当前位置:网站首页>If the evaluation conclusion of waiting insurance is poor, does it mean that waiting insurance has been done in vain?
If the evaluation conclusion of waiting insurance is poor, does it mean that waiting insurance has been done in vain?
2022-06-29 18:03:00 【Xingyun housekeeper】
When surfing the Internet recently , Ask again when you see an enterprise , The evaluation conclusion of ISO insurance is poor , Does it mean that the insurance work has been done in vain ? How to deal with this situation ? Who can answer it in detail , Thank you guys !
The evaluation conclusion of ISO insurance is poor , Does it mean that the insurance work has been done in vain ?
【 answer 】: No, it isn't . The conclusion of the grading protection evaluation is “ Bad ”, It means that the current information system has high risk or poor overall security , It doesn't meet the requirements of corresponding standards . But it doesn't mean that the work of classified protection has been done in vain , Even if you have a non compliant evaluation report , The competent authorities also acknowledge that the work of classified protection in your unit has been carried out this year , It's just that there are many problems at present , Not up to the standard , We need to speed up the rectification . So we must seize the time to rectify .
Summary of high-risk items that lead to poor evaluation conclusion of equal assurance in equal assurance work
1、 Cloud computing platform is not available in China
The cloud computing infrastructure of level II and above cloud computing platforms shall be located in China . If you choose an overseas cloud platform , Then you can't pass the insurance .
2、 Only one internal network segment does not conform to
Secondary and above systems , Important network areas and non important network areas shall be divided into different network segments or subnets . Production network and office network , External and internal server areas are mixed with high-risk risks .
3、 The uncontrolled wireless network can access the internal network at will
Class III and above systems of equal protection , Wireless network and important internal network interconnection are not controlled , Or improper control , After accessing through wireless network, you can access important internal resources , This is a high risk item , Therefore, illegal access should be controlled in Level 3 and above systems , It is recommended that you use safety access equipment , Not just for wireless networks .
Classification standard for conclusion level of ISO guarantee evaluation
1、 optimal : There are security problems in the tested object , But it will not cause the tested object to face 、 High level security risk , And the comprehensive score of the system 90 More than , contain 90 branch ;
2、 good : There are security problems in the tested object , However, it will not cause the tested object to face high-level security risks , And the comprehensive score of the system 80 More than , contain 80 branch ;
3、 in : There are security problems in the tested object , However, it will not cause the tested object to face high-level security risks , And the comprehensive score of the system 70 More than , contain 70 branch ;
4、 Bad : There are security problems in the tested object , And it will cause the measured object to face high-level security risks , Or the comprehensive score of the tested object is lower than 70 branch .
边栏推荐
- lodash深拷贝使用
- Test dble split function execution + import time-consuming shell script reference
- 分割回文串[dp + dfs组合]
- 第42期:MySQL 是否有必要多列分区
- kubekey2.2.1 kubernetes1.23.7离线包制作+harbor部暑并上传镜像
- PWM output experiment based on stm32f103zet6 library function
- Selenium key combination operation
- ISO 32000-2 国际标准7.7
- It's really easy to make money in foreign lead and build a website
- Web Scraping with Beautiful Soup for Data Scientist
猜你喜欢

Analyze the implementation principle of zero copy mechanism, applicable scenarios and code implementation

DevCloud加持下的青软,让教育“智”上云端

Detailed introduction and Simulation of bitmap

Let Google search your blog

Niuke Xiaobai monthly race 52 E group logarithmic sum (inclusion exclusion theorem + dichotomy)

Maidong Internet won the bid of Dajia Insurance Group

小白月赛51 补题 E G F

QQ如何开通在线客服

VB.Net读写NFC Ntag标签源码
![Split palindrome string [dp + DFS combination]](/img/7b/221b000984977508f849e19802c2c2.png)
Split palindrome string [dp + DFS combination]
随机推荐
Top 30 open source software
PWM output experiment based on stm32f103zet6 library function
Repair of JSON parsing errors in a collection
Inherit Chinese virtues, pay attention to the health of the middle-aged and the elderly, and Yurun milk powder has strong respect for the elderly
Force deduction daily question 06.29 add two numbers
mongoTemplate - distinct 使用
Visio annotation, annotation location
VB. Net read / write NFC ntag tag source code
Mac installation php7.2
selenium 文件上传方法
DevCloud加持下的青软,让教育“智”上云端
Servlet学生管理系统(萌新练手版)
最受欢迎的30款开源软件
Spingmvc requests and responses
Visual Studio插件CodeRush正式发布v22.1——优化调试可视化工具
shell教程之循环语句for,while,until用法
Opencv+yolo-v3 for target tracking
Digital twin energy system, creating a "perspective" in the low-carbon era
Redux源码分析之createStore
Partial mock of static class of phpunit operation