protection measures proposed by the general security requirements , We should also adopt the protection measures proposed by the cloud computing security expansion requirements according to the technical characteristics of the cloud computing platform ; The industrial control system not only needs to adopt the protection measures proposed by the general safety requirements , In addition, according to the technical characteristics of the industrial control system, the protection measures proposed by the safety expansion requirements of the industrial control system shall be adopted .
2 Contents of general safety requirements
2.1 Basic classification of general safety requirements
《GB/T 22239-2019》 It specifies the safety requirements for the objects protected from the first level to the fourth level , The safety requirements of each level are composed of general safety requirements and extended safety requirements . for example , 《GB/T 22239-2019》 The basic structure of the proposed level III Safety requirements is :
8 Level 3 Safety requirements
8.1 General requirements for safety
8.2 Cloud computing security extension requirements
8.3 Mobile internet security extension requirements
8.4 Internet of things security extension requirements
8.5 Safety extension requirements of industrial control system
The general safety requirements are subdivided into technical requirements and management requirements . The technical requirements include “ Secure physical environment ” 、“ Secure communication network ” 、“ Security zone boundary ” 、“ Secure computing environment ” and “ Safety Management Center ” ; Management requirements include “ Safety management system ” 、“ Safety management organization ” 、“ Safety management personnel ” 、“ Safety construction management ” and “ Safety operation and maintenance management ” . The two add up 10 Categories: , Pictured 1 Shown .
[ Failed to transfer the external chain picture (img-fz0Rkpbo-1569168897794)(《 Basic requirements for network security level protection 》(GB T 22239-2019) Standard interpretation /img_1.png)]
chart 1 Basic classification of general safety requirements
2.2 technical requirement
The classification of technical requirements reflects the defense in depth idea from the outside to the inside . For the security protection of the objects under grade protection, the overall protection from the outside to the inside from the communication network to the regional boundary and then to the computing environment shall be considered , At the same time, consider the security protection of the physical environment in which it is located . For high-level protection objects, it is also necessary to consider the centralized technical management means for the safety functions or safety components distributed in the whole system .
1) Secure physical environment
The safety physical environment part of the general safety requirements is the safety control requirements for the physical machine room . The main object is the physical environment 、 Physical equipment and facilities, etc ; The safety control points involved include the selection of physical location 、 Physical access control 、 Burglary and vandalism 、 Lightning protection 、 Fire prevention 、 Water and moisture resistance 、 Antistatic 、 Temperature and humidity control 、 Power supply and electromagnetic protection .
surface 1 The security physical environment control points are given / Step by step change of requirements . The number represents the number of required items at each level under each control point , The higher the level , The more items required . The figures in the following tables have this meaning .
surface 1 Secure physical environment control point / Step by step change of requirements
| Serial number | The control points | Class A | second level | Level three | Level Four |
|---|---|---|---|---|---|
| 1 | Selection of physical location | 0 | 2 | 2 | 2 |
| 2 | Physical access control | 1 | 1 | 1 | 2 |
| 3 | Burglary and vandalism | 1 | 2 | 3 | 3 |
| 4 | Lightning protection | 1 | 1 | 2 | 2 |
| 5 | Fire prevention | 1 | 2 | 3 | 3 |
| 6 | Water and moisture resistance | 1 | 2 | 3 | 3 |
| 7 | Antistatic | 0 | 1 | 2 | 2 |
| 8 | Temperature and humidity control | 1 | 1 | 1 | 1 |
| 9 | Power supply | 1 | 2 | 3 | 4 |
| 10 | Electromagnetic protection | 0 | 1 | 2 | 2 |
The computer room bearing the high-level system strengthens the physical access control compared with the computer room bearing the low-level system 、 Requirements for power supply and electromagnetic protection . for example , Compared with level 3, level 4 adds “ Important areas shall be equipped with a second electronic access control system ” 、“ Emergency power supply facilities shall be provided ” 、“ Electromagnetic shielding shall be applied to key areas ” Other requirements .
