[Industry News] The "Regulations on the Safety Protection of Key Information Infrastructure" is promulgated for the first anniversary of observation

Author:Information security research Time:2022.08.15

On July 30, 2021, the State Council Order No. 745 announced the "Regulations on the Safety Protection of Key Information Infrastructure" (hereinafter referred to as the "Regulations"). It will be implemented from September 1, 2021, and officially promulgated on August 17, 2021. The promulgation of the regulations marked the entry of my country's network security laws and regulations and security guarantee. Over the past year, relevant departments and relevant agencies have actively promoted the safety protection of key information infrastructure and achieved remarkable results.

On the occasion of the first anniversary of the promulgation of this regulation, Guangming Network Network Security Channel, the China Information Association Information Security Professional Committee, and Six -Party Cloud jointly organized a special sharing meeting to promote the implementation of the "Regulations on the Safety Protection of Key Information Infrastructure" and invite front -line experts in the field of industry, university and research fields Scholars conducted the "six -party talks" and shared their feelings and experience sharing over the past year.

The meeting was chaired by Cui Guangyao, deputy president and editor -in -chief of the China Information Security Magazine. He believes that in conjunction with the current domestic and foreign situations, on the first anniversary of the release of the "Guanji Regulations", the impact and changes that the "Regulations" over the past year should be In -depth analysis of the problem, in the environment where cyber security -related laws and regulations are basically sound, they should be focused on implementing work.

▲ Cui Guangyao, deputy president and editor -in -chief of "China Information Security" magazine

01. Five major aspects to further promote the security protection of key information infrastructure

Ye Hong, director of the Information Security Professional Committee of the China Information Association, said that with the "Regulations on the Security Protection of Key Information Infrastructure" and the "Cyber ​​Security Law of the People's Republic of China", "Data Security Law of the People's Republic of China" and "Personal Information Protection Law of the People's Republic of China" The introduction and implementation of the three laws and one regulations, the laws and regulations systems in the field of network security in my country have been continuously improved and improved.

▲ Ye Hong, director of the Information Security Professional Committee of China Information Association

She pointed out that since the first anniversary of the promulgation of the Regulations, the protection of network security in the field of key information infrastructure in my country has achieved certain results. For example, the relevant standards, methods and supporting regulations are introduced at the national level. At the same time, the safety awareness of relevant key areas and industries in work has further improved, and the talent structure and organization are further improved.

Ye Hong has shared the security protection of key information infrastructure and ensuring national network security on how to further consolidate key information infrastructure: First, continuously improves the key information infrastructure protection system, improves supporting standards and systems; second, key information infrastructure infrastructure Safety protection competent units should strengthen the supervision and inspection of related work, make multi -angle monitoring of the loopholes and weaknesses of existing network systems, as well as the security links of related industries and units; , Discover and solve new vulnerabilities and problems brought by new technologies and new applications; fourth is to promote the training of network security talents, continue to promote the vocational education of relevant professionals, open up the channel of talent progress, encourage talents to join the network security guarantee team; To strengthen the prediction and judgment of the security risks of key information infrastructure, we can pay attention to signs, tendencies, and potential risks in network security research, and make pre -judgment pre -layout defense measures.

02. Promote the establishment of key information infrastructure security protection plans

Professor Zuo Xiaodong, a professor at the University of Science and Technology of China, discussed the theme of "key information infrastructure security protecting policies and promotion of policies in various countries". He believes that in the process of security protection and promotion of key information infrastructure, the coordination of departmental responsibilities is the key issue. Legal requirements, key information infrastructure on the basis of the level protection system requires accurate "break" work.

▲ Professor Zuo Xiaodong of the University of Science and Technology of China

"It is recommended to organize the formulation of key information infrastructure security protection plans. At the same time, the departments should be further strengthened to coordinate, carefully study this system, clarify its essence, and have a clearer positioning, promote the implementation of relevant laws and regulations, and make it a become the implementation An important barrier to maintain national security. "Zuo Xiaodong said.

北京师范大学互联网发展研究院院长助理、中国互联网协会研究中心副主任吴沈括认为《条例》的性质不仅是法律的规则汇集,也是一个“工具箱”,以及战略引领和业务操作的规则,并The focus of personal information security protection was explained.

▲ Assistant to the Dean of the Internet Development Research Institute of Bei Normal University, Wu Shenkuo, Deputy Director of the Research Center of the China Internet Association

The "Regulations" are accompanied by risks generated by new technologies and new applications, and they are required to prevent network attacks and illegal crimes, ensure the safe and stable operation of key information infrastructure, and maintain the integrity, confidentiality and availability of data. Efforts to construct a comprehensive ecosystem of the protection of network security information sharing mechanisms, and different subjects participate in the protection of key information infrastructure of network security.

At the sharing meeting, Wang Shaojie, deputy dean of Lu Yuntian Network Security Research Institute, spoke around "hot spots and trends that need attention to key information infrastructure protection". He said that the security protection of key information infrastructure in my country is still in its infancy, and its security protection concept, system framework, and best practice still need to explore and research.

▲ Wang Shaojie, deputy dean of Lu Yuntian Network Security Research Institute

"Cyber ​​security level protection system is the basis for the security protection of key information infrastructure." The protection of key information infrastructure is the goal of preventing hidden dangers of security threats, effectively resolving security risks, and ensuring the safety and stable operation of business applications. , Enterprise automation, security ability process, and integration of safety operations. The protection of key information infrastructure needs to enhance the dynamic, adaptability and self -improvement of its security capabilities on the basis of level protection. Wang Shaojie said. 03. Implementing the protection of Guanji protection requires systematic joint efforts to build

As the organizer of this sharing session, Li Jiangli, president of Liufangyun, exchanged on -site with the theme of "technical support analysis of Guanji security protection". He said that at present, the relevant rules of the security protection of key information infrastructure in my country are gradually being improved, but its implementation of its implementation not only requires multi -department co -cooperation and long -term construction, but also requires its own all -round, systematic system, and framework.

▲ Li Jiangli, President of Liufangyun

According to Li Jiangli, the key information infrastructure is the neurotrans of the social operation of the digital economy era, and it is also the top priority of network security. The security of key information infrastructure is of great significance to safeguard the sovereignty of the national network space and national security, protect the healthy development of the economy and society, safeguard public interests and the legitimate rights and interests of citizens.

The security protection of key information infrastructure in my country must also promote the self -innovation of safety equipment manufacturers on the basis of the "Security Protection of key information infrastructure", fully mobilize the positive force of the whole society, and establish a complete, scientific, scientific, scientific, scientific, scientific, scientific, scientific, science Based on the strict institutional framework, the implementation of responsibilities, co -discussion and co -construction, the security into entities, and implementing peace of mind.

The release of the "Regulations" is a milestone event, marking the protection of key infrastructure protection work to the new era. Over the past year, under the strong promotion of the country, through the joint efforts of many parties, it has continuously created a new pattern of network security protection. Network space security is of great significance.

(Source: Guangming Network Security Channel)

- END -

Popular science empowerment, happy summer!Wuhan Science and Technology Museum accompanies you to have a different summer vacation!

With the advent of Sanfu Sky, the summer vacation in 2022 also showed a hot scene!...

Comes with business card!Don't hang up when you receive this phone

The Ministry of Industry and Information Technology recently issued an anti -fraud...