19.12.2012 Views

IT Baseline Protection Manual - The Information Warfare Site

IT Baseline Protection Manual - The Information Warfare Site

IT Baseline Protection Manual - The Information Warfare Site

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

<strong>IT</strong> <strong>Baseline</strong> <strong>Protection</strong> of Generic Components Crypto-concept<br />

_________________________________________________________________________________________<br />

Organisational shortcomings:<br />

- T 2.1 Lack of, or insufficient, rules<br />

- T 2.2 Insufficient knowledge of requirements documents<br />

- T 2.4 Insufficient monitoring of <strong>IT</strong> security measures<br />

- T 2.19 Inadequate key management for encryption<br />

Human Failure:<br />

- T 3.1 Loss of data confidentiality/integrity as a result of <strong>IT</strong> user error<br />

- T 3.32 Violation of basic legal conditions for the use of cryptographic procedures<br />

- T 3.33 Improper use of cryptomodules<br />

Technical Failure:<br />

- T 4.22 Software vulnerabilities or errors (here: poor encryption methods)<br />

- T 4.34 Failure of a cryptomodule<br />

- T 4.35 Insecure cryptographic algorithms<br />

- T 4.36 Mistakes in encoded data<br />

Deliberate Acts:<br />

- T 5.81 Unauthorised use of a cryptomodule<br />

- T 5.82 Manipulation of a cryptomodule<br />

- T 5.83 Compromising cryptographic codes<br />

- T 5.84 Forged certificates<br />

Recommended Countermeasures (S)<br />

For the implementation of <strong>IT</strong> baseline protection, selection of the required packages of safeguards<br />

("modules"), as described in chapters 2.3 and 2.4, is recommended.<br />

For cryptographic procedures essentially the following additional steps have to be taken:<br />

1. Develop a crypto-concept (see S 2.161)<br />

<strong>The</strong> use of cryptographic procedures is determined by a large number of influencing factors. <strong>The</strong>se<br />

factors include the <strong>IT</strong> system, the volume of data, the desired level of protectionn and the demands<br />

on availability. For this reason, a concept should first be developed which takes into account all<br />

influencing factors and criteria which determine the choice of a particular cryptographic procedure<br />

and the corresponding products. At the same time, this concept should be economically feasible.<br />

2. Determine the requirements that the cryptographic procedure has to meet<br />

A requirement catalogue must be created which describes the influencing variables and the<br />

decision criteria on which the use of cryptographic procedures are based (see S 2.162 Determining<br />

the need to use cryptographic procedures and products and S 2.163 Determining the factors<br />

influencing cryptographic procedures and products). Cryptographic procedures can be used on the<br />

various layers of the ISO/OSI model. According to the specified demands or threats, it is<br />

recommended to use the procedure on particular layers (see also S 4.90 Use of cryptographic<br />

procedures on the various layers of the ISO/OSI reference model).<br />

_________________________________________________________________________________________<br />

<strong>IT</strong>-<strong>Baseline</strong> <strong>Protection</strong> <strong>Manual</strong>: Otober 2000

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!