Home >Common Problem >What kind of protection is implemented for computers that store and process state secrets?
Computers that store and process state secrets are subject to hierarchical protection. Computers that store and process state secrets are subject to hierarchical protection in accordance with the basic requirements for hierarchical protection of national information security and in accordance with the hierarchical protection of confidential information systems of the national confidentiality work department.
The operating environment of this article: Windows 7 system, Dell G3 computer.
What kind of protection is implemented for computers that store and process state secrets?
Computers that store and process state secrets are subject to graded protection.
Confidential information systems are divided into top secret level, confidential level and secret level according to the degree of confidentiality. Agencies and units shall determine the confidentiality level of the system based on the highest level of confidentiality of the information stored and processed by the confidential information system, and adopt corresponding security and confidentiality protection measures in accordance with the hierarchical protection requirements.
Computers that store and process state secrets shall be protected in accordance with the basic requirements of the national information security level protection and the classified information systems of the national security work department.
According to Article 24 of the "Measures for the Administration of Leveled Protection of Information Security", confidential information systems shall be based on the basic requirements of national information security level protection and in accordance with the management regulations of the national confidentiality work department on the hierarchical protection of confidential information systems. and technical standards, and protect them based on the actual situation of the system. Non-confidential information systems shall not handle state secret information, etc.
Extended information:
Article 27 of the "Measures for the Management of Information Security Level Protection" Units with intensive integration qualifications shall be responsible for or participate in the design and implementation of confidential information systems.
Units that construct and use confidential information systems shall design plans and implement hierarchical protection based on the actual requirements of the system in accordance with the hierarchical protection management specifications and technical standards for confidential information systems, and in accordance with the different requirements of secret, confidential and top secret levels. Its protection level is generally not lower than the third, fourth and fifth levels of national information security level protection.
For more related knowledge, please visit the FAQ column!
The above is the detailed content of What kind of protection is implemented for computers that store and process state secrets?. For more information, please follow other related articles on the PHP Chinese website!