Welcome to the Industrial Automation website!

NameDescriptionContent
HONG  KANG
E-mail  
Password  
  
Forgot password?
  Register
当前位置:

Open a new stage in the security protection of critical information infrastructure

来源: | 作者:佚名 | 发布时间 :2023-12-05 | 285 次浏览: | 🔊 Click to read aloud ❚❚ | Share:

First, legislation on the security protection of critical information infrastructure is an important part of each country's cybersecurity strategy

(1) The complex and grave global cyber security situation poses new challenges to the security and protection of critical information infrastructure in all countries. Recently, the infrastructure and important information systems of many countries have been subjected to cyber attacks, causing global shock and posing huge risks to national security and stability. In particular, in 2021, the largest fuel pipeline operator in the United States and the world's largest meat processing enterprises were shut down due to hacker attacks, resulting in damage to infrastructure affecting the operation of the national and even global economy, having a chain impact on the whole industrial chain, and triggering global thinking on strengthening the security protection of critical information infrastructure. Recently, major countries and regions in the world have strengthened the security protection of critical infrastructure. The United States not only significantly increased funding for critical infrastructure cybersecurity, but also proposed a number of bills and official guidelines to strengthen critical infrastructure cybersecurity and prevent ransomware attacks. The EU has also made improving the protection and resilience of critical infrastructure a top priority for cybersecurity over the next five years in the EU Security Union Strategy.

(2) Major countries and regions in the world have taken critical infrastructure legislation as the most critical link in cybersecurity legislation. The United States and Europe started earlier in critical infrastructure legislation. The United States promulgated the Critical Infrastructure Protection Act of 2001 as early as 2001, followed by the Executive Order on Improving Critical Infrastructure Network Security and the Executive Order on Enhancing Federal Government Network and Critical Infrastructure Network Security. With the increasingly severe cybersecurity situation, the United States has actively adjusted its cybersecurity protection strategy, and recently issued the Interim National Security Strategic Guideline for 2021 and the Executive Order on Strengthening National Cybersecurity for 2021. The EU has introduced several pieces of legislation related to the protection of critical infrastructure, including the 2008 EU Directive on the Identification and Security Assessment of Critical Infrastructure and the 2016 Directive on Network and Information Security. Russia enacted the Federal Critical Information Infrastructure Security Act in 2017, and Australia enacted the Critical Infrastructure Security Act in 2018. In addition, the United Kingdom, Germany, Japan and other countries have also introduced relevant legislation and policies for the protection of critical infrastructure.

(3) China's cybersecurity Law emphasizes a higher level of protection for critical information infrastructure. On the basis of clarifying the basic system of national network security, China's cybersecurity Law introduced in 2016 stipulates a higher level of security protection requirements for critical information infrastructure. The Cybersecurity Law provides for the key protection of critical information infrastructure, and in Chapter 3, "Network Operation Security", a single section is set up to specifically provide for the security protection of critical information infrastructure. Higher requirements are put forward for security management measures such as technical measures, personnel mechanisms, data security, and risk assessment involved in the security protection of critical information infrastructure, and it is emphasized that the security protection system of critical information infrastructure should be further improved through supporting legislation, highlighting the important position of critical information infrastructure in the overall national network security system.

The Regulations establish specific institutional requirements for the security protection of China's critical information infrastructure

The Cybersecurity Law makes general provisions on the relevant implementation objects, responsibility subjects, and work contents of the security protection system for critical information infrastructure. As an important supporting regulation of the Cybersecurity Law, the Regulations are implemented based on work and define a series of basic elements related to the security protection of critical information infrastructure such as the scope of application, regulatory subjects, and assessment objects. Security protection requirements and security measures are put forward to ensure specific objects, clear rights and responsibilities, and clear tasks, and to provide systematic guidance and work compliance for security protection work.

(1) Determine the scope of protected objects. Article 2 of the Regulations gives a clear definition of critical information infrastructure, Article 9 puts forward the key considerations for the protection work department to formulate identification rules, and determines that the protection work department is responsible for formulating the identification rules and lists of critical information infrastructure in the industry and the field. On the one hand, the formation process of the identification rules and lists must be based on the reality, fully combined with the characteristics and importance of the industry and the field of business, and achieve the accurate definition of the scope of the list on the basis of quantitative index parameters; On the other hand, the list should be dynamically adjusted and updated along with the development of national cybersecurity and informatization.