2) Secure communication network
The safety communication network part of the general safety requirements is the safety control requirements for the communication network . The main object is wan 、 Man, LAN, etc ; The security control points involved include network architecture 、 Communication transmission and trusted verification .
surface 2 The secure communication network control point is given / Step by step change of requirements .
| Serial number | The control points | Class A | second level | Level three | Level Four |
|---|---|---|---|---|---|
| 1 | Network architecture | 0 | 2 | 5 | 6 |
| 2 | Communication transmission | 1 | 1 | 2 | 4 |
| 3 | Trusted verification | 1 | 1 | 1 | 1 |
surface 2 Secure communication network control point / Step by step change of requirements
The communication network of the high-level system strengthens the priority bandwidth allocation compared with the communication network of the low-level system 、 Device access authentication 、 Requirements for communication equipment certification, etc . for example , Compared with level 3, level 4 adds “ It shall be possible to allocate bandwidth according to the importance of business services , Give priority to important business ” , “ The trusted verification mechanism shall be adopted to perform trusted verification on the equipment in the access network , Ensure that the devices connected to the network are authentic ” , “ Both sides of the communication shall be verified or authenticated based on cryptographic technology before communication ” Other requirements .
3) Security zone boundary
The security zone boundary in the general security requirements is a security control requirement for the network boundary . The main objects are system boundary and area boundary ; The safety control points involved include boundary protection 、 Access control 、 Invasion prevention 、 Malicious code prevention 、 Security audit and trusted verification .
surface 3 The boundary control points of the safety zone are given / Step by step change of requirements .
| Serial number | The control points | Class A | second level | Level three | Level Four |
|---|---|---|---|---|---|
| 1 | Border protection | 1 | 1 | 4 | 6 |
| 2 | Access control | 3 | 4 | 5 | 5 |
| 3 | Invasion prevention | 0 | 1 | 4 | 4 |
| 4 | Malicious code prevention | 0 | 1 | 2 | 2 |
| 5 | Security audit | 0 | 3 | 4 | 3 |
| 6 | Trusted verification | 1 | 1 | 1 | 1 |
surface 3 Safety zone boundary control points / Step by step change of requirements
The network boundary of the high-level system strengthens the requirements of high-strength isolation and illegal access blocking compared with the network boundary of the low-level system . for example , Compared with level 3, level 4 adds “ Data exchange shall be conducted at the network boundary by means of communication protocol conversion or communication protocol isolation ” , “ It shall be able to detect the unauthorized connection of unauthorized equipment to the internal network or the unauthorized connection of internal users to the external network , Effectively block it ” Other requirements .
4) Secure computing environment
The security computing environment part of the general security requirements is the security control requirements proposed for the interior of the boundary . The main object is all objects inside the boundary , Including network devices 、 Safety equipment 、 Server devices 、 Terminal equipment 、 Application system 、 Data objects and other devices ; The security control points involved include identity authentication 、 Access control 、 Security audit 、 Invasion prevention 、 Malicious code prevention 、 Trusted verification 、 Data integrity 、 Data confidentiality 、 Data backup and recovery 、 Residual information protection and personal information protection .
surface 4 The control points of secure computing environment are given / Step by step change of requirements .
* surface 4* Secure computing environment control point / Step by step change of requirements
| Serial number | The control points | Class A | second level | Level three | Level Four |
|---|---|---|---|---|---|
| 1 | Identification | 2 | 3 | 4 | 4 |
| 2 | Access control | 3 | 4 | 7 | 7 |
| 3 | Security audit | 0 | 3 | 4 | 4 |
| 4 | Invasion prevention | 2 | 5 | 6 | 6 |
| 5 | Malicious code prevention | 1 | 1 | 1 | 1 |
| 6 | Trusted verification | 1 | 1 | 1 | 1 |
| 7 | Data integrity | 1 | 1 | 2 | 3 |
| 8 | Data confidentiality | 0 | 0 | 2 | 2 |
| 9 | Data backup and recovery | 1 | 2 | 3 | 4 |
| 10 | Residual information protection | 0 | 1 | 2 | 2 |
| 11 | Personal information protection | 0 | 2 | 2 | 2 |
surface 4 Secure computing environment control point / Step by step change of requirements
The computing environment of the high-level system strengthens the identity authentication compared with the computing environment of the low-level system 、 Requirements for access control and program integrity . for example , Compared with level 3, level 4 adds “ Password should be used 、 Cryptography 、 Biometrics and other two or more combinations of authentication technology to identify users , And at least one of the authentication techniques should be implemented by using cryptography ” , “ Response subject 、 The object is set with a security mark , The access of the subject to the object is determined according to the security mark and the mandatory access control rules ” , “ Active immune trusted verification mechanism shall be adopted to timely identify intrusion and virus behavior , And effectively block ” Other requirements .
