[go: up one dir, main page]

CN117879927A - Security level determination method, device, equipment and storage medium - Google Patents

Security level determination method, device, equipment and storage medium Download PDF

Info

Publication number
CN117879927A
CN117879927A CN202410010029.1A CN202410010029A CN117879927A CN 117879927 A CN117879927 A CN 117879927A CN 202410010029 A CN202410010029 A CN 202410010029A CN 117879927 A CN117879927 A CN 117879927A
Authority
CN
China
Prior art keywords
security level
capability
assessment
security
target
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202410010029.1A
Other languages
Chinese (zh)
Inventor
张桂玉
马季春
梁晓晨
张笑颜
李长连
王新
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
China United Network Communications Group Co Ltd
China Information Technology Designing and Consulting Institute Co Ltd
Original Assignee
China United Network Communications Group Co Ltd
China Information Technology Designing and Consulting Institute Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by China United Network Communications Group Co Ltd, China Information Technology Designing and Consulting Institute Co Ltd filed Critical China United Network Communications Group Co Ltd
Priority to CN202410010029.1A priority Critical patent/CN117879927A/en
Publication of CN117879927A publication Critical patent/CN117879927A/en
Pending legal-status Critical Current

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/20Network architectures or network communication protocols for network security for managing network security; network security policies in general
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/40Network security protocols

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Computer Hardware Design (AREA)
  • Computing Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Data Exchanges In Wide-Area Networks (AREA)

Abstract

The application relates to a security level determining method, a security level determining device, security level determining equipment and a storage medium, and relates to the technical field of communication. The method comprises the following steps: and determining at least one target security level assessment domain corresponding to the target device and at least one target security level assessment item corresponding to each target security level assessment domain according to the target device class of the target device and the first corresponding relation. And then, determining the target security level of the target device according to the target device information of the target device, at least one target security level evaluation item corresponding to each target security level evaluation domain and the second corresponding relation. The second correspondence relationship includes: the system comprises a plurality of security level assessment items, a plurality of security levels corresponding to each security level assessment item and a plurality of device information corresponding to the security levels one by one. The target security level is used to represent the degree of security of the target device. The method and the device are used for determining the safety degree of the communication equipment.

Description

安全等级确定方法、装置、设备及存储介质Security level determination method, device, equipment and storage medium

技术领域Technical Field

本申请涉及通信技术领域,尤其涉及一种安全等级确定方法、装置、设备及存储介质。The present application relates to the field of communication technology, and in particular to a security level determination method, apparatus, device and storage medium.

背景技术Background Art

通信网络安全与人们的生活息息相关,由于通信网络依赖于通信设备,确定通信设备的安全程度,有助于通信网络的管理,可以加强通信网络的安全。因此,如何确定通信设备的安全程度,是目前亟需解决的技术问题。The security of communication networks is closely related to people's lives. Since communication networks rely on communication equipment, determining the security level of communication equipment is helpful for the management of communication networks and can enhance the security of communication networks. Therefore, how to determine the security level of communication equipment is a technical problem that needs to be solved urgently.

发明内容Summary of the invention

本申请提供一种安全等级确定方法、装置、设备及存储介质,以确定通信设备的安全程度。本申请的技术方案如下:The present application provides a security level determination method, apparatus, device and storage medium to determine the security level of a communication device. The technical solution of the present application is as follows:

第一方面,提供一种安全等级确定方法,该方法包括:获取目标设备的目标设备类别和目标设备信息。目标设备信息包括:设备评估维度的设备信息、网络评估维度的设备信息和系统评估维度的设备信息中的至少一个。根据目标设备类别和第一对应关系,确定目标设备对应的至少一个目标安全等级评估域以及目标设备在每个目标安全等级评估域对应的至少一个目标安全等级评估项。第一对应关系包括:多个预设设备类别、每个预设设备类别对应的至少一个安全等级评估域、每个预设设备类别在每个安全等级评估域对应的至少一个安全等级评估项。至少一个安全等级评估域包括:设备评估维度的评估域、网络评估维度的评估域和系统评估维度的评估域中的至少一个。根据目标设备信息、目标设备在每个目标安全等级评估域对应的至少一个目标安全等级评估项和第二对应关系,确定目标设备的目标安全等级。第二对应关系包括:多个安全等级评估项、每个安全等级评估项对应的多个安全等级、与多个安全等级一一对应的多个设备信息。目标安全等级用于表示目标设备的安全程度。In a first aspect, a security level determination method is provided, the method comprising: obtaining a target device category and target device information of a target device. The target device information comprises: at least one of device information of a device evaluation dimension, device information of a network evaluation dimension, and device information of a system evaluation dimension. According to the target device category and a first corresponding relationship, at least one target security level assessment domain corresponding to the target device and at least one target security level assessment item corresponding to each target security level assessment domain of the target device are determined. The first corresponding relationship comprises: a plurality of preset device categories, at least one security level assessment domain corresponding to each preset device category, and at least one security level assessment item corresponding to each preset device category in each security level assessment domain. At least one security level assessment domain comprises: at least one of an assessment domain of a device evaluation dimension, an assessment domain of a network evaluation dimension, and an assessment domain of a system evaluation dimension. According to the target device information, at least one target security level assessment item corresponding to each target security level assessment domain of the target device, and a second corresponding relationship, a target security level of the target device is determined. The second corresponding relationship comprises: a plurality of security level assessment items, a plurality of security levels corresponding to each security level assessment item, and a plurality of device information corresponding to the plurality of security levels one by one. The target security level is used to indicate the security level of the target device.

在一种可能的实施方式中,上述方法还包括:建立第一子对应关系。第一子对应关系包括:设备评估维度的评估域对应的多个第一安全等级评估项、每个第一安全等级评估项对应的多个第一安全等级、与多个第一安全等级一一对应的多个第一设备信息。建立第二子对应关系。第二子对应关系包括:网络评估维度的评估域对应的多个第二安全等级评估项、每个第二安全等级评估项对应的多个第二安全等级、与多个第二安全等级一一对应的多个第二设备信息。建立第三子对应关系。第三子对应关系包括:系统评估维度的评估域对应的多个第三安全等级评估项、每个第三安全等级评估项对应的多个第三安全等级、与多个第三安全等级一一对应的多个第三设备信息。根据第一子对应关系、第二子对应关系和第三子对应关系,建立第二对应关系。In a possible implementation, the method further includes: establishing a first sub-correspondence. The first sub-correspondence includes: a plurality of first security level assessment items corresponding to the assessment domain of the device assessment dimension, a plurality of first security levels corresponding to each first security level assessment item, and a plurality of first device information corresponding one-to-one to the plurality of first security levels. Establishing a second sub-correspondence. The second sub-correspondence includes: a plurality of second security level assessment items corresponding to the assessment domain of the network assessment dimension, a plurality of second security levels corresponding to each second security level assessment item, and a plurality of second device information corresponding one-to-one to the plurality of second security levels. Establishing a third sub-correspondence. The third sub-correspondence includes: a plurality of third security level assessment items corresponding to the assessment domain of the system assessment dimension, a plurality of third security levels corresponding to each third security level assessment item, and a plurality of third device information corresponding one-to-one to the plurality of third security levels. A second correspondence is established based on the first sub-correspondence, the second sub-correspondence, and the third sub-correspondence.

在一种可能的实施方式中,上述建立第一子对应关系,包括:获取设备评估维度的评估域对应的多个第一安全等级评估项。多个第一安全等级评估项包括:设备启动时完整性保护能力、设备运行时完整性保护能力、安全密码算法管理能力、预设数据保护能力、身份认证能力。获取每个第一安全等级评估项对应的多个第一设备信息。设备启动时完整性保护能力对应的多个第一设备信息包括:设备启动时软件完整性校验能力、设备启动时通过数字签名技术进行完整性和真实性校验能力、设备启动时零配置开局能力。设备运行时完整性保护能力对应的多个第一设备信息包括:设备升级时软件包完整性校验能力、设备升级时补丁完整性校验能力、设备升级时通过数字签名技术进行完整性和真实性校验能力。安全密码算法管理能力对应的多个第一设备信息包括:预设密码算法安全强度、密码算法告警能力、多层密钥保护能力、根密钥硬件保护能力。预设数据保护能力对应的多个第一设备信息包括:第一预设数据保护能力、第二预设数据保护能力、预设程序保护能力,第二预设数据的重要程度高于第一预设数据。身份认证能力对应的多个第一设备信息包括:用户身份标识能力、用户身份鉴别能力、用户执行预设操作时是否进行用户身份鉴别能力、接口认证能力。根据任一第一安全等级评估项对应的多个第一设备信息,确定任一第一安全等级评估项对应的多个第一安全等级。根据设备评估维度的评估域对应的多个第一安全等级评估项、任一第一安全等级评估项对应的多个第一设备信息和任一第一安全等级评估项对应的多个第一安全等级,建立第一子对应关系。In a possible implementation, the above-mentioned establishment of the first sub-correspondence includes: obtaining multiple first security level assessment items corresponding to the assessment domain of the device assessment dimension. The multiple first security level assessment items include: integrity protection capability at device startup, integrity protection capability at device runtime, secure cryptographic algorithm management capability, preset data protection capability, and identity authentication capability. Obtain multiple first device information corresponding to each first security level assessment item. The multiple first device information corresponding to the integrity protection capability at device startup includes: software integrity verification capability at device startup, integrity and authenticity verification capability through digital signature technology at device startup, and zero-configuration start capability at device startup. The multiple first device information corresponding to the integrity protection capability at device runtime includes: software package integrity verification capability at device upgrade, patch integrity verification capability at device upgrade, and integrity and authenticity verification capability through digital signature technology at device upgrade. The multiple first device information corresponding to the secure cryptographic algorithm management capability includes: preset cryptographic algorithm security strength, cryptographic algorithm alarm capability, multi-layer key protection capability, and root key hardware protection capability. The multiple first device information corresponding to the preset data protection capability includes: first preset data protection capability, second preset data protection capability, and preset program protection capability, and the importance of the second preset data is higher than the first preset data. The multiple first device information corresponding to the identity authentication capability includes: user identity identification capability, user identity verification capability, whether to perform user identity verification when the user performs a preset operation, and interface authentication capability. According to the multiple first device information corresponding to any first security level assessment item, determine the multiple first security levels corresponding to any first security level assessment item. According to the multiple first security level assessment items corresponding to the assessment domain of the device assessment dimension, the multiple first device information corresponding to any first security level assessment item, and the multiple first security levels corresponding to any first security level assessment item, establish a first sub-correspondence relationship.

在一种可能的实施方式中,上述建立第二子对应关系,包括:获取网络评估维度的评估域对应的多个第二安全等级评估项。多个第二安全等级评估项包括:用户认证能力、攻击防护能力、链路保护能力。获取每个第二安全等级评估项对应的多个第二设备信息。用户认证能力对应的多个第二设备信息包括:支持预设服务器的远程认证和授权能力、支持预设服务器组配置能力、建立安全通道能力、支持预设服务器动态下发命令行配置能力。攻击防护能力对应的多个第二设备信息包括:第一预设攻击流量检测和清洗能力、第二预设攻击检测能力、秒级检测第一预设攻击的能力。链路保护能力对应的多个第二设备信息包括:端口循环冗余校验能力、光传输网误码检测能力、毫秒级业务切换能力。根据任一第二安全等级评估项对应的多个第二设备信息,确定任一第二安全等级评估项对应的多个第二安全等级。根据网络评估维度的评估域对应的多个第二安全等级评估项、任一第二安全等级评估项对应的多个第二设备信息和任一第二安全等级评估项对应的多个第二安全等级,建立第二子对应关系。In a possible implementation, the above-mentioned establishment of the second sub-correspondence includes: obtaining multiple second security level assessment items corresponding to the assessment domain of the network assessment dimension. The multiple second security level assessment items include: user authentication capability, attack protection capability, and link protection capability. Obtain multiple second device information corresponding to each second security level assessment item. The multiple second device information corresponding to the user authentication capability includes: supporting remote authentication and authorization capability of a preset server, supporting preset server group configuration capability, establishing a secure channel capability, and supporting the preset server to dynamically issue command line configuration capability. The multiple second device information corresponding to the attack protection capability includes: first preset attack traffic detection and cleaning capability, second preset attack detection capability, and second-level detection capability of the first preset attack. The multiple second device information corresponding to the link protection capability includes: port cyclic redundancy check capability, optical transmission network error detection capability, and millisecond-level service switching capability. According to the multiple second device information corresponding to any second security level assessment item, determine the multiple second security levels corresponding to any second security level assessment item. Establish a second sub-correspondence relationship according to the multiple second security level assessment items corresponding to the assessment domain of the network assessment dimension, the multiple second device information corresponding to any second security level assessment item, and the multiple second security levels corresponding to any second security level assessment item.

在一种可能的实施方式中,上述建立第三子对应关系,包括:获取系统评估维度的评估域对应的多个第三安全等级评估项。多个第三安全等级评估项包括:入侵检测能力、证书管理能力、安全配置能力。获取每个第三安全等级评估项对应的多个第三设备信息。入侵检测能力对应的多个第三设备信息包括:第三预设攻击检测能力、预设文件篡改检测能力、反弹接口攻击行为检测能力。证书管理能力对应的多个第三设备信息包括:数字证书导入和更新能力、数字证书过期预警能力、是否具有数字证书导入和更新的接口、数字证书完整性保护能力、对接公钥基础设施系统的能力。安全配置能力对应的多个第三设备信息包括:业务安全配置核查能力、手动修复预设配置能力、In a possible implementation, the establishment of the third sub-correspondence relationship includes: obtaining multiple third security level assessment items corresponding to the assessment domain of the system assessment dimension. The multiple third security level assessment items include: intrusion detection capability, certificate management capability, and security configuration capability. Obtain multiple third device information corresponding to each third security level assessment item. The multiple third device information corresponding to the intrusion detection capability includes: third preset attack detection capability, preset file tampering detection capability, and rebound interface attack behavior detection capability. The multiple third device information corresponding to the certificate management capability includes: digital certificate import and update capability, digital certificate expiration warning capability, whether there is an interface for digital certificate import and update, digital certificate integrity protection capability, and the ability to connect to the public key infrastructure system. The multiple third device information corresponding to the security configuration capability includes: business security configuration verification capability, manual repair of preset configuration capability,

修复预设配置能力。根据任一第三安全等级评估项对应的多个第三设备信息,确定任一第三安全等级评估项对应的多个第三安全等级。根据系统评估维度的评估域对应的多个第三安全等级评估项、任一第三安全等级评估项对应的多个第三设备信息和任一第三安全等级评估项对应的多个第三安全等级,建立第三子对应关系。Repair preset configuration capabilities. Determine multiple third security levels corresponding to any third security level assessment item based on multiple third device information corresponding to any third security level assessment item. Establish a third sub-correspondence relationship based on multiple third security level assessment items corresponding to the assessment domain of the system assessment dimension, multiple third device information corresponding to any third security level assessment item, and multiple third security levels corresponding to any third security level assessment item.

第二方面,提供一种安全等级确定装置,该安全等级确定装置包括:获取单元和确定单元。获取单元,用于获取目标设备的目标设备类别和目标设备信息。目标设备信息包括:设备评估维度的设备信息、网络评估维度的设备信息和系统评估维度的设备信息中的至少一个。确定单元,用于根据目标设备类别和第一对应关系,确定目标设备对应的至少一个目标安全等级评估域以及目标设备在每个目标安全等级评估域对应的至少一个目标安全等级评估项。第一对应关系包括:多个预设设备类别、每个预设设备类别对应的至少一个安全等级评估域、每个预设设备类别在每个安全等级评估域对应的至少一个安全等级评估项。至少一个安全等级评估域包括:设备评估维度的评估域、网络评估维度的评估域和系统评估维度的评估域中的至少一个。确定单元,还用于根据目标设备信息、目标设备在每个目标安全等级评估域对应的至少一个目标安全等级评估项和第二对应关系,确定目标设备的目标安全等级。第二对应关系包括:多个安全等级评估项、每个安全等级评估项对应的多个安全等级、与多个安全等级一一对应的多个设备信息。目标安全等级用于表示目标设备的安全程度。In a second aspect, a security level determination device is provided, the security level determination device comprising: an acquisition unit and a determination unit. The acquisition unit is used to acquire a target device category and target device information of a target device. The target device information comprises: at least one of device information of a device evaluation dimension, device information of a network evaluation dimension, and device information of a system evaluation dimension. The determination unit is used to determine, according to the target device category and a first corresponding relationship, at least one target security level assessment domain corresponding to the target device and at least one target security level assessment item corresponding to each target security level assessment domain of the target device. The first corresponding relationship comprises: a plurality of preset device categories, at least one security level assessment domain corresponding to each preset device category, and at least one security level assessment item corresponding to each preset device category in each security level assessment domain. At least one security level assessment domain comprises: at least one of an assessment domain of a device evaluation dimension, an assessment domain of a network evaluation dimension, and an assessment domain of a system evaluation dimension. The determination unit is further used to determine the target security level of the target device according to the target device information, at least one target security level assessment item corresponding to each target security level assessment domain of the target device, and a second corresponding relationship. The second corresponding relationship comprises: a plurality of security level assessment items, a plurality of security levels corresponding to each security level assessment item, and a plurality of device information corresponding to the plurality of security levels one by one. The target security level is used to indicate the security level of the target device.

在一种可能的实施方式中,上述装置还包括建立单元。建立单元,用于:建立第一子对应关系。第一子对应关系包括:设备评估维度的评估域对应的多个第一安全等级评估项、每个第一安全等级评估项对应的多个第一安全等级、与多个第一安全等级一一对应的多个第一设备信息。建立第二子对应关系。第二子对应关系包括:网络评估维度的评估域对应的多个第二安全等级评估项、每个第二安全等级评估项对应的多个第二安全等级、与多个第二安全等级一一对应的多个第二设备信息。建立第三子对应关系。第三子对应关系包括:系统评估维度的评估域对应的多个第三安全等级评估项、每个第三安全等级评估项对应的多个第三安全等级、与多个第三安全等级一一对应的多个第三设备信息。根据第一子对应关系、第二子对应关系和第三子对应关系,建立第二对应关系。In a possible implementation, the device further includes an establishing unit. The establishing unit is used to: establish a first sub-correspondence. The first sub-correspondence includes: a plurality of first security level assessment items corresponding to the assessment domain of the device assessment dimension, a plurality of first security levels corresponding to each first security level assessment item, and a plurality of first device information corresponding to the plurality of first security levels. Establish a second sub-correspondence. The second sub-correspondence includes: a plurality of second security level assessment items corresponding to the assessment domain of the network assessment dimension, a plurality of second security levels corresponding to each second security level assessment item, and a plurality of second device information corresponding to the plurality of second security levels. Establish a third sub-correspondence. The third sub-correspondence includes: a plurality of third security level assessment items corresponding to the assessment domain of the system assessment dimension, a plurality of third security levels corresponding to each third security level assessment item, and a plurality of third device information corresponding to the plurality of third security levels. A second correspondence is established based on the first sub-correspondence, the second sub-correspondence, and the third sub-correspondence.

