Case of cyber security planning project for a financial institution under the background of data security and security compliance

0 22
PrefaceIn recent years, frequent incidents such as network intrusion, informatio...

Preface

In recent years, frequent incidents such as network intrusion, information leakage, and network viruses have occurred. At the national level, a number of data security-related laws and regulations have been successively issued. As a key industry under strict supervision by the state, the financial industry has drafted and issued various relevant industry standards and specifications in accordance with the upper-level laws and regulations. In addition, combining with the fact that the basic infrastructure and information systems of the author's company have been constructed for many years, some application systems, management platforms, and equipment need to be updated and replaced, and reorganized. In this situation, it is of great significance to comprehensively carry out the company's cyber security planning and scientifically and reasonably promote the construction of cyber security.Given that the cyber security construction of most financial institutions is at the same level as our company, except for the leading institutions in the industry that are at the forefront of maturity and technological innovation, this planning project of our company is proposed to lead the way for discussions with fellow industry professionals.

I. Project Implementation Background

(I) The requirements for cyber security supervision are becoming increasingly strict

In response to the objective reality and urgent needs of the cyber security situation at home and abroad, a series of laws, regulations, and regulatory requirements have been successively introduced domestically, such as the 'Cyber Security Law', the series of standards of 'Cyber Security Grade Protection' (Level Protection 2.0), the 'Data Security Law', the 'Regulations on the Security Protection of National Key Information Infrastructure', and the 'Personal Information Protection Law', which have put forward more comprehensive and strict new requirements for the management of cyber security, data security, and personal information security.

(II) Cost reduction and efficiency improvement in the implementation of cyber security construction

Case of cyber security planning project for a financial institution under the background of data security and security compliance

The digital construction of the current company has entered the fast lane, and through a series of projects such as network transformation, cloud management platform construction, and enterprise service bus construction, networks are connected, resources are integrated, and interactions and sharing are achieved. Therefore, under the background of comprehensive information construction and security compliance, how to implement the synchronous construction of cyber security through overall planning and intensive construction, improve the compliance of cyber security management, and avoid excessive construction of cyber security and excessive resource investment is an urgent problem that needs to be solved.

II. Project Construction Content

(One) Overall construction思路

The company has already possessed the most basic security management infrastructure, completed the division and construction of the internal network, unified the internet exit, and also adopted a comprehensive management approach to manage all network resources and server resources.

Figure 1 Framework of overall construction思路

On this basis, it should continue to follow the principle of deep defense in network security, first clarifying the protection objects of network security and the subsequent protection efforts required through the classification and grading of data assets and the classification and grading of existing information systems.

In the overall security planning stage, it is necessary to sort out and count the existing data distribution, system analysis, and the coverage of network security resources, and combine the classification and grading results of data and information systems, as well as the identified network security technology risks and compliance risks, to provide the most reasonable network security planning solution.

The final planning approach is to allocate network security resources in stages and batches according to the different levels of protection objects and the security risks they face, ensuring that the most comprehensive security protection is provided for important data and systems at the moment, while also maximizing the use of the company's existing and future resources.

(Two) Planning project organization structure

The group leader of the project leadership group is the division leader of the company's network security, and department heads serve as members of the project leadership group.

The project manager is planned to be the head of the IT department, and the project members are the network security special posts, security officers of each department, and third-party security service suppliers.

(Three) Implementation content of each stage

1.Data classification and grading (data compliance risk assessment)

1) Data asset sorting

Work Content:

  • A project launch meeting (system research + data research) is held, notifying department heads to arrange and appoint the responsible persons for data asset sorting in their respective departments to participate in the subsequent asset sorting work.
  • Training on the use of data asset reporting tools is conducted for the responsible persons of data asset sorting in each department, clarifying the scope, type, and reporting methods of data statistics for the current status of data lifecycle management.
  • The project team collects and summarizes the statistical results of data assets from each department, and returns the statistical results that do not meet the reporting requirements for correction.

Work Significance:

  • The sorting work of existing data assets has been completed, and the basic work for the formulation of classification and grading principles has been completed.
  • A preliminary investigation of the current status of data lifecycle management has been completed.

