107 lines
458 KiB
HTML
107 lines
458 KiB
HTML
|
<!DOCTYPE html>
|
|||
|
<html lang="zh"><head><title>网络安全等级保护2.0:定级、测评、实施与运维</title><meta charset="utf-8"/><link rel="preconnect" href="https://fonts.googleapis.com"/><link rel="preconnect" href="https://fonts.gstatic.com"/><link rel="stylesheet" href="https://fonts.googleapis.com/css2?family=IBM Plex Mono&family=Noto Serif Simplified Chinese:wght@400;700&family=Source Sans Pro:ital,wght@0,400;0,600;1,400;1,600&display=swap"/><meta name="viewport" content="width=device-width, initial-scale=1.0"/><meta property="og:title" content="网络安全等级保护2.0:定级、测评、实施与运维"/><meta property="og:description" content="网络安全等级保护按照网络安全等级保护核心标准的要求及网络安全建设要求,对网络安全建设流程、安全评估和测评、物理安全、网络和通信安全、设备和计算安全、应用和数据安全、安全管理机构和人员、运维管理、云计算安全、移动互联网安全、工业控制系统安全等方面提出解决方案,并紧密结合工程实际,通过具体项目案例,介绍了网安全规划设计方案,为网络安全建设人员和管理人员提供了清晰的思路和可操作的方法。 ..."/><meta property="og:image" content="https://wiki.7wate.com/static/og-image.png"/><meta property="og:width" content="1200"/><meta property="og:height" content="675"/><link rel="icon" href="../../../static/icon.png"/><meta name="description" content="网络安全等级保护按照网络安全等级保护核心标准的要求及网络安全建设要求,对网络安全建设流程、安全评估和测评、物理安全、网络和通信安全、设备和计算安全、应用和数据安全、安全管理机构和人员、运维管理、云计算安全、移动互联网安全、工业控制系统安全等方面提出解决方案,并紧密结合工程实际,通过具体项目案例,介绍了网安全规划设计方案,为网络安全建设人员和管理人员提供了清晰的思路和可操作的方法。 ..."/><meta name="generator" content="Quartz"/><link href="../../../index.css" rel="stylesheet" type="text/css" spa-preserve/><link href="https://cdnjs.cloudflare.com/ajax/libs/KaTeX/0.16.9/katex.min.css" rel="stylesheet" type="text/css" spa-preserve/><script src="../../../prescript.js" type="application/javascript" spa-preserve></script><script type="application/javascript" spa-preserve>const fetchData = fetch("../../../static/contentIndex.json").then(data => data.json())</script></head><body data-slug="Personal/Book/计算机/网络安全等级保护2.0:定级、测评、实施与运维"><div id="quartz-root" class="page"><div id="quartz-body"><div class="left sidebar"><h2 class="page-title"><a href="../../..">🪴 X·Eden</a></h2><div class="spacer mobile-only"></div><div class="search"><button class="search-button" id="search-button"><p>搜索</p><svg role="img" xmlns="http://www.w3.org/2000/svg" viewBox="0 0 19.9 19.7"><title>Search</title><g class="search-path" fill="none"><path stroke-linecap="square" d="M18.5 18.3l-5.4-5.4"></path><circle cx="8" cy="8" r="7"></circle></g></svg></button><div id="search-container"><div id="search-space"><input autocomplete="off" id="search-bar" name="search" type="text" aria-label="搜索些什么" placeholder="搜索些什么"/><div id="search-layout" data-preview="true"></div></div></div></div><button class="darkmode" id="darkmode"><svg xmlns="http://www.w3.org/2000/svg" xmlns:xlink="http://www.w3.org/1999/xlink" version="1.1" id="dayIcon" x="0px" y="0px" viewBox="0 