📜 ⬆️ ⬇️

Summary table of taxiway FSTEC (to protection profiles) in order and in the context of the vultures

The number of RD / ND FSTEC is growing, some current [open] documents are about to be knocked over a quarter of a century!
Students and university graduates are younger than many of these fundamental documents - this is where the “generational conflict” worthy of the classics!
To help students with the development of RD / ND FSTEK [GOSTECHKOMISSII], pave the bridge between the "heritage" and "modern trends", the documents are summarized in a single table and distributed in relation to the type of information being processed.
After going through various approaches, the metric according to the information stamp has proved to be the most visible and universal.
There will be no detailed analysis of the documents; the goal is to build a visual system representation of the documents and their interrelationships.


additional parametersVulturesLinks and comments
State secretConfidential
information
Law of the Russian Federation of July 21, 1993 No. 5485-I “On State Secrets”
other types of secrets (legally protected information) more than 20 (trade secrets, tax secrets, personal data, etc.)
OB (of special importance)SS (top secret)C (secret)...
AS classificationone user3A3BGuidance Document
Automated systems.
Protection against unauthorized access to information
Classification of automated systems and information security requirements
Approved by the decision of the Chairman of the State Technical Commission under the President of the Russian Federation on March 30, 1992.
key point for the separation of the neck - 2.18
users have the same access rights to all information2A2b
not all users have access to all information1A1B1B1G1D
SVT security from unauthorized access123fourfive67
(just worse than 6)
Guidance Document
Computer Aids
Protection against unauthorized access to information
Indicators of security against unauthorized access to information
Approved by the decision of the Chairman of the State Technical Commission under the President of the Russian Federation on March 30, 1992.
Firewalls
* will be replaced with protection profiles from December 2016.
one23fourfiveGuidance Document
Computing facilities. Firewalls
Protection against unauthorized access to information
Indicators of security against unauthorized access to information
Approved by the decision of the Chairman of the State Technical Commission under the President of the Russian Federation of July 25, 1997
in accordance with item 1.6. for 2B, 3B ME is applied not lower than class 5
NDV controlone23fourGuidance Document
Protection against unauthorized access to information
Part 1.
Information Security Software
Classification by the level of control of the absence of undeclared
of opportunities
Approved by the decision of the Chairman of the State Technical Commission under the President of the Russian Federation No. 114 dated June 4, 1999
Protection profilesone234, etc.Guidance Document
Security information technology.
Security Profile Family Guide
State Technical Commission of Russia, 2003
The current and developed protection profiles correspond to the above division. The FSTEC website has published profiles, starting with 4, etc., designed to protect confidential information; you can read them here .
Information messages of FSTEC clarify the number and scope of profiles, starting with 4, because 1 to 3 - always GT.


In this presentation of materials, it seems that for a long time regulatory documents were poorly focused on the protection of confidential information, focusing on a secret. Note that the situation is changing due to the active development and adoption of families of protection profiles (with reference to the classes of GIS, APCS, ISPDn) in various areas.

')

Source: https://habr.com/ru/post/311978/


All Articles