5) Safety Management Center
The safety management center part of the general safety requirements is the technical control requirements for safety management proposed for the whole system , Realize centralized management through technical means . The safety control points involved include system management 、 Audit management 、 Safety management and centralized control .
surface 5 The control points of the safety management center are given / Step by step change of requirements .
| Serial number | The control points | Class A | second level | Level three | Level Four |
|---|---|---|---|---|---|
| 1 | System management | 2 | 2 | 2 | 2 |
| 2 | Audit management | 2 | 2 | 2 | 2 |
| 3 | security management | 0 | 2 | 2 | 2 |
| 4 | Centralized control | 0 | 0 | 6 | 7 |
surface 5 Security management center control point / Step by step change of requirements
The security management of the high-level system strengthens the requirements of centralized control by using technical means compared with the security management of the low-level system . for example , Compared with level II, level III adds “ Specific management areas shall be allocated , Control the security devices or components distributed in the network ” , “ Deal with network links 、 Safety equipment 、 Centralized monitoring of network equipment and servers ” , “ The audit data scattered on various devices shall be collected, summarized and analyzed in a centralized way , And ensure that the retention time of audit records meets the requirements of laws and regulations ” , “ Coping with security strategies 、 Malicious code 、 Patch upgrade and other security related matters shall be managed centrally ” Other requirements .
2.3 Management requirements
The classification of management requirements reflects the idea of comprehensive management from elements to activities . Safety management needs “ Institutions ” 、“ The system ” and “ personnel ” None of the three elements is indispensable , At the same time, it shall also control and manage important activities in the process of system construction and rectification and operation and maintenance . It is necessary to build a complete safety management system for high-level protection objects .
1) Safety management system
The safety management system in the general safety requirements is the safety control requirements for the whole management system , The security control points involved include security policies 、 Management system 、 Develop and issue, review and revise .
surface 6 The control points of safety management system are given / Step by step change of requirements .
| Serial number | The control points | Class A | second level | Level three | Level Four |
|---|---|---|---|---|---|
| 1 | The security policy | 0 | 1 | 1 | 1 |
| 2 | Management system | 1 | 2 | 3 | 3 |
| 3 | Develop and release | 0 | 2 | 2 | 2 |
| 4 | Review and revise | 0 | 1 | 1 | 1 |
surface 6 Safety management system control points / Step by step change of requirements
2) Safety management organization
The safety management organization part of the general safety requirements is the safety control requirements for the entire management organization structure , The safety control points involved include post setting 、 Staffing 、 Authorization and approval 、 Communication and cooperation, as well as audit and inspection .
surface 7 The control points of safety management organization are given / Step by step change of requirements .
| Serial number | The control points | Class A | second level | Level three | Level Four |
|---|---|---|---|---|---|
| 1 | Position setting | 1 | 2 | 3 | 3 |
| 2 | Staffing | 1 | 1 | 2 | 3 |
| 3 | Authorization and approval | 1 | 2 | 3 | 3 |
| 4 | Communication and cooperation | 0 | 3 | 3 | 3 |
| 5 | Audit and inspection | 0 | 1 | 3 | 3 |
surface 7 Safety management organization control point / Step by step change of requirements
3) Safety management personnel
The safety management personnel part of the general safety requirements is the safety control requirements for the personnel management mode , The safety control points involved include personnel recruitment 、 Personnel leave the post 、 Safety awareness education and training and access management of external personnel .
surface 8 The control points of safety management personnel are given / Step by step change of requirements .
