The use of SKZI to ensure the security of personal data is necessary in the following cases:
- if personal data are subject to cryptographic protection in accordance with the legislation of the Russian Federation;
- if there are threats in the information system that can be neutralized only with the help of the CMIS.
- transfer of personal data via communication channels that are not protected from interception by the violator of information transmitted through it or from unauthorized impacts on this information (for example, when transmitting personal data over public information and telecommunication networks);
- storage of personal data on storage media, unauthorized access to which by the offender cannot be excluded using non-cryptographic methods and techniques.
1.1. conducting an attack while staying within the controlled area.
- Employees who are users of SPDD but are not users of the IHRD, are informed about the rules of work in SPDH and responsibility for non-compliance with the rules for ensuring the security of information;
- CPSP users are informed about the rules of work in ISPDN, rules of work with the CIPF and responsibility for non-compliance with the rules of information security;
- the premises in which SKZI are located are equipped with entrance doors with locks, ensuring the permanent closing of the doors of the rooms to the lock and opening them only for an authorized passage;
- approved the rules of access to the premises where SKZI, during working and non-working hours, as well as in emergency situations;
- approved a list of persons entitled to access the premises where SKZI are located;
- the differentiation and control of user access to protected resources;
- registration and accounting of users' actions with PD is carried out;
- on workstations and servers on which SKZI are installed:
- certified information security measures against unauthorized access are used;
- certified antivirus protection is used.
- in order to ensure the security of personal data when processing them in ISPD, SKZI should be used, having undergone the conformity assessment procedure in the prescribed manner.
- in the absence of the procedure for assessing the compliance of the CIPS in the prescribed manner ... at the stage of an advance project or a draft (draft technical) project, the developer of the information system with the participation of the operator (authorized person) and the proposed developer of the CIPP develops a justification for the feasibility of developing a new type of TESIS and defines the requirements for its functional properties.
When using channels (lines) of communication, from which interception of the protected information transmitted through them is impossible and (or) in which unauthorized actions on this information are impossible, it is necessary to specify in the general description of information systems:
- description of methods and ways to protect these channels from unauthorized access to them;
- conclusions on the results of studies of the security of these channels (lines) of communication from unauthorized access to the protected information transmitted through them by an organization that has the right to conduct such studies, with reference to the document containing these conclusions.
- security characteristics (confidentiality, integrity, availability, authenticity) that must be ensured for the personal data being processed;
- communication channels (lines), including cable systems, used in each subsystem or in the information system as a whole, and measures to restrict unauthorized access to protected information transmitted through these communication channels (lines), indicating communication channels (lines) in which it is impossible unauthorized access to the protected information transmitted through them, and measures implemented to ensure this quality;
- protected information carriers used in each subsystem of the information system or in the information system as a whole (except for communication channels (lines)).
Coordination with the FSB of Russia of private threat models of operators prepared in accordance with these guidelines is not required.
Source: https://habr.com/ru/post/260833/
All Articles