0 35 35" style="enable-background:new 0 0 35 35" xml:space="preserve" aria-label="暗色模式"><title>暗色模式</title><path d="M6,17.5C6,16.672,5.328,16,4.5,16h-3C0.672,16,0,16.672,0,17.5 S0.672,19,1.5,19h3C5.328,19,6,18.328,6,17.5z M7.5,26c-0.414,0-0.789,0.168-1.061,0.439l-2,2C4.168,28.711,4,29.086,4,29.5 C4,30.328,4.671,31,5.5,31c0.414,0,0.789-0.168,1.06-0.44l2-2C8.832,28.289,9,27.914,9,27.5C9,26.672,8.329,26,7.5,26z M17.5,6 C18.329,6,19,5.328,19,4.5v-3C19,0.672,18.3
|
|||
|
<ul>
|
|||
|
<li><strong>书名</strong>:《网络安全等级保护2.0:定级、测评、实施与运维》</li>
|
|||
|
<li><strong>作者</strong>: 李劲等编著</li>
|
|||
|
<li><strong>分类</strong>: 计算机-理论知识</li>
|
|||
|
<li><strong>ISBN</strong>:9787115549976</li>
|
|||
|
<li><strong>出版社</strong>:人民邮电出版社</li>
|
|||
|
</ul>
|
|||
|
<h2 id="概述">概述<a role="anchor" aria-hidden="true" tabindex="-1" data-no-popover="true" href="#概述" class="internal"><svg width="18" height="18" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round"><path d="M10 13a5 5 0 0 0 7.54.54l3-3a5 5 0 0 0-7.07-7.07l-1.72 1.71"></path><path d="M14 11a5 5 0 0 0-7.54-.54l-3 3a5 5 0 0 0 7.07 7.07l1.71-1.71"></path></svg></a></h2>
|
|||
|
<p>网络安全等级保护按照网络安全等级保护核心标准的要求及网络安全建设要求,对网络安全建设流程、安全评估和测评、物理安全、网络和通信安全、设备和计算安全、应用和数据安全、安全管理机构和人员、运维管理、云计算安全、移动互联网安全、工业控制系统安全等方面提出解决方案,并紧密结合工程实际,通过具体项目案例,介绍了网安全规划设计方案,为网络安全建设人员和管理人员提供了清晰的思路和可操作的方法。</p>
|
|||
|
<h2 id="划线">划线<a role="anchor" aria-hidden="true" tabindex="-1" data-no-popover="true" href="#划线" class="internal"><svg width="18" height="18" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round"><path d="M10 13a5 5 0 0 0 7.54.54l3-3a5 5 0 0 0-7.07-7.07l-1.72 1.71"></path><path d="M14 11a5 5 0 0 0-7.54-.54l-3 3a5 5 0 0 0 7.07 7.07l1.71-1.71"></path></svg></a></h2>
|
|||
|
<blockquote>
|
|||
|
<p>等保2.0的适时推出,体现了国家积极应对新技术引发的新风险,变被动防御为主动保障,解决了中国网络安全存在的主要问题。</p>
|
|||
|
</blockquote>
|
|||
|
<blockquote>
|
|||
|
<p>《中华人民共和国网络安全法》第二十一条要求,国家实行网络安全等级保护制度;第二十五条要求,网络运营者应当制定网络安全事件应急预案;第五十九条明确了,网络运营者不履行本法第二十一条、第二十五条规定的网络安全保护义务的,由有关主管部门责令改正,给予警告。总而言之,不开展等级保护等于违法!</p>
|
|||
|
</blockquote>
|
|||
|
<blockquote>
|
|||
|
<p>第一层:法律。第二层:行政法规。第三层:规章、地方性法规以及规范性文件。</p>
|
|||
|
</blockquote>
|
|||
|
<blockquote>
|
|||
|
<p>从基础分类角度出发,可以分为:基础标准、技术标准以及管理类标准;从对象角度出发,可以分为:基础标准、系统标准、产品标准、安全服务标准以及安全事件标准等;从网络安全等级保护生命周期出发,可以分为:通用/基础标准、系统定级标准、建设标准、等级测评标准、运行维护及其他标准。</p>
|
|||
|
</blockquote>
|
|||
|
<blockquote>
|
|||
|
<p>[插图]</p>
|
|||
|
</blockquote>
|
|||
|
<blockquote>
|
|||
|
<p>没有攻不破的网络,没有绝对的信息安全</p>
|
|||
|
</blockquote>
|
|||
|
<blockquote>
|
|||
|
<p>接入控制、安全隔离、边界检测/防御、终端防御、网络审计、访问控制等</p>
|
|||
|
</blockquote>
|
|||
|
<blockquote>
|
|||
|
<p>快速响应安全事件是安全运营的关键</p>
|
|||
|
</blockquote>
|
|||
|
