Level protection study notes

Basic guarantee process

  1. Grading
    steps of: determining an object classification, grading initially identified objects (business information systems and services), expert evaluation, supervisory authorities, the public security authorities for the record review.
  2. Recording
    Hold the graded report, record form and other materials to the local public security organ network security department for record.
  3. Construction and rectification
    Refer to the current level requirements and standards of the information system to rectify and strengthen the information system.
  4. Rating evaluation
    Entrust an evaluation agency with an evaluation mechanism to evaluate the information system and form a formal evaluation report.
  5. Supervision and Inspection
    Submit the evaluation report to the network supervision department of the local public security organ, and cooperate to complete the inspection of the implementation of information security level protection.

One center triple protection

Insert picture description here

Key measures for equal protection 2.0 construction

Insert picture description here

Insert picture description here

Waiting for 2.0 design ideas

Insert picture description here
Secure communication network-data integrity and confidential transmission

Insert picture description here
Design and Realization of the Safety Area Boundary Function

Insert picture description here

Equivalent technical analysis and delivery guidance

And so the whole process of security assessment
Insert picture description here
Insert picture description here
rating for the record

Insert picture description here

Insert picture description here
Differential rectification-safe physical environment
Insert picture description here
Differential rectification-safe area boundary
Insert picture description here
Differential rectification-safe communication network
Insert picture description here
Differential rectification-safe computing environment
Insert picture description here
Insert picture description here
Insert picture description here

Insert picture description here
Differential rectification - Security Management Center
Insert picture description here
Differential rectification - Security management
Insert picture description here
Insert picture description here
level evaluation
Insert picture description here
Insert picture description here

Published 37 original articles · won praise 29 · views 3704

Guess you like

Origin blog.csdn.net/weixin_44253823/article/details/105446949