| Serial number | The control points | Class A | second level | Level three | Level Four |
|---|---|---|---|---|---|
| 1 | Employment | 1 | 2 | 3 | 4 |
| 2 | Personnel leave the post | 1 | 1 | 2 | 2 |
| 3 | Safety awareness education and training | 1 | 1 | 3 | 3 |
| 4 | Access management of external personnel | 1 | 3 | 4 | 5 |
surface 8 Safety management personnel control points / Step by step change of requirements
4) Safety construction management
The safety construction management part of the general safety requirements is the safety control requirements for the safety construction process , The safety control points involved include grading and filing 、 Safety scheme design 、 Procurement and use of safety products 、 Develop your own software 、 Outsourcing software development 、 Project implementation 、 Test acceptance 、 System delivery 、 Grade evaluation and service provider management .
surface 9 The safety construction management control points are given / Step by step change of requirements .
| Serial number | The control points | Class A | second level | Level three | Level Four |
|---|---|---|---|---|---|
| 1 | Grading and filing | 1 | 4 | 4 | 4 |
| 2 | Safety scheme design | 1 | 3 | 3 | 3 |
| 3 | Procurement and use of safety products | 1 | 2 | 3 | 4 |
| 4 | Develop your own software | 0 | 2 | 7 | 7 |
| 5 | Outsourcing software development | 0 | 2 | 3 | 3 |
| 6 | Project implementation | 1 | 2 | 3 | 3 |
| 7 | Test acceptance | 1 | 2 | 2 | 2 |
| 8 | System delivery | 2 | 3 | 3 | 3 |
| 9 | Rating | 0 | 3 | 3 | 3 |
| 10 | Service provider management | 2 | 2 | 3 | 3 |
surface 9 Safety construction management control point / Step by step change of requirements
5) Safety operation and maintenance management
The security operation and maintenance management part of the general security requirements is the security control requirements for the security operation and maintenance process , The safety control points involved include environmental management 、 Asset management 、 Media management 、 Equipment maintenance management 、 Loopholes and risk management 、 Network and system security management 、 Malicious code prevention management 、 Configuration Management 、 Password management 、 Change management 、 Backup and recovery management 、 Security incident handling 、 Emergency plan management and outsourcing operation and maintenance management .
surface 10 The safety operation and maintenance management control points are given / Step by step change of requirements .
| Serial number | The control points | Class A | second level | Level three | Level Four |
|---|---|---|---|---|---|
| 1 | Environmental management | 2 | 3 | 3 | 4 |
| 2 | Asset management | 0 | 1 | 3 | 3 |
| 3 | Media management | 1 | 2 | 2 | 2 |
| 4 | Equipment maintenance management | 1 | 2 | 4 | 4 |
| 5 | Loopholes and risk management | 1 | 1 | 2 | 2 |
| 6 | Network and system security management | 2 | 5 | 10 | 10 |
| 7 | Malicious code prevention management | 2 | 3 | 2 | 2 |
| 8 | Configuration Management | 0 | 1 | 2 | 2 |
| 9 | Password management | 0 | 2 | 2 | 3 |
| 10 | Change management | 0 | 1 | 3 | 3 |
| 11 | Backup and recovery management | 2 | 3 | 3 | 3 |
| 12 | Security incident handling | 2 | 3 | 4 | 5 |
| 13 | Emergency plan management | 0 | 2 | 4 | 5 |
| 14 | Outsourcing operation and maintenance management | 0 | 2 | 4 | 4 |
surface 10 Safety operation and maintenance management control point / Step by step change of requirements
3 Security extension requirements
Security extension requirements refer to the security requirements that need to be added to the level protection object under specific technology or specific application scenario .《GB/T 22239-2019》 The proposed security extension requirements include cloud computing security extension requirements 、 Mobile internet security extension requirements 、 Internet of things security expansion requirements and industrial control system security expansion requirements .
