On April 26, 2021, the Ministry of State Security issued the Provisions on Anti-Espionage Security Work, which is summarized as follows:
Operators of critical information infrastructure shall take anti-espionage technology security measures to prevent and stop overseas network attacks, network intrusion, network theft and other espionage activities, and ensure the security of network and information core technologies, key infrastructure and information systems and data in important fields.
For China’s government application system of network intrusion, theft, illegal destruction and other network attacks have never stopped, a large number of network security incidents remind us that the construction of network security has no time to delay.
As the promoter and leader of China’s government cloud market, Inspur cloud knows the importance of network security construction on the cloud, constantly optimizing and improving security capabilities, and is committed to providing users with a safe and reliable cloud environment. In order to ensure the basic security of the cloud platform, Inspur cloud can provide various security services for users. Users can choose various security services according to the importance of the business and construct a protection system that meets the requirements of the business security level.
Wave cloud platform reference to safety standards at home and abroad, by means of three horizontal and three vertical construction of the whole cloud platform security system, realized the depth of safety protection, standardized safety management and operations of a solid guarantee, can effectively resist all kinds of network attack from outside, at the same time, the wave of cloud based on the concept of cloud native launched the royal “cloud,” a series of security products and services ** comprehensive coverage of user border security, application security, host security, data security and other security needs, ** enables users to easily and quickly choose the use of security services.
In the process of security defense, only relying on “cloud Royal security product and service system” cannot effectively help users face increasingly severe security threats and challenges. Based on the concept of cloud native and continuous operation, Inspur Cloud security brain protection system emerges as The Times require. Centering on security brain, inspur cloud security brain protection system establishes strong security support capability through efficient integration of technical personnel, comprehensive tools and standard processes.
Inspur cloud regards the cloud platforms distributed across the country as secure distributed nodes, and regards the security brain as the coordination and command center of the whole system. Just like the human brain, inspur cloud has three abilities: storage, learning and coordination. Through the standards of secure interconnection, so that the interaction between the various security nodes. With the help of big data, machine learning, AI analysis and other leading technologies, the security data of the national 90+ government cloud platform is summarized, processed and analyzed, and the security data is transformed from “owned by me” to “used by me”.
Inspur Cloud security Brain takes sustainable safe operation as the concept, integrates platform security system and “cloud royal” security system, and constructs a security protection system of in-depth defense and active discovery. Through comprehensive information collection and big data analysis, multi-dimensional security situation presentation is realized. The security expert team combines with process management to provide users with security operation services of “prediction – defense – detection – response”.
For anti-spy security measures, there can be a variety of combination of preventive measures, inspur Cloud believes that its core points are:
-
Build a deep defense system to resist all kinds of network attacks
-
High anti-ddos, virtual border defense, real-time Web site defense, cloud WAF and other products can help users establish solid border security defense.
-
Cloud host security, honeypot system, webpage anti-tampering and other services can effectively help users strengthen the security protection ability of computing environment;
-
Log audit, database audit, cloud fortress machine and other services to achieve users in the network security management of the “before, during, after” three-step management ability;
-
Situational awareness comprehensively monitors the security state. While monitoring external attacks, situational awareness can effectively identify horizontal attacks of “insiders” through full-flow detection and behavior portrait analysis, and prevent spies from entering the interior in disguise to carry out theft.
-
Security Brain plans the overall situation, realizes the standardization of human, technology and process security in a continuous operation way, empowers users with network security capabilities throughout the life cycle, and realizes the three core goals of network security, data security and behavior security on the cloud.
-
All staff deepen safety awareness, strictly prohibit unauthorized operation
-
Regular network security-related training should be carried out for relevant personnel, such as security management training, security awareness and security professional technology training. Promote the implementation of the safety management system by improving the understanding of the safety management system and the function of the safety management organization; Improve information security awareness and reduce the risk of internal disclosure by means of security incident analysis and attack demonstration; Through technical training to improve security skills, so that it can meet the relevant information security job requirements, improve the overall level of information security.