网络安全等级保护
Search documents
安恒信息首批入驻网络安全等级保护2.0和可信计算3.0攻关示范基地
Xin Lang Cai Jing· 2025-12-15 06:32
12月11日,由网络安全等级保护制度2.0与可信计算3.0攻关示范基地、可信计算北京市重点实验室、中关村科学城专精特新企业党建联盟、中国通信工业 协会数据中心委员会主办的2025自主可信计算创新论坛在北京隆重开幕。会上,安恒信息首批入驻网络安全等级保护2.0和可信计算3.0攻关示范基地,成 为国内自主可信计算产学研用协同创新机制中的关键一环。 网络安全等级保护建设工作是我国网络安全领域的重要标志性建设工程,是我国网络安全领域的一项重大举措。可信计算作为网络安全的核心技术支撑, 是构建主动防御体系、保障信息系统安全可控的关键抓手。 安恒信息深耕网络安全领域多年,在助力等保建设、可信计算技术研发、产品落地及场景化应用方面积累了丰富经验。此前,安恒信息重磅发布"等保测 评报告分析智能体",以AI为核心驱动,深度集成GB/T 28448等核心标准,构建多维度智能审核引擎,开启了测评报告智能审核新纪元。 作为首家完成中国信息通信研究院组织的首批"面向大模型的增强型可信执行环境基础能力专项测试"的企业,安恒信息致力于以隐私计算等技术为核心底 座,构建数据要素安全流通基础设施,研发可信数据空间产品——数由空间、数由器,通过 ...
企业如何高效完成信息系统定级备案及测评
Sou Hu Cai Jing· 2025-09-02 05:45
Core Insights - The article emphasizes the importance of proper classification and evaluation of information systems to enhance efficiency in compliance processes [1][4][8] Group 1: Classification and Evaluation - Proper classification is crucial and should be based on standards such as GB/T 22240-2019, considering the system's impact scope, social influence, and data sensitivity [1][4] - Common confusion arises regarding how to classify systems, often leading to either overestimation or underestimation of the classification level, which can result in increased costs or compliance risks [4][5] - A significant portion of business systems, approximately 78%, are classified at level two, while only core systems are classified at level three, which can alleviate compliance pressure [7] Group 2: Registration Process - The registration process should focus on clarifying security responsibilities rather than merely completing paperwork, with essential materials prepared in advance [5][6] - Establishing a centralized registration material database can facilitate quicker reuse for similar systems, particularly in large enterprises [5][6] Group 3: Evaluation Tools and Methods - Utilizing intelligent tools, such as the QianKun Cloud Integrated Machine, can help simulate evaluations and identify issues before the actual assessment [6][8] - The evaluation process should not be limited to vulnerability scanning; it must also include checks on management processes and compliance with national standards [6][7] Group 4: Industry Practices and Collaboration - Merging multiple systems for registration can enhance efficiency, as seen in practices by major internet companies that consolidate submissions [7][8] - Successful classification and evaluation require collaboration across departments, ensuring that business, security, and IT teams work together effectively [8]