Unofficial translation
In accordance with paragraph 3 of Article 141 and paragraph 1 of Article 143 of the Entrepreneurial Code of the Republic of Kazakhstan dated October 29, 2015, WE HEREBY ORDER:
1. To approve:
1) Excluded by joint order of the Minister of Digital Development, Innovation and Aerospace Industry of the Republic of Kazakhstan dated 20.01.2023 № 21/NҚ and the Minister of National Economy of the Republic of Kazakhstan dated 23.01.2023 № 8 (shall enter into force dated 01.01.2023).2) Excluded by joint order of the Minister of Digital Development, Innovation and Aerospace Industry of the Republic of Kazakhstan dated 20.01.2023 № 21/NҚ and the Minister of National Economy of the Republic of Kazakhstan dated 23.01.2023 № 8 (shall enter into force dated 01.01.2023).
3) a checklist in the field of informatization in terms of ensuring information security in relation to state legal entities, entities of the quasi-public sector, possessors and owners of non-state information systems that are integrated with information systems of state bodies or intended to form state electronic information resources, as well as possessors and owners of critically important objects of information and communication infrastructure in accordance with Appendix 3 to this joint order.
2. The Committee on Information Security of the Ministry of Defense and Aerospace Industry of the Republic of Kazakhstan, in the manner prescribed by the legislation of the Republic of Kazakhstan, to ensure:
1) state registration of this joint order in the Ministry of Justice of the Republic of Kazakhstan;
2) within ten calendar days from the date of registration of this joint order, its sending in the Kazakh and Russian languages to the Republican state enterprise on the basis of the right of economic management “Republican Legal Information Center” for official publication and inclusion in the Reference Control Bank of regulatory legal acts of the Republic of Kazakhstan;
3) placement of a copy of this joint order on the Internet resource of the Ministry of Defense and Aerospace Industry of the Republic of Kazakhstan.
3. The supervising vice minister of the defense and aerospace industry of the Republic of Kazakhstan shall be authorized to oversee the execution of this joint order.
4. This joint order shall come into force upon expiry of ten calendar days after the day of its first official publication.
Deputy Prime Minister of the | |
Republic of Kazakhstan – | |
Minister of defense and aerospace | |
industry of the Republic of Kazakhstan | ____________ A. Zhumagaliyev |
Minister of national economy of the | |
Republic of Kazakhstan | ___________ T. Suleimenov |
"AGREED"
Committee for legal statistics and
special accounting of the
General Prosecutor’s Office of the
Republic of Kazakhstan
Appendix 1 to the joint order of the Deputy Prime Minister of the Republic of Kazakhstan – Minister of defense and aerospace industry of the Republic of Kazakhstan dated January 29, 2019 № 13/НҚ and Minister of national economy of the Republic of Kazakhstan dated January 29, 2019 № 12 |
Risk assessment criteria in the field of informatization in terms
of ensuring information security
Footnote. Annex 1 recognized as invalid by joint order of the Minister of Digital Development, Innovation and Aerospace Industry of the Republic of Kazakhstan dated 20.01.2023 № 21/NҚ and the Minister of National Economy of the Republic of Kazakhstan dated 23.01.2023 № 8 (shall enter into force dated 01.01.2023).
Appendix 2 to the joint order of the Deputy Prime Minister of the Republic of Kazakhstan – Minister of defense and aerospace industry of the Republic of Kazakhstan dated January 29, 2019 № 13/НҚ and Minister of national economy of the Republic of Kazakhstan dated January 29, 2019 № 12 |
Checklist in the field of informatization in terms of ensuring information security in relation
to the state and local executive bodies
Footnote. Annex 1 recognized as invalid by joint order of the Minister of Digital Development, Innovation and Aerospace Industry of the Republic of Kazakhstan dated 20.01.2023 № 21/NҚ and the Minister of National Economy of the Republic of Kazakhstan dated 23.01.2023 № 8 (shall enter into force dated 01.01.2023).
Appendix 3 to the joint order of the Deputy Prime Minister of the Republic of Kazakhstan – Minister of defense and aerospace industry of the Republic of Kazakhstan dated January 29, 2019 № 13/НҚ and Minister of national economy of the Republic of Kazakhstan dated January 29, 2019 № 12 |
Checklist in the sphere of informatization regarding ensuring information security
_________________________________________________________________
pursuant to Article 138
Footnote. Annex 3 - as amended by the joint order of the Minister of Digital Development, Innovation and Aerospace Industry of the Republic of Kazakhstan dated 20.01.2023 № 21/NҚ and the Minister of National Economy of the Republic of Kazakhstan dated 23.01.2023 № 8 shall enter into force dated 01.01.2023).
