Analysis of methodological and technical support of procedures for assessing the security of significant objects of critical information infrastructure from unauthorized access
{"title":"Analysis of methodological and technical support of procedures for assessing the security of significant objects of critical information infrastructure from unauthorized access","authors":"Evgeniy N. Pivkin, Anastasia A. Ardaeva","doi":"10.17212/2782-2230-2022-1-27-40","DOIUrl":null,"url":null,"abstract":"This paper provides a direct analysis of existing methods for assessing the security of significant objects of critical information infrastructure, a review of their legislative framework and existing means of protecting information from unauthorized access. Such an analysis is necessary to solve problems related to the development of an integrated approach to assessing the security of significant objects of critical information infrastructure. The main guiding documents and orders of the FSTEC of Russia, Federal Law No. 187-FZ of July 26, 2017 \"On the security of the CII of the Russian Federation\" were considered. The modern market of means of protecting information from unauthorized access was analyzed. For convenience, all comparative criteria were divided into categories: general information; system requirements (minimum); supported automated workstations and servers based on well-known secure operating systems; the level of certification according to the safety requirements of the FSTEC of Russia; deployment of a protection system; component updates; the main functions of the means of protecting information from unauthorized access; clearing information; additional protection modules; centralized management and reporting; possibility of integration; licensing. The four most popular Russian groups of means of protecting information from unauthorized access were selected to participate in the comparison: Secret Net Studio; Dallas Lock 8.0-K; Diamond ACS; Blockhost Network 2.0. In order to identify methods for assessing the security of significant objects of critical information infrastructure, national standards of Russia and scientific periodicals were considered. It is shown that the methodological support of this segment of safety is not at the proper level.","PeriodicalId":207311,"journal":{"name":"Digital Technology Security","volume":"12 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2022-03-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"Digital Technology Security","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.17212/2782-2230-2022-1-27-40","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 0
Abstract
This paper provides a direct analysis of existing methods for assessing the security of significant objects of critical information infrastructure, a review of their legislative framework and existing means of protecting information from unauthorized access. Such an analysis is necessary to solve problems related to the development of an integrated approach to assessing the security of significant objects of critical information infrastructure. The main guiding documents and orders of the FSTEC of Russia, Federal Law No. 187-FZ of July 26, 2017 "On the security of the CII of the Russian Federation" were considered. The modern market of means of protecting information from unauthorized access was analyzed. For convenience, all comparative criteria were divided into categories: general information; system requirements (minimum); supported automated workstations and servers based on well-known secure operating systems; the level of certification according to the safety requirements of the FSTEC of Russia; deployment of a protection system; component updates; the main functions of the means of protecting information from unauthorized access; clearing information; additional protection modules; centralized management and reporting; possibility of integration; licensing. The four most popular Russian groups of means of protecting information from unauthorized access were selected to participate in the comparison: Secret Net Studio; Dallas Lock 8.0-K; Diamond ACS; Blockhost Network 2.0. In order to identify methods for assessing the security of significant objects of critical information infrastructure, national standards of Russia and scientific periodicals were considered. It is shown that the methodological support of this segment of safety is not at the proper level.
本文直接分析了评估关键信息基础设施重要对象安全性的现有方法,审查了其立法框架和保护信息免受未经授权访问的现有手段。这样的分析对于解决与开发综合方法来评估关键信息基础设施的重要对象的安全性相关的问题是必要的。审议了俄罗斯FSTEC的主要指令性文件和命令,即2017年7月26日第187-FZ号联邦法“关于俄罗斯联邦CII的安全”。分析了信息保护手段的现代市场。为方便起见,所有比较标准分为以下几类:一般信息;系统要求(最低);支持基于知名安全操作系统的自动化工作站和服务器;符合俄罗斯FSTEC安全要求的认证等级;部署保护系统;组件的更新;保护信息免遭未经授权访问的手段的主要功能;结算信息;附加保护模块;集中管理和报告;整合的可能性;许可。俄罗斯最受欢迎的四种保护信息免遭未经授权访问的手段被选中参与比较:Secret Net Studio;达拉斯锁8.0-K;钻石ACS;Blockhost网络2.0。为了确定评估关键信息基础设施重要对象安全的方法,审议了俄罗斯的国家标准和科学期刊。结果表明,这部分安全的方法支持没有达到适当的水平。