当前位置:网站首页>Business secret series -- Talking about the evaluation of commercial passwords from the perspective of Party A and Party B (I)
Business secret series -- Talking about the evaluation of commercial passwords from the perspective of Party A and Party B (I)
2022-07-26 07:08:00 【51CTO】
C0 Why write these articles
C1 Definition of terms 、 The structure of the series is
- Secret comments : Full name “ Security evaluation of commercial password applications ”, Abbreviations are used in the series .
- password : Refers to encryption 、 Cryptographic techniques such as hashing , For login in daily concept “ password ” In the article, it is uniformly called password .
- Party a : Refers to the actual user of the system .
- Party B : Refers to the developer of the application system , Generally, it is a development company or an integration company .
- The third party : Refers to secret evaluation company .
- Business secret certificate : It refers to the certificate issued after passing the quality inspection of the State Password Administration , The full name is the commercial password product certification certificate ( or “ Commercial password product type certificate ”), If you want to pass the secret evaluation, you must use software and hardware password products with business secret certificates , Otherwise, it may lead to high-risk items . The series of articles will be divided into three parts , The first is the basic introduction of this secret comment , The second is the indicators required by all levels of secret evaluation , Finally, it explains the quantitative evaluation rules of secret evaluation . Among them, the indicators at all levels of the secret evaluation will be interspersed with high-risk items guided by the high-risk judgment .
C3 Related concepts of secret evaluation
3.1 Why make secret comments
《 The code law of the people's Republic of China 》 Article 27 provides that : law 、 Administrative regulations and relevant national regulations require the use of commercial passwords for the protection of key information infrastructure , Its operators should use commercial passwords to protect , Carry out the security evaluation of commercial password application by itself or by entrusting the commercial password detection agency . The security evaluation of commercial password application should be evaluated with the security detection of key information infrastructure 、 Network security level evaluation system is connected , Avoid double evaluation 、 Evaluation .
3.2 Conditions for passing the secret evaluation
References
- GB/T 39786-2021《 Information security technology Basic requirements for password application of information system 》
- Guidelines for high risk determination of password application in information system
- Quantitative evaluation rules for security evaluation of commercial password application
3.3 Secret evaluation company 、 Password manufacturers, etc
3.4 Personnel who cooperate with the secret evaluation
Conclusion
边栏推荐
- 【QT】怎样获得QTableView和QTableWidget的行数和列数
- From scratch, we will completely develop an online chess game [Gobang] Based on websocket, and only use dozens of lines of code to complete all the logic.
- Getting started with kernel PWN (5)
- LTS(Light-Task-Scheduler)
- I don't understand the MySQL 57 version under centos7 when I encounter a problem. I was informed by big Shen who knows it
- LeetCode刷题1:题目分类
- Solve the problem that Chrome browser is tampered with by drug bullies
- Advanced Mathematics (Seventh Edition) Tongji University General exercises two person solution
- MySQL check whether the table is locked
- Drools(3):Drools基础语法(1)
猜你喜欢

What to pay attention to when using German chicks for the first time

opengauss简易版安装报错
![[hardware ten treasures] - 7.1 [dynamic RAM] key points of DDR hardware design](/img/ba/87cd3b1600bcb6f2839e7bb093ff62.png)
[hardware ten treasures] - 7.1 [dynamic RAM] key points of DDR hardware design

Drools(3):Drools基础语法(1)

String and memory functions

Queue assistant | product update log in June 2022

Question: can't download sh shellcheck Please install it manually and some commands of shell script

Drools (2): drools quick start

Yolov5 improvements: add attention mechanism (video tutorial)

MySQL execution plan
随机推荐
< II> ObjectARX development: create and edit basic graphic objects
NIO实现
NiO implementation
Common CMD instructions
敏捷整洁之道
[Star Project] small hat aircraft War (II)
"XXXX" is running, which may cause the system to jam, reduce the standby time, and click Close "
Advanced Mathematics (Seventh Edition) Tongji University General exercises two person solution
Precious metal knowledge: lethal short-term secret script
From scratch, we will completely develop an online chess game [Gobang] Based on websocket, and only use dozens of lines of code to complete all the logic.
20000 words will take you from 0 to 1 to build an enterprise level microservice security framework
<二> objectARX开发:创建和编辑基本图形对象
Getting started with kernel PWN (5)
微信小程序 - 从入门到入土
[database] CTE (common table expression)
Orthogonality of 20220724 trigonometric function system
What are the ways to open the JDBC log of Youxuan database
LTS(Light-Task-Scheduler)
Introduce you to JVM from architecture
强网杯2021 pwn 赛题解析——baby_diary