Key Protection Notes (Part Two): Identification and Recognition

0 43
Identification and recognition as the first link in the key protection standard...

Identification and recognition as the first link in the key protection standard requirements, requires the identification and sorting of the organization's business, assets, risks, etc. Similar to the identification stage of risk assessment (assets, threats, vulnerabilities), here the 'Requirements' also recommends referring to the analytical methods of GB/T 20984. For the process and methods of risk assessment, there are detailed interpretation articles in the forum, and it will not be repeated here.

Key Protection Notes Series

Initial Understanding of 'Basic Requirements for Cybersecurity Protection of Key Information Infrastructure': Based on the level of protection, higher than the level of protection

Key Protection Notes (Part Two): Identification and Recognition

Key Protection Notes (Part Two): Identification and Recognition

Security Protection (Part Three): Key Protection

Business identification requirements

a) Identify the key business and the external business dependent on the key business of this organization, and recognize the importance of the external business to the key business of this organization.

b) When the key business provides services to external businesses, identify the importance of the key business of this organization to external businesses.

c) Sort out the key business chain, and clarify the distribution and operation of key information infrastructure supporting the key business of this organization.

Security protection is no longer just concerned about an organization's key business system, but needs to consider various external businesses related to the business, and consider the impact of these external factors on key business, similar to BIA.

img

Figure 1 Organizational key business, external business, and CII impact relationship

Asset identification requirements

a) Identify the assets dependent on the key business chain, and establish a list of networks, systems, services, and other assets related to the key business chain.

b) Prioritize assets based on asset category, asset importance, and the importance of supporting business, and determine the priority of asset protection.

c) Implement automated management of related assets of key information infrastructure, and update in real-time and dynamically according to the actual situation of assets dependent on the key business chain.

The security protection emphasizes the sorting of assets dependent on CII, and classification and classification management are required, and it is required to be able to carry out automated management of assets, including identification, monitoring, early warning, and updates. Given the scale of CII's assets, the 50/50 method of tool +人工 is difficult to manage, and this proportion needs to move towards 99/1 through automated management platforms, that is, 99 automated management with 1 manual supervision.

img

Figure 2 Automatic sorting and management of CII-dependent assets

Risk identification requirements

The operator should carry out security risk and impact analysis based on the key business chain, identify the threats, vulnerabilities, existing security control measures, and main security risk points of each link of the key business chain, determine the priority of risk disposal, and form a security risk report.

Regarding the part of risk identification, everyone should be quite familiar with it. It is basically the same set of methods as risk assessment. However, this time the scope of definition will be very large. In addition to the business chain of CII itself, it includes systems, networks, equipment, personnel, supply chain, data security and other aspects involved in external business, which is the whole business chain rather than the traditional single business. Of course, it also includes the existing control measures and control effects of each organization involved in this chain. Imagine the huge workload. <Requirements> notes that GB/T 20984 can be referred to.

Major change requirements

The operator should carry out identification work again and update the asset list in case of major changes that may affect the identification results, such as changes in network topology and business chain, and report the relevant situation to the protection department in a timely manner, and re-identify according to regulations.

This part is basically consistent with the requirements of the security protection standard, but more factors need to be considered, such as changes in the business chain. After major changes, re-identification and re-recognition should be carried out. RegardingIdentification and recognitionThe content required is not much, but the scope involved is relatively wide. However, the methodology still follows the mode of risk assessment.

The original author of this article is Yu Chen. This article is an original work of FreeBuf and is subject to the FreeBuf Original Reward Plan. Unauthorized reproduction is prohibited.

你可能想看:

d) Adopt identification technologies such as passwords, password technologies, biometric technologies, and combinations of two or more to identify users, and at least one identification technology sho

Article 2 of the Cryptography Law clearly defines the term 'cryptography', which does not include commonly known terms such as 'bank card password', 'login password', as well as facial recognition, fi

It is possible to perform credible verification on the system boot program, system program, important configuration parameters, and application programs of computing devices based on a credible root,

In today's rapidly developing digital economy, data has become an important engine driving social progress and enterprise development. From being initially regarded as part of intangible assets to now

Data security can be said to be a hot topic in recent years, especially with the rapid development of information security technologies such as big data and artificial intelligence, the situation of d

Is the validity period of code signing certificates the same as that of SSL certificates, which is 1 year?

Announcement regarding the addition of 7 units as technical support units for the Ministry of Industry and Information Technology's mobile Internet APP product security vulnerability database

Google Android 11 Beta version officially released, Baidu Security fortification technology first fully compatible

Internal and external cultivation | Under the high-confrontation offensive and defensive, internal network security cannot be ignored

As announced today, Glupteba is a multi-component botnet targeting Windows computers. Google has taken action to disrupt the operation of Glupteba, and we believe this action will have a significant i

最后修改时间:
admin
上一篇 2025年03月30日 17:44
下一篇 2025年03月30日 18:07

评论已关闭