3.1 Cloud computing security extension requirements
The information system adopting cloud computing technology is usually called cloud computing platform . The cloud computing platform consists of facilities 、 Hardware 、 Resource abstraction control layer 、 Virtualize computing resources 、 Software platform and application software . Cloud computing platforms usually have cloud service providers and cloud service customers / Cloud tenants have two roles . According to the type of service provided by the cloud service provider , Cloud computing platforms have software as a service (SaaS)、 Platform as a service (PaaS)、 Infrastructure as a service (IaaS)3 A basic cloud computing service model . In different service modes , Cloud service providers and cloud service customers have different control ranges over resources , The control scope determines the boundary of safety responsibility .
Cloud computing security extension requirements are additional security requirements that need to be implemented in addition to the general security requirements proposed for the cloud computing platform . The control points involved in cloud computing security extension requirements include infrastructure location 、 Network architecture 、 Access control of network boundary 、 Intrusion prevention of network boundary 、 Security audit of network boundary 、 Centralized control 、 Authentication of computing environment 、 Access control of computing environment 、 Intrusion prevention in computing environment 、 Mirror and snapshot protection 、 Data security 、 Data backup recovery 、 Residual information protection 、 Cloud service providers choose 、 Supply chain management and cloud computing environment management .
surface 11 The control points of cloud computing security extension requirements are given / Step by step change of requirements .
| Serial number | The control points | Class A | second level | Level three | Level Four |
|---|---|---|---|---|---|
| 1 | Infrastructure location | 1 | 1 | 1 | 1 |
| 2 | Network architecture | 2 | 3 | 5 | 8 |
| 3 | Access control of network boundary | 1 | 2 | 2 | 2 |
| 4 | Intrusion prevention of network boundary | 0 | 3 | 4 | 4 |
| 5 | Security audit of network boundary | 0 | 2 | 2 | 2 |
| 6 | Centralized control | 0 | 0 | 4 | 4 |
| 7 | Authentication of computing environment | 0 | 0 | 1 | 1 |
| 8 | Access control of computing environment | 2 | 2 | 2 | 2 |
| 9 | Intrusion prevention in computing environment | 0 | 0 | 3 | 3 |
| 10 | Mirror and snapshot protection | 0 | 2 | 3 | 3 |
| 11 | Data security | 1 | 3 | 4 | 4 |
| 12 | Data backup recovery | 0 | 2 | 4 | 4 |
| 13 | Residual information protection | 0 | 2 | 2 | 2 |
| 14 | Cloud service providers choose | 3 | 4 | 5 | 5 |
| 15 | Supply chain management | 1 | 2 | 3 | 3 |
| 16 | Cloud computing environment management | 0 | 1 | 1 | 1 |
surface 11 Cloud computing security extensions require control points / Step by step change of requirements
3.2 Mobile internet security extension requirements
Class protection objects adopting mobile Internet technology , Its mobile interconnection part is usually composed of mobile terminals 、 Mobile applications and wireless networks 3 Part of it is made up of . The mobile terminal connects the wireless access device to the wired network through the wireless channel ; The wireless access gateway restricts the access behavior of the mobile terminal through the access control policy ; Background mobile terminal management system ( If configured ) Responsible for the management of mobile terminals , Including sending mobile device management to client software 、 Mobile application management and mobile content management policies .
Mobile internet security extension requirements are for mobile terminals 、 Special security requirements for mobile applications and wireless networks , Together with the general security requirements, they constitute the complete security requirements for the classified protection objects using the mobile Internet technology . The control points involved in mobile internet security extension requirements include the physical location of wireless access points 、 Border protection between wireless and wired networks 、 Access control between wireless and wired networks 、 Intrusion prevention between wireless and wired networks , Mobile terminal control 、 Mobile application control 、 Mobile application software procurement 、 Mobile application software development and configuration management .
surface 12 The control points of mobile internet security extension requirements are given / Step by step change of requirements .
