Management Rules for Multi-Level Protection of Information Security

Posted on Updated on

Notice concerning issuance of the “Management Rules for Multi-Level Protection of Information Security”

All provincial, autonomous region and municipal people’s security departments (bureaus), secrecy protection bureaus, the State Secrets Management Bureau (Office of the State Commission for Encryption Management),the Office of the Leading Group for Informatization, the Xinjiang Production-Construction Corps Public Security Bureau, Secrecy Protection Bureau, State Encryption Management Bureau, and Informatization Leading Group Office, the Secrecy Protection Committee Offices of all ministries and commissions of Centre and State bodies, Encryption Work Leading Group Offices,, Informatization Leading Group Offices, all People’s Organizations’ Secrecy Protection Committee Offices:

In order to accelerate the advance of information security multi-level protection, standardize information security multi-level protection management, raise information security protection capabilities and levels, safeguard national security, social stability and the public interest, safeguard and stimulate informatization construction, the Ministry of Public Security, the State Secrecy Protection Bureau, the State Encryption Management Bureau and the State Council Informatization Work Office have formulated the “Management Rules for Multi-Level Protection of Information Security”. These are hereby issued to you, please implement them earnestly.

Ministry of Public Security
State Secrecy Protection Management Bureau
State Encryption Management Bureau
State Council Informatization Work Office

22 June 2007

Management Rules for Multi-Level Protection of Information Security”

    Chapter I: General provisions

Article 1: In order to standardize information security multi-level protection management, raise information security protection capabilities and levels, safeguard national security, social stability and the public interest, safeguard and stimulate informatization construction, on the basis of the “Computer Information Network Security Protection Regulations of the People’s Republic of China” and other such relevant laws and regulations, these Rules are formulated.

Article 2: Through formulating uniform information security multi-level protection management norms and technical standards, the State organizes citizens, legal persons and other organizations to implement security protection of information systems in a tiered manner, and conducts supervision and management of the implementation of multi-level protection work.

Article 3: Public security bodies are responsible for the supervision, inspection and guidance of information security multi-level protection work. The State secrecy protection work department is responsible for the supervision, inspection and guidance of secrecy protection-related work in multi-level protection work. The State encryption management department is responsible for the supervision, inspection and guidance of encryption-related work in multi-level protection work. Matters affecting other functional departments’ scope of jurisdiction will be managed by the relevant functional department according to the provisions of State laws and regulations. The State Council Informatization Work Office and local informatization leading group office bodies are responsible for the interdepartmental coordination of multi-level protection work.

Article 4: Departments in charge of information systems shall, according to these Rules and related norms and standards, supervise, inspect and guide information security multi-level protection work concerning work units operating and using information systems within their sector, their department or their locality.

Article 5: Work units operating and using information systems shall, according to these Rules and related norms and standards, fulfil information security multi-level protection duties and responsibilities.

Chapter II: Tier division and protection

Article 6: National information security multi-level protection upholds the principles of self-classification and self-protection. The security protection tier of an information system shall be determined on the basis of the degree of importance of the information system for national security, economic construction and social life, the degree of harm to national security, social order, the public interest as well as the lawful rights and interests of citizens, legal persons and other organizations if the information system is destroyed, and other such factors.

Article 7: Security protection tiers for information systems are divided into the following five levels:

The first tier, after the information system is destroyed, harm is inflicted upon the lawful rights and interests of citizens, legal persons and other organizations, but national security, social order and the public interest are not endangered;

The second tier, after the information system is destroyed, grave harm is done to the lawful rights and interests of citizens, legal persons and other organizations, or harm is inflicted upon social order and the public interest, but national security is not harmed.

The third tier, after the information system is destroyed, grave harm is done to social order and the public interest, or harm is inflicted upon national security.

The fourth tier, after the information system is destroyed, especially grave harm is inflicted upon social order and the public interest, or grave harm is inflicted upon national security

The fifth tier, after the information system is destroyed, especially grave harm is inflicted upon national security.

Article 8: Work units operating and using information systems implement protection of information systems on the basis of these Rules and related technical standards, relevant State information security supervision and management departments implement supervision and management of information security multi-level protection work.

Work units operating and using first-tier information systems shall implement protection on the basis of relevant State management norms and technical standards.

Work units operating and using second-tier information systems shall implement protection on the basis of relevant State management norms and technical standards. State information security supervision and management departments conduct guidance over information security multi-level protection work of information systems in this tier.

Work units operating and using third-tier information systems shall implement protection on the basis of relevant State management norms and technical standards. State information security supervision and management departments conduct supervision and inspection of information security multi-level protection work of information systems in this tier.

    Work units operating and using fourth-tier information systems shall implement protection on the basis of relevant State management norms, technical standards and special operational requirements. State information security supervision and management departments conduct mandatory supervision and inspection of information security multi-level protection work of information systems in this tier.

    Work units operating and using fifth-tier information systems shall implement protection on the basis of relevant State management norms, technical standards and special operational security requirements. State-appointed specialized bodies conduct specialized supervision and inspection of information security multi-level protection work of information systems in this tier.

Chapter III: Implementation and management of multi-level protection

Article 9: Work units operating and using information systems shall concretely implement multi-level protection work according to the “Information System Security Multi-Level Protection Implementation Guidelines.

Article 10: Work units operating and using information systems shall determine information systems’ security protection tier on the basis of these Rules and the “Information System Security Multi-Level Protection Implementation Guidelines”. Where there is a competent department, they shall undergo verification and approval by the competent department.

Information systems operating across provinces or uniformly nationwide may have their security protection tier determined uniformly by the competent department.

