Review of changes in the 17th order of the FSTEC





Hello, Habr! On September 13, the Ministry of Justice approved a document amending the 17th order. This is the one that is about the protection of information in state information systems (hereinafter - GIS). In fact, there are many changes, and some of them are significant. There is at least one very pleasant thing for GIS operators. Details under the cut.



About pleasant



Let's start with this, and then about everything else. The best part for operators is that the GIS certificate is now unlimited. In paragraph 17.4, where it was previously written that the certificate is issued for 5 years, it is now written "Certificate of conformity is issued for the entire life of the information system." True, this, of course, does not eliminate the need to maintain the compliance of the information protection system with the certificate, as mentioned in the same paragraph 17.4.



About cloud data centers



In our experience, more and more GIS operators are inclined to believe that it is not very profitable for them to maintain their own server infrastructure and are migrating to the capacity of a cloud provider. A couple of lines were devoted to such situations in the previous edition of Order 17, but now they decided to describe it in more detail. In particular, the following requirements are indicated:





Other trivia



In paragraph 17, where it was already written that the design of the protection system and its certification should be carried out by various officials, the “employees” were added to the “officials” in brackets. It’s good that they added clarity, because the debate about what to mean by “officials” was serious.



Clause 17.2 was supplemented with the paragraph that acceptance tests of the GIS itself and certification tests of the information security system can be combined. Yes, in general, this has usually always been done.



Information security during the operation of the information system



Point 18 was replenished with new mandatory measures that must be carried out during the operation of a certified GIS. To the management of the information protection system, the detection and response of incidents, the management of the system configuration and the control over ensuring the level of information security are added “planning of measures to protect information”, “analysis of security threats” and “informing and training personnel of the information system”. Here the last one in the 17th order was definitely not enough for a long time.



Further, all these stages in the 17th order are disclosed in more detail, and since “event planning” became the first in the list, “analysis of security threats” - the second, the numbering of the subitems has changed.



In the course of planning (new paragraph 18.1) we must:





According to the threat analysis (new paragraph 18.2), everything is quite concise. It is necessary to identify and eliminate vulnerabilities, analyze changes in security threats and assess the possible consequences of the implementation of threats.



We are often asked how often we need to search for vulnerabilities and analyze information security threats. In the same paragraph, the regulator says that the frequency is determined by the operator.



The item for managing the information security system (formerly 18.1 and new 18.3) has also changed. From here, “informing users about security threats ...” was removed, apparently because now we have a separate section and the “definition of persons responsible for managing the information security system” has been added. However, there is nothing particularly new about the new item, this is our dearly respected security administrator! The rest here remained in place, although a little paraphrased, but essentially the same.



The point about managing the configuration of the information system (old 18.3, new 18.4) is somewhat rephrased, but essentially has not changed. The same can be said about the incident response point (old 18.2, new 18.5).



Paragraph 18.6 about staff training is new, so we will dwell on it in more detail. So, what should we teach them and what to inform about:





The frequency of training is set in the internal documents of the operator, but should be at least 1 time in two years.



The appearance of staff training is a good start, but unfortunately, the forms and hours of training are not indicated again, should such training be carried out according to the programs approved by the FSTEC or enough internal instruction. We suspect that many will continue to approach the issue formally, namely, the marks in the magazine “instructed by”, “listened to instructed” without actually conducting classes.



In the item on control over ensuring the level of information security, the frequency of such control has been added. For GIS grade 1 - at least 1 time per year. For GIS 2 and 3 classes - at least 1 time in two years. You can engage a licensee in such events, but you can conduct it yourself.



About levels of confidence in information security tools



In paragraph 26, in addition to the concept of “class of remedy”, the concept of “level of confidence” is introduced. For GIS class 1, you need at least 4 levels of trust, for GIS 2 classes - 5 level of trust and above, for GIS 3 classes - 6 level of trust and above. FSTEC issued an information message about these levels of trust and should not be confused with the estimated level of trust in accordance with GOST R ISO / IEC 15408-3 (there, by the way, the 5th level of trust is the highest, the 1st level of trust is the lowest).



This is the only point of change that does not enter immediately, but from June 1, 2020. We are waiting for updated certificates of conformity of information protection tools by this date. Whether the means of protection that did not renew the certificate will turn into a pumpkin is still unknown. FSTEC closer to date X may release some kind of informational message as it was with firewalls in 2016.



Pro Certified Routers



Finally, we are finished off by the introduction of paragraph 26.1:



“When designing newly created or modernized information systems with access to the Internet telecommunications network, routers should be selected that are certified to meet information security requirements (in terms of the security functions implemented in them).”



In fact, the introduction of this paragraph is not very clear. Firstly, all protective equipment must be certified. Secondly, as a rule, when connecting to the Internet, GIS uses certified firewalls, including those that are routers. There are no separate security profiles for routers (by analogy with those for MEs) and, possibly, the introduction of clause 26.1 hints at their appearance (security profiles) in the near future.



All Articles