(2) Clarify the division of oversight responsibilities. In order to ensure the smooth development of the security protection of critical information infrastructure, the Regulations set up a scientific and rigorous supervision and management mechanism. At the national level, the national network information department is responsible for overall coordination, the public security department of The State Council is responsible for guidance and supervision, and the telecommunications department of The State Council and other relevant departments are responsible for the security protection, supervision and management of key information infrastructure of the industry; At the local level, the relevant departments of the provincial people's governments are responsible for the security protection, supervision and management of critical information infrastructure. It not only effectively ensures the unified, orderly and coordinated promotion of the security protection of critical information infrastructure, but also gives full play to the professional advantages of specific industry sectors to improve the security protection of critical information infrastructure.

3. Strengthening primary responsibility for security. The Regulations emphasize that critical information infrastructure operators (hereinafter referred to as operators) assume the main responsibility for the security protection of critical information infrastructure, and set strict requirements for the operators' own security management mechanism. The first is to emphasize the responsibility of the main person in charge, and make it clear that the main person in charge of the operator is responsible for the security protection of critical information infrastructure. The second is to require the establishment of a special security management organization, which is specifically responsible for the security protection of the critical information infrastructure of the unit. The third is the implementation of security background checks for personnel in key positions, including the person in charge of the operator's special safety management agency and the personnel identified as key positions. The fourth is to ensure the operation of the special safety management agency, and provide funds and professional personnel protection for the special safety management agency of the unit.

(4) Detailed security protection requirements. The Regulations strengthen the security protection of critical information infrastructure and put forward higher security protection requirements for operators on the basis of the Network Security Law. The first is to implement the "three synchronization" requirements, requiring security protection measures and critical information infrastructure synchronous planning, synchronous construction, synchronous use, critical information infrastructure from the date of inclusion in the list of key information infrastructure, in the design and construction (expansion), operation and maintenance, emergency recovery, decommissioning and waste stages, should ensure the implementation of security protection covering the whole life cycle. The second is to carry out regular security testing and risk assessment, and the operator must carry out network security testing and risk assessment at least once a year, which can be carried out by itself or commissioned by network security service agencies. The third is to fulfill the obligation of reporting security incidents and threats, in the event of a major cybersecurity incident or the discovery of a major cybersecurity threat, the operator shall report to the relevant departments. The fourth is to implement the requirements of network security review, operator procurement of network products and services may affect national security, should be in accordance with the national network security provisions for security review. Fifth, to strengthen monitoring and early warning and information sharing, the Regulations propose to establish and improve the network security monitoring and early warning system for critical information infrastructure, accurately grasp the operation of critical information infrastructure, and promote network security information sharing.

5. Strengthening key security guarantees. First, the implementation of vulnerability detection, penetration testing and other activities for critical information infrastructure should be approved by the national network information department, the public security department of The State Council, or authorized by the protection department and the operator. Activities such as vulnerability detection and penetration testing of basic telecommunications networks shall be reported to the competent department of telecommunications under The State Council in advance. Second, the energy and telecommunications industries provide important support and resource guarantee for the stable operation of key information infrastructure in finance, water conservancy, transportation and other industries, and the basic telecommunications network is also basic and global, carrying other key information infrastructure. The state will take measures to give priority to the safe operation of key information infrastructure such as energy and telecommunications. The energy and telecommunications industries will provide key guarantees for the safe operation of critical information infrastructure in other industries and fields.

Third, the new stage of critical information infrastructure security protection

1. Improving the system of supporting standards and regulations. First, accelerate the formulation and introduction of national standards around the common security needs and baseline security requirements of critical information infrastructure. Second, the protection work department focuses on the actual conditions and characteristics of the industry, deeply promotes the construction of key information infrastructure standards in the industry, and organizes the implementation. The third is to carry out in-depth research on the management mechanism in key aspects such as operators' responsibilities and obligations, information sharing mode, collaborative disposal mechanism, and security protection capability identification.

(2) Deepening the implementation of industry supervision responsibilities. The first is to guide and supervise the industry operators to implement the main responsibility of security, and do a solid job in the security protection of key information infrastructure such as network security threat monitoring and disposal, network security review. The second is to improve the supervision and inspection mechanism, and strengthen the security protection inspection and risk assessment of key information infrastructure in the industry. The third is to build and improve the emergency support system, establish technical support means such as situational awareness and emergency command, organize and carry out scenario-based, thematic and joint emergency drills, and build a team of experts.

3. We will strengthen demonstrations of the application of new technologies and models. First, strengthen research on innovation and development, and actively use new technologies such as cloud computing, big data, and artificial intelligence to enhance the cybersecurity capabilities of critical information infrastructure. The second is to establish an innovation incentive mechanism, deepen the innovative application and pilot demonstration of advanced cybersecurity technologies, gather the strength of the cybersecurity industry, and strengthen the supply of cybersecurity capabilities for critical information infrastructure. The third is to carry out the assessment and continuous optimization of the network security capability of critical information infrastructure, and objectively assess the level of network security capability. Choose the direction of improving security capability in a scientific way.