__________________________________________________________________
Entrepreneurial Code of the Republic of Kazakhstan
in relation to: state legal entities, entities
quasi-public sector, owners and owners of non-state
information systems integrated with information systems
state bodies or intended for the formation of state
electronic information resources, as well as owners and proprietors
Critical Information and Communications Infrastructure
____________________________________________________________________
name of a homogeneous group of control subjects (objects)
____________________________________________________________________
____________________________________________________________________
The state body that appointed the audit __________________________
____________________________________________________________________
Inspection Assignment Certificate ____________________________________________
№, date
Name of the subject (object) of control ______________________________
(Individual Identification Number), Business Identification Number
subject (object) of control ___________________________________________
Address of residence ______________________________________________
№ | Requirement list | Conforms to requirements | Does not meet the requirements |
1 | 2 | 3 | 4 |
1 | Compliance with the requirement to connect local, departmental and corporate telecommunication networks of state bodies, local executive body, state legal entities, entities of the quasi-public sector, as well as owners of critical information and communication infrastructure (hereinafter referred to as ICI) to the Internet by telecom operators through a unified gateway to the Internet | ||
2 | Compliance with the requirement to notify the owner of critical information and communication infrastructure facilities of the National coordination center for information security about information security incidents and the results of response to them | ||
3 |
Compliance with the requirements for the use of means: | ||
4 | Compliance with the requirements for information security monitoring, protection and safe functioning during operation of informatization objects | ||
5 | Availability of anti-virus tools, updates of operating systems on workstations connected to the Internet when organizing access to the Internet from local networks of the outer outline | ||
6 | Availability of information security subdivision, which shall be a structural subdivision separated from other structural subdivisions dealing with the creation, maintenance and development of informatization objects, or determination of an official responsible for information security, with the passage of specialized courses in the field of information security at least once every three years with the issuance of a certificate | ||
7 |
Availability and compliance with regulatory and technical documentation (hereinafter referred to as TD) on information security, in the form of a four-level system of documented rules, procedures, practices or guidelines that guide state bodies (hereinafter referred to as the SB), local executive body (hereinafter referred to as the LEB) or organization in its activities. | ||
8 | Compliance with the requirements for access to informatization objects of the first and second classes in accordance with the classifier for the use of multifactor authentication, including using an electronic digital signature | ||
9 | Compliance with the requirement to include in the job descriptions and (or) the terms of the employment contract functional duties to ensure IS and obligations to fulfill the requirements of the IS TD of the employees of the civil defense, LEB or employees of the organization | ||
10 | Compliance with CIPT application requirements | ||
11 | Compliance with the requirements for storage, restoration of state electronic information resources contained in the information system, safety of state electronic information resources | ||
12 |
Compliance with the requirements for information security of information resources (hereinafter referred to as the IS IR) for use | ||
13 | Compliance with the requirement for the use of registration certificates to verify the authenticity of the domain name and cryptographic protection of the contents of the communication session using CIPT when ensuring IS IR | ||
14 |
Compliance with requirements of management identification when using virtualization technology | ||
15 |
Compliance with the requirement to audit information security events when using virtualization technology: | ||
16 |
Compliance with the requirement for registration of information security events when using virtualization technology: | ||
17 |
Compliance with the requirements for the implementation of network and system administration procedures: | ||
18 | Compliance with the requirements ensuring storage systems by backup system | ||
19 | Compliance with the requirements for the use of software and hardware for information protection, including cryptographic encryption, using CIPT when organizing a dedicated communication channel connecting local networks | ||
20 | Compliance with the requirement to exclude interfacing of the internal loop local network and the external loop local network with each other, with the exception of organized communication channels using CIPT | ||
21 |
Compliance with the use requirement of | ||
22 | Availability of uninterruptible power supply for active equipment of local networks | ||
23 | Compliance with the requirement to physically disconnect unused local network cabling ports from active equipment | ||
24 | Compliance with the requirement for the use of firewalling | ||
25 |
Availability of documentation during technical support of equipment installed in the server room: | ||
26 |
Availability of access control and management system in the server room providing authorized entrance to the server room and authorized exit from it. Barriers and the design of the front door shall prevent access identifiers from being transmitted backwards through the front door vestibule. | ||
27 | Availability of up-to-date list of individuals authorized to maintain ICI objects installed in the server room | ||
28 |
Availability of a microclimate support system in the server room: | ||
29 |
Availability of security alarm system in the server room: | ||
30 |
Availability of video surveillance system in the server room: | ||
31 |
