Document from CIS Legislation database © 2003-2024 SojuzPravoInform LLC

It is registered

in Ministry of Justice

Russian Federation

On January 23, 2008 No. 10993

ORDER OF THE MINISTRY OF INFORMATION TECHNOLOGIES AND COMMUNICATIONS OF THE RUSSIAN FEDERATION

of January 9, 2008 No. 1

About approval of requirements for protection of communication networks against illegal access to them and transferred by means of their information

According to Article 12 and article 26 of the Federal Law of July 7, 2003 N126-FZ (The Russian Federation Code, 2003, N 28, Art. 2895; N52 (part I), Art. 5038; 2004, N 35, Art. 3607; N 45, of Art. 4377; 2005, N 19, Art. 1752; 2006, N 6, Art. 636; N 10, of Art. 1069; N31 (part I), Art. 3431, Art. 3452; 2007, N 1, Art. 8; 835) I order to Art. N 7,:

1. Approve the enclosed requirements for protection of communication networks against illegal access to them and transferred by means of their information.

2. Direct this order to state registration in the Ministry of Justice of the Russian Federation.

3. To impose control of execution of this order on the deputy minister of information technologies and communication of the Russian Federation B. D. Antonyuk.

 

Minister L.D.Reyman

Also communications of the Russian Federation of January 9, 2008 No. 1 are approved by the order of the Ministry of information technologies

Requirements for protection of communication networks against illegal access to them and transferred by means of their information

I. General provisions

1. These requirements extend to the networks of telecommunication which are part of public communication network, except for communication networks for distribution of programs of television broadcasting and broadcasting.

2. For the purpose of protection against illegal access to communication networks and transferred by means of their information telecom operators take the organizational and technical measures directed to prevention of the access to communication lines, the communication constructions, means of communication which are as inside, and out of constructions of the communication and transferred on communication networks of information performed with violation of the procedure for access established by these telecom operators.

3. The procedure for access affirms telecom operators and includes:

a) the description of the organization of access control on the protected territory within which communication constructions (the daleeokhranyaemy territory), and preservation scheme of this territory are placed;

b) the description of procedures of application in the protected territory of technical means of protection, detection and signaling;

c) establishment of the list and samples of the documents granting the right to be in the protected territory, and also in the constructions of communication and certain rooms located within the protected territory;

d) organizational procedures of execution of the admission to work with means of communication and communication lines, and also the works connected with the technological capability of information access transferred by means of communication network and establishment of the list of persons having the right to carrying out such works;

e) the description of procedures of registration of the events connected with implementation of access to funds of communication, to communication lines and constructions of communication.

4. Hub sites of communication networks are subdivided into hub sites I, II, III categories of security. Categorization of hub sites on security is given in appendix.

II. Requirements for protection against illegal access to means of communication and communication lines of communication networks and transferred by means of their information

5. For protection of hub sites of networks of the fixed telephone communication, networks of mobile radio communication, networks of mobile radio telephone communication, networks of mobile satellite radio communication, data communication networks, networks of telegraph communication from access from the physical persons who do not have the right to it, telecom operators provide:

a) equipment of constructions of communication in which hub sites, technical means of protection, including security signaling are placed;

b) availability of the barriers excluding accidental pass of physical persons and entrance of transport on the protected territory for hub sites I and the II category of security;

c) the organization of protection of hub sites for hub sites I and the II category of security;

d) the organization of the check mode both in the protected territory, and in communication constructions in which hub sites for hub sites I and the II category of security are placed;

e) equipment of constructions of communication by control facilities of access for hub sites I of category of security;

e) availability of the locking devices for rooms in which hub sites III of category of security are placed.

7. For protection against illegal access to software of hub sites of networks of the fixed telephone communication, networks of mobile radio communication, networks of mobile radio telephone communication, networks of mobile satellite radio communication, data communication networks, networks of telegraph communication telecom operators provide:

a) taking measures, the persons excluding possibility of access to communication networks not having the right to it or the subscribers and users breaking the procedure for network access of communication established by the telecom operator;

b) control of connection to hub sites technical and the software used in use hub sites;

c) registration and the subsequent control of actions of service personnel in use hub sites according to established procedure of access to funds and to communication lines;

d) differentiation of access rights, including use by service personnel of identification and authentication codes for hub sites I and the II category of security;

e) registration and the subsequent control of the facts of access for physical persons, including service personnel, to means of communication and communication lines in use hub sites for hub sites I and the II category of security;

e) application of the procedure of identification of the customer (terminal) premise equipment in networks of mobile radio communication, networks of mobile radio telephone communication, networks of mobile satellite radio communication;

g) establishment of procedures of authentication of service personnel in case of remote access to hub sites for hub sites I of category of security.

8. For protection against illegal access to the means of communication which are not part of hub sites of networks of the fixed telephone communication of networks of mobile radio communication, networks of mobile radio telephone communication, networks of mobile satellite radio communication, data communication networks, networks of telegraph communication telecom operators provide:

a) equipment of containers in which the means of communication which are out of communication constructions, the locking devices, disturbing and security signaling are placed;

Warning!!!

This is not a full text of document! Document shown in Demo mode!

If you have active License, please Login, or get License for Full Access.

With Full access you can get: full text of document, original text of document in Russian, attachments (if exist) and see History and Statistics of your work.

Get License for Full Access Now

Disclaimer! This text was translated by AI translator and is not a valid juridical document. No warranty. No claim. More info

Effectively work with search system

Database include more 50000 documents. You can find needed documents using search system. For effective work you can mix any on documents parameters: country, documents type, date range, teams or tags.
More about search system

Get help

If you cannot find the required document, or you do not know where to begin, go to Help section.

In this section, we’ve tried to describe in detail the features and capabilities of the system, as well as the most effective techniques for working with the database.

You also may open the section Frequently asked questions. This section provides answers to questions set by users.

Search engine created by SoyuzPravoInform LLC.