Provincial government portal system level protection requirements, national government service platform standards

1 year ago (2024-01-17) Chief Editor
5 minutes
two hundred and seventy-six
zero

Source: //www.cnnq.net/

According to relevant requirements of national level protection, The information security protection level of the provincial government portal system should be set as three levels The website system should establish comprehensive control measures to form a protection, detection, response and recovery system under the guidance of the same security strategy. Through the use of information security risk analysis and hierarchical protection gap analysis, the security requirements of the website system are formed, so as to establish a targeted security system framework and security protection measures.

Website system security requirements

According to the application of the website system, the security requirements for the website system can be obtained from System business process, software, data, network and physics Comprehensive analysis is carried out in several aspects, and the specific requirements are as follows:

1. Business process security requirements

Focusing on the accuracy of published information, the controllability of collection, analysis and summary of information, and the availability of the service platform, the system may face threats including Network attack, ultra vires, abuse, tampering, anti repudiation and physical attack should strengthen the ability to resist and protect against these threats By strictly controlling all links in the business process, including the requirements of personnel access identity, access control, approval and audit in the process of information collection, analysis, summary, and release, we should also strengthen the integrity protection of the system itself and the realization of the non repudiation mechanism.

2. Software security requirements

The website system software architecture generally includes Access layer, presentation layer, application layer, basic application support layer, information resource layer and basic support operating environment As there are some differences in the main functions and software implementations involved in several levels, it is necessary to analyze the possible threats faced by different levels.

The access layer is jointly constructed by the target user and the access media. It is an access portal for the business system. From the perspective of security requirements, the possibility of the portal attacking the system should be reduced. The designated access and portal can be protected by establishing a trusted mechanism, and the non designated interface can be protected by controlling permissions;

The presentation layer is the display area of the system content, which should ensure the integrity of the system display information and reduce the risk of being tampered with;

The application layer is the core part of data information processing. The security of the system itself and the security of software coding should be strengthened to reduce the vulnerability of the system itself;

The basic application support layer mainly includes general application services such as general components, user management, directory services and exchange components. This layer focuses on ensuring the security of the system components themselves, and strengthening the security of the interface with applications; The information resource layer is composed of business database and platform database, and the key security of this layer is database security; The basic support operating environment layer, the operating system, network infrastructure and security protection that support the operation of the application system, together form the basic support operating environment. The main threats faced by this layer include physical attacks, network attacks, software and hardware failures, inadequate management, malicious code and other threats. The comprehensive management of assets should be strengthened.

3. Data security requirements

The data of the website system mainly includes the data information read, entered, managed and reviewed by the Internet, as well as the interaction information of the front desk and the data exchange information of the back desk. In view of the different access relationships in each link of these information, the sensitivity and importance of the information are different, and there may be some differences in the threats faced, The reading process should combine the sensitivity and importance of information to conduct access control, so as to reduce the occurrence of threats such as ultra vires and abuse; Pay attention to the integrity and legitimacy of the input information itself, and pay attention to preventing malicious code and Trojan horse attacks on the system; The management and audit involves the key information of the information system, so it basically belongs to the management of sensitive information or key processes in the system to strengthen the safety management of personnel; Interaction and data exchange should resist network attacks and strengthen the non repudiation mechanism through the system's own security protection mechanism.

4. Network and physical security requirements

At the network level, the focus is to design a reasonable network architecture, deploy redundant network equipment, and form a security domain that can establish different security policies, so as to ensure the normal and stable operation of the website system.

Physical security mainly involves environmental security (fire prevention, waterproof, lightning protection, etc.), anti-theft, theft and damage prevention of equipment and media. Specifically, it includes: the selection of physical location, physical access control, anti-theft and vandalism prevention, lightning protection, fire prevention, waterproof and moisture-proof, anti-static, temperature and humidity control, power supply and electromagnetic protection, etc. The construction of the computer room should meet the relevant national requirements.

5. Security requirements for IT assets

IT assets focus on the vulnerability risk of the assets themselves, and can be divided into hardware assets and software assets according to the different types of assets. The key threats that hardware assets may face are software and hardware failures, physical attacks, etc; The threats that software assets may face include tampering, disclosure, network attack, malicious code and non repudiation.

6. Comprehensive security requirements

Through comprehensive security risk and demand analysis in all aspects, the business, software, data, network and related IT assets related to the website system are mainly threatened by network attack, tampering, physical attack, malicious code, ultra vires, abuse and non repudiation due to its application type, environment and other factors, The threat will have a greater impact after being used, resulting in a higher security risk. Therefore, necessary security measures should be taken to counter these threats and strengthen the security of the system itself. At the same time, we should further improve the control measures related to physical security, network security, host security, application security and data security, and be able to implement the management requirements related to organization, system, personnel, construction and operation and maintenance, in combination with the relevant technologies and management control points of the basic requirements of information security level protection.

This article is written by: Chief Editor Published on Software Development of Little Turkey , please indicate the source for reprinting: //hongchengtech.cn/blog/4178.html
Kuke_WP editor
author

Related recommendations

1 year ago (2024-02-20)

What are the main contents of wms system in warehouse management

Original title: What does the wms system mainly embody in warehouse management? What does the wms system mainly embody in warehouse management? Warehouse management has standardized and intelligent process oriented management. A good warehouse management mechanism can improve the efficiency of warehouse managers, relieve their pressure, and complete efficient and accurate work. 1. Warehouse management is accompanied by the progress of the times
1 year ago (2024-02-18)

How to implement the mptt comment function of CMS content management system in Django?, Django management page

During the daily development of content related Web systems in the directory, whether it is Blog or CMS, if you need to add links to interact with users, you must need the comment function. Next, you can implement the comment reply function in Django based on Python's MPTT framework. Note: Because the user comment function will involve a
three hundred and ninety-four
zero
1 year ago (2024-02-18)

Best CMS content management system in 2022, good novel in 2021

Looking for the best CMS software to build your website? At a high level, CMS or content management systems can help you create functional websites without having to use code to build every page from scratch. However, different CMS software has different advantages and disadvantages, so you need to choose the tool that best suits your specific needs and budget. To help, we accept
four hundred and six
zero
1 year ago (2024-02-18)

Shenzhen promotes the access of 5G base station energy storage system to the virtual power plant management center in the city. Does the Shenzhen 5g government subsidize the flow package charge

Xinhua News Agency, Shenzhen, December 14 (Reporter Wang Feng) At the 2022 Carbon Peak Carbon Neutralization Forum and Shenzhen International Low Carbon City Forum held here in Shenzhen, Shenzhen Virtual Power Plant Management Center signed a cooperation agreement on virtual power plant construction with China Tower, China Telecom, China Mobile, China Unicom, Huawei Digital Energy and other units on the 13th, which will jointly promote the city's 5G base station energy storage system
three hundred and forty-three
zero
1 year ago (2024-02-18)

Common website cms content management system recommendation, common website cms content management software

CMS is the abbreviation of "Content Management System", which means "Content Management System" in Chinese. These systems have developed common website functions and provided them to users for download, greatly improving the efficiency of website construction. The most common functions of CMS are column management, article management, product management, picture management
three hundred and twenty-eight
zero

comment

0 people have participated in the review

Scan code to add WeChat

contact us

WeChat: Kuzhuti
Online consultation: