What security evaluation agency should be used to test and evaluate the national secret information system?

The security information system shall be tested and evaluated by the security evaluation institution authorized by the state security administrative department, and can only be put into use after passing the examination by the security administrative department at or above the city or autonomous prefecture with districts.

The security inspection of classified information system is mainly to check whether the classified information system has implemented the relevant national security laws and regulations, security standards and measures, including system construction and use inspection, physical isolation inspection, security domain and boundary protection inspection, identity authentication inspection, access control inspection, security audit inspection, illegal outreach inspection, intrusion detection monitoring inspection, virus protection inspection, operating system security inspection, database security inspection, mobile device control inspection, on-site technical inspection, etc.

Physical isolation safety inspection:

(1) Physical isolation check between classified network terminals (including servers) and public information networks such as the Internet. Check whether the secret-related network terminal is connected with public information networks such as the Internet, and make comprehensive judgment and analysis through the online records and system logs of the secret-related network terminal. Check whether the graded network terminal is equipped with a TV card and connected to the public cable TV network.

(2) Physical isolation inspection between classified network equipment and public information networks such as the Internet. Check whether routers, switches and other classified network devices have traces of physical connection channels and access to public information networks such as the Internet. Check whether wireless switches, wireless routers and other wireless devices are used.

(3) Physical isolation inspection between classified networks and public information networks such as the Internet. Check the topology diagram of classified network and the wiring of network room, and analyze and judge whether it meets the requirements of physical isolation. Use the inspection tool to check whether there is a connection path between the confidential network and the non-confidential network. The main technical methods include active detection of network topology nodes, monitoring of illegal network outreach behavior, rapid location and verification analysis of illegal access nodes, etc.

(4) Physical isolation inspection of classified office automation equipment and public information networks such as the Internet. Check whether classified printers, copiers, fax machines and all-in-one machines are connected to public telephone lines. Check whether the internal IP phone is used for a secure network and whether the IP phone is connected to the public telephone network.