Public Internet Cybersecurity Threat Monitoring and Mitigation Measures

Posted on Updated on

This translation was kindly provided by John Costello

Ministry of Industry and Information Technology Network [2017] No. 202

Provincial, autonomous region, and municipal communications authorities, China Telecom Group Corporation, China Mobile Communications Corporation, China Unicom Group Corporation, China National Computer Emergency Technical Team/Coordination Center of China (CNCERT), China Information Communications Research Institute, National Industrial Information Security Development Research Center, China Internet Association, domain name registration management and service organs, internet companies, and cybersecurity enterprises:

In order to deepen the implementation of the spirit of General Secretary Xi Jinping’s important speeches on cybersecurity, actively respond to the dire and complex cybersecurity situation, to move forward robust public internet cybersecurity threat monitoring and mitigation mechanism, safeguard the legitimate rights and interests of citizens, legals person, and other organizations, and in accordance with “Cybersecurity Law of the People’s Republic of China” and other relevant laws and regulations, the “Public Internet Cybersecurity Threat Monitoring and Mitigation Measures”. Hereby issued to you, please realistically and effectively implement and carry out.

Ministry of Industry and Information Technology

August 9, 2017

Public Internet Cybersecurity Threat Monitoring and Mitigation Measures

Article 1: In order to strengthen and standardize the task of monitoring and mitigating public Internet cybersecurity threats, eliminate security risks, stop attacks, avoid harm, reduce security risks, maintain cyber order and public interests, protect the legitimate rights and interests of citizens, legal persons, and other organizations, and in accordance with “The Cybersecurity Law of the People’s Republic of China”, “Decision of the Standing Committee of the National People’s Congress on Strengthening the Information Protection of Networks”, “Telecommunications Regulations of the Peoples’ Republic of China”, other relevant laws and regulations, and the duties of the Ministry of Industry and Information Technology these measures are formulated.

Article 2 The term “public Internet cybersecurity threat” as mentioned in these Measures refers to the network resources, malicious processes, security risks or security incidents that exist or disseminated on the public Internet that may or may have harmed the public, including:

(1) malicious IP addresses, malicious domain names, malicious URLs, malicious electronic information, including Trojans and botnet controllers, phishing websites, phishing emails, SMS / MMS, instant messaging, etc.,

(2) malicious programs that are used to carry out cyber attacks, including Trojans, viruses, botnet programs, mobile malware, etc.;

(3) security risks in network services and products, including hardware vulnerabilities, software vulnerabilities, business logic vulnerabilities, weak passwords, backdoors, etc.;

(4) network services and products that have been illegally compromised, illegally controlled cybersecurity incidents, including host control, data leakage, and tampering with webpages, etc.;

(5) other threats to cybersecurity or any circumstance where security risks exist.

Article 3: The Ministry of Industry and Information Technology (MIIT) shall be responsible for organizing and developing national public internet cybersecurity threat monitoring and mitigation work. Communications authorities of provinces, autonomous regions, municipalities shall be responsible for organizing and developing public internet cybersecurity threat monitoring and mitigation work in their respective administrative areas. Ministry of Industry and Information Technology and provincial, autonomous region, and municipal Communications Authority are hereafter collectively referred to as principal telecommunication departments.

Article 4: Cybersecurity threat monitoring and mitigation work shall adhere to the principle of timely, discovery, scientific identification, and effective mitigation.

Article 5: Relevant professional organizations, basic telecommunication companies, cybersecurity companies, Internet companies, domain name registration management and service organs shall strengthen the monitoring and disposal of cybersecurity threats, specify responsible departments, responsible persons and contact persons, strengthen the establishment of relevant technical measures, and constantly improve the timeliness, accuracy, and effectiveness of cybersecurity threats to monitoring and mitigation.

Article 6 After cybersecurity threats are discovered by relevant professional organizations, basic telecommunication enterprises, cybersecurity enterprises, Internet companies, domain name registration management and service organs, etc., shall be classified as the units own issue, and shall immediately begin mitigation, involve other entities, information shall be submitted to MIIT, provincial, autonomous region, and municipal communications authorities in a timely manner and in according with the content, indicators, and format of relevant regulations.

The Ministry of Industry and Information Technology will establish cybersecurity threat information sharing platform, unified collection, storage, analysis, notification, release network security threat information; formulate relevant interface specifications, and develop interoperability with related cybersecurity monitoring platforms. National Computer Emergency Response Technical Team/Coordination Center (CNCERT) is responsible for platform construction, operational and maintenance work.

Article 7: The principal telecommunication departments shall entrust CNCERT, China Information Communications Research Institute, and other specialized organs to identify threat information submitted by relevant units and issue mitigation recommendations. Identification work shall be carried out under the principles of scientific rigor, just, fair, timely, and effective. Principal telecommunication departments shall strengthen the management and training of professional organs and personnel involved in identification work.

Article 8: After the identification and mitigation recommendation has been approved by principal telecommunication organs, they may take the following mitigation measures for network security threats:

(1) Notify basic telecommunication companies, Internet companies, domain name registration management and service organs, etc., to cease service, block, or adopt other measures against malicious IP addresses (or broadband access accounts), malicious domain names, malicious URLs, malicious e-mail accounts, or malicious phone numbers.

(2) Notify network service providers, to eliminate all transmissible malware that reside on the unit’s network, systems, or website.

(3) Notify providers of network services a products that have vulnerabilities, backdoors, or who have already been compromised, controlled, or tampered with, to take corrective measures to eliminate the security risks.

(4) Other technical measures that can eliminate, stop, or control cybersecurity threats.

Mitigation notices from principle telecommunications departments must be sent to relevant units in written or verifiable electronic sources. In emergency circumstances, it is permissible to first make a telephone notice, then later supplement with a written notice.

Article 9: Basic telecommunication companies, internet companies, domain name registration management and service organs, etc, shall provide technical support and assistance for principal telecommunication organs inquiries into IP address attribution, domain name registration, and other information, and in accordance with notices from principal telecommunications departments and time limitations adopt mitigation measures and provide feedback on mitigation results. Specialized organization responsible for identifying cybersecurity threats shall be responsible for conducting verification of relevant mitigation situations.

Article 10: Where a relevant organization or individual is dissatisfied with the mitigation measures taken in accordance with Article 8 (1) of the present Measures, it shall have the right to appeal within 10 working days to the principal telecommunication departments that issued the mitigation decision. Relevant telecommunications departments shall promptly organize and investigation after receiving the complaint and reply within ten working days.

Article 11: Relevant units shall be encouraged to carry out cybersecurity threat monitoring and mitigation work in the form of industry self-discipline, technical cooperation, or technical services, and shall be responsible for handling mitigation, monitoring and mitigation results shall be reported to principal telecommunications organs in a timely manner.

Article 12: Where a basic telecommunications companies, internet companies, domain name registration management and service organ, etc. fail to take measures to deal with cybersecurity threats in accordance with notified requirements of principal telecommunication departments, the telecommunications departments shall, in accordance with Article 56, Article 59, Article 60, Article 68 of “National Cybersecurity Law of the People’s Republic of China” and other regulations, arrange questioning, issue warnings, institute fines, and other administrative penalties.

Article 13: Monitoring and mitigation work of public internet cybersecurity emergencies that cause or may cause serious social harm or influence shall be carried out in accordance with relevant emergency plans of the State and principal telecommunications departments.

Article 14: Communications authorities of provinces, autonomous regions, municipalities may, in accordance with these Measures, formulate detailed rules for implementation of cybersecurity threat monitoring and disposal within their respective administrative regions.

Article 15: These Measures shall come into force on January 1, 2018. “Trojan and Botnet Monitoring and Mitigation Mechanism” issued on April 13, 2009 and “Mobile Internet Malware Monitoring and Mitigation Mechanism” issued on December 9, 2011 are abolished at the same time.

信部网安[2017]202号

各省、自治区、直辖市通信管理局,中国电信集团公司、中国移动通信集团公司、中国联合网络通信集团有限公司,国家计算机网络应急技术处理协调中心、中国信息通信研究院、国家工业信息安全发展研究中心、中国互联网协会,域名注册管理和服务机构、互联网企业、网络安全企业:

为深入贯彻习近平总书记关于网络安全的重要讲话精神,积极应对严峻复杂的网络安全形势,进一步健全公共互联网网络安全威胁监测与处置机制,维护公民、法人和其他组织的合法权益,根据《中华人民共和国网络安全法》等有关法律法规,制定《公共互联网网络安全威胁监测与处置办法》。现印发给你们,请结合实际,切实抓好贯彻落实。

工业和信息化部

2017年8月9日

 

公共互联网网络安全威胁监测与处置办法

第一条 为加强和规范公共互联网网络安全威胁监测与处置工作,消除安全隐患,制止攻击行为,避免危害发生,降低安全风险,维护网络秩序和公共利益,保护公民、法人和其他组织的合法权益,根据《中华人民共和国网络安全法》《全国人民代表大会常务委员会关于加强网络信息保护的决定》《中华人民共和国电信条例》等有关法律法规和工业和信息化部职责,制定本办法。

第二条 本办法所称公共互联网网络安全威胁是指公共互联网上存在或传播的、可能或已经对公众造成危害的网络资源、恶意程序、安全隐患或安全事件,包括:

(一)被用于实施网络攻击的恶意IP地址、恶意域名、恶意URL、恶意电子信息,包括木马和僵尸网络控制端,钓鱼网站,钓鱼电子邮件、短信/彩信、即时通信等;

(二)被用于实施网络攻击的恶意程序,包括木马、病毒、僵尸程序、移动恶意程序等;

(三)网络服务和产品中存在的安全隐患,包括硬件漏洞、代码漏洞、业务逻辑漏洞、弱口令、后门等;

