Relevant documents, guidelines, requirements, etc. for 25 levels of network security protection (level protection), download at the end of the article

Hello everyone, this is the Network Technology Alliance website.

What I bring to you today are documents related to network security level protection.

What is waiting guarantee?

Class protection refers to the hierarchical security protection of important national information, proprietary information of legal persons and other organizations and citizens, public information, and information systems that store, transmit, and process such information. Hierarchical management, which responds and disposes of information security incidents that occur in the information system in a hierarchical manner.

What is Equal Insurance 2.0?

"Grade protection 2.0" or "Grade protection 2.0" is a common term, which refers to the general term for carrying out work according to the new grade protection standards. It is generally considered to be proposed after the promulgation and implementation of the "Network Security Law of the People's Republic of China". On December 1, 2019, the updated version of the basic requirements, evaluation requirements and design technical requirements of network security level protection is a symbolic sign.

Waiting for 5 grades

The same as the existing "information security" graded protection system, the "Regulations on Security Protection" still divides the network into five security protection levels, and the classification basis basically follows the factors such as the degree of importance and the degree of harm stipulated in the "Administrative Measures". In accordance with the "Multiple Security Regulations", according to the importance of the network in national security, economic construction, and social life, and the impact on national security and social order once it is damaged, loses its function, or data is tampered with, leaked, lost, or damaged , public interests, and the degree of harm to the legitimate rights and interests of relevant citizens, legal persons, and other organizations, the network is divided into the following five security protection levels:

first level

Once damaged, it will cause damage to the legitimate rights and interests of relevant citizens, legal persons and other organizations, but will not endanger national security, social order and the general network of public interests.

second level

Once damaged, it will cause serious damage to the legitimate rights and interests of relevant citizens, legal persons and other organizations, or cause harm to social order and public interests, but it will not endanger the general network of national security.

third level

Once damaged, it will cause particularly serious damage to the legitimate rights and interests of relevant citizens, legal persons and other organizations

fourth level

Once damaged, it will cause particularly serious harm to social order and public interests, or a particularly important network that will cause serious harm to national security.

fifth level

Critically important networks that would pose a particularly serious risk to national security if compromised.

Waiting for insurance related information

Table of contents

  • GAT 1389-2017 Information Security Technology Network Security Level Protection Grading Guide.pdf
  • GB 17859-1999_2375 Safety Protection Classification Criteria.pdf
  • GBT 22239-2019 Basic Requirements for Network Security Level Protection of Information Security Technology.pdf
  • GBT 22240-2008 Information Security Technology Information System Security Level Protection Grading Guide.pdf
  • GBT 22240-2020 Information Security Technology Network Security Classified Protection Grading Guide.pdf
  • GBT 25058-2019 Information Security Technology Network Security Level Protection Implementation Guide.pdf
  • GBT 25070-2019 Information Security Technology Network Security Level Protection Security Design Technical Requirements.pdf
  • GBT 28449-2018 Information Security Technology Network Security Classified Protection Evaluation Process Guide (2).pdf
  • GBT 28449-2018 Information Security Technology Network Security Classified Protection Evaluation Process Guide.pdf
  • GBT 35273-2020 Personal Information Security Specification.pdf
  • GBT 36627-2018 Information Security Technology Network Security Classified Protection Testing and Evaluation Technical Guidelines.pdf
  • GBT 36958-2018 Information Security Technology Network Security Level Protection Security Management Center Technical Requirements.pdf
  • GBT 36959-2018 Information Security Technology Network Security Level Protection Evaluation Institution Capability Requirements and Evaluation Specifications.pdf
  • GBT 39786-2021 Basic Requirements for Cryptography Application in Information Security Technology Information System.pdf
  • GBT22239-2019 Information Security Technology Network Security Level Protection Basic Requirements.pdf
  • GBT22239-2019 Information Security Technology Network Security Level Protection Basic Requirements.pdf
  • GBT25070-2019 Information Security Technology Network Security Level Protection Security Design Technical Requirements.pdf
  • GBT28448-2019 Information Security Technology Network Security Level Protection Evaluation Requirements.pdf
  • GY T 337-2020 "Guidelines for Grading of Radio and Television Network Security Level Protection".pdf
  • ISEAA 001-2020 Guidelines for High Risk Determination of Network Security Level Protection Evaluation.pdf
  • "Network Security Law of the People's Republic of China" came into effect on June 1, 2017.pdf
  • Interpretation of "Basic Requirements for Classified Network Security Protection" (GB_T 22239-2019) Standard.pdf
  • "Administrative Measures for Network Security Level Protection Evaluation Institutions" Gong Xin'an [2018] No. 765 Notice.pdf
  • Technical Requirements for Security Design of Information System Hierarchical Protection.pdf
  • Alliance Group Standard T∕ISEAA 002-2021 Information Security Technology Network Security Level Protection Big Data Basic Requirements.pdf

screenshot

Download

first step:

Like this article, click to watch, and forward to the circle of friends

Step two:

Scan the QR code below, and after paying attention, reply the secret code " waiting for protection "

Operation and maintenance talk is a public account of Ruige for the field of operation and maintenance. Welcome your attention!

Guess you like

Origin blog.csdn.net/weixin_43025343/article/details/132032648