当前位置:网站首页>If the evaluation conclusion of waiting insurance is poor, does it mean that waiting insurance has been done in vain?
If the evaluation conclusion of waiting insurance is poor, does it mean that waiting insurance has been done in vain?
2022-06-29 18:03:00 【Xingyun housekeeper】
When surfing the Internet recently , Ask again when you see an enterprise , The evaluation conclusion of ISO insurance is poor , Does it mean that the insurance work has been done in vain ? How to deal with this situation ? Who can answer it in detail , Thank you guys !
The evaluation conclusion of ISO insurance is poor , Does it mean that the insurance work has been done in vain ?
【 answer 】: No, it isn't . The conclusion of the grading protection evaluation is “ Bad ”, It means that the current information system has high risk or poor overall security , It doesn't meet the requirements of corresponding standards . But it doesn't mean that the work of classified protection has been done in vain , Even if you have a non compliant evaluation report , The competent authorities also acknowledge that the work of classified protection in your unit has been carried out this year , It's just that there are many problems at present , Not up to the standard , We need to speed up the rectification . So we must seize the time to rectify .
Summary of high-risk items that lead to poor evaluation conclusion of equal assurance in equal assurance work
1、 Cloud computing platform is not available in China
The cloud computing infrastructure of level II and above cloud computing platforms shall be located in China . If you choose an overseas cloud platform , Then you can't pass the insurance .
2、 Only one internal network segment does not conform to
Secondary and above systems , Important network areas and non important network areas shall be divided into different network segments or subnets . Production network and office network , External and internal server areas are mixed with high-risk risks .
3、 The uncontrolled wireless network can access the internal network at will
Class III and above systems of equal protection , Wireless network and important internal network interconnection are not controlled , Or improper control , After accessing through wireless network, you can access important internal resources , This is a high risk item , Therefore, illegal access should be controlled in Level 3 and above systems , It is recommended that you use safety access equipment , Not just for wireless networks .
Classification standard for conclusion level of ISO guarantee evaluation
1、 optimal : There are security problems in the tested object , But it will not cause the tested object to face 、 High level security risk , And the comprehensive score of the system 90 More than , contain 90 branch ;
2、 good : There are security problems in the tested object , However, it will not cause the tested object to face high-level security risks , And the comprehensive score of the system 80 More than , contain 80 branch ;
3、 in : There are security problems in the tested object , However, it will not cause the tested object to face high-level security risks , And the comprehensive score of the system 70 More than , contain 70 branch ;
4、 Bad : There are security problems in the tested object , And it will cause the measured object to face high-level security risks , Or the comprehensive score of the tested object is lower than 70 branch .
边栏推荐
- 第42期:MySQL 是否有必要多列分区
- Web Scraping with Beautiful Soup for Data Scientist
- shell教程之循环语句for,while,until用法
- Niuke small Bai monthly race 52 D ring insectivorous (feet +st table)
- Let Google search your blog
- Proxmox VE Install 7.2
- 小迈科技 X Hologres:高可用的百亿级广告实时数仓建设
- Have you grasped the most frequently asked question in the interview about massive data processing?
- selenium 文件上传方法
- 金鱼哥RHCA回忆录:DO447构建高级作业工作流--创建作业模板调查以设置工作的变量
猜你喜欢

Top 30 open source software

Kubekey2.2.1 kubernetes1.23.7 offline package production +harbor Department summer and upload image

Codeworks 5 questions per day (1700 for each) - the next day

Detailed introduction and Simulation of bitmap

How QQ opens online customer service

Configure the local domain name through the hosts file

Visio annotation, annotation location

selenium 文件上传方法

Wechat applet development reserve knowledge

Analyze the implementation principle of zero copy mechanism, applicable scenarios and code implementation
随机推荐
ISO 32000-2 国际标准7.7
【TcaplusDB知识库】TcaplusDB系统用户组介绍
双亲委派机制
Issue 42: is it necessary for MySQL to have multiple column partitions
The soft youth under the blessing of devcloud makes education "smart" in the cloud
Xiaobai yuesai 51 supplement e g f
Industry application of smart city based on GIS 3D visualization
Goldfish rhca memoirs: do447 building advanced job workflow -- using fact cache to improve performance
Longest XOR path (dfs+01trie)
2022 spring summer collection koreano essential reshapes the vitality of fashion
Repair of JSON parsing errors in a collection
【TcaplusDB知识库】TcaplusDB单据受理-事务执行介绍
Have you grasped the most frequently asked question in the interview about massive data processing?
金鱼哥RHCA回忆录:DO447构建高级作业工作流--使用事实缓存提高性能
小白月赛51 补题 E G F
Yurun multidimensional makes efforts in the charity field and bravely resists the corporate public welfare banner
VB. Net read / write NFC ntag tag source code
填充每个节点的下一个右侧节点指针[利用好每个点->尽可能降低时空复杂度]
What technology is an applet container? Can it help Internet of things enterprises break through the red sea?
ABC253 D FizzBuzz Sum Hard(容斥定理)