在一种可能的实施方式中,上述建立单元,具体用于:获取设备评估维度的评估域对应的多个第一安全等级评估项。多个第一安全等级评估项包括:设备启动时完整性保护能力、设备运行时完整性保护能力、安全密码算法管理能力、预设数据保护能力、身份认证能力。获取每个第一安全等级评估项对应的多个第一设备信息。设备启动时完整性保护能力对应的多个第一设备信息包括:设备启动时软件完整性校验能力、设备启动时通过数字签名技术进行完整性和真实性校验能力、设备启动时零配置开局能力。设备运行时完整性保护能力对应的多个第一设备信息包括:设备升级时软件包完整性校验能力、设备升级时补丁完整性校验能力、设备升级时通过数字签名技术进行完整性和真实性校验能力。安全密码算法管理能力对应的多个第一设备信息包括:预设密码算法安全强度、密码算法告警能力、多层密钥保护能力、根密钥硬件保护能力。预设数据保护能力对应的多个第一设备信息包括:第一预设数据保护能力、第二预设数据保护能力、预设程序保护能力,第二预设数据的重要程度高于第一预设数据。身份认证能力对应的多个第一设备信息包括:用户身份标识能力、用户身份鉴别能力、用户执行预设操作时是否进行用户身份鉴别能力、接口认证能力。根据任一第一安全等级评估项对应的多个第一设备信息,确定任一第一安全等级评估项对应的多个第一安全等级。根据设备评估维度的评估域对应的多个第一安全等级评估项、任一第一安全等级评估项对应的多个第一设备信息和任一第一安全等级评估项对应的多个第一安全等级,建立第一子对应关系。In a possible implementation, the establishment unit is specifically used to: obtain multiple first security level assessment items corresponding to the assessment domain of the device assessment dimension. The multiple first security level assessment items include: integrity protection capability at device startup, integrity protection capability at device runtime, secure cryptographic algorithm management capability, preset data protection capability, and identity authentication capability. Obtain multiple first device information corresponding to each first security level assessment item. The multiple first device information corresponding to the integrity protection capability at device startup includes: software integrity verification capability at device startup, integrity and authenticity verification capability through digital signature technology at device startup, and zero configuration start capability at device startup. The multiple first device information corresponding to the integrity protection capability at device runtime includes: software package integrity verification capability at device upgrade, patch integrity verification capability at device upgrade, and integrity and authenticity verification capability through digital signature technology at device upgrade. The multiple first device information corresponding to the secure cryptographic algorithm management capability includes: preset cryptographic algorithm security strength, cryptographic algorithm alarm capability, multi-layer key protection capability, and root key hardware protection capability. The multiple first device information corresponding to the preset data protection capability includes: first preset data protection capability, second preset data protection capability, and preset program protection capability, and the importance of the second preset data is higher than the first preset data. The multiple first device information corresponding to the identity authentication capability includes: user identity identification capability, user identity verification capability, whether to perform user identity verification when the user performs a preset operation, and interface authentication capability. According to the multiple first device information corresponding to any first security level assessment item, determine the multiple first security levels corresponding to any first security level assessment item. According to the multiple first security level assessment items corresponding to the assessment domain of the device assessment dimension, the multiple first device information corresponding to any first security level assessment item, and the multiple first security levels corresponding to any first security level assessment item, establish a first sub-correspondence relationship.

在一种可能的实施方式中,上述建立单元,具体用于:获取网络评估维度的评估域对应的多个第二安全等级评估项。多个第二安全等级评估项包括:用户认证能力、攻击防护能力、链路保护能力。获取每个第二安全等级评估项对应的多个第二设备信息。用户认证能力对应的多个第二设备信息包括:支持预设服务器的远程认证和授权能力、支持预设服务器组配置能力、建立安全通道能力、支持预设服务器动态下发命令行配置能力。攻击防护能力对应的多个第二设备信息包括:第一预设攻击流量检测和清洗能力、第二预设攻击检测能力、秒级检测第一预设攻击的能力。链路保护能力对应的多个第二设备信息包括:端口循环冗余校验能力、光传输网误码检测能力、毫秒级业务切换能力。根据任一第二安全等级评估项对应的多个第二设备信息,确定任一第二安全等级评估项对应的多个第二安全等级。根据网络评估维度的评估域对应的多个第二安全等级评估项、任一第二安全等级评估项对应的多个第二设备信息和任一第二安全等级评估项对应的多个第二安全等级,建立第二子对应关系。In a possible implementation, the establishment unit is specifically used to: obtain multiple second security level assessment items corresponding to the assessment domain of the network assessment dimension. The multiple second security level assessment items include: user authentication capability, attack protection capability, and link protection capability. Obtain multiple second device information corresponding to each second security level assessment item. The multiple second device information corresponding to the user authentication capability includes: remote authentication and authorization capability of supporting preset servers, configuration capability of supporting preset server groups, establishing secure channels, and supporting dynamic command line configuration capability of preset servers. The multiple second device information corresponding to the attack protection capability includes: first preset attack traffic detection and cleaning capability, second preset attack detection capability, and second-level detection capability of the first preset attack. The multiple second device information corresponding to the link protection capability includes: port cyclic redundancy check capability, optical transmission network error detection capability, and millisecond-level service switching capability. According to the multiple second device information corresponding to any second security level assessment item, determine the multiple second security levels corresponding to any second security level assessment item. According to the multiple second security level assessment items corresponding to the assessment domain of the network assessment dimension, the multiple second device information corresponding to any second security level assessment item, and the multiple second security levels corresponding to any second security level assessment item, establish a second sub-corresponding relationship.

在一种可能的实施方式中,上述建立单元,具体用于:获取系统评估维度的评估域对应的多个第三安全等级评估项。多个第三安全等级评估项包括:入侵检测能力、证书管理能力、安全配置能力。获取每个第三安全等级评估项对应的多个第三设备信息。入侵检测能力对应的多个第三设备信息包括:第三预设攻击检测能力、预设文件篡改检测能力、反弹接口攻击行为检测能力。证书管理能力对应的多个第三设备信息包括:数字证书导入和更新能力、数字证书过期预警能力、是否具有数字证书导入和更新的接口、数字证书完整性保护能力、对接公钥基础设施系统的能力。安全配置能力对应的多个第三设备信息包括:业务安全配置核查能力、手动修复预设配置能力、修复预设配置能力。根据任一第三安全等级评估项对应的多个第三设备信息,确定任一第三安全等级评估项对应的多个第三安全等级。根据系统评估维度的评估域对应的多个第三安全等级评估项、任一第三安全等级评估项对应的多个第三设备信息和任一第三安全等级评估项对应的多个第三安全等级,建立第三子对应关系。In a possible implementation, the establishment unit is specifically used to: obtain multiple third security level assessment items corresponding to the assessment domain of the system assessment dimension. The multiple third security level assessment items include: intrusion detection capability, certificate management capability, and security configuration capability. Obtain multiple third device information corresponding to each third security level assessment item. The multiple third device information corresponding to the intrusion detection capability includes: third preset attack detection capability, preset file tampering detection capability, and rebound interface attack behavior detection capability. The multiple third device information corresponding to the certificate management capability includes: digital certificate import and update capability, digital certificate expiration warning capability, whether there is an interface for digital certificate import and update, digital certificate integrity protection capability, and the ability to connect to the public key infrastructure system. The multiple third device information corresponding to the security configuration capability includes: business security configuration verification capability, manual repair preset configuration capability, and repair preset configuration capability. According to the multiple third device information corresponding to any third security level assessment item, determine the multiple third security levels corresponding to any third security level assessment item. According to the multiple third security level assessment items corresponding to the assessment domain of the system assessment dimension, the multiple third device information corresponding to any third security level assessment item, and the multiple third security levels corresponding to any third security level assessment item, establish a third sub-corresponding relationship.

第三方面,提供一种电子设备,包括:处理器。用于存储处理器可执行指令的存储器。其中,处理器被配置为执行指令,以实现上述第一方面及其任一种可能的实施方式的方法。In a third aspect, an electronic device is provided, comprising: a processor and a memory for storing instructions executable by the processor, wherein the processor is configured to execute the instructions to implement the method of the first aspect and any possible implementation manner thereof.

第四方面,提供一种计算机可读存储介质,当计算机可读存储介质中的指令由电子设备的处理器执行时,使得电子设备能够执行上述第一方面中及其任一种可能的实施方式的方法。In a fourth aspect, a computer-readable storage medium is provided. When instructions in the computer-readable storage medium are executed by a processor of an electronic device, the electronic device is enabled to execute the method in the above-mentioned first aspect and any possible implementation manner thereof.

第五方面,提供一种计算机程序产品,计算机程序产品包括计算机指令,当计算机指令在电子设备上运行时,使得电子设备执行上述第一方面及其任一种可能的实施方式的方法。In a fifth aspect, a computer program product is provided. The computer program product includes computer instructions. When the computer instructions are executed on an electronic device, the electronic device executes the method of the first aspect and any possible implementation manner thereof.

本申请提供的第一方面的技术方案至少带来以下有益效果:本申请获取目标设备的目标设备类别和目标设备信息。其中,目标设备信息包括:设备评估维度的设备信息、网络评估维度的设备信息和系统评估维度的设备信息中的至少一个。之后,根据目标设备类别和第一对应关系,确定目标设备对应的至少一个目标安全等级评估域以及目标设备在每个目标安全等级评估域对应的至少一个目标安全等级评估项。其中,第一对应关系包括:多个预设设备类别、每个预设设备类别对应的至少一个安全等级评估域、每个预设设备类别在每个安全等级评估域对应的至少一个安全等级评估项。至少一个安全等级评估域包括:设备评估维度的评估域、网络评估维度的评估域和系统评估维度的评估域中的至少一个。这样,通过目标设备的目标设备类别和第一对应关系,可以高效确定目标设备对应的至少一个目标安全等级评估域以及目标设备在每个目标安全等级评估域对应的至少一个目标安全等级评估项。The technical solution of the first aspect provided by the present application brings at least the following beneficial effects: the present application obtains the target device category and target device information of the target device. Among them, the target device information includes: at least one of the device information of the device evaluation dimension, the device information of the network evaluation dimension, and the device information of the system evaluation dimension. Afterwards, according to the target device category and the first corresponding relationship, at least one target security level assessment domain corresponding to the target device and at least one target security level assessment item corresponding to the target device in each target security level assessment domain are determined. Among them, the first corresponding relationship includes: multiple preset device categories, at least one security level assessment domain corresponding to each preset device category, and at least one security level assessment item corresponding to each security level assessment domain for each preset device category. At least one security level assessment domain includes: at least one of the assessment domain of the device evaluation dimension, the assessment domain of the network evaluation dimension, and the assessment domain of the system evaluation dimension. In this way, through the target device category and the first corresponding relationship of the target device, at least one target security level assessment domain corresponding to the target device and at least one target security level assessment item corresponding to the target device in each target security level assessment domain can be efficiently determined.

进一步的,根据目标设备信息、目标设备在每个目标安全等级评估域对应的至少一个目标安全等级评估项和第二对应关系,确定目标设备的目标安全等级。其中,第二对应关系包括:多个安全等级评估项、每个安全等级评估项对应的多个安全等级、与多个安全等级一一对应的多个设备信息。目标安全等级用于表示目标设备的安全程度。这样,可以高效且准确的确定目标设备的安全程度。Further, the target security level of the target device is determined according to the target device information, at least one target security level assessment item corresponding to the target device in each target security level assessment domain, and the second corresponding relationship. The second corresponding relationship includes: multiple security level assessment items, multiple security levels corresponding to each security level assessment item, and multiple device information corresponding to the multiple security levels. The target security level is used to indicate the security level of the target device. In this way, the security level of the target device can be determined efficiently and accurately.

需要说明的是,第二方面至第五方面中的任一种实现方式所带来的技术效果可参见第一方面中对应实现方式所带来的技术效果,此处不再赘述。It should be noted that the technical effects brought about by any implementation method in the second to fifth aspects can refer to the technical effects brought about by the corresponding implementation method in the first aspect, and will not be repeated here.

应当理解的是,以上的一般描述和后文的细节描述仅是示例性和解释性的,并不能限制本申请。It should be understood that the foregoing general description and the following detailed description are exemplary and explanatory only and are not restrictive of the present application.

附图说明BRIEF DESCRIPTION OF THE DRAWINGS

此处的附图被并入说明书中并构成本说明书的一部分,示出了符合本申请的实施例,并与说明书一起用于解释本申请的原理,并不构成对本申请的不当限定。The drawings herein are incorporated into the specification and constitute a part of the specification, illustrate embodiments consistent with the present application, and together with the specification are used to explain the principles of the present application, and do not constitute improper limitations on the present application.

图1是根据一示例性实施例示出的一种安全等级确定系统的结构示意图;FIG1 is a schematic structural diagram of a security level determination system according to an exemplary embodiment;

图2是根据一示例性实施例示出的一种安全等级确定方法的流程图;FIG2 is a flow chart of a method for determining a security level according to an exemplary embodiment;

图3是根据一示例性实施例示出的一种通信网络分类的示意图;FIG3 is a schematic diagram showing a communication network classification according to an exemplary embodiment;

图4是根据一示例性实施例示出的一种安全等级确定的实例示意图;FIG4 is a schematic diagram showing an example of determining a security level according to an exemplary embodiment;

图5是根据一示例性实施例示出的又一种安全等级确定方法的流程图;FIG5 is a flow chart showing another method for determining a security level according to an exemplary embodiment;

图6是根据一示例性实施例示出的又一种安全等级确定方法的流程图;FIG6 is a flow chart showing another method for determining a security level according to an exemplary embodiment;

图7是根据一示例性实施例示出的又一种安全等级确定方法的流程图;FIG7 is a flow chart showing another method for determining a security level according to an exemplary embodiment;

图8是根据一示例性实施例示出的又一种安全等级确定方法的流程图;FIG8 is a flow chart showing another method for determining a security level according to an exemplary embodiment;

图9是根据一示例性实施例示出的一种安全等级确定装置的框图;FIG9 is a block diagram of a security level determination device according to an exemplary embodiment;

图10是根据一示例性实施例示出的一种电子设备的框图。Fig. 10 is a block diagram of an electronic device according to an exemplary embodiment.

具体实施方式DETAILED DESCRIPTION

为了使本领域普通人员更好地理解本申请的技术方案,下面将结合附图,对本申请实施例中的技术方案进行清楚、完整地描述。In order to enable ordinary persons in the art to better understand the technical solution of the present application, the technical solution in the embodiments of the present application will be clearly and completely described below in conjunction with the accompanying drawings.

需要说明的是,本申请的说明书和权利要求书及上述附图中的术语“第一”、“第二”等是用于区别类似的对象,而不必用于描述特定的顺序或先后次序。应该理解这样使用的数据在适当情况下可以互换,以便这里描述的本申请的实施例能够以除了在这里图示或描述的那些以外的顺序实施。以下示例性实施例中所描述的实施方式并不代表与本申请相一致的所有实施方式。相反,它们仅是与如所附权利要求书中所详述的、本申请的一些方面相一致的装置和方法的例子。It should be noted that the terms "first", "second", etc. in the specification and claims of the present application and the above-mentioned drawings are used to distinguish similar objects, and are not necessarily used to describe a specific order or sequence. It should be understood that the data used in this way can be interchangeable where appropriate, so that the embodiments of the present application described herein can be implemented in an order other than those illustrated or described herein. The embodiments described in the following exemplary embodiments do not represent all embodiments consistent with the present application. On the contrary, they are merely examples of devices and methods consistent with some aspects of the present application as detailed in the attached claims.

在对本申请提供的安全等级确定方法进行详细介绍之前,先对本申请涉及的实施环境(实施架构)进行简单介绍。Before introducing in detail the security level determination method provided by the present application, a brief introduction to the implementation environment (implementation architecture) involved in the present application is first given.

本申请实施例提供的安全等级确定方法可以适用于安全等级确定系统。图1示出了该安全等级确定系统的一种结构示意图。如图1所示,该安全等级确定系统10包括安全等级确定装置11以及电子设备12。安全等级确定装置11与电子设备12连接,安全等级确定装置11与电子设备12之间可以采用有线方式连接,也可以采用无线方式连接,本申请实施例对此不作限定。The security level determination method provided in the embodiment of the present application can be applied to the security level determination system. FIG1 shows a schematic diagram of the structure of the security level determination system. As shown in FIG1 , the security level determination system 10 includes a security level determination device 11 and an electronic device 12. The security level determination device 11 is connected to the electronic device 12, and the security level determination device 11 and the electronic device 12 can be connected by wire or by wireless, which is not limited in the embodiment of the present application.

安全等级确定装置11可以用于与电子设备12进行数据交互,例如,接收电子设备12中发送的目标设备的目标设备类别和目标设备信息。向电子设备12发送目标设备的目标安全等级。The security level determination device 11 can be used to perform data interaction with the electronic device 12, for example, to receive the target device category and target device information of the target device sent by the electronic device 12, and to send the target security level of the target device to the electronic device 12.

安全等级确定装置11还可以用于对获取到的目标设备的目标设备类别和目标设备信息进行处理。例如,根据目标设备类别和第一对应关系,确定目标设备对应的至少一个目标安全等级评估域以及目标设备在每个目标安全等级评估域对应的至少一个目标安全等级评估项。其中,第一对应关系包括:多个预设设备类别、每个预设设备类别对应的至少一个安全等级评估域、每个预设设备类别在每个安全等级评估域对应的至少一个安全等级评估项。至少一个安全等级评估域包括:设备评估维度的评估域、网络评估维度的评估域和系统评估维度的评估域中的至少一个。The security level determination device 11 can also be used to process the target device category and target device information of the acquired target device. For example, according to the target device category and the first corresponding relationship, determine at least one target security level assessment domain corresponding to the target device and at least one target security level assessment item corresponding to the target device in each target security level assessment domain. Among them, the first corresponding relationship includes: multiple preset device categories, at least one security level assessment domain corresponding to each preset device category, and at least one security level assessment item corresponding to each preset device category in each security level assessment domain. At least one security level assessment domain includes: at least one of the assessment domain of the device assessment dimension, the assessment domain of the network assessment dimension, and the assessment domain of the system assessment dimension.

安全等级确定装置11还可以用于根据目标设备信息、目标设备在每个目标安全等级评估域对应的至少一个目标安全等级评估项和第二对应关系,确定目标设备的目标安全等级。第二对应关系包括:多个安全等级评估项、每个安全等级评估项对应的多个安全等级、与多个安全等级一一对应的多个设备信息。目标安全等级用于表示目标设备的安全程度。The security level determination device 11 can also be used to determine the target security level of the target device according to the target device information, at least one target security level assessment item corresponding to the target device in each target security level assessment domain, and a second corresponding relationship. The second corresponding relationship includes: multiple security level assessment items, multiple security levels corresponding to each security level assessment item, and multiple device information corresponding to the multiple security levels. The target security level is used to indicate the security level of the target device.

电子设备12可以用于与安全等级确定装置11进行数据交互,例如,向安全等级确定装置11发送目标设备的目标设备类别和目标设备信息。接收安全等级确定装置11发送的目标设备的目标安全等级。The electronic device 12 can be used to exchange data with the security level determination device 11, for example, to send the target device category and target device information of the target device to the security level determination device 11, and to receive the target security level of the target device sent by the security level determination device 11.

可选的,该电子设备可以是物理机,例如:台式电脑,又称台式机或桌面机(desktop computer)、手机、平板电脑、笔记本电脑、超级移动个人计算机(ultra-mobilepersonal computer,UMPC)、上网本、个人数字助理(personal digital assistant,PDA)等终端设备,该电子设备还可以为服务器,也可以为多个服务器组成的服务器群。Optionally, the electronic device can be a physical machine, for example, a desktop computer, also known as a desktop or desktop computer (desktop computer), a mobile phone, a tablet computer, a laptop computer, an ultra-mobile personal computer (ultra-mobile personal computer, UMPC), a netbook, a personal digital assistant (personal digital assistant, PDA) and other terminal devices. The electronic device can also be a server or a server group composed of multiple servers.

可选的,上述安全等级确定装置11也可以通过部署在物理机上的虚拟机(virtualmachine,VM),实现上述安全等级确定装置11所要实现的功能。Optionally, the security level determination device 11 may also implement the functions to be implemented by the security level determination device 11 through a virtual machine (VM) deployed on a physical machine.

需要说明的,安全等级确定装置11和电子设备12可以为相互独立的设备,也可以集成于同一设备中,本申请对此不作具体限定。It should be noted that the security level determination device 11 and the electronic device 12 can be independent devices or integrated into the same device, and this application does not make any specific limitation on this.

当安全等级确定装置11和电子设备12集成于同一设备时,安全等级确定装置11和电子设备12之间的通信方式为该设备内部模块之间的通信。这种情况下,二者之间的通信流程与“安全等级确定装置11和电子设备12之间相互独立的情况下,二者之间的通信流程”相同。When the security level determination device 11 and the electronic device 12 are integrated into the same device, the communication between the security level determination device 11 and the electronic device 12 is the communication between the internal modules of the device. In this case, the communication process between the two is the same as "the communication process between the security level determination device 11 and the electronic device 12 when they are independent of each other".

在本申请提供的以下实施例中,本申请以安全等级确定装置11和电子设备12相互独立设置为例进行说明。In the following embodiments provided in the present application, the present application is explained by taking the example that the security level determination device 11 and the electronic device 12 are independently configured.

为了便于理解,以下结合附图对本申请提供的安全等级确定方法进行具体介绍。For ease of understanding, the security level determination method provided by the present application is specifically introduced below with reference to the accompanying drawings.

图2是根据一示例性实施例示出的一种安全等级确定方法的流程图,该方法可以应用于电子设备,也可以应用于与电子设备连接的安全等级确定装置。同时,该方法也可以应用于与电子设备或者安全等级确定装置类似的设备。以下,以该方法应用于电子设备为例,对该方法进行说明,如图2所示,该安全等级确定方法包括以下步骤:FIG2 is a flow chart of a method for determining a security level according to an exemplary embodiment. The method can be applied to an electronic device or a security level determination device connected to the electronic device. At the same time, the method can also be applied to a device similar to the electronic device or the security level determination device. The following is an example of applying the method to an electronic device to illustrate the method. As shown in FIG2, the security level determination method includes the following steps:

S201、电子设备获取目标设备的目标设备类别和目标设备信息。S201: The electronic device obtains a target device category and target device information of a target device.

其中,目标设备信息包括:设备评估维度的设备信息、网络评估维度的设备信息和系统评估维度的设备信息中的至少一个。The target device information includes at least one of device information in a device evaluation dimension, device information in a network evaluation dimension, and device information in a system evaluation dimension.

示例性的,通信网络(communication technology)可以划分为设备层、网络层和系统层。其中,设备层包括多个基础设备(例如路由器、交换机)。为了保证设备层中每个设备的安全,需要确保设备的供应链安全,并通过安全启动技术、数据机密性保护技术、韧性恢复技术、单域安全技术等多种技术手段,实现设备的防篡改和入侵防御等安全能力。网络层包括多个组网,为了保证网络层中每个组网的安全,可以通过路由安全技术、流量加密技术、网络保护技术等多种技术手段,实现预测流量路径、历史流量行为查询,避免违规流量横向扩散。这样。可以提供流量路径和流量行为确定的组网。组网从组网技术的角度可以划分为:本地(native)互联网协议(internet protocol,IP)组网、多协议标签交换(multi-protocol label switching,MPLS)组网、下一代虚拟专用网络(ethernet virtualprivate network,EVPN)组网、基于第六代互联网协议(internet protocol version 6,IPv6)转发平面的段路由(segment routing IPv6,SRv6)组网。系统层包括多个系统,通过采集流量、安全日志、告警数据、文件、资产数据等安全数据,并对安全数据进行全域安全分析,可以得到异常行为。之后,通过对异常行为进行快速处理,可以避免风险扩散,达到安全损失最小化,实现网络安全一体化的智能安全防御。Exemplarily, the communication network (communication technology) can be divided into the device layer, the network layer and the system layer. Among them, the device layer includes multiple basic devices (such as routers, switches). In order to ensure the security of each device in the device layer, it is necessary to ensure the security of the device's supply chain, and through a variety of technical means such as secure boot technology, data confidentiality protection technology, resilience recovery technology, single-domain security technology, etc., to achieve the device's anti-tampering and intrusion defense and other security capabilities. The network layer includes multiple networking. In order to ensure the security of each networking in the network layer, a variety of technical means such as routing security technology, traffic encryption technology, and network protection technology can be used to predict traffic paths and query historical traffic behaviors to avoid lateral spread of illegal traffic. In this way. A network determined by traffic paths and traffic behaviors can be provided. From the perspective of networking technology, networking can be divided into: native Internet protocol (IP) networking, multi-protocol label switching (MPLS) networking, next-generation virtual private network (EVPN) networking, and segment routing IPv6 (SRv6) networking based on the sixth-generation Internet protocol (IPv6) forwarding plane. The system layer includes multiple systems. By collecting security data such as traffic, security logs, alarm data, files, and asset data, and performing global security analysis on security data, abnormal behavior can be obtained. After that, by quickly processing abnormal behavior, risk diffusion can be avoided, security losses can be minimized, and intelligent security defense for network security integration can be achieved.

图3提供了一种通信网络分类的示意图。如图3所示,通信网络包括:设备层、网络层和系统层。其中,设备层包括:接入路由器、汇聚路由器、核心路由器、安全设备。网络层包括:城域网、骨干网、互联网数据中心(internet data center,IDC)。系统层包括:控制器。FIG3 provides a schematic diagram of the classification of communication networks. As shown in FIG3, the communication network includes: a device layer, a network layer, and a system layer. The device layer includes: access routers, aggregation routers, core routers, and security devices. The network layer includes: metropolitan area networks, backbone networks, and internet data centers (IDCs). The system layer includes: controllers.

示例性的,由于通信网络可以划分为设备层、网络层和系统层,可以通过设备评估维度、网络评估维度和系统评估维度确定设备的安全程度。Exemplarily, since the communication network can be divided into a device layer, a network layer, and a system layer, the security level of the device can be determined through the device evaluation dimension, the network evaluation dimension, and the system evaluation dimension.

S202、电子设备根据目标设备类别和第一对应关系,确定目标设备对应的至少一个目标安全等级评估域以及目标设备在每个目标安全等级评估域对应的至少一个目标安全等级评估项。S202: The electronic device determines, according to the target device category and the first corresponding relationship, at least one target security level assessment domain corresponding to the target device and at least one target security level assessment item corresponding to the target device in each target security level assessment domain.

其中,第一对应关系包括:多个预设设备类别、每个预设设备类别对应的至少一个安全等级评估域、每个预设设备类别在每个安全等级评估域对应的至少一个安全等级评估项。至少一个安全等级评估域包括:设备评估维度的评估域、网络评估维度的评估域和系统评估维度的评估域中的至少一个。The first corresponding relationship includes: a plurality of preset device categories, at least one security level assessment domain corresponding to each preset device category, and at least one security level assessment item corresponding to each preset device category in each security level assessment domain. The at least one security level assessment domain includes: at least one of an assessment domain of a device assessment dimension, an assessment domain of a network assessment dimension, and an assessment domain of a system assessment dimension.

作为一种可能的实现方式,电子设备获取多个预设设备类别,并针对每个预设设备类别,确定预设设备类别对应的至少一个安全等级评估域以及预设设备类别在每个安全等级评估域对应的至少一个安全等级评估项,构建第一对应关系。As a possible implementation method, the electronic device obtains multiple preset device categories, and for each preset device category, determines at least one security level assessment domain corresponding to the preset device category and at least one security level assessment item corresponding to the preset device category in each security level assessment domain, and constructs a first corresponding relationship.

之后,电子设备根据目标设备类别和第一对应关系,确定目标设备对应的至少一个目标安全等级评估域以及每个目标安全等级评估域对应的至少一个目标安全等级评估项。Afterwards, the electronic device determines at least one target security level assessment domain corresponding to the target device and at least one target security level assessment item corresponding to each target security level assessment domain according to the target device category and the first corresponding relationship.

示例性的,第一对应关系可以如下表1所示:Exemplarily, the first corresponding relationship may be shown in the following Table 1:

表1第一对应关系Table 1 The first correspondence

如上表1所示,预设设备类别1对应的安全等级评估域为设备评估维度的评估域,设备评估维度的评估域对应的安全等级评估项为:设备安全等级评估项1和设备安全等级评估项2。预设设备类别2对应的安全等级评估域为设备评估维度的评估域和系统评估维度的评估域,设备评估维度的评估域对应的安全等级评估项为设备安全等级评估项3,系统评估维度的评估域对应的安全等级评估项为系统安全等级评估项1。预设设备类别3对应的安全等级评估域为网络评估维度的评估域和系统评估维度的评估域,网络评估维度的评估域对应的安全等级评估项为网络安全等级评估项1,系统评估维度的评估域对应的安全等级评估项为系统安全等级评估项1和系统安全等级评估项2。As shown in Table 1 above, the security level assessment domain corresponding to the preset device category 1 is the assessment domain of the device assessment dimension, and the security level assessment items corresponding to the assessment domain of the device assessment dimension are: device security level assessment item 1 and device security level assessment item 2. The security level assessment domain corresponding to the preset device category 2 is the assessment domain of the device assessment dimension and the assessment domain of the system assessment dimension, the security level assessment item corresponding to the assessment domain of the device assessment dimension is device security level assessment item 3, and the security level assessment item corresponding to the assessment domain of the system assessment dimension is system security level assessment item 1. The security level assessment domain corresponding to the preset device category 3 is the assessment domain of the network assessment dimension and the assessment domain of the system assessment dimension, the security level assessment item corresponding to the assessment domain of the network assessment dimension is network security level assessment item 1, and the security level assessment items corresponding to the assessment domain of the system assessment dimension are system security level assessment item 1 and system security level assessment item 2.

预设设备类别4对应的安全等级评估域为网络评估维度的评估域,网络评估维度的评估域对应的安全等级评估项为网络安全等级评估项2。预设设备类别5对应的安全等级评估域为设备评估维度的评估域、网络评估维度的评估域和系统评估维度的评估域,设备评估维度的评估域对应的安全等级评估项为设备安全等级评估项3,网络评估维度的评估域对应的安全等级评估项为网络安全等级评估项3,系统评估维度的评估域对应的安全等级评估项为系统安全等级评估项3。The security level assessment domain corresponding to preset device category 4 is the assessment domain of the network assessment dimension, and the security level assessment item corresponding to the assessment domain of the network assessment dimension is network security level assessment item 2. The security level assessment domain corresponding to preset device category 5 is the assessment domain of the device assessment dimension, the assessment domain of the network assessment dimension, and the assessment domain of the system assessment dimension. The security level assessment item corresponding to the assessment domain of the device assessment dimension is device security level assessment item 3, the security level assessment item corresponding to the assessment domain of the network assessment dimension is network security level assessment item 3, and the security level assessment item corresponding to the assessment domain of the system assessment dimension is system security level assessment item 3.

示例性的,以目标设备的目标设备类别为预设设备类别2为例,电子设备根据预设设备类别2和如上表1所示的第一对应关系,确定目标设备对应的目标安全等级评估域为设备评估维度的评估域和系统评估维度的评估域,以及设备评估维度的评估域对应的目标安全等级评估项为设备安全等级评估项3,系统评估维度的评估域对应的目标安全等级评估项为系统安全等级评估项1。Exemplarily, taking the target device category of the target device as preset device category 2, the electronic device determines, based on the preset device category 2 and the first correspondence shown in Table 1 above, that the target security level assessment domain corresponding to the target device is the assessment domain of the device assessment dimension and the assessment domain of the system assessment dimension, and that the target security level assessment item corresponding to the assessment domain of the device assessment dimension is device security level assessment item 3, and the target security level assessment item corresponding to the assessment domain of the system assessment dimension is system security level assessment item 1.

S203、电子设备根据目标设备信息、目标设备在每个目标安全等级评估域对应的至少一个目标安全等级评估项和第二对应关系,确定目标设备的目标安全等级。S203: The electronic device determines a target security level of the target device according to the target device information, at least one target security level assessment item corresponding to the target device in each target security level assessment domain, and the second corresponding relationship.

其中,第二对应关系包括:多个安全等级评估项、每个安全等级评估项对应的多个安全等级、与多个安全等级一一对应的多个设备信息。目标安全等级用于表示目标设备的安全程度。The second corresponding relationship includes: a plurality of security level evaluation items, a plurality of security levels corresponding to each security level evaluation item, and a plurality of device information corresponding to the plurality of security levels. The target security level is used to indicate the security level of the target device.

作为一种可能的实现方式,电子设备获取多个安全等级评估项。之后,电子设备获取每个安全等级评估项对应的多个设备信息,并根据每个安全等级评估项对应的多个设备信息,确定多个安全等级,构建第二对应关系。As a possible implementation, the electronic device obtains multiple security level assessment items. Then, the electronic device obtains multiple device information corresponding to each security level assessment item, and determines multiple security levels according to the multiple device information corresponding to each security level assessment item, and establishes a second corresponding relationship.

接着,电子设备根据目标设备信息、每个目标安全等级评估域对应的至少一个目标安全等级评估项和第二对应关系,确定目标设备的目标安全等级。Next, the electronic device determines the target security level of the target device according to the target device information, at least one target security level assessment item corresponding to each target security level assessment domain, and the second corresponding relationship.

示例性的,第二对应关系可以如下表2所示:Exemplarily, the second corresponding relationship may be shown in the following Table 2:

表2第二对应关系Table 2 Second correspondence

示例性的,以目标设备对应的目标安全等级评估域为设备评估维度的评估域和系统评估维度的评估域,以及目标设备在设备评估维度的评估域对应的目标安全等级评估项为设备安全等级评估项3,目标设备在系统评估维度的评估域对应的目标安全等级评估项为系统安全等级评估项1,目标设备信息包括:设备评估维度的设备信息32和系统评估维度的设备信息12为例,电子设备根据目标设备信息(设备评估维度的设备信息32和系统评估维度的设备信息12)、每个目标安全等级评估域对应的至少一个目标安全等级评估项(设备安全等级评估项3和系统安全等级评估项1)和第二对应关系,确定目标设备的目标安全等级为设备安全等级32和系统安全等级12。Exemplarily, taking the target security level assessment domain corresponding to the target device as the assessment domain of the device assessment dimension and the assessment domain of the system assessment dimension, and the target security level assessment item corresponding to the target device in the assessment domain of the device assessment dimension is device security level assessment item 3, and the target security level assessment item corresponding to the target device in the assessment domain of the system assessment dimension is system security level assessment item 1, and the target device information includes: device information 32 in the device assessment dimension and device information 12 in the system assessment dimension as an example, the electronic device determines that the target security level of the target device is device security level 32 and system security level 12 based on the target device information (device information 32 in the device evaluation dimension and device information 12 in the system evaluation dimension), at least one target security level assessment item corresponding to each target security level assessment domain (device security level assessment item 3 and system security level assessment item 1), and the second corresponding relationship.

图4提供了一种安全等级确定的实例示意图。如图4所示,电子设备根据目标设备的目标设备类别,确定目标设备对应的目标安全等级评估域为设备评估维度的评估域和网络评估维度的评估域,以及目标设备在设备评估维度的评估域对应的目标安全等级评估项为设备安全等级评估项1和设备安全等级评估项2、目标设备在网络评估维度的评估域对应的目标安全等级评估项为网络安全等级评估项1和网络安全等级评估项2。FIG4 provides a schematic diagram of an example of security level determination. As shown in FIG4, the electronic device determines, based on the target device category of the target device, that the target security level assessment domain corresponding to the target device is the assessment domain of the device assessment dimension and the assessment domain of the network assessment dimension, and that the target security level assessment items corresponding to the target device in the assessment domain of the device assessment dimension are device security level assessment item 1 and device security level assessment item 2, and the target security level assessment items corresponding to the target device in the assessment domain of the network assessment dimension are network security level assessment item 1 and network security level assessment item 2.

可以理解的是,本申请获取目标设备的目标设备类别和目标设备信息。其中,目标设备信息包括:设备评估维度的设备信息、网络评估维度的设备信息和系统评估维度的设备信息中的至少一个。之后,根据目标设备类别和第一对应关系,确定目标设备对应的至少一个目标安全等级评估域以及目标设备在每个目标安全等级评估域对应的至少一个目标安全等级评估项。其中,第一对应关系包括:多个预设设备类别、每个预设设备类别对应的至少一个安全等级评估域、每个预设设备类别在每个安全等级评估域对应的至少一个安全等级评估项。至少一个安全等级评估域包括:设备评估维度的评估域、网络评估维度的评估域和系统评估维度的评估域中的至少一个。这样,通过目标设备的目标设备类别和第一对应关系,可以高效确定目标设备对应的至少一个目标安全等级评估域以及目标设备在每个目标安全等级评估域对应的至少一个目标安全等级评估项。It can be understood that the present application obtains the target device category and target device information of the target device. Among them, the target device information includes: at least one of the device information of the device evaluation dimension, the device information of the network evaluation dimension, and the device information of the system evaluation dimension. Afterwards, according to the target device category and the first corresponding relationship, at least one target security level assessment domain corresponding to the target device and at least one target security level assessment item corresponding to the target device in each target security level assessment domain are determined. Among them, the first corresponding relationship includes: multiple preset device categories, at least one security level assessment domain corresponding to each preset device category, and at least one security level assessment item corresponding to each preset device category in each security level assessment domain. At least one security level assessment domain includes: at least one of the assessment domain of the device evaluation dimension, the assessment domain of the network evaluation dimension, and the assessment domain of the system evaluation dimension. In this way, through the target device category of the target device and the first corresponding relationship, at least one target security level assessment domain corresponding to the target device and at least one target security level assessment item corresponding to the target device in each target security level assessment domain can be efficiently determined.

进一步的,根据目标设备信息、目标设备在每个目标安全等级评估域对应的至少一个目标安全等级评估项和第二对应关系,确定目标设备的目标安全等级。其中,第二对应关系包括:多个安全等级评估项、每个安全等级评估项对应的多个安全等级、与多个安全等级一一对应的多个设备信息。目标安全等级用于表示目标设备的安全程度。这样,可以高效且准确的确定目标设备的安全程度。Further, the target security level of the target device is determined according to the target device information, at least one target security level assessment item corresponding to the target device in each target security level assessment domain, and the second corresponding relationship. The second corresponding relationship includes: multiple security level assessment items, multiple security levels corresponding to each security level assessment item, and multiple device information corresponding to the multiple security levels. The target security level is used to indicate the security level of the target device. In this way, the security level of the target device can be determined efficiently and accurately.

在一些实施例中,为了构建第二对应关系,如图5所示,本申请实施例提供的安全等级确定方法还包括:In some embodiments, in order to construct the second corresponding relationship, as shown in FIG5 , the security level determination method provided in the embodiment of the present application further includes:

S301、电子设备建立第一子对应关系。S301: The electronic device establishes a first sub-correspondence relationship.

其中,第一子对应关系包括:设备评估维度的评估域对应的多个第一安全等级评估项、每个第一安全等级评估项对应的多个第一安全等级、与多个第一安全等级一一对应的多个第一设备信息。Among them, the first sub-correspondence includes: multiple first security level evaluation items corresponding to the evaluation domain of the equipment evaluation dimension, multiple first security levels corresponding to each first security level evaluation item, and multiple first equipment information corresponding one-to-one to the multiple first security levels.

作为一种可能的实现方式,电子设备获取设备评估维度的评估域对应的多个第一安全等级评估项,以及每个第一安全等级评估项对应的多个第一设备信息。之后,电子设备根据任一第一安全等级评估项对应的多个第一设备信息,确定任一第一安全等级评估项对应的多个第一安全等级。As a possible implementation, the electronic device obtains multiple first security level assessment items corresponding to the assessment domain of the device assessment dimension, and multiple first device information corresponding to each first security level assessment item. Afterwards, the electronic device determines multiple first security levels corresponding to any first security level assessment item based on the multiple first device information corresponding to any first security level assessment item.

进一步的,电子设备根据设备评估维度的评估域对应的多个第一安全等级评估项、任一第一安全等级评估项对应的多个第一设备信息和任一第一安全等级评估项对应的多个第一安全等级,建立第一子对应关系。Furthermore, the electronic device establishes a first sub-correspondence relationship based on multiple first security level assessment items corresponding to the assessment domain of the device assessment dimension, multiple first device information corresponding to any first security level assessment item, and multiple first security levels corresponding to any first security level assessment item.

示例性的,第一子对应关系可以如下表3所示:Exemplarily, the first sub-correspondence relationship may be as shown in Table 3 below:

表3第一子对应关系Table 3 First sub-correspondence

此步骤的具体实现方式,可以参照本申请实施例的后续描述,此处不再进行赘述。For the specific implementation method of this step, please refer to the subsequent description of the embodiments of the present application, which will not be repeated here.

S302、电子设备建立第二子对应关系。S302: The electronic device establishes a second sub-correspondence relationship.

其中,第二子对应关系包括:网络评估维度的评估域对应的多个第二安全等级评估项、每个第二安全等级评估项对应的多个第二安全等级、与多个第二安全等级一一对应的多个第二设备信息。Among them, the second sub-correspondence includes: multiple second security level evaluation items corresponding to the evaluation domain of the network evaluation dimension, multiple second security levels corresponding to each second security level evaluation item, and multiple second device information corresponding one-to-one to the multiple second security levels.

作为一种可能的实现方式,电子设备获取网络评估维度的评估域对应的多个第二安全等级评估项,以及每个第二安全等级评估项对应的多个第二设备信息。之后,电子设备根据任一第二安全等级评估项对应的多个第二设备信息,确定任一第二安全等级评估项对应的多个第二安全等级。As a possible implementation, the electronic device obtains multiple second security level assessment items corresponding to the assessment domain of the network assessment dimension, and multiple second device information corresponding to each second security level assessment item. Afterwards, the electronic device determines multiple second security levels corresponding to any second security level assessment item based on the multiple second device information corresponding to any second security level assessment item.

进一步的,电子设备根据网络评估维度的评估域对应的多个第二安全等级评估项、任一第二安全等级评估项对应的多个第二设备信息和任一第二安全等级评估项对应的多个第二安全等级,建立第二子对应关系。Furthermore, the electronic device establishes a second sub-correspondence relationship based on multiple second security level evaluation items corresponding to the evaluation domain of the network evaluation dimension, multiple second device information corresponding to any second security level evaluation item, and multiple second security levels corresponding to any second security level evaluation item.

示例性的,第二子对应关系可以如下表4所示:Exemplarily, the second sub-correspondence relationship may be as shown in the following Table 4:

表4第二子对应关系Table 4 Second sub-correspondence

此步骤的具体实现方式,可以参照本申请实施例的后续描述,此处不再进行赘述。For the specific implementation method of this step, please refer to the subsequent description of the embodiments of the present application, which will not be repeated here.

S303、电子设备建立第三子对应关系。S303: The electronic device establishes a third sub-correspondence relationship.

其中,第三子对应关系包括:系统评估维度的评估域对应的多个第三安全等级评估项、每个第三安全等级评估项对应的多个第三安全等级、与多个第三安全等级一一对应的多个第三设备信息。Among them, the third sub-correspondence relationship includes: multiple third security level evaluation items corresponding to the evaluation domain of the system evaluation dimension, multiple third security levels corresponding to each third security level evaluation item, and multiple third device information corresponding one-to-one to the multiple third security levels.

此步骤的具体实现方式,可以参照本申请实施例的后续描述,此处不再进行赘述。For the specific implementation method of this step, please refer to the subsequent description of the embodiments of the present application, which will not be repeated here.

作为一种可能的实现方式,电子设备获取系统评估维度的评估域对应的多个第三安全等级评估项,以及每个第三安全等级评估项对应的多个第三设备信息。之后,电子设备根据任一第三安全等级评估项对应的多个第三设备信息,确定任一第三安全等级评估项对应的多个第三安全等级。As a possible implementation, the electronic device obtains multiple third security level assessment items corresponding to the assessment domain of the system assessment dimension, and multiple third device information corresponding to each third security level assessment item. Afterwards, the electronic device determines multiple third security levels corresponding to any third security level assessment item based on the multiple third device information corresponding to any third security level assessment item.

进一步的,电子设备根据系统评估维度的评估域对应的多个第三安全等级评估项、任一第三安全等级评估项对应的多个第三设备信息和任一第三安全等级评估项对应的多个第三安全等级,建立第三子对应关系。Furthermore, the electronic device establishes a third sub-correspondence relationship based on multiple third security level assessment items corresponding to the assessment domain of the system assessment dimension, multiple third device information corresponding to any third security level assessment item, and multiple third security levels corresponding to any third security level assessment item.

示例性的,第三子对应关系可以如下表5所示:Exemplarily, the third sub-correspondence relationship may be as shown in Table 5 below:

表5第三子对应关系Table 5 The third sub-correspondence

S304、电子设备根据第一子对应关系、第二子对应关系和第三子对应关系,建立第二对应关系。S304: The electronic device establishes a second correspondence relationship according to the first sub-correspondence relationship, the second sub-correspondence relationship and the third sub-correspondence relationship.

可以理解的是,第一子对应关系从设备评估维度确定通信设备的安全等级,第二子对应关系从网络评估维度确定通信设备的安全等级,第三子对应关系从系统评估维度确定通信设备的安全等级。这样,根据第一子对应关系、第二子对应关系和第三子对应关系构建得到的第二对应关系,涵盖了设备评估维度的评估域、网络评估维度的评估域和系统评估维度的评估域。It can be understood that the first sub-correspondence determines the security level of the communication device from the device evaluation dimension, the second sub-correspondence determines the security level of the communication device from the network evaluation dimension, and the third sub-correspondence determines the security level of the communication device from the system evaluation dimension. In this way, the second correspondence constructed based on the first sub-correspondence, the second sub-correspondence, and the third sub-correspondence covers the evaluation domain of the device evaluation dimension, the evaluation domain of the network evaluation dimension, and the evaluation domain of the system evaluation dimension.

在一些实施例中,为了建立第一子对应关系,如图6所示,上述S301可以以如下方式实现:In some embodiments, in order to establish the first sub-correspondence relationship, as shown in FIG6 , the above S301 may be implemented in the following manner:

S401、电子设备获取设备评估维度的评估域对应的多个第一安全等级评估项。S401. The electronic device obtains a plurality of first security level assessment items corresponding to an assessment domain of a device assessment dimension.

其中,多个第一安全等级评估项包括:设备启动时完整性保护能力、设备运行时完整性保护能力、安全密码算法管理能力、预设数据保护能力、身份认证能力。Among them, multiple first security level assessment items include: integrity protection capability when the device is started, integrity protection capability when the device is running, security cryptographic algorithm management capability, preset data protection capability, and identity authentication capability.

S402、电子设备获取每个第一安全等级评估项对应的多个第一设备信息。S402: The electronic device obtains a plurality of first device information corresponding to each first security level assessment item.

其中,设备启动时完整性保护能力对应的多个第一设备信息包括:设备启动时软件完整性校验能力、设备启动时通过数字签名技术进行完整性和真实性校验能力、设备启动时零配置开局能力。设备运行时完整性保护能力对应的多个第一设备信息包括:设备升级时软件包完整性校验能力、设备升级时补丁完整性校验能力、设备升级时通过数字签名技术进行完整性和真实性校验能力。安全密码算法管理能力对应的多个第一设备信息包括:预设密码算法安全强度、密码算法告警能力、多层密钥保护能力、根密钥硬件保护能力。预设数据保护能力对应的多个第一设备信息包括:第一预设数据保护能力、第二预设数据保护能力、预设程序保护能力,第二预设数据的重要程度高于第一预设数据。身份认证能力对应的多个第一设备信息包括:用户身份标识能力、用户身份鉴别能力、用户执行预设操作时是否进行用户身份鉴别能力、接口认证能力。Among them, the multiple first device information corresponding to the integrity protection capability when the device is started include: software integrity verification capability when the device is started, integrity and authenticity verification capability through digital signature technology when the device is started, and zero-configuration start capability when the device is started. The multiple first device information corresponding to the integrity protection capability when the device is running includes: software package integrity verification capability when the device is upgraded, patch integrity verification capability when the device is upgraded, and integrity and authenticity verification capability through digital signature technology when the device is upgraded. The multiple first device information corresponding to the security cryptographic algorithm management capability includes: preset cryptographic algorithm security strength, cryptographic algorithm alarm capability, multi-layer key protection capability, and root key hardware protection capability. The multiple first device information corresponding to the preset data protection capability includes: first preset data protection capability, second preset data protection capability, and preset program protection capability, and the importance of the second preset data is higher than that of the first preset data. The multiple first device information corresponding to the identity authentication capability includes: user identity identification capability, user identity authentication capability, whether to perform user identity authentication when the user performs a preset operation, and interface authentication capability.

S403、电子设备根据任一第一安全等级评估项对应的多个第一设备信息,确定任一第一安全等级评估项对应的多个第一安全等级。S403: The electronic device determines a plurality of first security levels corresponding to any first security level assessment item according to a plurality of first device information corresponding to any first security level assessment item.

作为一种可能的实现方式,电子设备根据设备启动时软件完整性校验能力、设备启动时通过数字签名技术进行完整性和真实性校验能力、设备启动时零配置开局能力,确定设备启动时完整性保护能力对应的多个第一安全等级。电子设备根据设备升级时软件包完整性校验能力、设备升级时补丁完整性校验能力、设备升级时通过数字签名技术进行完整性和真实性校验能力,确定设备运行时完整性保护能力对应的多个第一安全等级。As a possible implementation, the electronic device determines multiple first security levels corresponding to the integrity protection capability at device startup based on the software integrity verification capability at device startup, the integrity and authenticity verification capability through digital signature technology at device startup, and the zero-configuration start capability at device startup. The electronic device determines multiple first security levels corresponding to the integrity protection capability during device operation based on the software package integrity verification capability at device upgrade, the patch integrity verification capability at device upgrade, and the integrity and authenticity verification capability through digital signature technology at device upgrade.

电子设备根据预设密码算法安全强度、密码算法告警能力、多层密钥保护能力、根密钥硬件保护能力,确定安全密码算法管理能力对应的多个第一安全等级。电子设备根据第一预设数据保护能力、第二预设数据保护能力、预设程序保护能力,确定预设数据保护能力对应的多个第一安全等级。电子设备根据用户身份标识能力、用户身份鉴别能力、用户执行预设操作时是否进行用户身份鉴别能力、接口认证能力,确定身份认证能力对应的多个第一安全等级。The electronic device determines multiple first security levels corresponding to the security cryptographic algorithm management capability based on the preset cryptographic algorithm security strength, cryptographic algorithm alarm capability, multi-layer key protection capability, and root key hardware protection capability. The electronic device determines multiple first security levels corresponding to the preset data protection capability based on the first preset data protection capability, the second preset data protection capability, and the preset program protection capability. The electronic device determines multiple first security levels corresponding to the identity authentication capability based on the user identity identification capability, the user identity authentication capability, whether to perform user identity authentication when the user performs a preset operation, and the interface authentication capability.

S404、电子设备根据设备评估维度的评估域对应的多个第一安全等级评估项、任一第一安全等级评估项对应的多个第一设备信息和任一第一安全等级评估项对应的多个第一安全等级,建立第一子对应关系。S404. The electronic device establishes a first sub-correspondence relationship according to multiple first security level assessment items corresponding to the assessment domain of the device assessment dimension, multiple first device information corresponding to any first security level assessment item, and multiple first security levels corresponding to any first security level assessment item.

示例性的,第一子对应关系还可以如下表6所示:Exemplarily, the first sub-correspondence relationship may also be shown in the following Table 6:

表6第一子对应关系Table 6 First sub-correspondence

在实际应用中,设备启动时完整性保护能力在第一安全等级为2级的情况下,对应的第一设备信息为:具备设备启动时软件完整性校验能力、具备设备启动时以硬件可信根为起点并通过数字签名技术逐级校验启动链上的软件完整性和软件真实性能力。设备运行时完整性保护能力在第一安全等级为4级的情况下,对应的第一设备信息为:具备设备升级时通过数字签名技术对软件包进行完整性和真实性校验能力、具备设备升级时通过数字签名技术对补丁进行完整性和真实性校验能力、具备软件安装时降级告警消息,该告警消息可以为日志消息,也可以为管理员能够看见的告警消息。设备启动时完整性保护能力在第一安全等级为3级的情况下,对应的第一设备信息还包括:具备安全零配置部署(securezero touch provisioning,SZTP)能力和度量启动能力。In actual applications, when the first security level of the device's integrity protection capability is level 2, the corresponding first device information is: the ability to verify the software integrity when the device is started, and the ability to verify the software integrity and authenticity of the startup chain step by step using the digital signature technology starting from the hardware trusted root when the device is started. When the first security level of the device's integrity protection capability is level 4, the corresponding first device information is: the ability to verify the integrity and authenticity of the software package using the digital signature technology when the device is upgraded, the ability to verify the integrity and authenticity of the patch using the digital signature technology when the device is upgraded, and the ability to send a downgrade alarm message when the software is installed. The alarm message can be a log message or an alarm message that the administrator can see. When the first security level of the device's integrity protection capability is level 3, the corresponding first device information also includes: the ability to deploy secure zero touch provisioning (SZTP) and the ability to measure startup.

预设强度可以为120比特(bits),具备密码算法告警能力指的是,当配置不安全密码算法或者协议时具备安全提示或者告警能力。多层密钥保护能力指的是密钥的安全管理采用层次化的保护方式,密钥的分层管理机制推荐把密钥分为三层,最少两层。例如:根密钥、密钥加密密钥、工作密钥,根密钥为密钥加密密钥提供加密保护,密钥加密密钥为工作密钥提供加密保护。安全密码算法管理能力在第一安全等级为5级的情况下,对应的第一设备信息为:预设密码算法安全强度大于或等于预设强度、具备密码算法告警能力、多层密钥保护能力、具备根密钥硬件保护能力、具备抵抗量子攻击能力。The preset strength can be 120 bits. Having the cryptographic algorithm alarm capability means that it has the ability to issue security prompts or alarms when an unsafe cryptographic algorithm or protocol is configured. Multi-layer key protection capability means that the security management of keys adopts a hierarchical protection method. The hierarchical management mechanism of keys recommends dividing the keys into three layers, at least two layers. For example: root key, key encryption key, working key. The root key provides encryption protection for the key encryption key, and the key encryption key provides encryption protection for the working key. When the first security level of the secure cryptographic algorithm management capability is 5, the corresponding first device information is: the preset cryptographic algorithm security strength is greater than or equal to the preset strength, has the cryptographic algorithm alarm capability, multi-layer key protection capability, root key hardware protection capability, and the ability to resist quantum attacks.

第一预设数据可以为存储在设备中的敏感数据(例如私钥/口令),第二预设数据可以为关键数据(例如日志、配置文件、数字证书),预设程序可以为关键固件。The first preset data may be sensitive data (eg, private key/password) stored in the device, the second preset data may be critical data (eg, log, configuration file, digital certificate), and the preset program may be critical firmware.

身份认证能力在第一安全等级为1级的情况下,对应的第一设备信息还包括:身份鉴别信息向用户公开、用户身份标识具有唯一性、具备首次管理设备时修改默认口令的能力、具备首次管理设备时设置口令的能力、支持随机的初始口令、支持设置口令生存周期、使用口令鉴别方式时具备口令复杂度检查能力、具备使用口令鉴别方式时密文显示用户输入的口令信息能力、具备登录用户空闲超时锁定能力、支持自动退出安全策略。其中,口令复杂度检查包括口令长度是否大于或等于8位,且是否至少包含2种不同类型字符。When the first security level is 1, the corresponding first device information also includes: identity authentication information is open to users, user identity identifier is unique, the ability to modify the default password when managing the device for the first time, the ability to set the password when managing the device for the first time, support for random initial passwords, support for setting password life cycle, the ability to check password complexity when using password authentication, the ability to display the password information entered by the user in ciphertext when using password authentication, the ability to lock the logged-in user when idle timeout, and support for automatic logout security policy. Among them, the password complexity check includes whether the password length is greater than or equal to 8 characters and whether it contains at least 2 different types of characters.

接口可以为对系统进行管理的接口(例如人机接口、跨信任网络的机机接口)和在设备外部可见的能对系统进行管理的物理接口(例如串口、通用串行总线(universalserial bus,USB)接口、管理网口),对接口进行认证的机制可以为标准协议中的认证机制。身份认证能力在第一安全等级为3级的情况下,对应的第一设备信息还包括:禁用用于登录设备的硬编码的账户或认证凭据、支持多因素认证。身份认证能力在第一安全等级为4级的情况下,对应的第一设备信息包括:支持针对用户标识和鉴权的安全风险识别告警能力和修复能力。The interface may be an interface for managing the system (such as a human-machine interface, a machine-machine interface across a trusted network) and a physical interface visible from the outside of the device that can manage the system (such as a serial port, a universal serial bus (USB) interface, a management network port), and the mechanism for authenticating the interface may be an authentication mechanism in a standard protocol. When the first security level is level 3, the corresponding first device information also includes: disabling hard-coded accounts or authentication credentials for logging into the device, and supporting multi-factor authentication. When the first security level is level 4, the corresponding first device information includes: supporting security risk identification and alarm capabilities and repair capabilities for user identification and authentication.

在实际应用中,设备评估维度的评估域包括:完整性保护子域、数据保护子域、用户认证子域、网元态势感知子域和韧性恢复子域。其中,完整性保护子域对应的安全等级评估项包括:设备启动时完整性保护能力、设备运行时完整性保护能力。数据保护子域对应的安全等级评估项包括:安全密码算法管理能力、预设数据保护能力。用户认证子域对应的安全等级评估项包括:访问权限最小化能力、身份认证能力。网元态势感知子域对应的安全等级评估项包括:安全审计能力。韧性恢复子域对应的安全等级评估项包括:安全隔离能力。In actual applications, the assessment domains of the device assessment dimension include: integrity protection subdomain, data protection subdomain, user authentication subdomain, network element situational awareness subdomain and resilience recovery subdomain. Among them, the security level assessment items corresponding to the integrity protection subdomain include: integrity protection capability at device startup and integrity protection capability during device operation. The security level assessment items corresponding to the data protection subdomain include: secure cryptographic algorithm management capability and preset data protection capability. The security level assessment items corresponding to the user authentication subdomain include: access permission minimization capability and identity authentication capability. The security level assessment items corresponding to the network element situational awareness subdomain include: security audit capability. The security level assessment items corresponding to the resilience recovery subdomain include: security isolation capability.

可以理解的是,第一子对应关系从设备评估维度确定通信设备的安全等级,有助于后续高效建立第二对应关系。It can be understood that the first sub-correspondence determines the security level of the communication device from the device evaluation dimension, which helps to efficiently establish the second corresponding relationship later.

在一些实施例中,为了建立第二子对应关系,如图7所示,上述S302可以以如下方式实现:In some embodiments, in order to establish the second sub-correspondence relationship, as shown in FIG. 7 , the above S302 may be implemented in the following manner:

S501、电子设备获取网络评估维度的评估域对应的多个第二安全等级评估项。S501. The electronic device obtains a plurality of second security level assessment items corresponding to an assessment domain of a network assessment dimension.

其中,多个第二安全等级评估项包括:用户认证能力、攻击防护能力、链路保护能力。Among them, multiple second security level evaluation items include: user authentication capability, attack protection capability, and link protection capability.

S502、电子设备获取每个第二安全等级评估项对应的多个第二设备信息。S502: The electronic device obtains a plurality of second device information corresponding to each second security level assessment item.

其中,用户认证能力对应的多个第二设备信息包括:支持预设服务器的远程认证和授权能力、支持预设服务器组配置能力、建立安全通道能力、支持预设服务器动态下发命令行配置能力。攻击防护能力对应的多个第二设备信息包括:第一预设攻击流量检测和清洗能力、第二预设攻击检测能力、秒级检测第一预设攻击的能力。链路保护能力对应的多个第二设备信息包括:端口循环冗余校验能力、光传输网误码检测能力、毫秒级业务切换能力。Among them, the multiple second device information corresponding to the user authentication capability includes: the ability to support remote authentication and authorization of the preset server, the ability to support the configuration of the preset server group, the ability to establish a secure channel, and the ability to support the dynamic distribution of command line configuration by the preset server. The multiple second device information corresponding to the attack protection capability includes: the first preset attack traffic detection and cleaning capability, the second preset attack detection capability, and the ability to detect the first preset attack in seconds. The multiple second device information corresponding to the link protection capability includes: the port cyclic redundancy check capability, the optical transmission network error detection capability, and the millisecond-level service switching capability.

S503、电子设备根据任一第二安全等级评估项对应的多个第二设备信息,确定任一第二安全等级评估项对应的多个第二安全等级。S503: The electronic device determines a plurality of second security levels corresponding to any second security level assessment item according to a plurality of second device information corresponding to any second security level assessment item.

作为一种可能的实现方式,电子设备根据支持预设服务器的远程认证和授权能力、支持预设服务器组配置能力、建立安全通道能力、支持预设服务器动态下发命令行配置能力,确定用户认证能力对应的多个第二安全等级。电子设备根据第一预设攻击流量检测和清洗能力、第二预设攻击检测能力、秒级检测第一预设攻击的能力,确定攻击防护能力对应的多个第二安全等级。电子设备根据端口循环冗余校验能力、光传输网误码检测能力、毫秒级业务切换能力,确定链路保护能力对应的多个第二安全等级。As a possible implementation method, the electronic device determines multiple second security levels corresponding to the user authentication capability based on the remote authentication and authorization capability of the preset server, the capability of supporting the configuration of the preset server group, the capability of establishing a secure channel, and the capability of supporting the dynamic distribution of command line configuration by the preset server. The electronic device determines multiple second security levels corresponding to the attack protection capability based on the first preset attack traffic detection and cleaning capability, the second preset attack detection capability, and the capability of detecting the first preset attack in seconds. The electronic device determines multiple second security levels corresponding to the link protection capability based on the port cyclic redundancy check capability, the optical transmission network error detection capability, and the millisecond-level service switching capability.

S504、电子设备根据网络评估维度的评估域对应的多个第二安全等级评估项、任一第二安全等级评估项对应的多个第二设备信息和任一第二安全等级评估项对应的多个第二安全等级,建立第二子对应关系。S504. The electronic device establishes a second sub-correspondence relationship according to multiple second security level assessment items corresponding to the assessment domain of the network assessment dimension, multiple second device information corresponding to any second security level assessment item, and multiple second security levels corresponding to any second security level assessment item.

示例性的,第一子对应关系还可以如下表7所示:Exemplarily, the first sub-correspondence relationship may also be shown in the following Table 7:

表7第二子对应关系Table 7 Second sub-correspondence

在实际应用中,预设服务器可以为远程用户拨号认证系统(remoteauthentication dial in user service,Radius)服务器。用户认证能力在第二安全等级为2级的情况下,对应的第二设备信息还包括:具备对预设服务器的可用性探测能力,具备切换服务器能力。用户认证能力在第二安全等级为3级的情况下,对应的第二设备信息还包括:具备基于共享密钥保证认证信息安全能力。用户认证能力在第二安全等级为5级的情况下,对应的第二设备信息包括:支持预设服务器属性对接能力。其中,支持预设服务器属性对接能力可以基于三方脚本进行二次开发,具备建立安全通道能力可以在设备和服务器之间建立安全通道(例如互联网安全协议(internet protocol security,IPSec)和数据包传输层安全性协议(datagram transport layer security,DTLS)),支持预设服务器动态下发命令行配置能力可以为支持Radius动态下发访问控制列表(access control list,ACL)和动态下发命令行配置。In actual applications, the preset server may be a remote authentication dial in user service (Radius) server. When the second security level of the user authentication capability is level 2, the corresponding second device information also includes: the ability to detect the availability of the preset server and the ability to switch servers. When the second security level of the user authentication capability is level 3, the corresponding second device information also includes: the ability to ensure the security of authentication information based on a shared key. When the second security level of the user authentication capability is level 5, the corresponding second device information includes: the ability to support the preset server attribute docking. Among them, the ability to support the preset server attribute docking can be secondary developed based on a three-party script, the ability to establish a secure channel can establish a secure channel between the device and the server (such as Internet protocol security (IPSec) and Datagram transport layer security (DTLS)), and the ability to support the preset server to dynamically send command line configurations can be to support Radius to dynamically send access control lists (ACLs) and dynamically send command line configurations.

第一预设攻击可以为双栈分布式拒绝服务攻击(distributed denial ofservice attack,DDoS)攻击,第二预设攻击可以为SYN Flood攻击、Ping flood攻击、超文本传输安全协议(hypertext transfer protocol secure,HTTPS)flood攻击、会话发起协议(session initiation protocol,SIP)flood攻击、域名系统(domain name system,DNS)flood攻击。攻击防护能力在第二安全等级为3级的情况下,对应的第二设备信息还包括:第一预设攻击发生时保证超文本传输协议(hypertext transfer protocol,HTTP)请求业务正常的能力。The first preset attack may be a dual-stack distributed denial of service attack (DDoS) attack, and the second preset attack may be a SYN flood attack, a Ping flood attack, a hypertext transfer protocol secure (HTTPS) flood attack, a session initiation protocol (SIP) flood attack, or a domain name system (DNS) flood attack. When the attack protection capability is at level 3, the corresponding second device information also includes: the ability to ensure normal hypertext transfer protocol (HTTP) request services when the first preset attack occurs.

链路保护能力在第二安全等级为1级的情况下,对应的第二设备信息还包括:具备基于光路的原始误码率检测能力。链路保护能力在第二安全等级为2级的情况下,对应的第二设备信息还包括:支持纠前纠后误码呈现能力。链路保护能力在第二安全等级为3级的情况下,对应的第二设备信息还包括:SRv6算路时具备基于前向纠错码(forward errorcorrection,FEC)、循环冗余校验码(cyclic redundancy check,CRC)、丢包率约束能力,SRv6算路时具备多因子组合和调优能力。链路保护能力在第二安全等级为4级的情况下,对应的第二设备信息包括:链路故障时具备微妙级业务切换能力。其中,具备端口循环冗余校验能力可以支持CRC校验。光传输网误码检测能力可以支持光传输网(optical transportnetwork,OTN)误码检测。When the second security level is level 1, the corresponding second device information of the link protection capability also includes: the ability to detect the original bit error rate based on the optical path. When the second security level is level 2, the corresponding second device information also includes: the ability to support pre-correction and post-correction error presentation. When the second security level is level 3, the corresponding second device information also includes: the ability to constrain the forward error correction code (FEC), cyclic redundancy check code (CRC), and packet loss rate when calculating the SRv6 path, and the ability to combine and tune multiple factors when calculating the SRv6 path. When the second security level is level 4, the corresponding second device information includes: the ability to switch services at a microsecond level when a link fails. Among them, the port cyclic redundancy check capability can support CRC verification. The optical transport network error detection capability can support optical transport network (OTN) error detection.

在实际应用中,网络评估维度的评估域包括:用户认证子域、攻击报文防范子域、以太网业务子域、IP路由子域、IP业务子域、SRv6业务子域、IP组播子域、MPLS子域、协议子域、接口与链路子域、网络韧性子域。其中,用户认证子域对应的安全等级评估项包括:用户认证能力、终端访问控制器访问控制系统(terminal access controller access controlsystem,TACACS+)能力。攻击报文防范子域对应的安全等级评估项包括:传输控制协议(transmission control protocol,TCP)防攻击能力、IP防攻击能力、单播反向路由查找(unicast reverse path forwarding,URPF)能力和攻击防护能力。以太网业务子域对应的安全等级评估项包括:媒体访问控制(media access control,MAC)安全能力、链路层发现协议(link layer discovery protocol,LLDP)安全能力。In actual applications, the evaluation domains of the network evaluation dimension include: user authentication subdomain, attack message prevention subdomain, Ethernet service subdomain, IP routing subdomain, IP service subdomain, SRv6 service subdomain, IP multicast subdomain, MPLS subdomain, protocol subdomain, interface and link subdomain, and network resilience subdomain. Among them, the security level evaluation items corresponding to the user authentication subdomain include: user authentication capability and terminal access controller access control system (TACACS+) capability. The security level evaluation items corresponding to the attack message prevention subdomain include: transmission control protocol (TCP) anti-attack capability, IP anti-attack capability, unicast reverse path forwarding (URPF) capability, and attack protection capability. The security level evaluation items corresponding to the Ethernet service subdomain include: media access control (MAC) security capability and link layer discovery protocol (LLDP) security capability.

IP路由子域对应的安全等级评估项包括:中间系统到中间系统(intermediatesystem to intermediate system,ISIS)安全能力、开放最短路径优先(open shortestpath first,OSPF)安全能力、边界网关协议(border gateway protocol,BGP)安全能力。IP业务子域对应的安全等级评估项包括:互联网协议第4版(internet protocol version 4,IPv4)基础业务安全能力和能力IPv6基础业务安全。SRv6业务子域对应的安全等级评估项包括:SRv6安全能力。IP组播子域对应的安全等级评估项包括:协议无关组播(protocolindependent multicast,PIM)安全能力。MPLS子域对应的安全等级评估项包括:标签分发协议(label distribution protocol,LDP)安全能力。协议子域对应的安全等级评估项包括:安全外壳协议(secure shell,SSH)安全能力、IPSec能力、安全传输层协议(transportlayer security,TLS)能力、攻击防护能力。接口与链路子域对应的安全等级评估项包括:链路保护能力。网络韧性子域对应的安全等级评估项包括:IP快速重路由(fast reroute,FRR)能力、流量工程(traffic engineer,TE)FRR能力、虚拟专用网络(virtual privatenetwork,VPN)FRR能力。The security level assessment items corresponding to the IP routing subdomain include: intermediate system to intermediate system (ISIS) security capability, open shortest path first (OSPF) security capability, and border gateway protocol (BGP) security capability. The security level assessment items corresponding to the IP service subdomain include: Internet protocol version 4 (IPv4) basic service security capability and IPv6 basic service security. The security level assessment items corresponding to the SRv6 service subdomain include: SRv6 security capability. The security level assessment items corresponding to the IP multicast subdomain include: protocol independent multicast (PIM) security capability. The security level assessment items corresponding to the MPLS subdomain include: label distribution protocol (LDP) security capability. The security level assessment items corresponding to the protocol subdomain include: secure shell protocol (SSH) security capability, IPSec capability, transport layer security (TLS) capability, and attack protection capability. The security level assessment items corresponding to the interface and link subdomain include: link protection capability. The security level assessment items corresponding to the network resilience subdomain include: IP fast reroute (FRR) capability, traffic engineering (TE) FRR capability, and virtual private network (VPN) FRR capability.

其中,IPv4基础业务安全能力对应的第二设备信息包括:支持地址解析协议(address resolution protocol,ARP)。Ipv6基础业务安全能力对应的第二设备信息包括:支持邻居发现协议(neighbor discovery,ND)、支持源地址验证体系(source addressvalidation architecture,SAVA)。TLS能力对应的第二设备信息包括:具备TLS协议保护传输层之上的应用间通信数据机密性能力、具备数据包传输层安全性协议(datagramtransport layer security,DTLS)保护传输层之上的应用间通信数据机密性能力。IP FRR能力对应的第二设备信息包括:支持与FRR、双向转发检测(bidirectional forwardingdetection,BFD)结合实现收敛时长小于100毫秒(millisecond,ms)。TE FRR能力对应的第二设备信息包括:支持与FRR、BFD结合实现收敛时长小于100ms。VPN FRR能力对应的第二设备信息包括:支持与FRR、BFD结合实现收敛时长小于100ms。Among them, the second device information corresponding to the IPv4 basic service security capability includes: supporting the address resolution protocol (ARP). The second device information corresponding to the IPv6 basic service security capability includes: supporting the neighbor discovery protocol (ND) and supporting the source address validation architecture (SAVA). The second device information corresponding to the TLS capability includes: having the ability to protect the confidentiality of inter-application communication data above the transport layer using the TLS protocol and having the ability to protect the confidentiality of inter-application communication data above the transport layer using the datagram transport layer security protocol (DTLS). The second device information corresponding to the IP FRR capability includes: supporting the convergence time of less than 100 milliseconds (millisecond, ms) in combination with FRR and bidirectional forwarding detection (BFD). The second device information corresponding to the TE FRR capability includes: supporting the convergence time of less than 100ms in combination with FRR and BFD. The second device information corresponding to the VPN FRR capability includes: supporting the convergence time of less than 100ms in combination with FRR and BFD.