Where an information system is planned to be determined as fourth-tier or higher, operating and using work units or competent departments shall request the National Information Security Protection Tier Expert Assessment Committee to assess the matter.

    Article 11: After an information system’s security protection tier has been determined, the operating and using work unit shall use information technology products conform to relevant national regulations that satisfy the requirements of its information system security protection tier, according to State information security multi-level protection management norms and technical standards, and carry out information system security construction or reconstruction work.

    Article 12: In the process of information system construction, operating and using work units shall simultaneously construct information security facilities conform to the requirements of their tier according to the “Computer Information System Security Protection Tier Division Standards” (GB17859-1999), the “Basic Requirements for Information System Security Multi-Level Protection” and other such basic standards, and with reference to the “Information Security Technology – Common Security Technology Requirements for Information Systems” (GB/T20271-2006), “Information Security Technology – Basic Network Security Technology Requirements”(GB/T20270-2006), “Information Security Technology – Operating System Security Technology Requirements”(GB/T20272-2006), “Information Security Technology – Database Management System Security Technology Requirements”(GB/T20273-2006),“Information Security Technology – Server Technology Requirements”, “Information Security Technology – Terminal Computer System Security Multi-Level Technology Requirements” (GA/T671-2006) and other such technical standards.

    Article 13: Operating and using work units shall formulate and implement security management structures conform to the requirements of their system’s security protection tier, with reference to the “Information Security Technology – Information System Security Management Requirements” (GB/T20269-2006), “Information Security Technology – Information System Security Project Management Requirements” (GB/T20282-2006), “Basic Requirements for Information System Security Multi-Level Protection” and other such management standards.

    Article 14: After the construction of information systems is completed, operating and using work units or their competent departments shall choose an assessment body meeting the conditions provided in these Rules, to regularly conduct tier assessment of the information system’s security tier status on the basis of the “Information System Security Multi-Level Protection Assessment Requirements”. Third-tier information systems shall undergo tier assessment at least once every year, fourth-tier information systems shall undergo tier assessment at least once every half year, fifth-tier information systems shall undergo tier assessment on the basis of specialized security requirements.

Work units operating and using information systems and their competent departments shall regularly conduct inspections of information systems’ security status, security protection structures and the implementation status of measures. Third tier information systems shall undergo self-inspection at least once every year, fourth-tier information systems shall undergo self-inspection at least once every half year, fifth-tier information systems shall undergo self-inspection on the basis of specialized security requirements.

Where, through assessment or self-inspection, an information system’s security status does not meet their security protection tier’s requirements, operating and using work units shall formulate plans and rectify the matter.

Article 15: For already operating (running) second-tier and higher information systems their operating and using work unit shall, within 30 days after determination of the security protection tier, conduct filing formalities with the city-level or higher public security body of their locality.

For newly-built second-tier and higher information systems, their operating and using work unit shall, within 30 days after entering operations, conduct filing formalities with the city-level or higher public security bodies of their locality.

For work units subordinate to the Centre in Beijing, with information systems operating across provinces or in a national uniformly networked manner, whose tiers are uniformly determined by a competent department, the competent department conducts filing formalities with the Ministry of Public Security. For branch systems of information systems operating across provinces or in a nationwide uniformly networked manner that operate or are used in various localities, filing shall be submitted to the local city-level or higher public security body.

    Article 16: When conducting information security multi-level protection filing formalities an “Information System Security Multi-Level Protection Filing Form” shall be filled out, and the following materials shall simultaneously be submitted for third-tier and higher information systems: (1) system topologies, structures and explanations; (2) system security organization bodies and management structures; (3) system security protection equipment design and implementation plans and reconstruction implementation plans; (4) a list of information security products used on the system and their certification, and proof of sales licences; (5) a technical inspection and assessment report of post-assessment conformity to the system security protection tier; (6) an assessment opinion from the Information Security Protection Tier Expert Assessment Committee; (7) an opinion from the competent department on the examination, verification and approval of information system security protection tiers.

    Article 17: After information systems have been filed, public security bodies shall conduct examination and verification of the information system’s filing status, to those conforming to tier protection requirements, they shall issue an information system security multi-level protection filing certificate within ten working days after receiving the filing materials; where they discover [an information system] does not conform to these Rules and relevant standards, they shall notify the filing work unit within ten working days after receiving the filing materials and allow them to correct the matter; where they discover tier determination is inaccurate, they shall notify the filing work unit within ten working days after receiving the filing materials to examine and determine the matter again.

    Operating and using work units or competent departments shall, after determining an information system’s tier again, submit a new filing with the public security bodies according to these Rules.   

Article 18: Public security departments receiving filings shall conduct an inspection of the information security multi-level protection work status in work units operating and using third-tier and fourth-tier information systems. They shall inspect third-tier information systems at least once every year, and inspect fourth-tier information systems at least once every half year. The inspection of information systems operating across provinces or in a nationwide uniform manner, shall be conducted in coordination with its competent department. 

The inspection of fifth-tier information systems shall be conducted by a State-appointed specialized department.

    Public security bodies and state-appointed specialized departments shall inspect the following matters: (1) whether or not a change has occurred in the information system’s security needs, and the originally determined protection tier is still accurate; (2) the implementation status of the operating and using work unit’s security management structures and methods; (3) the inspection status by operating and using work units of information system security circumstances; (4) whether a system’s security tier assessment conforms to requirements;(5) whether the use of information security products conforms to requirements; (6) the status of information system security improvements; (7) the compliance status of filing materials with operating and using work units and information systems; (8) other matters that shall be subject to supervision and inspection.

