What is the level of information system security protection in China?

Information systems have five levels of security protection:

1, the first level, after the information system is destroyed, it will harm the legitimate rights and interests of citizens, legal persons and other organizations, but it will not harm national security, social order and public interests. The operating and using units of the first-level information system shall protect it in accordance with the relevant national management norms and technical standards.

2. At the second level, if the information system is destroyed, it will cause serious damage to the legitimate rights and interests of citizens, legal persons and other organizations, or damage to social order and public interests, but it will not endanger national security. The national information security supervision department shall guide the security level protection of information systems at the corresponding level.

3. At the third level, the information system will cause serious damage to social order and public interests, or damage to national security. The national information security supervision department shall supervise and inspect the security level protection of the information system at the corresponding level.

4. Level 4. After the information system is destroyed, it will cause particularly serious damage to social order and public interests, or cause serious damage to national security. The national information security supervision department shall conduct compulsory supervision and inspection on the security level protection of the information system at the corresponding level.

5. Level 5: After the information system is destroyed, it will cause particularly serious damage to national security. The national information security supervision department shall conduct special supervision and inspection on the security level protection of the information system at the corresponding level.

Extended data:

Information security level protection requires that information systems with different security levels should have different security protection capabilities. On the one hand, it can be realized by selecting security control suitable for security level in security technology and security management.

On the other hand, different security technologies and security controls distributed in the information system have the same effect on the security function of the information system through the relationship of connection, interaction, dependence, coordination and cooperation, so that the overall security function of the information system is closely related to the structure of the information system and the relationship between security control, level and region.