  • OEMAX NX-CPU700P PLC Controller
  • OEMAX NX-BASE10 PLC Backplane
  • OEMAX NX-AO4C 4-Channel Analog Output Module
  • OEMAX NX-AI8C 8-Channel Analog Input Module
  • OMACO GF0-57CQD-002 Industrial Control Module Precision Automation
  • OPTIMATE OP-620 Industrial Automation Control Module
  • OPTIMATE OM1510 Industrial Control Module Performance Solution
  • OPTO 22 SNAP-IDC5D Digital Input Module for Automation
  • OPTO 22 SNAP-AITM-2 Thermocouple Module
  • ORIENTAL A4722-9215KM Cooling Fan
  • ORIENTAL MOTOR 2GK180K Gearhead Specifications
  • OSRAM DULUX L 36W 840 865 Lamp Specification
  • OTHER FLASH SERIES 2 Memory Module Data
  • OVATION 1X00458H01 Control Module Specification
  • Emerson Ovation 1C31157G02 Event Sequence Module
  • Emerson Ovation 5X00070G04 Analog Input Module
  • OXIDE 0020-31655 Industrial Controller
  • ABB FAU810 C87-11006 / C10-12010 Flame Analyzer
  • Pilz PSSu E F 4DI Safety Input Module
  • Pepperl+Fuchs KFD2-UFC-1.D Frequency Converter
  • Pacific Scientific VDE0530-S1 Stepper Motor
  • Pacific Scientific 6410-001-N-N-N Stepper Drive
  • PACIFIC LA23GCKC-1Y Servo Motor Reliable Automation Motion Solution
  • PACIFIC LA23GCKX-P500A Servo Motor Advanced Industrial Motion Control
  • PACIFIC LA23GCKC-P500A High Precision Servo Motor for Industrial Automation
  • Pacific Scientific E32NCHA-LNN-NS-00 Hybrid Stepper Motor
  • Pacific Scientific SCE903A3-002-01 Servo Drive
  • Pacific Scientific 6410-024-N-N-N Stepper Motor Drive
  • PALCLEAN JD-BXG Industrial Control Module
  • Panametrics 704-673-20 Ultrasonic Flow Meter
  • Panasonic MSD043A1XX AC Servo Driver
  • Panasonic KX-FT936CN Plain Paper Fax Machine
  • Panasonic DL-1109CWS Electric Bidet Toilet Seat
  • PACIFIC SCIENTIFIC 33VM52-000-29 LDA-196-1000CE Servo Motor Controller
  • PACIFIC LA23GCKC-1G Linear Actuator Specifications
  • PACIFIC PC3406AI-001-E Stepper Controller Manual
  • PACIFIC SCE904AN-002-01 Servo Drive Analysis
  • PACIFIC 6445-001-K-N Digital Servo Drive Details
  • PACIFIC SCIENTIFIC R43HCNA-R2-NS-VS-00 Motor Data
  • Pacific Scientific H32NCHA-LNN-NS-00 Hybrid Motor Performance
  • ABB DSAI130DK01 3BSE020828R1 Analog Input Module
  • Parker 466966-0001-3820 Industrial Component Data
  • PARKER ZETA6104 Microstepping System
  • PARKER COMPAX 2500S/F3 Servo Drive Manual Details
  • PARKER CX-DH Indexer Drive Technical Specifications
  • PARKER 6K8 Motion Controller Features and Specifications
  • PARKER EVM32-BASE I/O Module Base Technical Specification
  • ABB Pb PN-112718 Digital Input Module
  • Pb PN-45734 PN-73899 Industrial Automation Module
  • Control Techniques Pb PN-40856 Industrial Control Module
  • Pb PN-104412 4002910956 Industrial Control Module
  • Siemens Pb PN-41513 Industrial Ethernet Module
  • Pelco PA30-0065-00-A1 PTZ Decoder Module
  • Pentek FILTER 3F11 800000919 Pleated Filter Cartridge
  • Pepperl+Fuchs RSD-TI-EX8 Temperature Input Module
  • PERITEK AC7-00712-1113 Industrial Interface Module
  • PFEIFFER EVR116 Vacuum Control Module
  • Pepperl+Fuchs RSD-CI-EX8 Hazardous Area Interface Module
  • PEPPERL+FUCHS 2108HAT Intrinsic Safety Barrier Module
  • Philips 958481320201 PROC+ Processing Unit
  • Philips 958481321300 PSB Power Supply Board