    Article 19: Work units operating and using information systems shall accept security supervision, inspection and guidance from public security bodies and State-appointed specialized departments, and accurately provide the following relevant information materials and data files on information security protection to public security bodies and State-appointed specialized departments: (1) changes of status in an information system’s filing items; (2) changes of status in security organization and personnel; (3) changes of status in information security management structures and methods; (4) records of the information system’s operational status; (5) regular inspection records by operating and using work units and their competent departments of the security status of their information system; (6) technical assessment reports of tier assessments conducted on information systems;(7) changes of status in information security products used; (8) information security incident emergency response plans, information security incident emergency response deployment result reports; (9) information system security construction and reconstruction result reports.

    Article 20: Where public security inspections discover that an information system’s security protection status does not comply with information security multi-level protection-related management norms and technical standards, they shall issue a correction notice to operating and using work units. Operating and using work units shall, on the basis of the requirements of the correction notice, conduct correction according to management norms and technical standards. After the correction is completed, they shall file the correction reports with the public security bodies. When necessary, public security bodies may organize inspection of the correction status.

    Article 21: Third-tier and higher information systems shall choose and use information security products meeting the following conditions: (1) the work unit developing and producing the product is invested in by Chinese citizens or legal persons, or State-invested or controlled, and has autonomous legal person qualifications within the borders of the People’s Republic of China; (2) the core technologies and critical components of the product have our country’s indigenous intellectual property rights; (3) the work unit developing and manufacturing the product and the main operational and technical personnel have no criminal records; (4) the work unit developing and manufacturing the product states that they have not willfully left or installed loopholes, back doors, Trojans and other such programmes and functions; (5) it does not constitute a risk to national security, social order and the public interest; (6) where they are already listed in information security product certification catalogues, a certification letter issued by the national information security product certification body shall be obtained.

    Article 22: Third-tier or higher information systems shall choose a multi-level protection assessment body meeting the following conditions to conduct assessment: (1) being registered and established within the borders of the People’s Republic of China (except the Hong Kong, Macau and Taiwan regions); (2) being an enterprise or undertaking work unit invested in by Chinese citizens or Chinese legal persons, or be State-invested or State-controlled (except the Hong Kong, Macau and Taiwan regions); (3) having engaged in related assessment and monitoring work for two years or more, and not having a record of violations of the law; (4) work personnel is limited to Chinese citizens; (5) legal persons and the main operational and technical personnel have no criminal records; (6) technical equipment and facilities used shall conform to the requirements in these Rules on information security products; (7) having complete secrecy protection management, project management, quality management, personnel management, training management and other such security management structures; (8) not constituting a threat to national security, social order and the public interest.

    Article 23: Bodies engaging in information system security tier assessment shall implement the following duties: (1) abiding by relevant State laws and regulations, and technical standards, providing secure, objective and fair assessment and evaluation services, guaranteeing the quality and efficacy of assessment; (2) protecting the State secrets, commercial secrets and personal privacy they learn in the process of assessment activities; (3) conducting security and secrecy protection education for assessment personnel, signing security and secrecy protection letters of responsibility with them, and providing that they shall implement security and secrecy protection duties and bear legal liability, and are responsible for inspecting their implementation.

    Chapter IV: Tiered protection and management of State secret-related information systems

Article 14: Secrecy-related information systems shall be protected on the basis of the basic requirements of national information security multi-level protection, according to the management norms and technical standards of the State secrecy protection work department concerning tiered protection of secrecy-related information systems, and in integration with the actual status of the system. State secret information may not be processed on non-secrecy-related information systems.

Article 25: Secrecy-related information systems will, according to the highest classification level of the information they process, be divided into three tiers, from high to low: secret, top secret and absolute secret.

Work units constructing and using secrecy-related information systems shall determine system tiers on the basis of determining secrecy through information norms, on the basis of secrecy-related information system tiered protection management rules and the State secrecy protection standard BMB17-2006 “Technical Requirements for Tiered Protection of Computer Information Systems Involving State Secrets”. With regard to secrecy-related information systems containing multiple security areas, protection tiers may be determined separately for every security area.

    Secrecy protection work departments and bodies shall supervise and guide work units building and using secrecy-related information systems, and reasonably conduct system tier determination.

    Article 26: Work units constructing and using secrecy-related information systems shall timely report their secrecy-related information tier determination and construction and use status to their operational competent department’s secrecy protection work body and the secrecy protection work department responsible for system examination and approval for filing, and accept the supervision, inspection and guidance of secrecy protection departments.

    Article 27: Work units constructing and using secrecy-related information systems shall choose a work unit holding secrecy-related integration qualifications to undertake or participate in the design and implementation of secrecy-related information systems.

    Work units constructing and operating secrecy-related information systems shall conduct planning and design on the basis of secrecy-related information system tiered protection management norms and technical standards, according to the different requirements of the three tiers of secret, top secret and absolute secret, and in integration of systems’ reality, and implement tiered protection, their protection levels in general is not lower than the third-tier, fourth-tier and fifth-tier levels of national information security multi-level protection.

    Article 28: Domestic products shall, in principle, be chosen for information security secrecy protection products used in secrecy-related information systems, these shall pass inspections conducted by examination bodies authorized by the State Secrets Protection Bureau on the basis of State secret protection-related standards, products that have passed examination will be listed in a catalogue examined and published by the State Secrets Protection Bureau.

    Article 29: Work units constructing and using secrecy-related information systems shall, after the system’s project implementation is concluded, put forward an application with the secrecy protection work department, for a system assessment body authorized by the State Secrets Protection Bureau to conduct a secrecy protection assessment of the secrecy-related information system on the basis of national secrecy protection standard BMB22-2007 “Assessment Guidelines for the Tiered Protection of Computer Information Systems Involving State Secrets”.