<blockquote>
|
|||
|
<p>一个完整的信息安全体系应该是安全技术、安全管理、安全运营的结合,三者缺一不可。</p>
|
|||
|
</blockquote>
|
|||
|
<blockquote>
|
|||
|
<p>机房内部署机房空调,24小时运行,设置温度为24°恒温。</p>
|
|||
|
</blockquote>
|
|||
|
<blockquote>
|
|||
|
<p>在系统建设完成后,按照等级保护的要求必须选择国家认可的测评机构对信息系统进行等级测评,并在系统运行过程中定期进行测评。</p>
|
|||
|
</blockquote>
|
|||
|
<blockquote>
|
|||
|
<p>① 规定统一的应急预案框架,如启动预案的条件、应急组织构成、应急资源保障、事后教育和培训等。② 制定重要事件的应急预案,如应急处理流程、系统恢复流程等。③ 定期对系统相关的人员进行应急预案培训,并进行应急预案的演练。④ 定期对原有的应急预案重新评估,修订完善。</p>
|
|||
|
</blockquote>
|
|||
|
<blockquote>
|
|||
|
<p>[插图]</p>
|
|||
|
</blockquote>
|
|||
|
<h2 id="笔记">笔记<a role="anchor" aria-hidden="true" tabindex="-1" data-no-popover="true" href="#笔记" class="internal"><svg width="18" height="18" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round"><path d="M10 13a5 5 0 0 0 7.54.54l3-3a5 5 0 0 0-7.07-7.07l-1.72 1.71"></path><path d="M14 11a5 5 0 0 0-7.54-.54l-3 3a5 5 0 0 0 7.07 7.07l1.71-1.71"></path></svg></a></h2>
|
|||
|
<blockquote>
|
|||
|
<p>2019年是中国全功能接入国际互联网25周年。</p>
|
|||
|
</blockquote>
|
|||
|
<p>💭 1994年中国全功能接入国际互联网</p>
|
|||
|
<blockquote>
|
|||
|
<p>等保2.0标准不再自主定级,而是通过“确定定级对象→初步确定等级→专家评审→主管部门审核→公安机关备案审查→最终确定等级”这种线性的定级流程,系统定级必须经过专家评审和主管部门审核,才能到公安机关备案,整体定级更加严格。</p>
|
|||
|
</blockquote>
|
|||
|
<p>💭 流程化</p>
|
|||
|
<blockquote>
|
|||
|
<p>对于大型工业控制系统,可根据系统功能、责任主体、控制对象和生产厂商等因素划分为多个定级对象。</p>
|
|||
|
</blockquote>
|
|||
|
<p>💭 具体情况具体分析</p>
|
|||
|
<blockquote>
|
|||
|
<p>[插图]</p>
|
|||
|
</blockquote>
|
|||
|
<p>💭 最基础的物理环境影响在特定场景下非常致命,亲身经历过……</p>
|
|||
|
<blockquote>
|
|||
|
<p>传统的以防为主的安全架构受到了极大挑战,安全防御手段也明显不足,需要重新分析当前信息系统的架构,评估安全措施的有效性,实施以积极防御为主导思想的新的安全架构。</p>
|
|||
|
</blockquote>
|
|||
|
<p>💭 企业蜜罐🍯引诱攻击者利用,进而拖延抓捕攻击者。</p>
|
|||
|
<blockquote>
|
|||
|
<p>机房场地应避免设在建筑物的顶层或地下室,否则应加强防水和防潮措施。</p>
|
|||
|
</blockquote>
|
|||
|
<p>💭 最好在中间楼层或者1/3楼层以上</p>
|
|||
|
<h2 id="书评">书评<a role="anchor" aria-hidden="true" tabindex="-1" data-no-popover="true" href="#书评" class="internal"><svg width="18" height="18" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round"><path d="M10 13a5 5 0 0 0 7.54.54l3-3a5 5 0 0 0-7.07-7.07l-1.72 1.71"></path><path d="M14 11a5 5 0 0 0-7.54-.54l-3 3a5 5 0 0 0 7.07 7.07l1.71-1.71"></path></svg></a></h2>
|
|||
|
<h2 id="点评">点评<a role="anchor" aria-hidden="true" tabindex="-1" data-no-popover="true" href="#点评" class="internal"><svg width="18" height="18" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round"><path d="M10 13a5 5 0 0 0 7.54.54l3-3a5 5 0 0 0-7.07-7.07l-1.72 1.71"></path><path d="M14 11a5 5 0 0 0-7.54-.54l-3 3a5 5 0 0 0 7.07 7.07l1.71-1.71"></path></svg></a></h2></article><hr/><div class="page-footer"></div></div><div class="right sidebar"><div class="graph"><h3>关系图谱</h3><div class="graph-outer"><div