  • Philips 958481321220 PD208 Power Module
  • PHILIPS 958481321200 PD216 Control Module
  • PHILIPS 958481320201 PROC PLUS Control Module
  • Philips 958481320400 PIF Interface Module
  • Philips 958481320100 LCB Control Board
  • PHILIPS 958481223220 Industrial Control Module
  • PHILIPS 958481223223 Industrial Control Module
  • PHILIPS 958481321300 Industrial Control Module
  • PHILIPS SCM040 Digital Output Synchronization Module
  • PHILIPS DSI020 Data Storage Interface Module
  • PHILIPS OPM010 Optoelectronic Control Module
  • PHILIPS VBM010 Industrial Automation Module
  • PHILIPS VBM030 Turbine Supervisory Instrumentation
  • PHILIPS PR1613 Industrial Control Module
  • PHOENIX PATG1/23 1013847 Ground Terminal Block
  • Phoenix Contact IB ST 24 AI 4/SF Analog Input
  • Phoenix Contact OPC5315-004-AB Industrial PC
  • Phoenix Contact UMK-SE11.25-1 Side Element
  • PHOENIX 2961192 Relay Module
  • PHOENIX IB ST ZF 24 AI 4/SF Analog Input Module
  • Phoenix Contact PLC-BSC-24DC/21 Relay Base
  • Phoenix Contact UK6N Feed-Through Terminal Block
  • Phoenix Contact UK4-T Disconnect Terminal Block
  • Phoenix UK3N Screw Terminal Block
  • Phoenix QUINT-PS-100-240AC/10 Power Supply
  • Phoenix QUINT PS-100-240AC/24DC/10 Power Supply
  • Phoenix UT 6-HE SI Surge Protection Terminal Block
  • Phoenix UT 4-MTD Feed-through Terminal Block
  • Phoenix UT 4-HE SI Surge Protection Terminal Block
  • Phoenix IBS 24BK-I/O-T Bus Coupler
  • Phoenix Contact HDFK4 High-Current Terminal Block
  • PHOENIX ST-SI-UK4 Fuse Terminal Block
  • PHOENIX FLMC10BASE-T/FO G850 Fiber Media Converter
  • PHOENIX CONTACT QUINT-PS-100-240AC/24DC/40 Power Supply
  • PHOENIX CONTACT QUINT-DIODE/40 Redundancy Module
  • Phoenix Contact 2884208 Wireless I/O MUX
  • Photonetics 3646 HE 1540 Tunable Laser Source
  • PI C-663.12 Mercury Multi-Axis Step Motor Controller
  • PI C-663.10 Mercury Step Motor Controller
  • Pillar CB6687-2L Industrial Communication Board
  • Pilz DE-106712 A.F.051.5/01 Safety Module
  • Pilz 680003 Safety Relay Module Set
  • Pilz 301140 PNOZ X3 Safety Relay
  • Pilz P1U-1NB Safety Relay
  • Pioneer PM3398B-6-1-3-E Power Supply
  • Pioneer Magnetics PM3326B-6-1-2-E Power Supply
  • Pioneer Magnetics HYRSP-1500-56 Power Supply
  • Pioneer Magnetics PM3398B-6-1-3-E Power Supply
  • Pioneer Magnetics PM3328BP-6 Power Supply
  • Potter & Brumfield SDAS-01-7Y2S1024 Relay
  • Powec PMP10.48 SIC High-Efficiency Rectifier
  • Powerbox PU200-31C Industrial DC-DC Converter
  • PIONEER MAGNETICS PM3398BP-6-1-3-E Power Supply Module
  • PIONEER MAGNETICS PM1253AL-6-3-Z03 Power Supply Module
  • Powerex PD411811 Rectifier Diode Module
  • Power-One MAP55-1024 AC-DC Power Supply
  • ProSoft MVI56-MDA4 ControlLogix Multi-Protocol
  • POLYSPED PRD2-200 Industrial Drive Module
  • P-OPEN P-OPEN-P4-150 PAC-OP150 Operator Panel
  • ABB Processor 958481321210 350211080320 Rugged CPU
  • ABB Processor 958481320201 350211080460 Safety CPU
  • ABB Processor 958481321200 350211080320 CPU Module
  • ABB Processor 958481321220 350211080320 CPU Module
  • ABB Processor 958481320100 350211080090 CPU Module
  • Pro-Face PL5901-T42-24V HMI Touch Panel
  • PROFIBUS PB3-VME-1-E V1.2.2 Interface Card
  • PROMESS 850040060P Force Displacement Monitor