    Work units constructing and using secrecy-related in information systems shall, before the system is put into use, apply with the city-level or higher secrecy protection work department for system examination and approval to be conducted according to the “Management Regulations for the Examination and Approval of Information Systems Involving State Secrets”, secrecy-related information systems may only be put into use after passing examination and approval. For secrecy-related information systems already put into use, their constructing and using work unit shall, after completing the system’s reconstruction according to tiered protection requirements, file the matter with the secrecy protection work department.

    Article 30: Work units constructing and using secrecy-related information systems shall, when applying for system examination and approval or filing, submit the following materials: (1) the system’s design, implementation plan and inspection analysis result; (2) certification materials of the qualifications of the work unit building the system; (3) a report of the system’s construction and project supervision status; (4) a report of the system’s security and secrecy protection inspection and assessment; (5) the status of system security and secrecy protection organization bodies and management structures; (6) other relevant materials.

    Article 31: When a change occurs in the secrecy tier, scope of connection, environmental facilities, main functioning, or responsible work units for security and secrecy protection management of secrecy-related information systems, the work units constructing or using them shall timely report the matter to the secrecy protection work department responsible for examination and approval. The secrecy protection work department shall, on the basis of the actual circumstances, decide whether or not to conduct assessment, examination and approval again.

    Article 32: Work units constructing and using secrecy-related information systems shall, on the basis of State secrecy protection standard BMB20-2007 “Management Norms for the Tiered Protection of Information Systems Involving State Secrets”, strengthen secrecy protection management in the operations of secrecy-related information systems, regularly conduct risk assessments, and eliminate leaks, vulnerabilities and loopholes.

Article 33: The national and all local levels’ secrecy protection work departments will implement supervision and management over tiered protection work of secrecy-related information systems of all localities and all departments, and complete the following work: (1) guiding, supervising and inspection the conduct of tiered protection work; (2) guiding work units operating and using secrecy-related information systems in standardizing information secrecy determination, and rationally determining systems’ protection tier; (3) participating in the analysis of secrecy-related information system tiered protection plans, guiding constructing and using work units to perform simultaneous planning and design of secrecy-protection equipment; (4) conducting supervision and management according to the law over work units with integration qualifications for secrecy-related information systems; (5) strictly conducting system assessment, examination and approval work, supervising and inspection the implementation status of tiered protection management structures and technical measures of work units constructing and using secrecy-related information system; (6) strengthening secrecy protection and inspection of secrecy-related information systems during operations. Secrecy protection inspection or system assessments are conducted at least once every two years for secret and top secret information systems, secrecy protection inspection or system assessments are conducted at least once every year for absolute secret information systems; (7)understanding and grasping the management and use status of secrecy-related information systems at all levels and of all categories, timely discovering, investigating and handling all kinds of acts violating laws and regulations and leakage incidents.

Chapter V: Encryption management in information security multi-level protection 

Article 34: The national encryption management department conducts categorized and tiered management of information security multi-level protection. On the basis of role and degree of importance of the protection counterpart in national security, social stability and economic construction, the protection counterpart’s security protection requirements and degree of involvement with secrets, the degree of harm after the destruction of the protection counterpart as well as the nature of encryption-using departments, etc., tiered protection norms for encryption are determined.

Work units operating and using information systems using encryption to conduct tiered protection shall abide by the “Information Security Multi-Level Protection Encryption Management Rules”, the “Technological Requirements for Commercial Encryption in Information Security Multi-Level Protection” and other such encryption management regulations and related standards.

Article 35: The installation, use and management of encryption in information system security multi-level protection shall strictly implement related State provisions concerning encryption management.

Article 36: Work units operating and using information systems shall fully use encryption technology to protect information systems. Where encryption is adopted to conduct protection of information and information systems involving State secrets, they shall report to the National Encryption Management Bureau for examination and approval, the design, implementation, use, operations, maintenance and daily management of encryption, etc., shall be executed according to State encryption management-related regulations and related standards; where encryption is adopted to protect information and information systems not involving State secrets, it must abide by the “Commercial Encryption Management Regulations” and regulations related to tiered and categorized encryption management and related standards, the installation and use status of encryption shall be reported to the national encryption management body for filing.

    Article 37: Where encryption technology is used to conduct tiered system protection construction or reconstruction of information systems, encryption products that passed approval for use approval for sale by the national encryption management departments must be adopted, foreign import or unauthorized, self-developed encryption products may not be used; without approval, it is prohibited to use imported information technology products containing encryption functions.

    Article 8: Assessment work of encryption in information systems and encryption equipment is conducted by an assessment body recognized by the State Encryption Management Bureau, no other department, work unit or individual may conduct encryption assessment or monitoring.

Article 39: All levels’ encryption management departments may, on a regular or non-regular basis, conduct inspections and assessments of the encryption installation, use and management status in information systems’ multi-level protection work, the encryption installation, use and management status of important secrecy-related information systems will be inspected and assessed at least once every two years. Where, in the process of supervision and inspection, the existence is discovered of security vulnerabilities, violations of encryption management-related regulations, or non-achievement of encryption-related standard requirements, the matters shall be handled according to State encryption management-related regulations.

