Information System Checklist (Safety technical measures) category Physical security Inspection items Selection physical location safety standards of Physical access control Theft-proof and damageproof Machine rooms and office space should be selected in buildings with earthquake, wind and rain proof capabilities. Personnel on duty should be assigned to the entrance and exit of the computer room. Personnel who control, identify and record entry Visitors who need to enter the computer room should go through the application and approval process, and limit and monitor the scope of their activities. The main equipment should be placed in the computer room. The equipment or main parts should be fixed and marked clearly and not easily removed. Communication cables should be laid in concealment. They can be laid underground or in pipelines. Classification and identification of media should be carried out. Stored in media library or archives. Does it conform to safety standard s? Remark s Information System Checklist (Safety technical measures) category Inspection items safety standards Host room should be equipped with necessary anti-theft alarm facilities Lightning protection Fire prevention Waterproof and moisture proof Lightning arrester should be installed in the building of computer room. AC power ground wire should be installed in computer room Fire extinguishing equipment and automatic fire alarm system should be installed in the engine room Installation of water pipes. It is not allowed to pass through the roof of the machine house and under the movable floor. Measures should be taken to prevent rainwater from penetrating through the windows, roofs and walls of the engine room. Measures should be taken to prevent the transfer and infiltration of steam condensation and groundwater in the engine room Does it conform to safety standard s? Remark s Information System Checklist (Safety technical measures) category Inspection items safety standards Antistatic Necessary grounding anti-static measures should be adopted for key equipment Temperature and humidity control The machine room should be equipped with automatic temperature and humidity adjustment facilities, so that the temperature and humidity of the machine room can be changed within the allowable range of the operation of the equipment. Regulators and overvoltage protection equipment should be installed on the power supply line of the engine room. power supply network security Short-term standby power supply should be provided to meet at least the normal operation requirements of critical equipment in case of power failure. Electromagne tic protection Power and communication cables should be laid separately to avoid mutual interference. Structural safety Redundant space should be ensured for Does it conform to safety standard s? Remark s Information System Checklist (Safety technical measures) category Inspection items safety standards the business processing capability of key network equipment to meet the needs of business peak period. The bandwidth of access network and core network should be guaranteed to meet the needs of business peak period. The network topology diagram corresponding to the current operation situation should be drawn. Different subnets or segments should be divided according to their functions, importance and the importance of the information involved. Address segments should be allocated for each subnet and segment according to the principle of easy management and control. access control Access control devices should be deployed at network boundaries. Access control functions should be enabled It should be able to provide a clear ability Does it conform to safety standard s? Remark s Information System Checklist (Safety technical measures) category Inspection items safety standards to allow/deny access to data streams based on session state information. The granularity of control is network segment level. According to the permissible access rules between users and systems, it is decided to allow or deny users access to the controlled system resources. The control granularity is single user. The number of users with dial-up access should be limited security audit Boundary Integrity Check It is necessary to log the operation status of network equipment, network traffic and user behavior in network system. Audit records should include the date and time of events, users, event types, su

docxDoc Information System Network Security Checklist

Professional Docs > Common > Other > Preview
34 Pages 0 Downloads 223 Views 3.0 Score
Tips: Current document can only be previewed at most page8,If the total number of pages in the document exceeds page 8,please download the document。
Uploaded by admin on 2019-10-16 00:18:50
Rate
You can enter 255 characters
What is my domain?( answer:www.45doc.com )
comments
  • No comments yet