What must a computer information system involving state secrets achieve?

Computer information systems involving state secrets must be physically isolated.

According to the "Regulations on the Safety Management of Computer Information System International Networking"

Article 6 Computer information systems involving state secrets shall not be directly or indirectly connected with the Internet or other public information networks, and must be physically isolated.

Article 7 Information involving state secrets, including information that has been legally exchanged with foreign specific objects upon examination and approval in foreign exchanges and cooperation, shall not be stored, processed or transmitted in computer information systems connected to the Internet.

Extended data

According to the "Regulations on the Safety Management of Computer Information System International Networking"

Article 4 The security management of international networking of computer information systems follows the principles of controlling the source, centralized management, graded responsibility, highlighting key points and promoting development.

Article 5 The national security department is responsible for the security of the international networking of the national computer information system. The local security departments at or above the county level shall be in charge of the international networking security of computer information systems within their respective administrative areas. The central state organs shall, within the scope of their functions and powers, be responsible for or guide the security work of the international networking of the computer information system of this system.

Article 6 of Chapter II Security System of the Provisions on Security Management of Computer Information Systems on International Networking clearly stipulates that "computer information systems involving state secrets shall not be directly or indirectly connected with the Internet or other public information networks, and must be physically isolated".

Realize? The physical isolation between the internal network and the public network can ensure that the internal network will not be illegally attacked by the external public network. At the same time, the implementation of physical isolation also defines a clear security boundary for classified computers and information systems, enhances the controllability of the network, and facilitates internal management and prevention. In recent years, physical isolation technology has become an indispensable and important means in the network security system, and has been paid more and more attention by various departments and units.