    Chapter VI: Legal liability

Article 40: Where third-tier or higher work units operating and using information systems violating the provisions of these Rules, and one of the following acts is present, the public security body, State secrecy protection work department and State encryption work management department will, according to their respective duties and responsibilities, order them to correct the matter within a limited time; where they have not corrected the matter within this time, they will receive a warning, and the situation will be reported to their higher-level competent department, suggesting the directly responsible persons in charge and other directly responsible personnel is punished, and the punishment outcomes are to be timely reported back: (1) not having filed or undergone examination and approval according to these Rules; (2) not implementing security management structures and measures according to these Rules; (3) not conducting system security status inspections according to the provisions of these Rules; (4) not conducting system security technical monitoring according to the provisions of these Rules; (5) after receiving a correction notification, refusing to correct; (6) not choosing and using information security products and assessment bodies according to the provisions of these Rules; (7)not accurately providing relevant documents and certification materials according to the provisions of these Rules; (8) violating secrecy protection management regulations; (9) violating encryption management regulations; (10) violating other provisions of these Rules.

Where the violation of the provisions in the previous Paragraph results in grave harm, the relevant department imposes punishment according to relevant laws and regulations.

    Article 41: Where information security supervision and management departments and their work personnel, during the implementation of their supervision and management duties, commit dereliction of duties, abuse their powers, or engage in embezzlement or malpractice, they will be subject to administrative punishment according to the law; where it constitutes a crime, criminal liability is prosecuted according to the law. 

    Chapter VII: Supplementary provisions

Article 42: Operating and using work units already operating information systems will determine the security protection tier of the information system within 180 days after these Rules take effect; and determine the security protection tier of newly-built information in the design and planning phase.  

Article 43: “Or higher” as mentioned in these Rules includes the number (or tier) in question.

    Article 44: These Rules take effect on the date of promulgation, the “Information Security Multi-Level Protection Management Rules (Trial)” (GTZ No. [2006]7 are abolished at the same time.

关于印发《信息安全等级保护管理办法》的通知

各省、自治区、直辖市公安厅(局)、保密局、国家密码管理局(国家密码管理委员会办公室)、信息化领导小组办公室,新疆生产建设兵团公安局、保密局、国家密码管理局、信息化领导小组办公室,中央和国家机关各部委保密委员会办公室、密码工作领导小组办公室、信息化领导小组办公室,各人民团体保密委员会办公室:

    为加快推进信息安全等级保护,规范信息安全等级保护管理,提高信息安全保障能力和水平,维护国家安全、社会稳定和公共利益,保障和促进信息化建设,公安部、国家保密局、国家密码管理局、国务院信息化工作办公室制定了《信息安全等级保护管理办法》。现印发给你们,请认真贯彻执行。

公安部    国家保密局          

国家密码管理局   国务院信息工作办公室

 二〇〇七年六月二十二日            

信息安全等级保护管理办法

    第一章 总则

    第一条 为规范信息安全等级保护管理,提高信息安全保障能力和水平,维护国家安全、社会稳定和公共利益,保障和促进信息化建设,根据《中华人民共和国计算机信息系统安全保护条例》等有关法律法规,制定本办法。

    第二条 国家通过制定统一的信息安全等级保护管理规范和技术标准,组织公民、法人和其他组织对信息系统分等级实行安全保护,对等级保护工作的实施进行监督、管理。

    第三条 公安机关负责信息安全等级保护工作的监督、检查、指导。国家保密工作部门负责等级保护工作中有关保密工作的监督、检查、指导。国家密码管理部门负责等级保护工作中有关密码工作的监督、检查、指导。涉及其他职能部门管辖范围的事项,由有关职能部门依照国家法律法规的规定进行管理。国务院信息化工作办公室及地方信息化领导小组办事机构负责等级保护工作的部门间协调。

    第四条 信息系统主管部门应当依照本办法及相关标准规范,督促、检查、指导本行业、本部门或者本地区信息系统运营、使用单位的信息安全等级保护工作。

    第五条 信息系统的运营、使用单位应当依照本办法及其相关标准规范,履行信息安全等级保护的义务和责任。

    第二章 等级划分与保护

    第六条 国家信息安全等级保护坚持自主定级、自主保护的原则。信息系统的安全保护等级应当根据信息系统在国家安全、经济建设、社会生活中的重要程度,信息系统遭到破坏后对国家安全、社会秩序、公共利益以及公民、法人和其他组织的合法权益的危害程度等因素确定。

    第七条 信息系统的安全保护等级分为以下五级:

    第一级,信息系统受到破坏后,会对公民、法人和其他组织的合法权益造成损害,但不损害国家安全、社会秩序和公共利益。

    第二级,信息系统受到破坏后,会对公民、法人和其他组织的合法权益产生严重损害,或者对社会秩序和公共利益造成损害,但不损害国家安全。

    第三级,信息系统受到破坏后,会对社会秩序和公共利益造成严重损害,或者对国家安全造成损害。

    第四级,信息系统受到破坏后,会对社会秩序和公共利益造成特别严重损害,或者对国家安全造成严重损害。

    第五级,信息系统受到破坏后,会对国家安全造成特别严重损害。

    第八条 信息系统运营、使用单位依据本办法和相关技术标准对信息系统进行保护,国家有关信息安全监管部门对其信息安全等级保护工作进行监督管理。

    第一级信息系统运营、使用单位应当依据国家有关管理规范和技术标准进行保护。

    第二级信息系统运营、使用单位应当依据国家有关管理规范和技术标准进行保护。国家信息安全监管部门对该级信息系统信息安全等级保护工作进行指导。

    第三级信息系统运营、使用单位应当依据国家有关管理规范和技术标准进行保护。国家信息安全监管部门对该级信息系统信息安全等级保护工作进行监督、检查。

    第四级信息系统运营、使用单位应当依据国家有关管理规范、技术标准和业务专门需求进行保护。国家信息安全监管部门对该级信息系统信息安全等级保护工作进行强制监督、检查。

    第五级信息系统运营、使用单位应当依据国家管理规范、技术标准和业务特殊安全需求进行保护。国家指定专门部门对该级信息系统信息安全等级保护工作进行专门监督、检查。

    第三章 等级保护的实施与管理

    第九条 信息系统运营、使用单位应当按照《信息系统安全等级保护实施指南》具体实施等级保护工作。

    第十条 信息系统运营、使用单位应当依据本办法和《信息系统安全等级保护定级指南》确定信息系统的安全保护等级。有主管部门的,应当经主管部门审核批准。

    跨省或者全国统一联网运行的信息系统可以由主管部门统一确定安全保护等级。

    对拟确定为第四级以上信息系统的,运营、使用单位或者主管部门应当请国家信息安全保护等级专家评审委员会评审。

    第十一条 信息系统的安全保护等级确定后,运营、使用单位应当按照国家信息安全等级保护管理规范和技术标准,使用符合国家有关规定,满足信息系统安全保护等级需求的信息技术产品,开展信息系统安全建设或者改建工作。

    第十二条 在信息系统建设过程中,运营、使用单位应当按照《计算机信息系统安全保护等级划分准则》(GB17859-1999)、《信息系统安全等级保护基本要求》等技术标准,参照《信息安全技术 信息系统通用安全技术要求》(GB/T20271-2006)、《信息安全技术 网络基础安全技术要求》(GB/T20270-2006)、《信息安全技术 操作系统安全技术要求》(GB/T20272-2006)、《信息安全技术 数据库管理系统安全技术要求》(GB/T20273-2006)、《信息安全技术 服务器技术要求》、《信息安全技术 终端计算机系统安全等级技术要求》(GA/T671-2006)等技术标准同步建设符合该等级要求的信息安全设施。

    第十三条 运营、使用单位应当参照《信息安全技术 信息系统安全管理要求》(GB/T20269-2006)、《信息安全技术 信息系统安全工程管理要求》(GB/T20282-2006)、《信息系统安全等级保护基本要求》等管理规范,制定并落实符合本系统安全保护等级要求的安全管理制度。

    第十四条 信息系统建设完成后,运营、使用单位或者其主管部门应当选择符合本办法规定条件的测评机构,依据《信息系统安全等级保护测评要求》等技术标准,定期对信息系统安全等级状况开展等级测评。第三级信息系统应当每年至少进行一次等级测评,第四级信息系统应当每半年至少进行一次等级测评,第五级信息系统应当依据特殊安全需求进行等级测评。

    信息系统运营、使用单位及其主管部门应当定期对信息系统安全状况、安全保护制度及措施的落实情况进行自查。第三级信息系统应当每年至少进行一次自查,第四级信息系统应当每半年至少进行一次自查,第五级信息系统应当依据特殊安全需求进行自查。

    经测评或者自查,信息系统安全状况未达到安全保护等级要求的,运营、使用单位应当制定方案进行整改。

    第十五条 已运营(运行)的第二级以上信息系统,应当在安全保护等级确定后30日内,由其运营、使用单位到所在地设区的市级以上公安机关办理备案手续。

    新建第二级以上信息系统,应当在投入运行后30日内,由其运营、使用单位到所在地设区的市级以上公安机关办理备案手续。

    隶属于中央的在京单位,其跨省或者全国统一联网运行并由主管部门统一定级的信息系统,由主管部门向公安部办理备案手续。跨省或者全国统一联网运行的信息系统在各地运行、应用的分支系统,应当向当地设区的市级以上公安机关备案。

    第十六条 办理信息系统安全保护等级备案手续时,应当填写《信息系统安全等级保护备案表》,第三级以上信息系统应当同时提供以下材料:(一)系统拓扑结构及说明;(二)系统安全组织机构和管理制度;(三)系统安全保护设施设计实施方案或者改建实施方案; (四)系统使用的信息安全产品清单及其认证、销售许可证明; (五)测评后符合系统安全保护等级的技术检测评估报告;(六)信息系统安全保护等级专家评审意见;(七)主管部门审核批准信息系统安全保护等级的意见。

    第十七条 信息系统备案后,公安机关应当对信息系统的备案情况进行审核,对符合等级保护要求的,应当在收到备案材料之日起的10个工作日内颁发信息系统安全等级保护备案证明;发现不符合本办法及有关标准的,应当在收到备案材料之日起的10个工作日内通知备案单位予以纠正;发现定级不准的,应当在收到备案材料之日起的10个工作日内通知备案单位重新审核确定。

    运营、使用单位或者主管部门重新确定信息系统等级后,应当按照本办法向公安机关重新备案。

    第十八条 受理备案的公安机关应当对第三级、第四级信息系统的运营、使用单位的信息安全等级保护工作情况进行检查。对第三级信息系统每年至少检查一次,对第四级信息系统每半年至少检查一次。对跨省或者全国统一联网运行的信息系统的检查,应当会同其主管部门进行。

    对第五级信息系统,应当由国家指定的专门部门进行检查。

    公安机关、国家指定的专门部门应当对下列事项进行检查:(一) 信息系统安全需求是否发生变化,原定保护等级是否准确;(二) 运营、使用单位安全管理制度、措施的落实情况;(三) 运营、使用单位及其主管部门对信息系统安全状况的检查情况;(四) 系统安全等级测评是否符合要求;(五) 信息安全产品使用是否符合要求; (六) 信息系统安全整改情况;(七) 备案材料与运营、使用单位、信息系统的符合情况;(八) 其他应当进行监督检查的事项。