可以理解的是,第二子对应关系从网络评估维度确定通信设备的安全等级,有助于后续高效建立第二对应关系。It can be understood that the second sub-correspondence determines the security level of the communication device from the network evaluation dimension, which helps to efficiently establish the second corresponding relationship later.

在一些实施例中,为了建立第三子对应关系,如图8所示,上述S303可以以如下方式实现:In some embodiments, in order to establish the third sub-correspondence relationship, as shown in FIG8 , the above S303 may be implemented in the following manner:

S601、电子设备获取系统评估维度的评估域对应的多个第三安全等级评估项。S601. The electronic device obtains a plurality of third security level assessment items corresponding to an assessment domain of a system assessment dimension.

其中,多个第三安全等级评估项包括:入侵检测能力、证书管理能力、安全配置能力。Among them, multiple third-level security level assessment items include: intrusion detection capability, certificate management capability, and security configuration capability.

S602、电子设备获取每个第三安全等级评估项对应的多个第三设备信息。S602: The electronic device obtains a plurality of third device information corresponding to each third security level assessment item.

其中,入侵检测能力对应的多个第三设备信息包括:第三预设攻击检测能力、预设文件篡改检测能力、反弹接口攻击行为检测能力。证书管理能力对应的多个第三设备信息包括:数字证书导入和更新能力、数字证书过期预警能力、是否具有数字证书导入和更新的接口、数字证书完整性保护能力、对接公钥基础设施系统的能力。安全配置能力对应的多个第三设备信息包括:业务安全配置核查能力、手动修复预设配置能力、修复预设配置能力。Among them, the multiple third device information corresponding to the intrusion detection capability includes: the third preset attack detection capability, the preset file tampering detection capability, and the rebound interface attack behavior detection capability. The multiple third device information corresponding to the certificate management capability includes: the digital certificate import and update capability, the digital certificate expiration warning capability, whether there is an interface for digital certificate import and update, the digital certificate integrity protection capability, and the ability to connect to the public key infrastructure system. The multiple third device information corresponding to the security configuration capability includes: the business security configuration verification capability, the manual repair preset configuration capability, and the repair preset configuration capability.

S603、电子设备根据任一第三安全等级评估项对应的多个第三设备信息,确定任一第三安全等级评估项对应的多个第三安全等级。S603: The electronic device determines multiple third security levels corresponding to any third security level assessment item based on multiple third device information corresponding to any third security level assessment item.

作为一种可能的实现方式,电子设备根据第三预设攻击检测能力、预设文件篡改检测能力、反弹接口攻击行为检测能力,确定入侵检测能力对应的多个第三安全等级。电子设备根据数字证书导入和更新能力、数字证书过期预警能力、是否具有数字证书导入和更新的接口、数字证书完整性保护能力、对接公钥基础设施系统的能力,确定证书管理能力对应的多个第三安全等级。电子设备根据业务安全配置核查能力、手动修复预设配置能力、修复预设配置能力,确定安全配置能力对应的多个第三安全等级。As a possible implementation method, the electronic device determines multiple third security levels corresponding to the intrusion detection capability based on the third preset attack detection capability, the preset file tampering detection capability, and the rebound interface attack behavior detection capability. The electronic device determines multiple third security levels corresponding to the certificate management capability based on the digital certificate import and update capability, the digital certificate expiration warning capability, whether there is an interface for digital certificate import and update, the digital certificate integrity protection capability, and the ability to connect to the public key infrastructure system. The electronic device determines multiple third security levels corresponding to the security configuration capability based on the business security configuration verification capability, the manual repair preset configuration capability, and the repair preset configuration capability.

S604、电子设备根据系统评估维度的评估域对应的多个第三安全等级评估项、任一第三安全等级评估项对应的多个第三设备信息和任一第三安全等级评估项对应的多个第三安全等级,建立第三子对应关系。S604. The electronic device establishes a third sub-correspondence relationship according to multiple third security level assessment items corresponding to the assessment domain of the system assessment dimension, multiple third device information corresponding to any third security level assessment item, and multiple third security levels corresponding to any third security level assessment item.

示例性的,第三子对应关系还可以如下表8所示:Exemplarily, the third sub-correspondence relationship may also be shown in the following Table 8:

表8第三子对应关系Table 8 The third sub-correspondence

在实际应用中,第三预设攻击可以为linux shell账户的常见攻击行为检测,包括暴力破解、非法连接行为,预设文件可以为linux的关键系统文件,例如账户文件、网络配置文件。反弹接口攻击行为中的接口可以为shell。通过反弹接口攻击行为检测,可以防止攻击者为了绕过主机上的安全检测系统,对主机已有的bash进行相关的操作,方便后续建立反弹shell的控制通道。入侵检测能力在第三安全等级为3级的情况下,对应的第三设备信息还包括:具备非法用户检测能力、具备通过rootkit进行隐藏痕迹检测能力、具备关键文件检测能力。其中,非法用户检测能力可以防止攻击者隐藏身份保持对设备的控制,通过rootkit进行隐藏痕迹检测可以防止攻击者隐藏文件、进程、网络连接、内核模块,长期驻留并拥有最高权限,关键文件检测能力可以防止黑客留下后门或者恶意文件对主机造成威胁。In actual applications, the third preset attack can be a common attack behavior detection for Linux shell accounts, including brute force cracking and illegal connection behaviors, and the preset files can be key system files of Linux, such as account files and network configuration files. The interface in the rebound interface attack behavior can be a shell. Through the rebound interface attack behavior detection, it is possible to prevent attackers from performing related operations on the host's existing bash in order to bypass the security detection system on the host, which facilitates the subsequent establishment of a control channel for the rebound shell. When the third security level of the intrusion detection capability is level 3, the corresponding third device information also includes: illegal user detection capability, hidden trace detection capability through rootkit, and key file detection capability. Among them, the illegal user detection capability can prevent attackers from hiding their identities and maintaining control over the device. Hidden trace detection through rootkit can prevent attackers from hiding files, processes, network connections, and kernel modules, and staying for a long time and having the highest authority. The key file detection capability can prevent hackers from leaving backdoors or malicious files to threaten the host.

证书管理能力在第三安全等级为1级的情况下,对应的第三设备信息还包括:无法对接网管被远程管理的设备具备近端程序化证书导入和更新能力,能够对接网管的设备具备通过网管远程导入和更新证书的能力,无法对接网管的设备具备本地数字证书过期预警能力,能够对接网管的设备具备向网管告警证书过期能力,具备证书吊销列表的导入与更新能力,支持数字证书吊销状态校验策略,具备验证对端证书的证书签名有效性、证书是否过期以及证书状态是否被吊销的能力,具备设备内预制证书唯一、密钥对以及公钥证书保密的能力,软件包内不包括证书相关数据(例如私钥、公钥证书、证书链以及验证对端证书的根证书)。其中,证书主题中含有产品唯一性信息(例如电子序列号(electronic serialnumber,ESN)、IP地址、MAC地址、服务器名)。When the third security level is 1, the corresponding third device information also includes: the device that cannot be connected to the network management and is remotely managed has the ability to import and update the certificate in a proximal programmed manner, the device that can be connected to the network management has the ability to remotely import and update the certificate through the network management, the device that cannot be connected to the network management has the ability to warn the network management of the expiration of the local digital certificate, the device that can be connected to the network management has the ability to warn the network management of the expiration of the certificate, has the ability to import and update the certificate revocation list, supports the digital certificate revocation status verification strategy, has the ability to verify the validity of the certificate signature of the peer certificate, whether the certificate has expired, and whether the certificate status has been revoked, has the ability to pre-make the certificate uniqueness, key pair and public key certificate confidentiality in the device, and the software package does not include certificate-related data (such as private key, public key certificate, certificate chain and root certificate for verifying the peer certificate). Among them, the certificate subject contains product uniqueness information (such as electronic serial number (ESN), IP address, MAC address, server name).

证书管理能力在第三安全等级为2级的情况下,对应的第三设备信息还包括:具备对接电子认证机构(certification authority,CA)系统能力,具备基于硬件保护私钥口令的能力,具备基于软件保护私钥口令的能力。其中,具备数字证书导入和更新能力可以对接网管实现证书导入与更新,具备对接CA系统能力可以实现证书申请与颁发自动化,具备数字证书完整性保护能力可以防止证书(含根证书)和私钥损坏而导致业务中断,具备对接公钥基础设施系统的能力可以实现证书吊销列表更新的自动化。When the third security level of certificate management capability is 2, the corresponding third device information also includes: the ability to connect to the electronic certification authority (CA) system, the ability to protect the private key password based on hardware, and the ability to protect the private key password based on software. Among them, the ability to import and update digital certificates can connect to the network management to realize certificate import and update, the ability to connect to the CA system can realize the automation of certificate application and issuance, the ability to protect the integrity of digital certificates can prevent business interruption caused by damage to certificates (including root certificates) and private keys, and the ability to connect to the public key infrastructure system can realize the automation of certificate revocation list updates.

安全配置能力在第三安全等级为1级的情况下,对应的第三设备信息还包括:具有业务安全配置基线、具备业务安全配置核查结果可视化能力。安全配置能力在第三安全等级为2级的情况下,对应的第三设备信息还包括:具备定制业务安全配置核查模板的能力。When the third security level is 1, the corresponding third device information also includes: having a business security configuration baseline and having the ability to visualize business security configuration verification results. When the third security level is 2, the corresponding third device information also includes: having the ability to customize business security configuration verification templates.

在实际应用中,系统评估维度的评估域包括:单域态势管控子域、网元安全管理子域、安全核查子域。其中,单域态势管控子域对应的安全等级评估项包括:入侵检测能力和安全资产管理能力。网元安全管理子域对应的安全等级评估项包括:证书管理能力。安全核查子域对应的安全等级评估项包括:安全配置能力。In actual applications, the assessment domains of the system assessment dimension include: single-domain situation control subdomain, network element security management subdomain, and security verification subdomain. Among them, the security level assessment items corresponding to the single-domain situation control subdomain include: intrusion detection capability and security asset management capability. The security level assessment items corresponding to the network element security management subdomain include: certificate management capability. The security level assessment items corresponding to the security verification subdomain include: security configuration capability.

可以理解的是,第三子对应关系从系统评估维度确定通信设备的安全等级,有助于后续高效建立第二对应关系。It can be understood that the third sub-correspondence determines the security level of the communication equipment from the system evaluation dimension, which helps to efficiently establish the second corresponding relationship later.

在实际应用中,目标设备可以为路由器。路由器从业务领域的角度可以划分为接入路由器、汇聚路由器、核心路由器。目标设备也可以为交换机。路由器从业务领域的角度可以划分为园区交换机、数据中心交换机、工业交换机。业务路由器对应的安全等级评估项包括:移动承载路由器可信能力、路由器可信能力、互联网网关(internet gateway,IGW)路由器可信能力、软件定义广域网络(software-defined networking in a wide areanetwork,SD-WAN)路由器可信能力。移动承载路由器对应的安全等级评估项包括:IP和安全防护能力、切片安全防护能力、SRv6安全能力、时钟同步安全能力、EVPN安全防护能力。路由器对应的安全等级评估项包括:控制面(control plane)和用户面(user plane)分离安全能力、宽带网络网关控制设备(broadband network gateway,BNG)业务安全防护能力、BGP安全能力。IGW路由器对应的安全等级评估项包括:BGP安全能力、流量调优安全防护能力。In actual applications, the target device can be a router. From the perspective of the business field, routers can be divided into access routers, aggregation routers, and core routers. The target device can also be a switch. From the perspective of the business field, routers can be divided into campus switches, data center switches, and industrial switches. The security level assessment items corresponding to the business router include: mobile bearer router trust capability, router trust capability, internet gateway (IGW) router trust capability, software-defined wide area network (SD-WAN) router trust capability. The security level assessment items corresponding to the mobile bearer router include: IP and security protection capability, slice security protection capability, SRv6 security capability, clock synchronization security capability, and EVPN security protection capability. The security level assessment items corresponding to the router include: control plane (control plane) and user plane (user plane) separation security capability, broadband network gateway control device (broadband network gateway, BNG) business security protection capability, and BGP security capability. The security level assessment items corresponding to the IGW router include: BGP security capability and traffic tuning security protection capability.

对目标设备的安全程度从设备评估维度的评估域、网络评估维度的评估域和系统评估维度的评估域进行评估。其中,设备评估维度的评估域包括多个安全等级评估项,网络评估维度的评估域包括多个安全等级评估项,系统评估维度的评估域包括多个安全等级评估项,这样,目标设备的安全等级在设备评估维度的评估域、网络评估维度的评估域和系统评估维度的评估域进行评估分别对应一个安全等级。示例性的,目标设备在设备启动时完整性保护能力对应的第一安全等级为3级、设备运行时完整性保护能力对应的第一安全等级为3级、预设数据保护能力对应的第一安全等级为3级、身份认证能力对应的第一安全等级为3级的情况下,目标设备在设备评估维度的评估域的目标安全等级为3级。The security level of the target device is evaluated from the evaluation domain of the device evaluation dimension, the evaluation domain of the network evaluation dimension, and the evaluation domain of the system evaluation dimension. Among them, the evaluation domain of the device evaluation dimension includes multiple security level evaluation items, the evaluation domain of the network evaluation dimension includes multiple security level evaluation items, and the evaluation domain of the system evaluation dimension includes multiple security level evaluation items. In this way, the security level of the target device is evaluated in the evaluation domain of the device evaluation dimension, the evaluation domain of the network evaluation dimension, and the evaluation domain of the system evaluation dimension, and each corresponds to a security level. Exemplarily, when the first security level corresponding to the integrity protection capability of the target device at device startup is level 3, the first security level corresponding to the integrity protection capability during device operation is level 3, the first security level corresponding to the preset data protection capability is level 3, and the first security level corresponding to the identity authentication capability is level 3, the target security level of the target device in the evaluation domain of the device evaluation dimension is level 3.

上述主要从方法的角度对本申请实施例提供的方案进行了介绍。为了实现上述功能,安全等级确定装置或电子设备包含了执行各个功能相应的硬件结构和/或软件模块。本领域技术人员应该很容易意识到,结合本文中所公开的实施例描述的各示例的单元及算法步骤,本申请能够以硬件或硬件和计算机软件的结合形式来实现。某个功能究竟以硬件还是计算机软件驱动硬件的方式来执行,取决于技术方案的特定应用和设计约束条件。专业技术人员可以对每个特定的应用来使用不同方法来实现所描述的功能,但是这种实现不应认为超出本申请的范围。The above mainly introduces the solution provided by the embodiment of the present application from the perspective of the method. In order to achieve the above functions, the security level determination device or electronic device includes a hardware structure and/or software module corresponding to the execution of each function. It should be easily appreciated by those skilled in the art that, in combination with the units and algorithm steps of each example described in the embodiments disclosed herein, the present application can be implemented in the form of hardware or a combination of hardware and computer software. Whether a function is executed in the form of hardware or computer software driving hardware depends on the specific application and design constraints of the technical solution. Professional and technical personnel can use different methods to implement the described functions for each specific application, but such implementation should not be considered to be beyond the scope of the present application.

本申请实施例可以根据上述方法,示例性的对安全等级确定装置或电子设备进行功能模块的划分,例如,安全等级确定装置或电子设备可以包括对应各个功能划分的各个功能模块,也可以将两个或两个以上的功能集成在一个处理模块中。上述集成的模块既可以采用硬件的形式实现,也可以采用软件功能模块的形式实现。需要说明的是,本申请实施例中对模块的划分是示意性的,仅仅为一种逻辑功能划分,实际实现时可以有另外的划分方式。The embodiments of the present application can exemplarily divide the functional modules of the security level determination device or electronic device according to the above method. For example, the security level determination device or electronic device can include various functional modules corresponding to the various functional divisions, or two or more functions can be integrated into one processing module. The above integrated modules can be implemented in the form of hardware or in the form of software functional modules. It should be noted that the division of modules in the embodiments of the present application is schematic and is only a logical functional division. There may be other division methods in actual implementation.

图9是根据一示例性实施例示出的一种安全等级确定装置700。如图9所示,该安全等级确定装置700包括获取单元701、确定单元702和建立单元703。Fig. 9 shows a security level determination device 700 according to an exemplary embodiment. As shown in Fig. 9 , the security level determination device 700 includes an acquisition unit 701 , a determination unit 702 and an establishment unit 703 .

获取单元701,用于获取目标设备的目标设备类别和目标设备信息。目标设备信息包括:设备评估维度的设备信息、网络评估维度的设备信息和系统评估维度的设备信息中的至少一个。The acquisition unit 701 is used to acquire the target device category and target device information of the target device. The target device information includes at least one of device information of device evaluation dimension, device information of network evaluation dimension and device information of system evaluation dimension.

确定单元702,用于根据目标设备类别和第一对应关系,确定目标设备对应的至少一个目标安全等级评估域以及目标设备在每个目标安全等级评估域对应的至少一个目标安全等级评估项。第一对应关系包括:多个预设设备类别、每个预设设备类别对应的至少一个安全等级评估域、每个预设设备类别在每个安全等级评估域对应的至少一个安全等级评估项。至少一个安全等级评估域包括:设备评估维度的评估域、网络评估维度的评估域和系统评估维度的评估域中的至少一个。The determination unit 702 is used to determine at least one target security level assessment domain corresponding to the target device and at least one target security level assessment item corresponding to the target device in each target security level assessment domain according to the target device category and the first corresponding relationship. The first corresponding relationship includes: multiple preset device categories, at least one security level assessment domain corresponding to each preset device category, and at least one security level assessment item corresponding to each preset device category in each security level assessment domain. The at least one security level assessment domain includes: at least one of an assessment domain of a device assessment dimension, an assessment domain of a network assessment dimension, and an assessment domain of a system assessment dimension.

