English
One-stop MLPS expert
POWERTIME

Evaluation servcie of Classified Protection

Classified protection evaluation is a process to verify whether the information system meets the corresponding level of security protection. Information security level requires that the information system at different level should have different ability of security protection. It evaluates the information system that does not involve state secrets, and issues relevant level evaluation report.


Classified protection evaluation is a process to verify whether the information system meets the corresponding level of security protection. Information security level requires that the information system at different level should have different ability of security protection. It evaluates the information system that does not involve state secrets, and issues relevant level evaluation report.


Procedures of evaluation
  • Evaluation preparation

    1. Basic situation investigation
    2. result data analsysi
    3. evaluation tools preparation
  • Programming

    1. Select evaluation objects
    2. select evaluation index
    3. determine evaluation methods
    4. make evaluation plan
  • On-site evaluation

    1. Cybersecurity evaluation
    2. management security evaluation
    3. physical security evaluation
    4. application security evaluation
    5. host security evaluation
  • Report preparation

    1. Single item conformity judgment
    2. overall evaluation
    3. security problems analysis
    4. form evaluation conclusions
    5. and put forward suggestions for rectification
  • Evaluation preparation

    1. Basic situation investigation
    2. result data analsysi
    3. evaluation tools preparation
  • Programming

    1. Select evaluation objects
    2. select evaluation index
    3. determine evaluation methods
    4. make evaluation plan
  • On-site evaluation

    1. Cybersecurity evaluation
    2. management security evaluation
    3. physical security evaluation
    4. application security evaluation
    5. host security evaluation
  • Report preparation

    1. Single item conformity judgment
    2. overall evaluation
    3. security problems analysis
    4. form evaluation conclusions
    5. and put forward suggestions for rectification
Basis for Classified Protction
Q&A
  • How often do information systems need to be evaluated?

    The Level IV Information system is required to carry out the evaluation at least half an year; the Level III information system at least once a year; generally, the Level II information system every two years, but there are no mandatory time requirements, some industries have special standards requirements, such as the power industry needs to carry our the evaluation every two years  

    More
  • Cybersecurity classified protection- Filling

    The filling works of Cybersecurity classified protection include the information system filling, accepting, review, and the management of filed information  Required materials for the filling works shall be submitted and the established procedures shall be followed

    More
  • Cybersecurity classified protection- Physical security construction

    The basic technical requirements of classified protection involve several important aspects, such as physical security, network security, host security, application and data security

    More
  • Relationship between the Cybersecurity Law and the classified protection under the new situation

    The state implements the cybersecurity classified protection system Network operators shall, in accordance with the requirements of the cybersecurity classified protection system, fulfill their obligations of security protection, protect the network from interference, sabotage or unauthorized access, and prevent network data from being leaked or stolen or tampered with

    More

Questions

POWERTIME-MLPS and IT Audit All rights reserved ICP:13008575
Free calls

返回
顶部