← Frameworks / Regulatory

GB/T 22239-2019 Multi-Level Protection Scheme 2.0 (Level 3)

China's mandatory cybersecurity classification and protection standard for information systems. Level 3 applies to government, finance, healthcare, energy, and critical infrastructure. Covers 10 security domains: physical environment, communication network, area boundary, computing environment, security management center, management system, management organization, personnel security, construction management, and operations management. Includes extension requirements for cloud computing, mobile internet, IoT, and industrial control systems. Enforced by the Ministry of Public Security through mandatory classification filing (备案) and periodic assessment by licensed testing organisations (等级测评).

Clause Title SP 800-53 Controls
8.1.1.1 Physical Location Selection (物理位置选择)
8.1.1.2 Physical Access Control (物理访问控制)
8.1.1.3 Anti-theft and Anti-damage (防盗窃和防破坏)
8.1.1.4 Lightning Protection (防雷击)
8.1.1.5 Fire Protection (防火)
8.1.1.6 Water and Moisture Protection (防水和防潮)
8.1.1.7 Static and Climate Control (防静电 / 温湿度控制)
8.1.1.8 Power Supply (电力供应)
8.1.1.9 Electromagnetic Protection (电磁防护)
8.1.2.1 Network Architecture (网络架构)
8.1.2.2 Communication Transmission (通信传输)
8.1.2.3 Trusted Verification — Network (可信验证)
8.1.3.1 Boundary Protection (边界防护)
8.1.3.2 Access Control — Boundary (访问控制)
8.1.3.3 Intrusion Prevention — Boundary (入侵防范)
8.1.3.4 Malware and Spam Prevention — Boundary (恶意代码和垃圾邮件防范)
8.1.3.5 Security Audit — Boundary (安全审计)
8.1.3.6 Trusted Verification — Boundary (可信验证)
8.1.4.1 Identity Authentication (身份鉴别)
8.1.4.2 Access Control — Computing Environment (访问控制)
8.1.4.3 Security Audit — Computing Environment (安全审计)
8.1.4.4 Intrusion Prevention — Computing Environment (入侵防范)
8.1.4.5 Malware Prevention — Computing Environment (恶意代码防范)
8.1.4.6 Trusted Verification — Computing Environment (可信验证)
8.1.4.7 Data Integrity (数据完整性)
8.1.4.8 Data Confidentiality (数据保密性)
8.1.4.9 Data Backup and Recovery (数据备份恢复)
8.1.4.10 Residual Information Protection (剩余信息保护)
8.1.4.11 Personal Information Protection (个人信息保护)
8.1.5.1 System Management (系统管理)
8.1.5.2 Audit Management (审计管理)
8.1.5.3 Security Management (安全管理)
8.1.5.4 Centralized Control — SOC/NOC (集中管控)
8.1.6 Security Management System — Policy and Procedures (安全管理制度)
8.1.7.1 Security Organization — Structure and Staffing (安全管理机构)
8.1.7.2 Authorization, Communication, and Audit (授权审批/沟通合作/审核检查)
8.1.8.1 Personnel Recruitment and Departure (人员录用/人员离岗)
8.1.8.2 Security Awareness Education and Training (安全意识教育和培训)
8.1.8.3 External Personnel Access Management (外部人员访问管理)
8.1.9.1 Classification and Filing (定级和备案)
8.1.9.2 Security Plan Design (安全方案设计)
8.1.9.3 Product Procurement and Use (产品采购和使用)
8.1.9.4 Software Development — In-house and Outsourced (自行/外包软件开发)
8.1.9.5 Implementation, Testing, and Delivery (工程实施/测试验收/系统交付)
8.1.9.6 Level Assessment (等级测评)
8.1.9.7 Service Provider Selection (服务供应商选择)
8.1.10.1 Environment, Asset, and Media Management (环境/资产/介质管理)
8.1.10.2 Equipment Maintenance (设备维护管理)
8.1.10.3 Vulnerability and Risk Management (漏洞和风险管理)
8.1.10.4 Network and System Security Management (网络和系统安全管理)
8.1.10.5 Malware Prevention Management (恶意代码防范管理)
8.1.10.6 Configuration Management (配置管理)
8.1.10.7 Cryptography Management (密码管理)
8.1.10.8 Change Management (变更管理)
8.1.10.9 Backup and Recovery Management (备份与恢复管理)
8.1.10.10 Security Incident Handling (安全事件处置)
8.1.10.11 Emergency Response Planning (应急预案管理)
8.1.10.12 Outsourced Operations Management (外包运维管理)
8.2 Cloud Computing Security Extension (云计算安全扩展要求)
8.3 Mobile Internet Security Extension (移动互联安全扩展要求)
8.4 IoT Security Extension (物联网安全扩展要求)
8.5 Industrial Control System Security Extension (工业控制系统安全扩展要求)