19.12.2012 Views

IT Baseline Protection Manual - The Information Warfare Site

IT Baseline Protection Manual - The Information Warfare Site

IT Baseline Protection Manual - The Information Warfare Site

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

Safeguard Catalogue - Organisation Remarks<br />

____________________________________________________________________ .........................................<br />

S 2.191 Establishment of the <strong>IT</strong> security process<br />

Initiation responsibility: Agency/company management<br />

Implementation responsibility: Agency/company management<br />

<strong>The</strong> enforcement and maintenance of a reasonable and adequate level of <strong>IT</strong><br />

security for a complex set of <strong>IT</strong> assets requires planned and organised action<br />

on the part of all those involved. Strategic key statements must be prepared,<br />

design requirements worked out and the organisational framework established<br />

to enable the company or agency to function with proper and secure <strong>IT</strong><br />

support. A controlled <strong>IT</strong> security process which will lay the groundwork for<br />

the thoughtful design and efficient implementation and success monitoring of<br />

<strong>IT</strong> security measures is initiated by Management.<br />

As the highest echelons of Management are not only responsible generally for<br />

the systematic and proper functioning of an organisation but also for<br />

guaranteeing <strong>IT</strong> security, the <strong>IT</strong> security process must be initiated, directed<br />

and monitored from that level. Ideally, the following specific conditions<br />

should be satisfied:<br />

- <strong>The</strong> initiative for <strong>IT</strong> security should originate from Management.<br />

- Responsibility for <strong>IT</strong> security should reside there.<br />

- <strong>The</strong> "<strong>IT</strong> security" function should be actively supported by Management.<br />

If this framework does not exist in a given situation, as a first step an attempt<br />

should be made to implement the missing <strong>IT</strong> security measures at "shopfloor"<br />

level. In all cases, however, every attempt should be made to make<br />

Management aware of the importance of <strong>IT</strong> security to ensure that it takes its<br />

responsibility in this area seriously. Although many aspects of the <strong>IT</strong> security<br />

process can be initiated on the shopfloor and will result in an improvement in<br />

the security situation; there is no guarantee that such actions will lead to a<br />

permanent raising of the <strong>IT</strong> security level.<br />

<strong>The</strong> establishment of a functional <strong>IT</strong> security process can be achieved through<br />

the following steps:<br />

Step 1: Drawing up of an <strong>Information</strong> Security Policy<br />

A set of <strong>IT</strong> security objectives that are derived from the overriding business<br />

objectives, marketing strategy and the general security objectives of the<br />

company or agency should be defined. <strong>The</strong> greater the dependence of the<br />

organisation on the use of <strong>IT</strong> and the operational capability provided through<br />

<strong>IT</strong>, the more important it is to consider the <strong>IT</strong> security objectives at all levels<br />

of the organisation.<br />

<strong>The</strong> <strong>Information</strong> Security Policy should be based on the <strong>IT</strong> security objectives<br />

agreed at Management level. It should define the internal organisational<br />

structures, guidelines, rules and procedures which are necessary to achieve the<br />

<strong>IT</strong> security goals. Depending on the size of the organisation, it may be<br />

appropriate in addition to the enterprise-wide <strong>Information</strong> Security Policy to<br />

prepare one (or more) sets of departmental or site-specific information<br />

security policy documents derived therefrom.<br />

____________________________________________________________________ .........................................<br />

<strong>IT</strong>-<strong>Baseline</strong> <strong>Protection</strong> <strong>Manual</strong>: Oktober 2000<br />

Optimal framework<br />

Alternatives

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!