19.12.2012 Views

IT Baseline Protection Manual - The Information Warfare Site

IT Baseline Protection Manual - The Information Warfare Site

IT Baseline Protection Manual - The Information Warfare Site

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

Safeguard Catalogue - Organisation Remarks<br />

____________________________________________________________________ .........................................<br />

S 2.183 Performing a RAS requirements analysis<br />

Initiation responsibility: Head of <strong>IT</strong> Section, <strong>IT</strong> Security Management<br />

Implementation responsibility: Administrators<br />

Before a system is used for remote access, a requirements analysis should be<br />

performed. <strong>The</strong> aim of the requirements analysis is, firstly, to determine all the<br />

operational scenarios likely to occur in the specific case and, secondly, to<br />

derive from these the requirements for the hardware and software components<br />

that will be needed. If practical scenarios are drawn up and "acted out", any<br />

special requirements can be identified, so that any corresponding requirements<br />

(critical criteria) as regards the RAS system architecture or the RAS software<br />

can be formulated.<br />

<strong>The</strong> issues to be clarified in the course of the requirements analysis include the<br />

following:<br />

- Which users will have RAS access (teleworkers, employees working out in<br />

the field, employees on business trips)?<br />

- Are any mobile users to have RAS access?<br />

- For what purpose will RAS access be used in each case (to retrieve<br />

information, upload information, use programs)?<br />

- Will the remote users need to access the entire LAN, i.e. all the data and<br />

services available there?<br />

- Will special software products need to be accessed remotely?<br />

- Will special protocols need to be used during RAS access?<br />

- From which (remote) locations will remote access be required (national,<br />

international)?<br />

- Which telecommunications access technologies may be used (fixed<br />

network, mobile phone, Internet)?<br />

<strong>The</strong> requirements for the planned scenarios should be documented and agreed<br />

with network administrators and technical staff. <strong>The</strong>se requirements will then<br />

determine how one proceeds from here (architecture, procurement, use).<br />

Additional controls:<br />

- Has a RAS requirements analysis been performed?<br />

- Have all the special requirements which are specific to the local<br />

circumstances been captured?<br />

- Has the list of requirements been agreed with the network administrators<br />

and technical staff?<br />

____________________________________________________________________ .........................................<br />

<strong>IT</strong>-<strong>Baseline</strong> <strong>Protection</strong> <strong>Manual</strong>: Oktober 2000

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!