确定单元702,还用于根据目标设备信息、目标设备在每个目标安全等级评估域对应的至少一个目标安全等级评估项和第二对应关系,确定目标设备的目标安全等级。第二对应关系包括:多个安全等级评估项、每个安全等级评估项对应的多个安全等级、与多个安全等级一一对应的多个设备信息。目标安全等级用于表示目标设备的安全程度。The determination unit 702 is further configured to determine the target security level of the target device according to the target device information, at least one target security level assessment item corresponding to the target device in each target security level assessment domain, and a second corresponding relationship. The second corresponding relationship includes: multiple security level assessment items, multiple security levels corresponding to each security level assessment item, and multiple device information corresponding to the multiple security levels. The target security level is used to indicate the security level of the target device.

可选的,为了构建第二对应关系,如图9所示,建立单元703用于:Optionally, in order to construct the second corresponding relationship, as shown in FIG9 , the establishing unit 703 is used to:

建立第一子对应关系。第一子对应关系包括:设备评估维度的评估域对应的多个第一安全等级评估项、每个第一安全等级评估项对应的多个第一安全等级、与多个第一安全等级一一对应的多个第一设备信息。A first sub-correspondence relationship is established. The first sub-correspondence relationship includes: a plurality of first security level assessment items corresponding to the assessment domain of the device assessment dimension, a plurality of first security levels corresponding to each first security level assessment item, and a plurality of first device information corresponding to the plurality of first security levels.

建立第二子对应关系。第二子对应关系包括:网络评估维度的评估域对应的多个第二安全等级评估项、每个第二安全等级评估项对应的多个第二安全等级、与多个第二安全等级一一对应的多个第二设备信息。A second sub-correspondence relationship is established. The second sub-correspondence relationship includes: a plurality of second security level assessment items corresponding to the assessment domain of the network assessment dimension, a plurality of second security levels corresponding to each second security level assessment item, and a plurality of second device information corresponding to the plurality of second security levels.

建立第三子对应关系。第三子对应关系包括:系统评估维度的评估域对应的多个第三安全等级评估项、每个第三安全等级评估项对应的多个第三安全等级、与多个第三安全等级一一对应的多个第三设备信息。The third sub-correspondence relationship is established. The third sub-correspondence relationship includes: a plurality of third security level assessment items corresponding to the assessment domain of the system assessment dimension, a plurality of third security levels corresponding to each third security level assessment item, and a plurality of third device information corresponding to the plurality of third security levels.

根据第一子对应关系、第二子对应关系和第三子对应关系,建立第二对应关系。A second corresponding relationship is established according to the first sub-corresponding relationship, the second sub-corresponding relationship and the third sub-corresponding relationship.

可选的,为了建立第一子对应关系,如图9所示,上述建立单元703,具体用于:Optionally, in order to establish the first sub-correspondence relationship, as shown in FIG9 , the establishing unit 703 is specifically configured to:

获取设备评估维度的评估域对应的多个第一安全等级评估项。多个第一安全等级评估项包括:设备启动时完整性保护能力、设备运行时完整性保护能力、安全密码算法管理能力、预设数据保护能力、身份认证能力。A plurality of first security level assessment items corresponding to the assessment domain of the device assessment dimension are obtained. The plurality of first security level assessment items include: integrity protection capability at device startup, integrity protection capability at device runtime, security cryptographic algorithm management capability, preset data protection capability, and identity authentication capability.

获取每个第一安全等级评估项对应的多个第一设备信息。设备启动时完整性保护能力对应的多个第一设备信息包括:设备启动时软件完整性校验能力、设备启动时通过数字签名技术进行完整性和真实性校验能力、设备启动时零配置开局能力。设备运行时完整性保护能力对应的多个第一设备信息包括:设备升级时软件包完整性校验能力、设备升级时补丁完整性校验能力、设备升级时通过数字签名技术进行完整性和真实性校验能力。安全密码算法管理能力对应的多个第一设备信息包括:预设密码算法安全强度、密码算法告警能力、多层密钥保护能力、根密钥硬件保护能力。预设数据保护能力对应的多个第一设备信息包括:第一预设数据保护能力、第二预设数据保护能力、预设程序保护能力,第二预设数据的重要程度高于第一预设数据。身份认证能力对应的多个第一设备信息包括:用户身份标识能力、用户身份鉴别能力、用户执行预设操作时是否进行用户身份鉴别能力、接口认证能力。Acquire multiple pieces of first device information corresponding to each first security level assessment item. Multiple pieces of first device information corresponding to the integrity protection capability at device startup include: software integrity verification capability at device startup, integrity and authenticity verification capability through digital signature technology at device startup, and zero-configuration start capability at device startup. Multiple pieces of first device information corresponding to the integrity protection capability at device runtime include: software package integrity verification capability at device upgrade, patch integrity verification capability at device upgrade, and integrity and authenticity verification capability through digital signature technology at device upgrade. Multiple pieces of first device information corresponding to the security cryptographic algorithm management capability include: preset cryptographic algorithm security strength, cryptographic algorithm alarm capability, multi-layer key protection capability, and root key hardware protection capability. Multiple pieces of first device information corresponding to the preset data protection capability include: first preset data protection capability, second preset data protection capability, and preset program protection capability, and the second preset data is more important than the first preset data. Multiple pieces of first device information corresponding to the identity authentication capability include: user identity identification capability, user identity authentication capability, whether to perform user identity authentication when the user performs a preset operation, and interface authentication capability.

根据任一第一安全等级评估项对应的多个第一设备信息,确定任一第一安全等级评估项对应的多个第一安全等级。According to the plurality of first device information corresponding to any first security level evaluation item, a plurality of first security levels corresponding to any first security level evaluation item are determined.

根据设备评估维度的评估域对应的多个第一安全等级评估项、任一第一安全等级评估项对应的多个第一设备信息和任一第一安全等级评估项对应的多个第一安全等级,建立第一子对应关系。A first sub-correspondence relationship is established based on multiple first security level assessment items corresponding to the assessment domain of the device assessment dimension, multiple first device information corresponding to any first security level assessment item, and multiple first security levels corresponding to any first security level assessment item.

可选的,为了建立第二子对应关系,如图9所示,上述建立单元703,具体用于:Optionally, in order to establish the second sub-correspondence relationship, as shown in FIG9 , the establishing unit 703 is specifically configured to:

获取网络评估维度的评估域对应的多个第二安全等级评估项。多个第二安全等级评估项包括:用户认证能力、攻击防护能力、链路保护能力。Acquire multiple second security level evaluation items corresponding to the evaluation domain of the network evaluation dimension. The multiple second security level evaluation items include: user authentication capability, attack protection capability, and link protection capability.

获取每个第二安全等级评估项对应的多个第二设备信息。用户认证能力对应的多个第二设备信息包括:支持预设服务器的远程认证和授权能力、支持预设服务器组配置能力、建立安全通道能力、支持预设服务器动态下发命令行配置能力。攻击防护能力对应的多个第二设备信息包括:第一预设攻击流量检测和清洗能力、第二预设攻击检测能力、秒级检测第一预设攻击的能力。链路保护能力对应的多个第二设备信息包括:端口循环冗余校验能力、光传输网误码检测能力、毫秒级业务切换能力。Obtain multiple second device information corresponding to each second security level assessment item. Multiple second device information corresponding to user authentication capability includes: remote authentication and authorization capability supporting preset server, capability to support preset server group configuration, capability to establish secure channel, capability to support dynamic command line configuration of preset server. Multiple second device information corresponding to attack protection capability includes: first preset attack traffic detection and cleaning capability, second preset attack detection capability, and capability to detect first preset attack in seconds. Multiple second device information corresponding to link protection capability includes: port cyclic redundancy check capability, optical transmission network error detection capability, and millisecond-level service switching capability.

根据任一第二安全等级评估项对应的多个第二设备信息,确定任一第二安全等级评估项对应的多个第二安全等级。A plurality of second security levels corresponding to any second security level evaluation item are determined according to a plurality of second device information corresponding to any second security level evaluation item.

根据网络评估维度的评估域对应的多个第二安全等级评估项、任一第二安全等级评估项对应的多个第二设备信息和任一第二安全等级评估项对应的多个第二安全等级,建立第二子对应关系。A second sub-correspondence relationship is established based on multiple second security level assessment items corresponding to the assessment domain of the network assessment dimension, multiple second device information corresponding to any second security level assessment item, and multiple second security levels corresponding to any second security level assessment item.

可选的,为了建立第三子对应关系,如图9所示,上述建立单元703,具体用于:Optionally, in order to establish the third sub-correspondence relationship, as shown in FIG9 , the establishing unit 703 is specifically configured to:

获取系统评估维度的评估域对应的多个第三安全等级评估项。多个第三安全等级评估项包括:入侵检测能力、证书管理能力、安全配置能力。A plurality of third security level evaluation items corresponding to the evaluation domain of the system evaluation dimension are obtained. The plurality of third security level evaluation items include: intrusion detection capability, certificate management capability, and security configuration capability.

获取每个第三安全等级评估项对应的多个第三设备信息。入侵检测能力对应的多个第三设备信息包括:第三预设攻击检测能力、预设文件篡改检测能力、反弹接口攻击行为检测能力。证书管理能力对应的多个第三设备信息包括:数字证书导入和更新能力、数字证书过期预警能力、是否具有数字证书导入和更新的接口、数字证书完整性保护能力、对接公钥基础设施系统的能力。安全配置能力对应的多个第三设备信息包括:业务安全配置核查能力、手动修复预设配置能力、修复预设配置能力。Obtain multiple third device information corresponding to each third security level assessment item. Multiple third device information corresponding to intrusion detection capability includes: third preset attack detection capability, preset file tampering detection capability, and rebound interface attack behavior detection capability. Multiple third device information corresponding to certificate management capability includes: digital certificate import and update capability, digital certificate expiration warning capability, whether there is an interface for digital certificate import and update, digital certificate integrity protection capability, and the ability to connect to the public key infrastructure system. Multiple third device information corresponding to security configuration capability includes: business security configuration verification capability, manual repair preset configuration capability, and repair preset configuration capability.

根据任一第三安全等级评估项对应的多个第三设备信息,确定任一第三安全等级评估项对应的多个第三安全等级。A plurality of third security levels corresponding to any third security level evaluation item is determined according to a plurality of third device information corresponding to any third security level evaluation item.

根据系统评估维度的评估域对应的多个第三安全等级评估项、任一第三安全等级评估项对应的多个第三设备信息和任一第三安全等级评估项对应的多个第三安全等级,建立第三子对应关系。A third sub-correspondence relationship is established based on multiple third security level assessment items corresponding to the assessment domain of the system assessment dimension, multiple third device information corresponding to any third security level assessment item, and multiple third security levels corresponding to any third security level assessment item.

图10是根据一示例性实施例示出的一种电子设备的框图。如图10所示,电子设备800包括但不限于:处理器801和存储器802。Fig. 10 is a block diagram of an electronic device according to an exemplary embodiment. As shown in Fig. 10 , the electronic device 800 includes but is not limited to: a processor 801 and a memory 802 .

其中,上述的存储器802,用于存储上述处理器801的可执行指令。可以理解的是,上述处理器801被配置为执行指令,以实现上述实施例中的安全等级确定方法。The memory 802 is used to store executable instructions of the processor 801. It can be understood that the processor 801 is configured to execute instructions to implement the security level determination method in the above embodiment.

需要说明的是,本领域技术人员可以理解,图10中示出的电子设备结构并不构成对电子设备的限定,电子设备可以包括比图10所示更多或更少的部件,或者组合某些部件,或者不同的部件布置。It should be noted that those skilled in the art will understand that the electronic device structure shown in FIG10 does not constitute a limitation on the electronic device, and the electronic device may include more or fewer components than shown in FIG10, or a combination of certain components, or a different arrangement of components.

处理器801是电子设备的控制中心,利用各种接口和线路连接整个电子设备的各个部分,通过运行或执行存储在存储器802内的软件程序和/或模块,以及调用存储在存储器802内的数据,执行电子设备的各种功能和处理数据,从而对电子设备进行整体监控。处理器801可包括一个或多个处理单元。可选的,处理器801可集成应用处理器和调制解调处理器,其中,应用处理器主要处理操作系统、用户界面和应用程序等,调制解调处理器主要处理无线通信。可以理解的是,上述调制解调处理器也可以不集成到处理器801中。The processor 801 is the control center of the electronic device. It uses various interfaces and lines to connect various parts of the entire electronic device. By running or executing software programs and/or modules stored in the memory 802, and calling data stored in the memory 802, it performs various functions of the electronic device and processes data, thereby monitoring the electronic device as a whole. The processor 801 may include one or more processing units. Optionally, the processor 801 may integrate an application processor and a modem processor, wherein the application processor mainly processes the operating system, user interface, and application programs, and the modem processor mainly processes wireless communications. It is understandable that the above-mentioned modem processor may not be integrated into the processor 801.

存储器802可用于存储软件程序以及各种数据。存储器802可主要包括存储程序区和存储数据区,其中,存储程序区可存储操作系统、至少一个功能模块所需的应用程序等(比如获取单元、确定单元和建立单元)。此外,存储器802可以包括高速随机存取存储器,还可以包括非易失性存储器,例如至少一个磁盘存储器件、闪存器件、或其他易失性固态存储器件。The memory 802 can be used to store software programs and various data. The memory 802 can mainly include a program storage area and a data storage area, wherein the program storage area can store an operating system, an application program required by at least one functional module, etc. (such as an acquisition unit, a determination unit, and an establishment unit). In addition, the memory 802 can include a high-speed random access memory, and can also include a non-volatile memory, such as at least one disk storage device, a flash memory device, or other volatile solid-state storage devices.

在示例性实施例中,还提供了一种包括指令的计算机可读存储介质,例如包括指令的存储器,上述指令可由电子设备的处理器执行以实现上述实施例中的安全等级确定方法。In an exemplary embodiment, a computer-readable storage medium including instructions is also provided, such as a memory including instructions. The above instructions can be executed by a processor of an electronic device to implement the security level determination method in the above embodiment.

在实际实现时,获取单元701、确定单元702和建立单元703的功能均可以由图10中的处理器801调用存储器802中存储的计算机程序实现。其具体的执行过程可参考上述实施例中的安全等级确定方法部分的描述,这里不再赘述。In actual implementation, the functions of the acquisition unit 701, the determination unit 702 and the establishment unit 703 can all be implemented by the processor 801 in Figure 10 calling a computer program stored in the memory 802. The specific execution process can refer to the description of the security level determination method in the above embodiment, which will not be repeated here.

可选地,计算机可读存储介质可以是非临时性计算机可读存储介质,例如,该非临时性计算机可读存储介质可以是只读存储器(read-only memory,ROM)、随机存储存储器(random access memory,RAM)、CD-ROM、磁带、软盘和光数据存储设备等。Optionally, the computer-readable storage medium may be a non-temporary computer-readable storage medium, for example, the non-temporary computer-readable storage medium may be a read-only memory (ROM), a random access memory (RAM), a CD-ROM, a magnetic tape, a floppy disk, an optical data storage device, etc.

在示例性实施例中,本申请实施例还提供了一种包括一条或多条指令的计算机程序产品,该一条或多条指令可以由电子设备的处理器执行以完成上述实施例中的方法。In an exemplary embodiment, the present application also provides a computer program product including one or more instructions, and the one or more instructions can be executed by a processor of an electronic device to complete the method in the above embodiment.

需要说明的是,上述计算机可读存储介质中的指令或计算机程序产品中的一条或多条指令被电子设备的处理器执行时实现上述方法实施例的各个过程,且能达到与上述方法相同的技术效果,为避免重复,这里不再赘述。It should be noted that when the instructions in the above-mentioned computer-readable storage medium or one or more instructions in the computer program product are executed by the processor of the electronic device, the various processes of the above-mentioned method embodiment are implemented, and the same technical effect as the above-mentioned method can be achieved. To avoid repetition, they will not be repeated here.

通过以上的实施方式的描述,所属领域的技术人员可以清楚地了解到,为描述的方便和简洁,仅以上述各功能模块的划分进行举例说明,实际应用中,可以根据需要而将上述功能分配由不同的功能模块完成,即将装置的内部结构划分成不同的功能模块,以完成以上描述的全部或者部分功能。Through the description of the above implementation methods, technical personnel in the relevant field can clearly understand that for the convenience and simplicity of description, only the division of the above-mentioned functional modules is used as an example. In actual applications, the above-mentioned functions can be assigned to different functional modules as needed, that is, the internal structure of the device can be divided into different functional modules to complete all or part of the functions described above.

在本申请所提供的几个实施例中,应该理解到,所揭露的装置和方法,可以通过其它的方式实现。例如,以上所描述的装置实施例仅仅是示意性的,例如,模块或单元的划分,仅仅为一种逻辑功能划分,实际实现时可以有另外的划分方式,例如多个单元或组件可以结合或者可以集成到另一个装置,或一些特征可以忽略,或不执行。另一点,所显示或讨论的相互之间的耦合或直接耦合或通信连接可以是通过一些接口,装置或单元的间接耦合或通信连接,可以是电性,机械或其它的形式。In the several embodiments provided in the present application, it should be understood that the disclosed devices and methods can be implemented in other ways. For example, the device embodiments described above are only schematic, for example, the division of modules or units is only a logical function division, and there may be other division methods in actual implementation, such as multiple units or components can be combined or integrated into another device, or some features can be ignored or not executed. Another point is that the mutual coupling or direct coupling or communication connection shown or discussed can be through some interfaces, indirect coupling or communication connection of devices or units, which can be electrical, mechanical or other forms.

作为分离部件说明的单元可以是或者也可以不是物理上分开的,作为单元显示的部件可以是一个物理单元或多个物理单元,即可以位于一个地方,或者也可以分布到多个不同地方。可以根据实际的需要选择其中的部分或者全部单元来实现本实施例方案的目的。The units described as separate components may or may not be physically separated, and the components shown as units may be one physical unit or multiple physical units, that is, they may be located in one place or distributed in multiple different places. Some or all of the units may be selected according to actual needs to achieve the purpose of the present embodiment.

另外,在本申请各个实施例中的各功能单元可以集成在一个处理单元中,也可以是各个单元单独物理存在,也可以两个或两个以上单元集成在一个单元中。上述集成的单元既可以采用硬件的形式实现,也可以采用软件功能单元的形式实现。In addition, each functional unit in each embodiment of the present application may be integrated into one processing unit, or each unit may exist physically separately, or two or more units may be integrated into one unit. The above-mentioned integrated unit may be implemented in the form of hardware or in the form of software functional units.

