IDC Backbone Network System Security Protection Plan_SupplyPro Co., Ltd._Hangzhou Xincx Network Technology Co., Ltd. 
在线客服 在线客服邀请中...
关闭

您好,现在客服正邀请与您通话,请留下您的联系方式,客服将尽快与您取得联系。

 点击提交代表您同意《服务条款》《隐私政策》
Hangzhou Xincx Network Technology Co., Ltd.

Equal Protection Assessment, Level Protection, Network Security Assessment

Consultation Hotline
18069775965

News Center Co., Ltd.

Product Categories
  • No Category
Home > SupplyPro Co., Ltd. > IDC Backbone Network System Security Protection Plan
IDC Backbone Network System Security Protection Plan
品牌: Insufficient information provided.
Location: Hangzhou
Available Locations: National
Advantages: Extensive industry experience
单价: 100.00/Unit
最小起订Quantity: 1 Unit
供货总Quantity: 9999 Unit
有效期至: 长期有效
最后更新: 2022-11-10 09:35
 
详细Info

The Cybersecurity Protection System is the fundamental national policy, system, and method in China's cybersecurity field, playing a crucial role in ensuring cybersecurity. Network operators in various industries and regions shall, in accordance with the requirements of the Cybersecurity Protection System, legally carry out network grading, record filing, security construction rectification, level assessment, and self-inspection, etc. The formal release and implementation of GB/T 22239-2019 "Information Security Technology - Basic Requirements for Cybersecurity Protection System" marks the entry of China's cybersecurity protection system into the 2.0 era.

"New Infrastructure" is one of the key terms in the macro policy field in 2020. It refers to infrastructure construction based on the technology end, primarily including seven fields: 5G infrastructure, ultra-high voltage, intercity high-speed rail and urban rail transit, new energy vehicle charging stations, data centers, artificial intelligence, and industrial internet. The IDC (Internet Data Center) - Internet data center serves as the infrastructure and support for other "new infrastructure" such as 5G, industrial internet, big data, and artificial intelligence. To ensure the provision of high-bandwidth, high-quality service, and high-security hosting services, the security of the IDC backbone network system is of paramount importance. According to the "Management Measures for the Protection of Information Security Grades," the basic network must not be classified as Grade Three, and it must not be lower than the level of the information systems it carries. Therefore, the IDC backbone network needs to strictly implement the regional network security protection system and carry out Grade Three protection construction for network security.

Design of Security Technical Measures

The design content of the security system for the backbone network of IDC mainly covers "one center and triple protection." This includes the Security Management Center, Secure Communication Network, Secure Zone Boundary, and Secure Computing Environment.

Key Design Points for Secure Communication Network

Offer hardware redundancy for communication lines, critical network equipment, and key computing equipment; bandwidth management devices ensure system availability.

Deploy firewalls between critical network zones and other network areas to provide reliable security isolation.

Key Design Points for Safe Zone Boundary

Deploy the next-generation firewall to implement access control based on application protocols and content for data streams entering and exiting the network.

Deploy systems against DDoS attacks, intrusion detection systems, traffic analysis systems, etc., to detect network attack behaviors initiated from external or internal sources at critical network nodes. Conduct detection, analysis, alerting, and prevention of network attacks, particularly new types of cyber attacks.

Key Points for Designing a Secure Computing Environment

Deploy fortresses to centralize audits of critical user actions and important security events through mechanisms such as fortress hosts (operation and maintenance auditing).

Key Design Points for Security Management Center

Divide different management roles, and implement centralized identity authentication, access authorization, and operation auditing through a bastion host.

Deploy vulnerability scanning to promptly discover information on various system vulnerabilities.


询价单
 Click submit means you agree to《Service terms》《Privacy policy》

18069775965