What is waiting for insurance?

Network security level protection, usually referred to as "equal protection"

Basic concepts

Classified network security protection refers to the hierarchical implementation of security protection for state secret information, legal person or other organizations and citizens' proprietary information, as well as the information systems that make public information and store, transmit and process such information, the hierarchical management of information systems, and the hierarchical response and disposal of information security incidents in information systems.

legal status

Article 21 of the Network Security Law stipulates that "the country implements the network security level protection system", and network operators shall perform their security protection obligations in accordance with the requirements of the network security level protection system, protect the network from interference, destruction or unauthorized access, and prevent network data from leaking or being stolen or tampered with. It marks the legal status of equal protection.

Scope

The scope of network security level protection stipulated by the state is divided into two levels: first, it covers all regions, units, departments, enterprises and institutions, that is, it covers the whole society. Second, it covers all protected objects, including networks, information systems, information, and various new technology applications such as cloud platforms, the Internet of Things, industrial control, big data, and mobile Internet.

Equal protection 2.0 new standard

The new standard of network security level protection 2.0 mainly includes: Basic Requirements for Network Security Level Protection (GB/T 22239-2019); GB/T 25070-2019 Technical Requirements for Security Design of Network Security Classification Protection; GB/T 28448-2019 Evaluation Requirements for Classified Protection of Network Security.

Introduction to equal assurance compliance process

From grading to equal protection evaluation, Tencent Cloud provides comprehensive security products and services based on its own advantages and the security product capabilities of Tencent Cloud, and provides one-stop equal protection compliance security solutions
  • one
    System grading
    Tencent Cloud provides grading guidance services and coordinates the completion of expert review
  • two
    System filing
    Tencent Cloud Coaching completes the filing materials and provides the filing guidance service
  • three
    Construction rectification
    Tencent Cloud coaches the deployment of relevant security products and the completion of system reinforcement
  • four
    Grade evaluation
    Tencent Cloud docks with local evaluation institutions and coaches customers to complete evaluation
  • five
    Supervision and inspection
    Submit the evaluation report to the local public security network supervisor and cooperate in completing the inspection

Equal assurance compliance product package

The security technology products selected in this scheme can enable the tested business system to meet the basic requirements of corresponding level protection at the technical level
Secure communication network Cloud firewall As low as 70% off
SSL Certificate Free Admission
Security area boundary Advanced Anti DDoS As low as 60% off
web application firewall As low as 70% off
Secure Computing Environment Host security As low as 70% off
Container safety As low as 70% off
Fortress machine As low as 60% off
Data security audit As low as 70% off
Data Security Center Click to authorize free subscription
Vulnerability scanning service
Security Management Center Security Operation Center As low as 70% off
Security expert service Tencent Cloud and other compliance services

30% off for 3 or more products. Please use Tencent's main cloud account to place an order

Interpretation of key items in Basic Requirements for Classified Protection of Network Security

  • Secure communication network
  • Security area boundary
  • Secure Computing Environment
  • Security Management Center
  • Safety management system

Network architecture

Divide different network areas. Reliable technical isolation measures should be taken between important network areas and other network areas to build a highly available and redundant network

Communication transmission

Verification technology and password technology shall be adopted to ensure the integrity and confidentiality of data in the communication process

Trusted authentication

The system boot program, system program, important configuration parameters and communication application program of the communication device can be trusted based on the trusted root, and the dynamic trusted verification can be carried out at the key execution link of the application program. After detecting that its credibility has been damaged, the alarm will be given, and the verification results will be sent to the security management center as an audit record

Interpretation of terms

The network security domain is divided according to the server role and importance; Ensure that network bandwidth and processing capacity can meet the needs of business peak; Ensure the integrity and confidentiality of data in the communication transmission process, which can be reliably verified

Recommended products

On cloud quality assurance compliance architecture

Based on the technical requirements and service requirements of equal protection 2.0, combined with the infrastructure of Tencent's cloud platform, it provides a complete set of cloud native security products for tenants to meet various technical requirements under the framework of secure communication network, secure area boundary, secure computing environment, security management center, and security expert services, and easily meet the requirements of enterprises and other security compliance requirements.

Best Practices for Safety Product Assurance

Free access to Tencent Cloud and other compliance materials gift package

Tencent Cloud and other compliance materials gift package

Tencent Cloud provides customers with equal assurance compliance data package to guide customers to complete equal assurance compliance security construction. The materials include: free professional guidance for security architects; Equal protection 2.0 solution PPT; Security Level Protection 2.0 compliance white paper.
Receiving conditions: free after submitting the questionnaire

common problem

What is waiting for insurance?

Based on the Cyber Security Law of the People's Republic of China GB/T22239-2019 Information Security Technology - Basic Requirements for Classified Protection of Network Security In order to guide the standard network security level protection method, it is referred to as "equal protection 2.0" in the industry.

Why do you need waiting insurance?

Which enterprises need to do waiting insurance?

How to grade after waiting for insurance?

Do cloud tenants need to wait for insurance separately?

What is the charge for waiting for compliance services?

How to obtain Tencent cloud platform filing certificate and evaluation report?

Equal Assurance Compliance Security Solution
Fast and worry free one-stop waiting service, choose Tencent Cloud