Detailed content of each level of the equal protection assessment

  Class protection assessment refers to the assessment of information system security level protection, which is an important task in the field of information security in my country. According to the national standards "Basic Requirements for Information System Security Level Protection" (GB/T 22239-2008) and "Technical Requirements for Evaluation of Information System Security Level Protection" (GB/T 25070-2010).

  There are five levels of assessment guarantee scores, namely: Level 1, Level 2, Level 3, Level 4, and Level 5. Here are the details for each level:

  1. Level 1: Mainly protects important national information systems and has high security requirements. The system requires strong security protection capabilities and can withstand various advanced attacks and damage. There are very high requirements for the physical security, network security, system software security, application software security, user security, data security and other aspects of the system.

  2. Level 2: Mainly protects information systems of important national departments and important fields, and has higher security requirements. The system is required to have strong security protection capabilities and be able to withstand higher-level attacks and damage. There are higher requirements for the physical security, network security, system software security, application software security, user security, data security and other aspects of the system.

  3. Level 3: Mainly protects important information systems of governments and enterprises and institutions, and has higher security requirements. The system is required to have strong security protection capabilities and be able to withstand medium-level attacks and damage. There are higher requirements for the physical security, network security, system software security, application software security, user security, data security and other aspects of the system.

  4. Level 4: Mainly protects important information systems of enterprises and institutions, and has general security requirements. The system is required to have average security protection capabilities and be able to withstand general attacks and damage. There are general requirements for the physical security, network security, system software security, application software security, user security, data security, etc. of the system.

  5. Level 5: Mainly protects the basic information systems of enterprises and institutions, and has basic security requirements. The system is required to have weak security protection capabilities and be able to withstand basic attacks and damage. There are basic requirements for the physical security, network security, system software security, application software security, user security, data security and other aspects of the system.

Guess you like

Origin blog.csdn.net/bocco/article/details/132587728
Recommended