    第十九条 信息系统运营、使用单位应当接受公安机关、国家指定的专门部门的安全监督、检查、指导,如实向公安机关、国家指定的专门部门提供下列有关信息安全保护的信息资料及数据文件:(一) 信息系统备案事项变更情况;(二) 安全组织、人员的变动情况;(三) 信息安全管理制度、措施变更情况;(四) 信息系统运行状况记录;(五) 运营、使用单位及主管部门定期对信息系统安全状况的检查记录;(六) 对信息系统开展等级测评的技术测评报告; (七) 信息安全产品使用的变更情况;(八) 信息安全事件应急预案,信息安全事件应急处置结果报告; (九) 信息系统安全建设、整改结果报告。

    第二十条 公安机关检查发现信息系统安全保护状况不符合信息安全等级保护有关管理规范和技术标准的,应当向运营、使用单位发出整改通知。运营、使用单位应当根据整改通知要求,按照管理规范和技术标准进行整改。整改完成后,应当将整改报告向公安机关备案。必要时,公安机关可以对整改情况组织检查。

    第二十一条 第三级以上信息系统应当选择使用符合以下条件的信息安全产品:(一)产品研制、生产单位是由中国公民、法人投资或者国家投资或者控股的,在中华人民共和国境内具有独立的法人资格;(二)产品的核心技术、关键部件具有我国自主知识产权;(三)产品研制、生产单位及其主要业务、技术人员无犯罪记录; (四)产品研制、生产单位声明没有故意留有或者设置漏洞、后门、木马等程序和功能;(五)对国家安全、社会秩序、公共利益不构成危害;(六)对已列入信息安全产品认证目录的,应当取得国家信息安全产品认证机构颁发的认证证书。

    第二十二条 第三级以上信息系统应当选择符合下列条件的等级保护测评机构进行测评:(一) 在中华人民共和国境内注册成立(港澳台地区除外);(二) 由中国公民投资、中国法人投资或者国家投资的企事业单位(港澳台地区除外);(三) 从事相关检测评估工作两年以上,无违法记录;(四) 工作人员仅限于中国公民;(五) 法人及主要业务、技术人员无犯罪记录;(六) 使用的技术装备、设施应当符合本办法对信息安全产品的要求; (七) 具有完备的保密管理、项目管理、质量管理、人员管理和培训教育等安全管理制度;(八) 对国家安全、社会秩序、公共利益不构成威胁。

    第二十三条 从事信息系统安全等级测评的机构,应当履行下列义务:(一)遵守国家有关法律法规和技术标准,提供安全、客观、公正的检测评估服务,保证测评的质量和效果;(二)保守在测评活动中知悉的国家秘密、商业秘密和个人隐私,防范测评风险;(三)对测评人员进行安全保密教育,与其签订安全保密责任书,规定应当履行的安全保密义务和承担的法律责任,并负责检查落实。

    第四章 涉及国家秘密信息系统的分级保护管理

    第二十四条 涉密信息系统应当依据国家信息安全等级保护的基本要求,按照国家保密工作部门有关涉密信息系统分级保护的管理规定和技术标准,结合系统实际情况进行保护。非涉密信息系统不得处理国家秘密信息。

    第二十五条 涉密信息系统按照所处理信息的最高密级,由低到高分为秘密、机密、绝密三个等级。

    涉密信息系统建设使用单位应当在信息规范定密的基础上,依据涉密信息系统分级保护管理办法和国家保密标准BMB17-2006《涉及国家秘密的计算机信息系统分级保护技术要求》确定系统等级。对于包含多个安全域的涉密信息系统,各安全域可以分别确定保护等级。

    保密工作部门和机构应当监督指导涉密信息系统建设使用单位准确、合理地进行系统定级。

    第二十六条 涉密信息系统建设使用单位应当将涉密信息系统定级和建设使用情况,及时上报业务主管部门的保密工作机构和负责系统审批的保密工作部门备案,并接受保密部门的监督、检查、指导。

    第二十七条 涉密信息系统建设使用单位应当选择具有涉密集成资质的单位承担或者参与涉密信息系统的设计与实施。

    涉密信息系统建设使用单位应当依据涉密信息系统分级保护管理规范和技术标准,按照秘密、机密、绝密三级的不同要求,结合系统实际进行方案设计,实施分级保护,其保护水平总体上不低于国家信息安全等级保护第三级、第四级、第五级的水平。

    第二十八条 涉密信息系统使用的信息安全保密产品原则上应当选用国产品,并应当通过国家保密局授权的检测机构依据有关国家保密标准进行的检测,通过检测的产品由国家保密局审核发布目录。

    第二十九条 涉密信息系统建设使用单位在系统工程实施结束后,应当向保密工作部门提出申请,由国家保密局授权的系统测评机构依据国家保密标准BMB22-2007《涉及国家秘密的计算机信息系统分级保护测评指南》,对涉密信息系统进行安全保密测评。

    涉密信息系统建设使用单位在系统投入使用前,应当按照《涉及国家秘密的信息系统审批管理规定》,向设区的市级以上保密工作部门申请进行系统审批,涉密信息系统通过审批后方可投入使用。已投入使用的涉密信息系统,其建设使用单位在按照分级保护要求完成系统整改后,应当向保密工作部门备案。

    第三十条 涉密信息系统建设使用单位在申请系统审批或者备案时,应当提交以下材料:(一)系统设计、实施方案及审查论证意见;(二)系统承建单位资质证明材料;(三)系统建设和工程监理情况报告;(四)系统安全保密检测评估报告;(五)系统安全保密组织机构和管理制度情况;(六)其他有关材料。

