Journal of Information Security Reserach ›› 2022, Vol. 8 ›› Issue (1): 62-.

Previous Articles     Next Articles

Research on Construction of Critical Information Infrastructure Protection System and Standardization of Vulnerability Management

  

  • Online:2022-01-09 Published:2022-01-07

关键信息基础设施保护体系建设与漏洞管理标准化研究

杨一未  孙成昊   

  1. (中国信息安全测评中心 北京 100085)

  • 通讯作者: 杨一未 硕士,高级企业信息管理师. 主要研究方向为信息安全漏洞、漏洞库建设、关键信息基础设施安全、信息安全管理、大数据分析. yangyw@itsec.gov.cn
  • 作者简介:杨一未 硕士,高级企业信息管理师. 主要研究方向为信息安全漏洞、漏洞库建设、关键信息基础设施安全、信息安全管理、大数据分析. yangyw@itsec.gov.cn 孙成昊 硕士,副研究员. 主要研究方向为信息安全风险评估和漏洞分析. sunch@itsec.gov.cn

Abstract: In order to solve the confusion of critical information infrastructure operator in vulnerability management, the implementation of the Cyber Security Law of the People's Republic of China and the Regulations on the Security and Protection of critical information infrastructure (Draft for Comments) should be further promoted, and the protection system of critical information infrastructure in China should be established. By systematically analyzing the development history of critical information infrastructure protection at home and abroad, relevant standards of vulnerability management, and frontier theories of vulnerability management of critical information infrastructure, the necessity of standardization of vulnerability management for operators of critical information infrastructure is demonstrated. The vulnerability control management of key information infrastructure is summarized into 5 elements of vulnerability management, asset management, patch management, personnel management and organizational management, and the management model of 5 stages of preparation, planning, execution, monitoring and change. The 5 elements and 5 stages of vulnerability control management are cross-subdivided into 32 work processes. It is suggested to compile a vulnerability management guide standard for vulnerability operators of critical information infrastructure with Chinese characteristics according to this model.

Key words: vulnerability, critical information infrastructure, elimination and control, vulnerability life cycle, vulnerability management

摘要: 为解决关键信息基础设施运营者在漏洞管理工作中的困惑,深化推进《中华人民共和国网络安全法》和《关键信息基础设施安全保护条例(征求意见稿)》的落实工作,构建我国关键信息基础设施保护体系.通过系统分析国内外关键信息基础设施保护发展历程、漏洞管理相关标准、关键信息基础设施漏洞管理前沿理论,论证了关键信息基础设施运营者漏洞管理工作标准化的必要性.将关键信息基础设施漏洞消控管理工作归纳为漏洞管理、资产管理、补丁管理、人员管理、组织管理5要素和准备、规划、执行、监控、变更5阶段的管理模型,漏洞消控管理5要素与5阶段交叉细分为32个工作过程,建议根据此模型编写具有我国特色的关键信息基础设施漏洞运营者漏洞管理指南类标准.

关键词: 漏洞, 关键信息基础设施, 消控, 漏洞生命周期, 漏洞管理