信息系统安全等级保护基本要求1三级基本要求..............................................................1.1技术要求................................................................1.1.1物理安全..............................................................物理位置的选择(G3).........................................................物理访问控制(G3)...........................................................防盗窃和防破坏(G3).........................................................防雷击(G3).................................................................防火(G3)...................................................................防水和防潮(G3).............................................................防静电(G3).................................................................温湿度控制(G3).............................................................电力供应(A3)...............................................................电磁防护(S3)...............................................................1.1.2网络安全..............................................................结构安全(G3)...............................................................访问控制(G3)...............................................................安全审计(G3)...............................................................边界完整性检查(S3).........................................................入侵防范(G3)...............................................................恶意代码防范(G3)...........................................................网络设备防护(G3)...........................................................1.1.3主机安全..............................................................身份鉴别(S3)...............................................................访问控制(S3)...............................................................安全审计(G3)...............................................................剩余信息保护(S3)...........................................................入侵防范(G3)...............................................................恶意代码防范(G3)...........................................................资源控制(A3)...............................................................1.1.4应用安全..............................................................身份鉴别(S3)...............................................................访问控制(S3)...............................................................安全审计(G3)...............................................................剩余信息保护(S3)...........................................................通信完整性(S3).............................................................通信保密性(S3).............................................................抗抵赖(G3).................................................................软件容错(A3)...............................................................资源控制(A3)...............................................................1.1.5数据安全及备份恢复....................................................数据完整性(S3).............................................................数据保密性(S3).............................................................备份和恢复(A3).............................................................1.2管...