id="graph-container" data-cfg="{"drag":true,"zoom":true,"depth":1,"scale":1.1,"repelForce":0.5,"centerForce":0.3,"linkDistance":30,"fontSize":0.6,"opacityScale":1,"showTags":true,"removeTags":[],"focusOnHover":false}"></div><button id="global-graph-icon" aria-label="Global Graph"><svg version="1.1" xmlns="http://www.w3.org/2000/svg" xmlns:xlink="http://www.w3.org/1999/xlink" x="0px" y="0px" viewBox="0 0 55 55" fill="currentColor" xml:space="preserve"><path d="M49,0c-3.309,0-6,2.691-6,6c0,1.035,0.263,2.009,0.726,2.86l-9.829,9.829C32.542,17.634,30.846,17,29,17
|
|||
|
s-3.542,0.634-4.898,1.688l-7.669-7.669C16.785,10.424,17,9.74,17,9c0-2.206-1.794-4-4-4S9,6.794,9,9s1.794,4,4,4
|
|||
|
c0.74,0,1.424-0.215,2.019-0.567l7.669,7.669C21.634,21.458,21,23.154,21,25s0.634,3.542,1.688,4.897L10.024,42.562
|
|||
|
C8.958,41.595,7.549,41,6,41c-3.309,0-6,2.691-6,6s2.691,6,6,6s6-2.691,6-6c0-1.035-0.263-2.009-0.726-2.86l12.829-12.829
|
|||
|
c1.106,0.86,2.44,1.436,3.898,1.619v10.16c-2.833,0.478-5,2.942-5,5.91c0,3.309,2.691,6,6,6s6-2.691,6-6c0-2.967-2.167-5.431-5-5.91
|
|||
|
v-10.16c1.458-0.183,2.792-0.759,3.898-1.619l7.669,7.669C41.215,39.576,41,40.26,41,41c0,2.206,1.794,4,4,4s4-1.794,4-4
|
|||
|
s-1.794-4-4-4c-0.74,0-1.424,0.215-2.019,0.567l-7.669-7.669C36.366,28.542,37,26.846,37,25s-0.634-3.542-1.688-4.897l9.665-9.665
|
|||
|
C46.042,11.405,47.451,12,49,12c3.309,0,6-2.691,6-6S52.309,0,49,0z M11,9c0-1.103,0.897-2,2-2s2,0.897,2,2s-0.897,2-2,2
|
|||
|
S11,10.103,11,9z M6,51c-2.206,0-4-1.794-4-4s1.794-4,4-4s4,1.794,4,4S8.206,51,6,51z M33,49c0,2.206-1.794,4-4,4s-4-1.794-4-4
|
|||
|
s1.794-4,4-4S33,46.794,33,49z M29,31c-3.309,0-6-2.691-6-6s2.691-6,6-6s6,2.691,6,6S32.309,31,29,31z M47,41c0,1.103-0.897,2-2,2
|
|||
|
s-2-0.897-2-2s0.897-2,2-2S47,39.897,47,41z M49,10c-2.206,0-4-1.794-4-4s1.794-4,4-4s4,1.794,4,4S51.206,10,49,10z"></path></svg></button></div><div id="global-graph-outer"><div id="global-graph-container" data-cfg="{"drag":true,"zoom":true,"depth":-1,"scale":0.9,"repelForce":0.5,"centerForce":0.3,"linkDistance":30,"fontSize":0.6,"opacityScale":1,"showTags":true,"removeTags":[],"focusOnHover":true}"></div></div></div><div class="toc desktop-only"><button type="button" id="toc" class aria-controls="toc-content" aria-expanded="true"><h3>目录</h3><svg xmlns="http://www.w3.org/2000/svg" width="24" height="24" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="fold"><polyline points="6 9 12 15 18 9"></polyline></svg></button><div id="toc-content" class><ul class="overflow"><li class="depth-0"><a href="#简介" data-for="简介">简介</a></li><li class="depth-0"><a href="#概述" data-for="概述">概述</a></li><li class="depth-0"><a href="#划线" data-for="划线">划线</a></li><li class="depth-0"><a