China Unicom and its partners released the "White Paper on Trusted Networks"​

2023.07.13

China Unicom and its partners released the "White Paper on Trusted Networks"​


As the digital transformation of enterprises accelerates, the exposure of network security boundaries continues to expand, which greatly increases the complexity of network security protection. At the same time, network security incidents of domestic and foreign operators, enterprises and governments occur frequently, causing major economic losses and serious international impact.

On July 9, 2023, China United Network Communications Group Co., Ltd. (hereinafter referred to as China Unicom), together with the China Academy of Information and Communications Technology (hereinafter referred to as ICT), and Huawei Technologies Co., Ltd. (hereinafter referred to as Huawei) officially released the "Trusted Network Policy" in Beijing. "White Paper", released for the first time the definition of trusted network, target architecture, capability requirements, and development ideas. It is also hoped that through this release, the consensus of all parties in the industry will be consolidated, and integration will drive the industry to work together for the development of China's trusted network industry.

The theme of the press conference is "Building a trusted network standard system and strengthening the national network security barrier". Zhang Yong, chairman of Consulting Design Institute Co., Ltd., Wang Zhigang, vice president of Huawei's data communication product line, and other leaders attended the conference and delivered speeches. At the press conference, China Unicom and relevant industry experts were invited to share their themes and introduce research ideas and results related to trusted networks.

In recent years, with the accelerated digital transformation of enterprises, the exposure of network security boundaries has continued to expand, which has greatly increased the complexity of network security protection. At the same time, network security incidents of domestic and foreign operators, enterprises and governments occur frequently, causing major economic losses and serious international impact. Under this situation, network security has risen to the level of national strategy. From the "Network Security Law" to the "Network Security Level Protection System 2.0 Standard", "Critical Information Infrastructure Security Protection Regulations" and other legal levels, network security management requirements have been put forward. . However, the current CT security standards are relatively lagging behind, and the CT security industry still adopts the IT management model, which is weakly adapted to scenarios and cannot meet the rapidly developing business security requirements.

This white paper clarifies that "trusted network" refers to the integration of secure and trusted technologies into network infrastructure solutions, the construction of endogenous security capabilities of the network, the transmission and verification of digital entity trust relationships, and the continuous monitoring and monitoring of network behaviors. Management and control, traceability and disposal of business exceptions, so as to achieve a network with predictable results. At the same time, the overall structure of "trusted network" with trusted equipment, network and management and control has been formulated, and the overall goal of the development of "trusted network" has been clarified:

Device trustworthiness: Device trustworthiness is the basis for ensuring the security and trustworthiness of network infrastructure. Through the construction of key capabilities such as software and hardware, the construction of endogenous security and full lifecycle protection is realized. Software "zero" tampering, data "zero" leakage, and security situational awareness;

Network trustworthiness: Network trustworthiness is the guarantee of trust. Based on equipment trustworthiness, through the construction of key network capabilities, all-round network trustworthiness in routing, business and protocols, "zero" hijacking of routes, "zero" counterfeiting of protocols, Active identification of network attacks;

Credible management and control: Trustworthy management and control is the brain of equipment and network security. Through the construction of key management and control capabilities, integrated network security protection, network-wide monitoring, and joint defense and joint control are realized. Users have "zero" trust and "zero" misconfiguration of operations. Threat handling is self-closing.

As the leader of the network security industry chain, China Unicom is willing to work with partners in the industry chain to promote the development of trusted networks, establish a trusted network ecosystem, work together, carry forward the past and forge ahead, and provide services for escorting the safe development of the digital economy and realizing Chinese-style modernization Strong floor, make due contribution!