[{"title":"( 47 个子文件 11.91MB ) X集团IT安全保障体系建设规范(安全管理体系文件全集).zip","children":[{"title":"X集团IT安全保障体系建设规范(安全管理体系文件全集)","children":[{"title":".DS_Store <span style='color:#111;'> 10.00KB </span>","children":null,"spread":false},{"title":"管理分册","children":[{"title":"M-3-9 管理分册-IT安全事件管理指南_V1.0.doc <span style='color:#111;'> 410.37KB </span>","children":null,"spread":false},{"title":"M-3-16 管理分册-IT安全风险评估管理指南_V1.0.doc <span style='color:#111;'> 348.50KB </span>","children":null,"spread":false},{"title":"M-3-7 管理分册-IT安全监控与预警管理指南_V1.0.doc <span style='color:#111;'> 121.50KB </span>","children":null,"spread":false},{"title":"M-3-6 管理分册-IT系统网络接入安全管理指南_V1.0.doc <span style='color:#111;'> 879.00KB </span>","children":null,"spread":false},{"title":"M-3-14 管理分册-IT防病毒管理指南_V1.0.doc <span style='color:#111;'> 113.00KB </span>","children":null,"spread":false},{"title":"M-3-12 管理分册-IT终端安全管理指南_V1.0.doc <span style='color:#111;'> 105.25KB </span>","children":null,"spread":false},{"title":"M-2-4 管理分册-IT系统运维安全管理规范_V1.1.doc <span style='color:#111;'> 196.00KB </span>","children":null,"spread":false},{"title":"M-3-3 管理分册-IT文档安全与信息保护管理指南_V1.1.doc <span style='color:#111;'> 151.50KB </span>","children":null,"spread":false},{"title":"M-3-10 管理分册-IT系统数据备份与恢复管理指南_V1.0.doc <span style='color:#111;'> 268.00KB </span>","children":null,"spread":false},{"title":"M-2-5 管理分册-IT安全检查管理规范_V1.1.doc <span style='color:#111;'> 228.00KB </span>","children":null,"spread":false},{"title":"M-2-2 管理分册-人员信息安全管理规范V1.1.doc <span style='color:#111;'> 111.50KB </span>","children":null,"spread":false},{"title":"M-3-4 管理分册-IT系统上线验收安全管理指南_V1.1.doc <span style='color:#111;'> 1.22MB </span>","children":null,"spread":false},{"title":"M-3-8 管理分册-IT业务连续性管理指南_V1.0.doc <span style='color:#111;'> 294.50KB </span>","children":null,"spread":false},{"title":"M-1-1 IT 管理分册-IT安全管理策略_V1.1.doc <span style='color:#111;'> 208.50KB </span>","children":null,"spread":false},{"title":"M-3-13 管理分册-IT账号权限与密码管理指南_v1.0.doc <span style='color:#111;'> 762.50KB </span>","children":null,"spread":false},{"title":"M-3-2 管理分册-第三方IT安全管理指南_V1.1.doc <span style='color:#111;'> 222.00KB </span>","children":null,"spread":false},{"title":"M-2-3 管理分册-IT系统建设安全管理规范_V1.1.doc <span style='color:#111;'> 144.50KB </span>","children":null,"spread":false},{"title":"M-3-15 管理分册-IT系统安全补丁管理指南_V1.0.docx <span style='color:#111;'> 436.36KB </span>","children":null,"spread":false},{"title":"M-2-1 管理分册-IT安全组织建设管理规范_V1.1.doc <span style='color:#111;'> 306.50KB </span>","children":null,"spread":false},{"title":"M-3-11 管理分册-IT物理环境安全管理指南_V1.0.doc <span style='color:#111;'> 184.50KB </span>","children":null,"spread":false},{"title":"M-3-1 管理分册-员工信息安全管理指南_V1.1.doc <span style='color:#111;'> 250.00KB </span>","children":null,"spread":false},{"title":"M-3-5 管理分册-网络安全域管理指南_V1.1.doc <span style='color:#111;'> 181.50KB </span>","children":null,"spread":false}],"spread":false},{"title":"中国电信IT安全保障体系建设规范总册.doc <span style='color:#111;'> 1.60MB </span>","children":null,"spread":false},{"title":"技术分册","children":[{"title":"T-3-10技术分册-虚拟化与云计算安全应用指南_v1.0.docx <span style='color:#111;'> 736.89KB </span>","children":null,"spread":false},{"title":"T-3-11技术分册-WLAN设备安全功能和配置指南_1.1.docx <span style='color:#111;'> 72.63KB </span>","children":null,"spread":false},{"title":"T-3-7技术分册-网络安全域划分指南_v1.0.docx <span style='color:#111;'> 2.31MB </span>","children":null,"spread":false},{"title":"T-3-8技术分册-应用开发安全指南_v1.0.doc <span style='color:#111;'> 325.00KB </span>","children":null,"spread":false},{"title":"T-3-3(2)技术分册-操作系统安全配置指南-HP-UNIX_v1.0.docx <span style='color:#111;'> 83.38KB </span>","children":null,"spread":false},{"title":"T-3-2(3)技术分册-网络设备安全配置指南-Juniper_v1.0.docx <span style='color:#111;'> 104.69KB </span>","children":null,"spread":false},{"title":"T-3-2(2)技术分册-网络设备安全配置指南-HUAWEI_v1.0.docx <span style='color:#111;'> 87.13KB </span>","children":null,"spread":false},{"title":"T-1-1技术分册-IT系统安全保护要求_V1.1.doc <span style='color:#111;'> 366.00KB </span>","children":null,"spread":false},{"title":"T-2-1技术分册-IT安全管控平台建设规范_V1.1.doc <span style='color:#111;'> 1016.50KB </span>","children":null,"spread":false},{"title":"T-3-3(1)技术分册-操作系统安全配置指南-AIX_v1.0.docx <span style='color:#111;'> 84.73KB </span>","children":null,"spread":false},{"title":"T-3-1技术分册-IT安全技术保护措施应用指南_V1.1.doc <span style='color:#111;'> 2.65MB </span>","children":null,"spread":false},{"title":"T-3-6(2)技术分册-应用中间件安全配置指南-Tomcat__v1.0.docx <span style='color:#111;'> 92.78KB </span>","children":null,"spread":false},{"title":"T-3-4(2)技术分册-数据库安全配置指南-Oracle_v1.0.docx <span style='color:#111;'> 85.28KB </span>","children":null,"spread":false},{"title":"T-3-9技术分册-IT系统网络接入安全技术指南_v1.0.docx <span style='color:#111;'> 106.86KB </span>","children":null,"spread":false},{"title":"T-3-4(1)技术分册-数据库安全配置指南-DB2_v1.0.docx <span style='color:#111;'> 79.54KB </span>","children":null,"spread":false},{"title":"T-3-5技术分册-IT终端安全配置指南_v1.0.docx <span style='color:#111;'> 281.33KB </span>","children":null,"spread":false},{"title":"T-3-3(4)技术分册-操作系统安全配置指南-Solaris_v1.0.docx <span style='color:#111;'> 90.64KB </span>","children":null,"spread":false},{"title":"T-3-6(3)技术分册-应用中间件安全配置指南-WebSphere_v1.0.docx <span style='color:#111;'> 85.72KB </span>","children":null,"spread":false},{"title":"T-3-2(1)技术分册-网络设备安全配置指南-CISCO_v1.0.docx <span style='color:#111;'> 98.63KB </span>","children":null,"spread":false},{"title":"T-3-6(1)技术分册-应用中间件安全配置指南-IIS_v1.0.docx <span style='color:#111;'> 260.55KB </span>","children":null,"spread":false},{"title":"T-3-4(3)技术分册-数据库安全配置指南-Sqlserver_v1.0.docx <span style='color:#111;'> 77.75KB </span>","children":null,"spread":false},{"title":"T-3-3(5)技术分册-操作系统安全配置指南-Windowsv1.0.docx <span style='color:#111;'> 86.09KB </span>","children":null,"spread":false},{"title":"T-3-3(3)技术分册-操作系统安全配置指南-Linux_v1.0.docx <span style='color:#111;'> 84.83KB </span>","children":null,"spread":false}],"spread":false}],"spread":true}],"spread":true}]