Output Results:

Data Asset Sorting Table, Data Lifecycle Management Current Status Statistics Table

2) Principle of classification and grading

Work Content:

  • Refer to the 'JRT 0197-2020 Financial Data Security Data Security Grading Guidelines', and classify and grade the data summarized by each department based on the existing data classification and grading principles of the company.
  • Screen out the categories applicable to the current data status of the company from the industry and group data classification and grading reference standards.
  • Combined with the hierarchical classification protection requirements of the industry, the principles of classification and grading are redefined according to the existing data management environment.

Work Significance:

  • The classification and grading work is completed based on best practices and the current management status, providing a basis for the subsequent system classification and grading.
  • An analysis of the resources required for data security protection at all levels has been preliminarily completed.

Output Results:

Data Classification and Grading Details, Data Lifecycle Assessment Table

3) Data Risk Assessment

Work Content:

Refer to the requirements of laws and regulations such as the 'Data Security Law', 'Personal Information Protection Law', 'GB/T 35273-2017 Information Security Technology Personal Information Security Specification', 'Financial Data Security Data Lifecycle Security Specification JRT0223-2021', etc., combined with the statistical results of 'Data Asset Sorting Table' and 'Data Lifecycle Management Current Status Statistics Table', conduct risk assessment of all links of the data lifecycle through interviews, technical inspections, and other methods.

Work Significance:

Identify the technical and compliance risks of existing data security as an important reference and input for the company's subsequent safety management and overall planning.

Output Results:

Data Security Risk Assessment Report, Data Security Risk Disposal Suggestions

2.Information System Grading and Classification (Full Coverage Assessment of Level Protection)

1) Current Status Research of Information Systems

Work Content:

  • Convene the project launch meeting (system research + data research) to notify department heads to arrange and appoint the responsible persons for information system sorting in their respective departments to cooperate with the subsequent research work.
  • Train the responsible persons for system sorting in all departments according to the existing system classification and grading definitions of the company;
  • The project team collects and summarizes the system statistics results of all departments, and returns the statistics results that do not meet the reporting requirements for correction.

Work Significance:

  • Refer to the grading management principles of level protection to conduct an initial sorting of systems, as a reference for the adjustment of subsequent system grading and classification principles;
  • Statistical data on the security resources invested in existing systems as an important input for the planning stage.

Output Results:

Summary Table of Information Systems (including business feature descriptions, associated data, and statistics of security resource investment)

2) Establishment of System Grading and Classification Principles

Work Content:

Based on the research results of information systems, combined with the requirements of industry-level protection, compile the classification and grading details of internal systems of the company.

Work Significance:

Compile guidance documents for the security level certification filing of existing information systems and newly constructed systems in the future.

Output Results:

Details of Information System Classification and Grading

3) System Grading and Filing Guidance

Work Content:

Conduct centralized publicity and Q&A sessions for the 'Details of Information System Classification and Grading' and the security level certification filing process for all departments.

Work Significance:

  • Establish the basic environment for achieving full coverage of security level certification filing;
  • Establish the basic working process for system reporting;
  • Avoid over-classification and over-construction of information systems.

Output Results:

  • Each department has the independent ability to classify and grade systems and to file for security level certification;
  • The initial completion of the process construction for the internal filing of the system.

3.Overall Planning of Corporate Network Security (Intensive Construction, Integration, and Utilization of Existing Resources)

1) Security Management Resource Analysis

Work Content:

Based on the statistical results of security resources at the data and system research stage, combined with the classification and grading results of data and systems, analyze the rationality of the current resource allocation.

Work Significance:

As a reference for the integration of existing resources and the planning of future resources.

Output Results:

Security Management Resource Analysis Report

2) Risk Control Requirement Analysis

Work Content:

Summarize the results of the past year's safety inspections, risk assessments, and security assessment, and combine them with the results of data risk assessment to complete the analysis of risk control requirements.

Work Significance:

As a reference for resource integration and planning, define the key investment direction of security resources.

Output Results:

《Risk Control Demand List》

3)Network Security Management Resource Integration Proposal

Work Content:

Based on the current status of risk control demand and security resource allocation, provide suggestions for the integration of existing network security management resources, and prioritize the rectification content.