| Serial number | The control points | Class A | second level | Level three | Level Four |
|---|---|---|---|---|---|
| 1 | The physical location of the wireless access point | 1 | 1 | 1 | 1 |
| 2 | Border protection between wireless and wired networks | 1 | 1 | 1 | 1 |
| 3 | Access control between wireless and wired networks | 1 | 1 | 1 | 1 |
| 4 | Intrusion prevention between wireless and wired networks | 0 | 5 | 6 | 6 |
| 5 | Mobile terminal control | 0 | 0 | 2 | 3 |
| 6 | Mobile application control | 1 | 2 | 3 | 4 |
| 7 | Mobile application software procurement | 1 | 2 | 2 | 2 |
| 8 | Mobile application software development | 0 | 2 | 2 | 2 |
| 9 | Configuration Management | 0 | 0 | 1 | 1 |
surface 12 Mobile internet security extension requires control points / Step by step change of requirements
3.3 Internet of things security extension requirements
The Internet of things can generally be divided into 3 A logic layer , Perception layer 、 Network transport layer and processing application layer . The sensing layer includes sensor nodes and sensor network gateway nodes RFID Labels and RFID Reader writer , It also includes the communication between the sensing device and the sensor network gateway 、RFID Labels and RFID Short distance communication between readers and writers ( Usually wireless ) part ; The network transport layer includes a network that transmits sensing data over a long distance to the processing center , Like the Internet 、 Mobile network or convergence of several different networks ; The processing application layer includes a platform for storing and intelligently processing perceptual data , And provide services for business application terminals . For the large Internet of things , The processing application layer is generally composed of cloud computing platform and business application terminal .
The security protection of the Internet of things should include the perception layer 、 Network transport layer and processing application layer . Because the network transport layer and processing application layer are usually composed of computer equipment , Therefore, these two parts are protected according to the requirements of the general safety requirements . The security extension requirements of the Internet of things are special security requirements for the perception layer , Together with the general security requirements, they constitute the complete security requirements for the Internet of things .
The control points involved in the security expansion requirements of the Internet of things include the physical protection of sensing nodes 、 Intrusion prevention of perceptual network 、 Access control of perceptual network 、 Sense node device security 、 Gateway node device security 、 Anti data replay 、 Data fusion processing and management of sensing nodes .
surface 13 The control points for the security expansion requirements of the Internet of things are given / Step by step change of requirements .
| Serial number | The control points | Class A | second level | Level three | Level Four |
|---|---|---|---|---|---|
| 1 | Sensing the physical protection of nodes | 2 | 2 | 4 | 4 |
| 2 | Intrusion prevention of perceptual network | 0 | 2 | 2 | 2 |
| 3 | Access control of perceptual network | 1 | 1 | 1 | 1 |
| 4 | Sense node device security | 0 | 0 | 3 | 3 |
| 5 | Gateway node device security | 0 | 0 | 4 | 4 |
| 6 | Anti data replay | 0 | 0 | 2 | 2 |
| 7 | Data fusion processing | 0 | 0 | 1 | 2 |
| 8 | Aware node management | 1 | 2 | 3 | 3 |
surface 13 IOT security extension requires control points / Step by step change of requirements
3.4 Safety extension requirements of industrial control system
Industrial control system is usually a high-level protection object with high availability requirements . Industrial control system is the general name of various control systems , Typical data acquisition and monitoring control system (SCADA)、 Distributed control system (DCS) etc. . Industrial control systems are usually used for electric power , Water and sewage treatment , Oil and gas , chemical , The transportation , Pharmacy , Pulp and paper , Food and beverage and discrete manufacturing ( Such as car 、 Aerospace and durable goods ) Other industries .
Industrial control system is generally divided into from top to bottom 5 A hierarchy , Enterprise resource layer in turn 、 Production management 、 Process monitoring layer 、 Field control layer and field equipment layer , Real time requirements vary at different levels , The safety protection of industrial control system shall include all levels . Because the enterprise resource layer 、 Production management layer and process monitoring layer are usually composed of computer equipment , Therefore, these levels are protected according to the requirements of the general safety requirements .