(四)网络服务和产品已被非法入侵、非法控制的网络安全事件,包括主机受控、数据泄露、网页篡改等;

(五)其他威胁网络安全或存在安全隐患的情形。

第三条 工业和信息化部负责组织开展全国公共互联网网络安全威胁监测与处置工作。各省、自治区、直辖市通信管理局负责组织开展本行政区域内公共互联网网络安全威胁监测与处置工作。工业和信息化部和各省、自治区、直辖市通信管理局以下统称为电信主管部门。

第四条 网络安全威胁监测与处置工作坚持及时发现、科学认定、有效处置的原则。

第五条 相关专业机构、基础电信企业、网络安全企业、互联网企业、域名注册管理和服务机构等应当加强网络安全威胁监测与处置工作,明确责任部门、责任人和联系人,加强相关技术手段建设,不断提高网络安全威胁监测与处置的及时性、准确性和有效性。

第六条 相关专业机构、基础电信企业、网络安全企业、互联网企业、域名注册管理和服务机构等监测发现网络安全威胁后,属于本单位自身问题的,应当立即进行处置,涉及其他主体的,应当及时将有关信息按照规定的内容要素和格式提交至工业和信息化部和相关省、自治区、直辖市通信管理局。

工业和信息化部建立网络安全威胁信息共享平台,统一汇集、存储、分析、通报、发布网络安全威胁信息;制定相关接口规范,与相关单位网络安全监测平台实现对接。国家计算机网络应急技术处理协调中心负责平台建设和运行维护工作。

第七条 电信主管部门委托国家计算机网络应急技术处理协调中心、中国信息通信研究院等专业机构对相关单位提交的网络安全威胁信息进行认定,并提出处置建议。认定工作应当坚持科学严谨、公平公正、及时高效的原则。电信主管部门对参与认定工作的专业机构和人员加强管理与培训。

第八条 电信主管部门对专业机构的认定和处置意见进行审查后,可以对网络安全威胁采取以下一项或多项处置措施:

(一)通知基础电信企业、互联网企业、域名注册管理和服务机构等,由其对恶意IP地址(或宽带接入账号)、恶意域名、恶意URL、恶意电子邮件账号或恶意手机号码等,采取停止服务或屏蔽等措施。

(二)通知网络服务提供者,由其清除本单位网络、系统或网站中存在的可能传播扩散的恶意程序。

(三)通知存在漏洞、后门或已经被非法入侵、控制、篡改的网络服务和产品的提供者,由其采取整改措施,消除安全隐患;对涉及党政机关和关键信息基础设施的,同时通报其上级主管单位和网信部门。

(四)其他可以消除、制止或控制网络安全威胁的技术措施。

电信主管部门的处置通知应当通过书面或可验证来源的电子方式等形式送达相关单位,紧急情况下,可先电话通知,后补书面通知。

第九条 基础电信企业、互联网企业、域名注册管理和服务机构等应当为电信主管部门依法查询IP地址归属、域名注册等信息提供技术支持和协助,并按照电信主管部门的通知和时限要求采取相应处置措施,反馈处置结果。负责网络安全威胁认定的专业机构应当对相关处置情况进行验证。

第十条 相关组织或个人对按照本办法第八条第(一)款采取的处置措施不服的,有权在10个工作日内向做出处置决定的电信主管部门进行申诉。相关电信主管部门接到申诉后应当及时组织核查,并在30个工作日内予以答复。

第十一条 鼓励相关单位以行业自律或技术合作、技术服务等形式开展网络安全威胁监测与处置工作,并对处置行为负责,监测与处置结果应当及时报送电信主管部门。

第十二条 基础电信企业、互联网企业、域名注册管理和服务机构等未按照电信主管部门通知要求采取网络安全威胁处置措施的,由电信主管部门依据《中华人民共和国网络安全法》第五十六条、第五十九条、第六十条、第六十八条等规定进行约谈或给予警告、罚款等行政处罚。

第十三条 造成或可能造成严重社会危害或影响的公共互联网网络安全突发事件的监测与处置工作,按照国家和电信主管部门有关应急预案执行。

第十四条 各省、自治区、直辖市通信管理局可参照本办法制定本行政区域网络安全威胁监测与处置办法实施细则。

第十五条 本办法自2018年1月1日起实施。2009年4月13日印发的《木马和僵尸网络监测与处置机制》和2011年12月9日印发的《移动互联网恶意程序监测与处置机制》同时废止。

 

Advertisements

Leave a Reply

Fill in your details below or click an icon to log in:

WordPress.com Logo

You are commenting using your WordPress.com account. Log Out / Change )

Twitter picture

You are commenting using your Twitter account. Log Out / Change )

Facebook photo

You are commenting using your Facebook account. Log Out / Change )

Google+ photo

You are commenting using your Google+ account. Log Out / Change )

Connecting to %s