Customers: Information city (State Budgetary Institution Infogorod)
Contractors: Corp Soft (CorpSoft24) Product: Complex projects on information securityProject date: 2020/02 - 2020/08
|
2020: Creation of an information security system of uniform cryptographic service of Moscow
On September 21, 2020 it became known that CorpSoft24 developed an information security system of uniform cryptographic service of Moscow for GKU "Information City".
The information system "Uniform Cryptographic Service" (IC EKS) allows to create and check the electronic signatures used for electronic document management in information systems of Moscow.
Among them — the portal of the public and municipal services, the website of the mayor and the city government, a uniform medical information and analytical system of Moscow and others.
Problem of the information security system developed by CorpSoft24 to provide confidentiality, integrity and availability of the processed data.
The project turned out dynamic and difficult because of strict requirements of the legislation, large volume of the documents and restrictions connected with a pandemic. Nevertheless, we managed to fulfill all obligations in time and to provide compatibility of all means of protecting — Konstantin Renzyaev, the CEO of Corpsoft24 told. |
According to him, the system of protection should provide confidentiality, integrity and data availability, processed in the IC EC, due to neutralization of relevant threats and also to conform to requirements of the current legislation of the Russian Federation in the field of data protection.
The company told that works were performed in three stages: updating of security requirements of information, creation of a system and certification of the IC EKS for security requirements of data.
At the first stage the analysis of compliance of project solutions ICs EKS, structure and technologies of information processing was carried out to the IC EKS to relevant requirements for data protection, requirements to measures and means of protecting are defined.
At the second stage the engineering design of an information security system was created. Then installation and a commissioning of information security tools was performed, trial operation, the analysis of vulnerabilities and acceptance tests are carried out.
At the third stage of the project certification of an information system for security requirements of information was made.