集成的单元如果以软件功能单元的形式实现并作为独立的产品销售或使用时,可以存储在一个可读取存储介质中。基于这样的理解,本申请实施例的技术方案本质上或者说对现有技术做出贡献的部分或者该技术方案的全部或部分可以以软件产品的形式体现出来,该软件产品存储在一个存储介质中,包括若干指令用以使得一个设备(可以是单片机,芯片等)或处理器(processor)执行本申请各个实施例方法的全部或部分步骤。而前述的存储介质包括:U盘、移动硬盘、ROM、RAM、磁碟或者光盘等各种可以存储程序代码的介质。If the integrated unit is implemented in the form of a software functional unit and sold or used as an independent product, it can be stored in a readable storage medium. Based on this understanding, the technical solution of the embodiment of the present application is essentially or the part that contributes to the prior art or all or part of the technical solution can be embodied in the form of a software product, which is stored in a storage medium, including several instructions to enable a device (which can be a single-chip microcomputer, chip, etc.) or a processor (processor) to perform all or part of the steps of the various embodiments of the present application. The aforementioned storage medium includes: various media that can store program codes, such as USB flash drives, mobile hard drives, ROM, RAM, magnetic disks or optical disks.

以上,仅为本申请的具体实施方式,但本申请的保护范围并不局限于此,任何在本申请揭露的技术范围内的变化或替换,都应涵盖在本申请的保护范围之内。因此,本申请的保护范围应以权利要求的保护范围为准。The above are only specific implementations of the present application, but the protection scope of the present application is not limited thereto, and any changes or substitutions within the technical scope disclosed in the present application should be included in the protection scope of the present application. Therefore, the protection scope of the present application should be based on the protection scope of the claims.

Claims (12)

1. A security level determining method, comprising:
acquiring a target equipment category and target equipment information of target equipment; the target device information includes: at least one of device information of a device evaluation dimension, device information of a network evaluation dimension, and device information of a system evaluation dimension;
determining at least one target security level assessment domain corresponding to the target device and at least one target security level assessment item corresponding to the target device in each target security level assessment domain according to the target device category and the first corresponding relation; the first correspondence relationship includes: the security level evaluation system comprises a plurality of preset device categories, at least one security level evaluation domain corresponding to each preset device category, and at least one security level evaluation item corresponding to each preset device category in each security level evaluation domain; the at least one security level assessment domain comprises: at least one of an assessment domain of a device assessment dimension, an assessment domain of a network assessment dimension, and an assessment domain of a system assessment dimension;
Determining a target security level of the target device according to the target device information, at least one target security level evaluation item corresponding to the target device in each target security level evaluation domain and a second corresponding relation; the second correspondence relationship includes: a plurality of security level evaluation items, a plurality of security levels corresponding to each security level evaluation item, and a plurality of pieces of equipment information corresponding to the plurality of security levels one to one; the target security level is used to represent a degree of security of the target device.
2. The method according to claim 1, wherein the method further comprises:
establishing a first sub-corresponding relation; the first sub-correspondence relationship includes: the device comprises a plurality of first security level assessment items corresponding to an assessment domain of the device assessment dimension, a plurality of first security levels corresponding to each first security level assessment item, and a plurality of first device information corresponding to the plurality of first security levels one to one;
establishing a second sub-corresponding relation; the second sub-correspondence includes: a plurality of second security level evaluation items corresponding to the evaluation domain of the network evaluation dimension, a plurality of second security levels corresponding to each second security level evaluation item, and a plurality of second device information corresponding to the plurality of second security levels one to one;
Establishing a third sub-corresponding relation; the third sub-correspondence relationship includes: the system comprises a plurality of third security level assessment items corresponding to assessment domains of the system assessment dimension, a plurality of third security levels corresponding to each third security level assessment item and a plurality of third device information corresponding to the third security levels one to one;
and establishing the second corresponding relation according to the first sub corresponding relation, the second sub corresponding relation and the third sub corresponding relation.
3. The method of claim 2, wherein the establishing the first sub-correspondence comprises:
acquiring a plurality of first security level evaluation items corresponding to an evaluation domain of the equipment evaluation dimension; the plurality of first security level assessment items includes: integrity protection capability when equipment is started, integrity protection capability when equipment is operated, security cryptographic algorithm management capability, preset data protection capability and identity authentication capability;
acquiring a plurality of pieces of first equipment information corresponding to each first security level evaluation item; the plurality of first device information corresponding to the integrity protection capability when the device is started comprises: the software integrity verification capability when the equipment is started, the integrity and authenticity verification capability when the equipment is started and the zero configuration starting capability when the equipment is started are realized through a digital signature technology; the plurality of first device information corresponding to the device runtime integrity protection capability includes: the software package integrity checking capability during equipment upgrading, the patch integrity checking capability during equipment upgrading and the integrity and authenticity checking capability during equipment upgrading are carried out through the digital signature technology; the plurality of pieces of first device information corresponding to the secure cryptographic algorithm management capability include: presetting the security strength of a cryptographic algorithm, the alarm capability of the cryptographic algorithm, the multi-layer key protection capability and the root key hardware protection capability; the plurality of pieces of first equipment information corresponding to the preset data protection capability comprise: the method comprises the steps of a first preset data protection capability, a second preset data protection capability and a preset program protection capability, wherein the importance degree of the second preset data is higher than that of the first preset data; the plurality of first device information corresponding to the identity authentication capability includes: user identity identification capability, user identity authentication capability, and whether user identity authentication capability and interface authentication capability are performed when a user performs preset operation;
Determining a plurality of first security levels corresponding to any first security level evaluation item according to a plurality of first device information corresponding to any first security level evaluation item;
and establishing the first sub-corresponding relation according to a plurality of first security level assessment items corresponding to the assessment domains of the equipment assessment dimension, a plurality of first equipment information corresponding to any one of the first security level assessment items and a plurality of first security levels corresponding to any one of the first security level assessment items.
4. The method of claim 2, wherein the establishing the second sub-correspondence comprises:
acquiring a plurality of second security level evaluation items corresponding to the evaluation domains of the network evaluation dimension; the plurality of second security level assessment items includes: user authentication capability, attack protection capability, and link protection capability;
acquiring a plurality of pieces of second equipment information corresponding to each second security level evaluation item; the plurality of second device information corresponding to the user authentication capability includes: supporting remote authentication and authorization capability of a preset server, supporting configuration capability of a preset server group, establishing a secure channel capability and supporting dynamic issuing command line configuration capability of the preset server; the plurality of pieces of second device information corresponding to the attack protection capability include: the method comprises the steps of detecting and cleaning a first preset attack flow, detecting a second preset attack, and detecting the first preset attack in a second level; the plurality of second device information corresponding to the link protection capability includes: port cyclic redundancy check capability, optical transmission network error code detection capability and millisecond service switching capability;
Determining a plurality of second security levels corresponding to any second security level evaluation item according to a plurality of second device information corresponding to any second security level evaluation item;
and establishing the second sub-corresponding relation according to a plurality of second security level assessment items corresponding to the assessment domains of the network assessment dimension, a plurality of second equipment information corresponding to any one of the second security level assessment items and a plurality of second security levels corresponding to any one of the second security level assessment items.
5. The method according to any one of claims 2-4, wherein the establishing a third sub-correspondence comprises:
acquiring a plurality of third security level evaluation items corresponding to the evaluation domain of the system evaluation dimension; the plurality of third security level assessment items includes: intrusion detection capability, certificate management capability, security configuration capability;
acquiring a plurality of pieces of third equipment information corresponding to each third security level evaluation item; the plurality of third device information corresponding to the intrusion detection capability includes: third preset attack detection capability, preset file tampering detection capability and rebound interface attack behavior detection capability; the plurality of third device information corresponding to the certificate management capability includes: digital certificate import and update capability, digital certificate expiration pre-warning capability, whether there is an interface for digital certificate import and update, digital certificate integrity protection capability, capability to dock public key infrastructure systems; the plurality of third device information corresponding to the security configuration capability includes: business security configuration checking capability, manual restoration preset configuration capability and restoration preset configuration capability;
Determining a plurality of third security levels corresponding to any third security level evaluation item according to a plurality of third device information corresponding to any third security level evaluation item;
and establishing the third sub-corresponding relation according to a plurality of third security level assessment items corresponding to the assessment domains of the system assessment dimension, a plurality of third device information corresponding to any one of the third security level assessment items and a plurality of third security levels corresponding to any one of the third security level assessment items.
6. A security level determining apparatus, characterized by comprising an acquisition unit and a determining unit;
the acquisition unit is used for acquiring the target equipment category and the target equipment information of the target equipment; the target device information includes: at least one of device information of a device evaluation dimension, device information of a network evaluation dimension, and device information of a system evaluation dimension;
the determining unit is configured to determine, according to the target device class and the first correspondence, at least one target security level assessment domain corresponding to the target device and at least one target security level assessment item corresponding to the target device in each target security level assessment domain; the first correspondence relationship includes: the security level evaluation system comprises a plurality of preset device categories, at least one security level evaluation domain corresponding to each preset device category, and at least one security level evaluation item corresponding to each preset device category in each security level evaluation domain; the at least one security level assessment domain comprises: at least one of an assessment domain of a device assessment dimension, an assessment domain of a network assessment dimension, and an assessment domain of a system assessment dimension;
The determining unit is further configured to determine a target security level of the target device according to the target device information, at least one target security level evaluation item corresponding to the target device in each target security level evaluation domain, and a second correspondence; the second correspondence relationship includes: a plurality of security level evaluation items, a plurality of security levels corresponding to each security level evaluation item, and a plurality of pieces of equipment information corresponding to the plurality of security levels one to one; the target security level is used to represent a degree of security of the target device.
7. The apparatus of claim 6, further comprising a setup unit; the establishing unit is used for:
establishing a first sub-corresponding relation; the first sub-correspondence relationship includes: the device comprises a plurality of first security level assessment items corresponding to an assessment domain of the device assessment dimension, a plurality of first security levels corresponding to each first security level assessment item, and a plurality of first device information corresponding to the plurality of first security levels one to one;
establishing a second sub-corresponding relation; the second sub-correspondence includes: a plurality of second security level evaluation items corresponding to the evaluation domain of the network evaluation dimension, a plurality of second security levels corresponding to each second security level evaluation item, and a plurality of second device information corresponding to the plurality of second security levels one to one;
Establishing a third sub-corresponding relation; the third sub-correspondence relationship includes: the system comprises a plurality of third security level assessment items corresponding to assessment domains of the system assessment dimension, a plurality of third security levels corresponding to each third security level assessment item and a plurality of third device information corresponding to the third security levels one to one;
and establishing the second corresponding relation according to the first sub corresponding relation, the second sub corresponding relation and the third sub corresponding relation.
8. The apparatus according to claim 7, wherein the establishing unit is specifically configured to:
acquiring a plurality of first security level evaluation items corresponding to an evaluation domain of the equipment evaluation dimension; the plurality of first security level assessment items includes: integrity protection capability when equipment is started, integrity protection capability when equipment is operated, security cryptographic algorithm management capability, preset data protection capability and identity authentication capability;
acquiring a plurality of pieces of first equipment information corresponding to each first security level evaluation item; the plurality of first device information corresponding to the integrity protection capability when the device is started comprises: the software integrity verification capability when the equipment is started, the integrity and authenticity verification capability when the equipment is started and the zero configuration starting capability when the equipment is started are realized through a digital signature technology; the plurality of first device information corresponding to the device runtime integrity protection capability includes: the software package integrity checking capability during equipment upgrading, the patch integrity checking capability during equipment upgrading and the integrity and authenticity checking capability during equipment upgrading are carried out through the digital signature technology; the plurality of pieces of first device information corresponding to the secure cryptographic algorithm management capability include: presetting the security strength of a cryptographic algorithm, the alarm capability of the cryptographic algorithm, the multi-layer key protection capability and the root key hardware protection capability; the plurality of pieces of first equipment information corresponding to the preset data protection capability comprise: the method comprises the steps of a first preset data protection capability, a second preset data protection capability and a preset program protection capability, wherein the importance degree of the second preset data is higher than that of the first preset data; the plurality of first device information corresponding to the identity authentication capability includes: user identity identification capability, user identity authentication capability, and whether user identity authentication capability and interface authentication capability are performed when a user performs preset operation;
Determining a plurality of first security levels corresponding to any first security level evaluation item according to a plurality of first device information corresponding to any first security level evaluation item;
and establishing the first sub-corresponding relation according to a plurality of first security level assessment items corresponding to the assessment domains of the equipment assessment dimension, a plurality of first equipment information corresponding to any one of the first security level assessment items and a plurality of first security levels corresponding to any one of the first security level assessment items.
9. The apparatus according to claim 7, wherein the establishing unit is specifically configured to:
acquiring a plurality of second security level evaluation items corresponding to the evaluation domains of the network evaluation dimension; the plurality of second security level assessment items includes: user authentication capability, attack protection capability, and link protection capability;
acquiring a plurality of pieces of second equipment information corresponding to each second security level evaluation item; the plurality of second device information corresponding to the user authentication capability includes: supporting remote authentication and authorization capability of a preset server, supporting configuration capability of a preset server group, establishing a secure channel capability and supporting dynamic issuing command line configuration capability of the preset server; the plurality of pieces of second device information corresponding to the attack protection capability include: the method comprises the steps of detecting and cleaning a first preset attack flow, detecting a second preset attack, and detecting the first preset attack in a second level; the plurality of second device information corresponding to the link protection capability includes: port cyclic redundancy check capability, optical transmission network error code detection capability and millisecond service switching capability;
Determining a plurality of second security levels corresponding to any second security level evaluation item according to a plurality of second device information corresponding to any second security level evaluation item;
and establishing the second sub-corresponding relation according to a plurality of second security level assessment items corresponding to the assessment domains of the network assessment dimension, a plurality of second equipment information corresponding to any one of the second security level assessment items and a plurality of second security levels corresponding to any one of the second security level assessment items.
10. The apparatus according to any of the claims 7-9, characterized in that the establishing unit is specifically configured to:
acquiring a plurality of third security level evaluation items corresponding to the evaluation domain of the system evaluation dimension; the plurality of third security level assessment items includes: intrusion detection capability, certificate management capability, security configuration capability;
acquiring a plurality of pieces of third equipment information corresponding to each third security level evaluation item; the plurality of third device information corresponding to the intrusion detection capability includes: third preset attack detection capability, preset file tampering detection capability and rebound interface attack behavior detection capability; the plurality of third device information corresponding to the certificate management capability includes: digital certificate import and update capability, digital certificate expiration pre-warning capability, whether there is an interface for digital certificate import and update, digital certificate integrity protection capability, capability to dock public key infrastructure systems; the plurality of third device information corresponding to the security configuration capability includes: business security configuration checking capability, manual restoration preset configuration capability and restoration preset configuration capability;
Determining a plurality of third security levels corresponding to any third security level evaluation item according to a plurality of third device information corresponding to any third security level evaluation item;
and establishing the third sub-corresponding relation according to a plurality of third security level assessment items corresponding to the assessment domains of the system assessment dimension, a plurality of third device information corresponding to any one of the third security level assessment items and a plurality of third security levels corresponding to any one of the third security level assessment items.
11. An electronic device, comprising:
a processor;
a memory for storing the processor-executable instructions;
wherein the processor is configured to execute the instructions to implement the method of any of claims 1-5.
12. A computer readable storage medium, characterized in that, when computer-executable instructions stored in the computer readable storage medium are executed by a processor of an electronic device, the electronic device is capable of performing the method of any of claims 1-5.
CN202410010029.1A 2024-01-03 2024-01-03 Security level determination method, device, equipment and storage medium Pending CN117879927A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202410010029.1A CN117879927A (en) 2024-01-03 2024-01-03 Security level determination method, device, equipment and storage medium

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202410010029.1A CN117879927A (en) 2024-01-03 2024-01-03 Security level determination method, device, equipment and storage medium

Publications (1)

Publication Number Publication Date
CN117879927A true CN117879927A (en) 2024-04-12

Family

ID=90578657

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202410010029.1A Pending CN117879927A (en) 2024-01-03 2024-01-03 Security level determination method, device, equipment and storage medium

Country Status (1)

Country Link
CN (1) CN117879927A (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN118277925A (en) * 2024-06-04 2024-07-02 北京警察学院 Classification security assessment method and device for public security video image system

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN118277925A (en) * 2024-06-04 2024-07-02 北京警察学院 Classification security assessment method and device for public security video image system

Similar Documents

Publication Publication Date Title
US12363191B2 (en) Attestation-based scheme for validating peering setups for critical infrastructure protocols
Chuat et al. The complete guide to scion
US10154049B2 (en) System and method for providing an in-line sniffer mode network based identity centric firewall
EP3850510B1 (en) Infrastructure device enrolment
US11799844B2 (en) Secure communication network
US20150113589A1 (en) Authentication server enhancements
Nicholes et al. A survey of security techniques for the border gateway protocol (BGP)
Li et al. Enhancing the trust of internet routing with lightweight route attestation
US11784993B2 (en) Cross site request forgery (CSRF) protection for web browsers
CN116915486B (en) Cloud service communication system
Chapman Network performance and security: testing and analyzing using open source and low-cost tools
TWI668987B (en) System of host protection based on moving target defense and method thereof
CN117879927A (en) Security level determination method, device, equipment and storage medium
CN111404884A (en) Secure communication method, client and non-public server
Wang et al. A data plane security model of SR-BE/TE based on zero-trust architecture
Cisco Cisco IOS Security Configuration Guide Release 12.1
Cisco Security Configuration Guide Cisco IOS Release 12.0
Yamakawa et al. Enhancing digital certificate usability in Long Lifespan IoT devices by utilizing private CA
Singh In Depth Analysis of BGP Protocol, its Security Vulnerabilities and Solutions
CN111917746B (en) Routing protocol access authentication method, device and medium
Carthern et al. Management Plane
Wang et al. ZbSR: A Data Plane Security Model of SR-BE/TE based on Zero-Trust Architecture
Kant et al. Security and Robustness in the Internet Infrastructure
MM TRUSTED VIRTUAL ROUTER REDUNDANCY PROTOCOL
Chouk The use of BGP Flowspec in the protection against DDoS attacks

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination