The unit shall determine the security level of the classified information system according to the highest security level of the information stored and processed by the classified information system, and take corresponding security and confidentiality protection measures according to the requirements of classified protection. Classified information systems are classified into top secret level, confidential level and secret level according to the degree of confidentiality.
Organs and units shall determine the security level of classified information system according to the highest security level of information stored and processed by classified information system, and take corresponding security and confidentiality protection measures according to the requirements of classified protection.
Measures for the Administration of Classified Protection of Information Security Article 24 Classified information systems shall be protected according to the basic requirements of classified protection of national information security, in accordance with the regulations and technical standards for classified protection of classified information systems of state secrecy departments, and in combination with the actual situation of the system.
Non-confidential information systems shall not handle state secret information, etc. Twenty-fifth classified information system according to the highest level of information processing, from low to high is divided into three levels: secret, confidential and top secret.
Main functions of classified information system:
1, document centralized security management.
Realize centralized encrypted storage and security management of documents, and protect and manage the centrally stored documents throughout their life cycle, including online editing, controllable file sharing, file authorization, version control, file retrieval and file delivery management.
2. Record local safety management.
The files in the secure disk are encrypted and stored, and the reading process transparently encrypts and decrypts the files in the secure disk. At the same time, the security kernel controls the reading process to prevent the contents of the opened file from being leaked through various channels.
3, file terminal security protection.
The confidential files opened in the user terminal will be controlled by the security kernel of the terminal. Under the control of the safe disk protection kernel, the safe controlled files will be confined to the safe disk, and at the same time, when viewing the contents of the safe disk files, they cannot be leaked by printing, screen copying, content copying and pasting, dragging, screen fetching, network sending, etc.