The safety expansion requirements of industrial control system are special safety requirements for field control layer and field equipment layer , Together with the general safety requirements, they constitute the complete safety requirements for industrial control systems . The control points involved in the safety expansion requirements of industrial control system include outdoor control equipment protection 、 Network architecture 、 Communication transmission 、 Access control 、 Dial up usage control 、 Wireless usage control 、 Control equipment safety 、 Product procurement and use and outsourced software development .
surface 14 The control points for safety extension requirements of industrial control system are given / Step by step change of requirements .
| Serial number | The control points | Class A | second level | Level three | Level Four |
|---|---|---|---|---|---|
| 1 | Protection of outdoor control equipment | 2 | 2 | 2 | 2 |
| 2 | Network architecture | 2 | 3 | 3 | 3 |
| 3 | Communication transmission | 0 | 1 | 1 | 1 |
| 4 | Access control | 1 | 2 | 2 | 2 |
| 5 | Dial up usage control | 0 | 1 | 2 | 3 |
| 6 | Wireless usage control | 2 | 2 | 4 | 4 |
| 7 | Control equipment safety | 2 | 2 | 5 | 5 |
| 8 | Purchase and use of products | 0 | 1 | 1 | 1 |
| 9 | Outsourcing software development | 0 | 1 | 1 | 1 |
surface 14 Safety extension of industrial control systems requires control points / Step by step change of requirements
4 Conclusion
《GB/T 22239-2019》 Compare with in structure and content 《GB/T 22239-2008》 Great changes have taken place , These changes give rise to the rectification of the construction of network security level protection 、 Grade evaluation and other work have brought certain impact . How to form security solutions based on new standards , How to carry out grade protection evaluation based on the new standard , We need to study the new standards carefully , Based on the new standards, find new ideas and new methods to carry out network security level protection .
边栏推荐
- R语言使用自定义函数编写深度学习阶跃step激活函数、并可视化阶跃step激活函数
- 奋斗吧,程序员——第三十九章 人生不失意,焉能慕知己
- HMS Core新闻行业解决方案:让技术加上人文的温度
- 【软工】 软件体系结构
- Install pyGame
- Recommander un logiciel de machine virtuelle pour la construction rapide d'un Cluster d'ordinateurs à puce M1
- Puzzle (019) plane forward problem
- 【软工】计划和项目管理
- How many of the eight classic MySQL errors did you encounter?
- R language uses user-defined functions to write in-depth learning parametric relu activation functions and visualize parametric relu activation functions
猜你喜欢

Common thread scheduling methods

Today, how does sysak implement business jitter monitoring and diagnosis Take you through Anolis OS 25-26

Development technology of NFT trading platform digital collection system

Rtklib postpos carding (taking single point positioning as an example)

TCP connection establishment process (in-depth understanding of the source code and three handshakes)

Flink状态管理

微信小程序项目实例——图片处理小工具(自制低配版美图秀秀)

将有色液体图像转换成透明液体,CMU教机器人准确掌控向杯中倒多少水

Puzzle (019) plane forward problem

“不敢去怀疑代码,又不得不怀疑代码”记一次网络请求超时分析
随机推荐
Basic principles of the Internet
Convert the colored liquid image into transparent liquid, and CMU teaches the robot to accurately control how much water is poured into the cup
Pychart debugging is stuck and connected appears
奋斗吧,程序员——第四十四章 八百里分麾下炙,五十弦翻塞外声
In depth analysis of business model of blind box software development in 2022
Web Configuration of Visual Studio Code
puzzle(019)平面正推问题
R语言使用自定义函数编写深度学习阶跃step激活函数、并可视化阶跃step激活函数
[Software Engineering] Introduction & process and life cycle modeling
Go微服务(一)——RPC入门
Recommend a virtual machine software for fast cluster building of M1 chip computers
R language uses read Table load the data set (CSV data) of conditional logistic regression analysis, and use the unique function to view the number of groups of paired data
【软工】计划和项目管理
【软工】 设计模块
6-13 improving load performance - application cache
Common thread scheduling methods
【软工】 概论 & 过程和生命周期建模
[user case - intelligent manufacturing] Digital generous "cloud" collaboration, leap over Qianshan "guarantee" production!
[understanding of opportunity -28]: Guiguzi - Internal Defense chapter - protect yourself and persuade your boss
开源代码存在安全隐患:一个项目平均有49个漏洞