当前位置:网站首页>What are the password requirements for waiting insurance 2.0? What are the legal bases?
What are the password requirements for waiting insurance 2.0? What are the legal bases?
2022-06-28 04:08:00 【Xingyun housekeeper】
Equal insurance 2.0 The policy has made it clear that cryptography , Cryptographic technology mainly appears in Level 3 and level 4 security requirements , It mainly involves secure communication network 、 Secure computing environment 、 Safety transportation management, etc . Then wait for me 2.0 What are the specific requirements for passwords ? What is the legal basis ?
Equal insurance 2.0 What are the password requirements ?
1、 Authenticity
Both sides of the communication shall be verified or authenticated based on cryptographic technology before communication ;
Password should be used 、 Cryptography 、 Biometrics and other two or more combinations of authentication technology to identify users , And at least one of the authentication techniques should be implemented by using cryptography .
2、 confidentiality
Password technology shall be adopted to ensure the confidentiality of data during communication .
Password technology shall be adopted to ensure the confidentiality of important data during transmission , Including but not limited to identification data 、 Important business data and important personal information ;
Password technology should be used to ensure the confidentiality of important data in the storage process , Including but not limited to identification data 、 Important business data and important personal information .
3、 integrity
Verification technology or password technology shall be used to ensure the integrity of data in the communication process ;
Password technology shall be adopted to ensure the integrity of important data in the transmission process , Including but not limited to identification data 、 Important business data 、 Important audit data 、 Important configuration data 、 Important video data, important personal information, etc ;
Password technology shall be adopted to ensure the integrity of important data in the storage process , Including but not limited to identification data 、 Important business data 、 Important audit data 、 Important configuration data 、 Important video data, important personal information, etc .
4、 Non repudiation
In the application that may involve the identification of legal liability , Cryptographic technology shall be used to provide evidence of data origin and data reception , Realize the repudiation of data original behavior and data receiving behavior .
5、 Password management requirements
Ensure that the procurement and use of password products and services meet the requirements of the national password management authority ;
The security test before going online shall be carried out , And issue the safety test report , The security test report shall include the content related to password application security test ;
Password management shall comply with relevant national and industrial standards for passwords ;
Password management shall use the password technology and products certified and approved by the competent national password management department .
6、 Problems that can be effectively solved by using cryptographic technology
① Trusted verification :
The system bootstrap can be based on a trusted root 、 System program 、 Trusted verification of important configuration parameters and boundary protection applications , Dynamic trusted verification is carried out in all execution links of the application , Alarm when it detects that its credibility is damaged , And send the audit records of the verification results to the safety management center , And conduct dynamic association perception ;
The trusted verification mechanism shall be adopted to conduct trusted verification on the equipment connected to the network , Ensure that the devices connected to the network are authentic ;
② Remote management : When it comes to remote management , Necessary measures shall be taken to prevent the identification information from being eavesdropped during network transmission ;
③ centralized management : It should be able to establish a secure information transmission path , Manage the security devices or security components in the network .
Equal insurance 2.0 What is the legal basis for password requirements ?
1、 Network security law
“ Network security law ” Article 10 of the general provisions specifies ,“ Maintain the integrity of network data 、 Confidentiality and availability ”.
Article 21 states “ The State implements the network security level protection system , Protect the network from interference 、 Sabotage or unauthorized access , Prevent network data from leaking or being stolen 、 Tampering , And data classification is required 、 Important data backup and encryption measures ”. The above contents can be correctly 、 Effectively use cryptographic techniques to meet the corresponding needs , Among them, the use of password technology to encrypt data can prevent data leakage , Using the integrity function of cryptographic technology can prevent attackers from tampering with data .
2、 Cryptology
Cryptology ” Article 8 states “ citizens 、 Legal persons and other organizations can use commercial passwords to protect network and information security according to law ”.
Article 27 “ law 、 Administrative regulations and relevant national regulations require the use of commercial passwords for the protection of key information infrastructure , Its operators should use commercial passwords to protect , Carry out the security evaluation of commercial password application by itself or by entrusting the commercial password detection agency . The security evaluation of commercial password application should be evaluated with the security detection of key information infrastructure 、 Network security level evaluation system is connected , Avoid double evaluation 、 Evaluation ”. At the same time, it has established a password system with the domestic password as the core :1) The state establishes and improves the standard system of commercial passwords ;2) Promote the construction of commercial password detection and authentication system ;3) Detection and certification of commercial cryptographic products ;4) The key information infrastructure is subject to the security assessment of commercial password application by the commercial password detection agency ;5) Using commercial encryption technology to engage in e-government e-authentication services .
3、 Management measures for information security level protection
Article 34 The State Password Administration Department shall carry out classified and hierarchical management of passwords with classified protection of information security . According to the national security of the protected object 、 Social stability, 、 Role and importance in economic construction , Safety protection requirements and confidentiality degree of the protected object , The damage degree of the protected object after being destroyed and the nature of the password using department , Determine the level protection criteria for passwords .
Information system operation 、 The user adopts password for level protection , Should follow 《 Administrative measures for classified protection passwords of information security 》、《 Technical requirements for classified protection of information security commercial passwords 》 And other password management regulations and relevant standards .
Article 35 password allocation in security classification protection of information system 、 Use and management, etc , The relevant provisions of the state on password management shall be strictly implemented .
边栏推荐
- leetcode:494.数组中添加加减运算符得到指定值的所有方法
- Learning notes of digital circuit (II)
- 2021 year end summary and 2022 outlook
- Understanding and learning of parental delegation mechanism
- Detailed explanation of KVM common commands
- 音频 scipy 中 spectrogram 的运作机制
- Using elk to build a log analysis system (I) -- component introduction
- 加法器—笔记
- ELK 搭建日志分析系统 + Zipkin服务链路追踪整合
- 黑體輻射初探
猜你喜欢

光伏板怎么申请ASTM E108阻燃测试?

Talking about cloud primitiveness, we have to talk about containers

Does the applet image component not display pictures?

Arrangement of basic electrical knowledge (II)

The operating mechanism of spectrogram in audio Science

音频 scipy 中 spectrogram 的运作机制

关于 SY8120I 的DC-DC的降压芯片的学习(12V降至3.3V)

第一章 Bash 入门

02 MongoDB数据类型、重要概念以及shell常用指令

电学基础知识整理(一)
随机推荐
Particle theory of light (photoelectric effect / Compton effect)
Meichuang data security management platform has obtained the evaluation certificate of "data security product capability verification plan" of the Institute
English语法_形容词/副词3级 - 比较级
One article tells you what kubernetes is
Talking about cloud primitiveness, we have to talk about containers
等保三级密码复杂度是多少?多久更换一次?
Sorting from one stack to another
What is the process of en 1101 flammability test for curtains?
MSC 307(88) (2010 FTPC Code) Part 5低播焰测试
02 MongoDB数据类型、重要概念以及shell常用指令
Market competitiveness of robot programming education
回溯—迷宫问题
Building log analysis system with elk (II) -- deployment and installation
机器学习入门笔记
La norme européenne en 597 - 1 pour les meubles est - elle la même que les deux normes en 597 - 2 pour les ignifuges?
[graduation season] graduate summary
PyCharm设置仿sublime配色方案
黑體輻射初探
01 MongoDB的概述、应用场景、下载方式、连接方式和发展历史等
How to write a software test report? Here comes the third party performance report template