Availability of fire alarm system in the server room: | ||
32 |
Availability of fire extinguishing system in the server room: | ||
33 |
Availability of a guaranteed power supply system in the server room: | ||
34 |
Availability of grounding system in the server room: | ||
35 | Absence of powerful sources of electromagnetic interference (transformers, electric boards, electric motors, etc.) in the marshalling yard | ||
36 | Absence of pipes and valves of the water supply system in the marshalling room | ||
37 | Availability of fire safety systems in the marshalling room | ||
38 | Absence of easily ignitable materials (wooden racks, cardboard, books, etc.) in the marshalling room | ||
39 | Availability of a separate power supply line from a separate circuit breaker in the marshalling room for connection of the cabinet under the project | ||
40 | Availability of intrusion alarm systems, access control systems in the cross room | ||
41 | Availability of air conditioning system in the marshalling area | ||
42 |
At the stage of experimental and industrial operation of informatization objects, the following means and systems shall be used: | ||
43 | Compliance with the requirements for the creation of its own information security operations center and ensuring its functioning or the acquisition of information security operations center services from third parties, as well as its interaction with the National information security coordination center | ||
44 |
Compliance with the requirement for placement on the Internet resource with the registered domain name .KZ and (or) KAZ on the hardware and software complex, which shall be located in the Republic of Kazakhstan. | ||
45 | Compliance with the requirement to conduct a regular inventory of server equipment with verification of its configuration | ||
46 |
Compliance with the requirements for the purchase of goods in order to implement the requirements for ensuring information security for the country's defense and state security from the register of trusted software and electronic industry products. | ||
47 |
Compliance with the requirements for monitoring information security violation events in the civil defense, individual training center or organization: | ||
48 | The existence of an agreement that shall establish the conditions for the operation, access or use of these objects, as well as responsibility for their violation when involving third-party organizations in ensuring the information security of EIR, IS, ICI | ||
49 | Compliance with the requirements when dismissing or introducing amendments the conditions of the employment contract of the right of access of an employee of the Civil Defense, MO or employee of the organization to information and information processing means, including physical and logical access, access identifiers, subscriptions, documentation that shall identify him as an active SB employee, LEB or an employee of the organization are canceled after the termination of his employment contract or change when amending the terms of the employment contract | ||
50 | Compliance with the requirements of the personnel department of the organization and keeping records of the passage of training in the field of informatization and information security by employees of the SB, LEB or employees of organizations | ||
51 |
Compliance with the requirement to register with the computer incident response service of the state technical service of events identified as critical for confidentiality, accessibility and integrity | ||
52 | Compliance with the requirement to conduct an IS audit at least once a year, to owners of critical ICI facilities that process data containing legally protected secrets, with the exception of second-tier banks | ||
53 | Compliance with the requirement when writing off the IS, software or service software product to ensure the preservation of the structure and content of the database through the built-in functionality of the database management system of the decommissioned IS with the preparation of instructions for the restoration of the EIR | ||
54 | Availability of certificate with positive test result for compliance with information security requirements | ||
55 |
Compliance with the requirement to ensure the development or purchase of finished application software | ||
56 |
Compliance with monitoring requirements: | ||
57 | Compliance with the requirement to provide the developed or purchased ready-made application software with technical documentation for operation in Kazakh and Russian languages | ||
58 |
Meet embedded server high availability requirements: | ||
59 | Availability of software and hardware for guaranteed destruction of information during decommissioning of information carriers used in confidential ISs, confidential AIRs and EIRs containing personal data of limited access | ||
60 | Availability of local network diagram | ||
61 | Availability of hardware and software complex and data storage system in server room | ||
62 |
Compliance with the requirement for the location of the server room in separate, impassable rooms without window openings. If there are window openings, they are closed or closed with non-combustible materials. | ||
63 | Availability of false floor and/or false ceiling in the server room for placement of cable systems and utilities | ||
64 | Compliance with the requirement to exclude any transit communications through the server room. Normal and fire water, heating and sewerage routes shall be located outside the server room and shall not be located above the server room on the upper floors | ||
65 | Compliance with the requirement to locate the main and backup server rooms at a safe distance in remote buildings. Redundant server room requirements shall be identical to primary server room requirements | ||
66 | Compliance with the requirement to exclude placement in a server room in one virtual environment, one server equipment, one mounting cabinet or rack of EIR, IR, MSR, IS related in accordance with the classifier of informatization objects of the first class with informatization objects of the second and third class |
Official (s)
_________________________________ ____________
position
signature
______________________________________________
full name (if any)
Head of control subject
___________________________________ ___________
position
signature
_______________________________________________
full name (if any)