Work Significance:

  • Define the direction of integrating existing resources;
  • Ensure the necessity and effectiveness of resource investment.

Output Results:

《Network Security Management Resource Integration Proposal》

4)Network Security Resource Input Planning

Work Content:

  • The project team plans security resources for other risk items after the integration of existing resources is completed, mainly involving personnel organization adjustments, process construction optimization, technical product supplements, and the utilization planning of existing products after the supplement of products;
  • Comprehensively analyze the network security strategic direction of the industry and the group, and provide a network security project topic applicable to the current management and development status of the company.

Work Significance:

  • Define the direction of additional resource investment within three to five years;
  • Provide suggestions for the utilization of old resources within three to five years;
  • Ensure the rationality of network security resource allocation within three to five years.

Output Results:

《Overall Network Security Planning Report》

3. Project Input

According to the implementation plan formulated by the project proposal, the total estimated man-days of the project are 92 man-days, and the specific estimated man-days and implementation methods are as follows:

Implementation Stage

Implementation Content

Implementation Method

Man-day Estimation

Data Classification and Grading

Data Asset Sorting

Interview and Research

10

Principles for Classification and Grading

Document Writing, On-site Reporting

7

Data Risk Assessment

Interview and Research, Technical Assessment

14

Information System Classification and Grading

Current Information System Research

Interview and Research

10

Establishment of System Classification and Grading Principles

Document Writing, On-site Reporting

7

System Classification Record Guidance

Document Writing, On-site Guidance

5

Overall Network Security Planning

Security Management Resource Analysis

Document Writing, On-site Reporting

10

Risk Control Demand Analysis

Document Writing, On-site Reporting

5

Existing Resource Integration Proposal

Document Writing, On-site Reporting

10

Future Resource Input Planning

Document Writing, On-site Reporting

14


Total Man-days

92

4. Project Implementation Period and Nodes

(I) Construction Period

Construction Period: June 20XX to December 20XX

(II) Key Nodes of Project Implementation

Serial Number

Project Implementation Progress

Start Time

1

Project Launch

June 20XX

2

Data Asset/Information System Sorting Training

June 20XX

3

Data Asset/Information System Sorting

June to July 20XX

4

Principles for Classification and Grading

July to August 20XX

5

Data Risk Assessment

August to September 20XX

6

System Classification Record Guidance

September 20XX

7

Security Management Resource/Risk Control Demand Analysis

September to October 20XX

8

Resource Integration Proposal/Resource Input Planning Compilation

October to November 20XX

9

Resource Integration Proposal/Resource Input Planning Review

November to December 20XX

10

Project Acceptance

December 20XX


你可能想看:

It is possible to perform credible verification on the system boot program, system program, important configuration parameters, and application programs of computing devices based on a credible root,

As announced today, Glupteba is a multi-component botnet targeting Windows computers. Google has taken action to disrupt the operation of Glupteba, and we believe this action will have a significant i

Announcement regarding the addition of 7 units as technical support units for the Ministry of Industry and Information Technology's mobile Internet APP product security vulnerability database

Ensure that the ID can be accessed even if it is guessed or cannot be tampered with; the scenario is common in resource convenience and unauthorized vulnerability scenarios. I have found many vulnerab

In today's rapidly developing digital economy, data has become an important engine driving social progress and enterprise development. From being initially regarded as part of intangible assets to now

Bubba AI launches open-source compliance platform Comp AI, helping 100,000 startups achieve security compliance

Data security can be said to be a hot topic in recent years, especially with the rapid development of information security technologies such as big data and artificial intelligence, the situation of d

Article 2 of the Cryptography Law clearly defines the term 'cryptography', which does not include commonly known terms such as 'bank card password', 'login password', as well as facial recognition, fi

(3) Is the national secret OTP simply replacing the SHA series hash algorithms with the SM3 algorithm, and becoming the national secret version of HOTP and TOTP according to the adopted dynamic factor

b) It should have a login failure handling function, and should configure and enable measures such as ending the session, limiting the number of illegal login attempts, and automatically logging out w

最后修改时间:
admin
上一篇 2025年03月27日 20:14
下一篇 2025年03月27日 20:36

评论已关闭