href="#笔记" data-for="笔记">笔记</a></li><li class="depth-0"><a href="#书评" data-for="书评">书评</a></li><li class="depth-0"><a href="#点评" data-for="点评">点评</a></li></ul></div></div><div class="explorer mobile-only"><button type="button" id="explorer" data-behavior="collapse" data-collapsed="collapsed" data-savestate="true" data-tree="[{"path":"Personal","collapsed":true},{"path":"Personal/Blog","collapsed":true},{"path":"Personal/Blog/2018","collapsed":true},{"path":"Personal/Blog/2020","collapsed":true},{"path":"Personal/Blog/2021","collapsed":true},{"path":"Personal/Blog/2022","collapsed":true},{"path":"Personal/Blog/2023","collapsed":true},{"path":"Personal/Blog/2024","collapsed":true},{"path":"Personal/Book","collapsed":true},{"path":"Personal/Book/个人成长","collapsed":true},{"path":"Personal/Book/医学健康","collapsed":true},{"path":"Personal/Book/历史","collapsed":true},{"path":"Personal/Book/哲学宗教","collapsed":true},{"path":"Personal/Book/心理","collapsed":true},{"path":"Personal/Book/政治军事","collapsed":true},{"path":"Personal/Book/教育学习","collapsed":true},{"path":"Personal/Book/文学","collapsed":true},{"path":"Personal/Book/生活百科","collapsed":true},{"path":"Personal/Book/社会文化","collapsed":true},{"path":"Personal/Book/科学技术","collapsed":true},{"path":"Personal/Book/经济理财","collapsed":true},{"path":"Personal/Book/艺术","collapsed":true},{"path":"Personal/Book/计算机","collapsed":true},{"path":"Personal/Journal","collapsed":true},{"path":"Personal/Journal/2022","collapsed":true},{"path":"Personal/Journal/2022/W34","collapsed":true},{"path":"Personal/Journal/2022/W35","collapsed":true},{"path":"Personal/Journal/2022/W36","collapsed":true},{"path":"Personal/Journal/2022/W37","collapsed":true},{"path":"Personal/Journal/2022/W38","collapsed":true},{"path":"Personal/Journal/2022/W39","collapsed":true},{"path&q
|
|||
|
</script><script type="module">
|
|||
|
let mermaidImport = undefined
|
|||
|
document.addEventListener('nav', async () => {
|
|||
|
if (document.querySelector("code.mermaid")) {
|
|||
|
mermaidImport ||= await import('https://cdnjs.cloudflare.com/ajax/libs/mermaid/10.7.0/mermaid.esm.min.mjs')
|
|||
|
const mermaid = mermaidImport.default
|
|||
|
const darkMode = document.documentElement.getAttribute('saved-theme') === 'dark'
|
|||
|
mermaid.initialize({
|
|||
|
startOnLoad: false,
|
|||
|
securityLevel: 'loose',
|
|||
|
theme: darkMode ? 'dark' : 'default'
|
|||
|
})
|
|||
|
|
|||
|
await mermaid.run({
|
|||
|
querySelector: '.mermaid'
|
|||
|
})
|
|||
|
}
|
|||
|
});
|
|||
|
</script><script src="https://cdnjs.cloudflare.com/ajax/libs/KaTeX/0.16.9/contrib/copy-tex.min.js" type="application/javascript"></script><script src="../../../postscript.js" type="module"></script></html>
|