    第三十一条 涉密信息系统发生涉密等级、连接范围、环境设施、主要应用、安全保密管理责任单位变更时,其建设使用单位应当及时向负责审批的保密工作部门报告。保密工作部门应当根据实际情况,决定是否对其重新进行测评和审批。

    第三十二条 涉密信息系统建设使用单位应当依据国家保密标准BMB20-2007《涉及国家秘密的信息系统分级保护管理规范》,加强涉密信息系统运行中的保密管理,定期进行风险评估,消除泄密隐患和漏洞。

    第三十三条 国家和地方各级保密工作部门依法对各地区、各部门涉密信息系统分级保护工作实施监督管理,并做好以下工作:(一)指导、监督和检查分级保护工作的开展;(二)指导涉密信息系统建设使用单位规范信息定密,合理确定系统保护等级;(三)参与涉密信息系统分级保护方案论证,指导建设使用单位做好保密设施的同步规划设计;(四)依法对涉密信息系统集成资质单位进行监督管理;(五)严格进行系统测评和审批工作,监督检查涉密信息系统建设使用单位分级保护管理制度和技术措施的落实情况;(六)加强涉密信息系统运行中的保密监督检查。对秘密级、机密级信息系统每两年至少进行一次保密检查或者系统测评,对绝密级信息系统每年至少进行一次保密检查或者系统测评;(七)了解掌握各级各类涉密信息系统的管理使用情况,及时发现和查处各种违规违法行为和泄密事件。

    第五章 信息安全等级保护的密码管理

    第三十四条 国家密码管理部门对信息安全等级保护的密码实行分类分级管理。根据被保护对象在国家安全、社会稳定、经济建设中的作用和重要程度,被保护对象的安全防护要求和涉密程度,被保护对象被破坏后的危害程度以及密码使用部门的性质等,确定密码的等级保护准则。

    信息系统运营、使用单位采用密码进行等级保护的,应当遵照《信息安全等级保护密码管理办法》、《信息安全等级保护商用密码技术要求》等密码管理规定和相关标准。

    第三十五条 信息系统安全等级保护中密码的配备、使用和管理等,应当严格执行国家密码管理的有关规定。

    第三十六条 信息系统运营、使用单位应当充分运用密码技术对信息系统进行保护。采用密码对涉及国家秘密的信息和信息系统进行保护的,应报经国家密码管理局审批,密码的设计、实施、使用、运行维护和日常管理等,应当按照国家密码管理有关规定和相关标准执行;采用密码对不涉及国家秘密的信息和信息系统进行保护的,须遵守《商用密码管理条例》和密码分类分级保护有关规定与相关标准,其密码的配备使用情况应当向国家密码管理机构备案。

    第三十七条 运用密码技术对信息系统进行系统等级保护建设和整改的,必须采用经国家密码管理部门批准使用或者准于销售的密码产品进行安全保护,不得采用国外引进或者擅自研制的密码产品;未经批准不得采用含有加密功能的进口信息技术产品。

    第三十八条 信息系统中的密码及密码设备的测评工作由国家密码管理局认可的测评机构承担,其他任何部门、单位和个人不得对密码进行评测和监控。

    第三十九条 各级密码管理部门可以定期或者不定期对信息系统等级保护工作中密码配备、使用和管理的情况进行检查和测评,对重要涉密信息系统的密码配备、使用和管理情况每两年至少进行一次检查和测评。在监督检查过程中,发现存在安全隐患或者违反密码管理相关规定或者未达到密码相关标准要求的,应当按照国家密码管理的相关规定进行处置。

    第六章 法律责任

    第四十条 第三级以上信息系统运营、使用单位违反本办法规定,有下列行为之一的,由公安机关、国家保密工作部门和国家密码工作管理部门按照职责分工责令其限期改正;逾期不改正的,给予警告,并向其上级主管部门通报情况,建议对其直接负责的主管人员和其他直接责任人员予以处理,并及时反馈处理结果: (一) 未按本办法规定备案、审批的;(二) 未按本办法规定落实安全管理制度、措施的;(三) 未按本办法规定开展系统安全状况检查的;(四) 未按本办法规定开展系统安全技术测评的;(五) 接到整改通知后,拒不整改的;(六) 未按本办法规定选择使用信息安全产品和测评机构的;(七) 未按本办法规定如实提供有关文件和证明材料的;(八) 违反保密管理规定的;(九) 违反密码管理规定的;(十) 违反本办法其他规定的。

    违反前款规定,造成严重损害的,由相关部门依照有关法律、法规予以处理。

    第四十一条 信息安全监管部门及其工作人员在履行监督管理职责中,玩忽职守、滥用职权、徇私舞弊的,依法给予行政处分;构成犯罪的,依法追究刑事责任。

    第七章 附则

    第四十二条 已运行信息系统的运营、使用单位自本办法施行之日起180日内确定信息系统的安全保护等级;新建信息系统在设计、规划阶段确定安全保护等级。

    第四十三条 本办法所称“以上”包含本数(级)。

    第四十四条 本办法自发布之日起施行,《信息安全等级保护管理办法(试行)》(公通字[2006]7号)同时废止。 

Leave a Reply

Fill in your details below or click an icon to log in:

WordPress.com Logo

You are commenting using your WordPress.com account. Log Out /  Change )

Google photo

You are commenting using your Google account. Log Out /  Change )

Twitter picture

You are commenting using your Twitter account. Log Out /  Change )

Facebook photo

You are commenting using your Facebook account. Log Out /  Change )

Connecting to %s