19.12.2012 Views

IT Baseline Protection Manual - The Information Warfare Site

IT Baseline Protection Manual - The Information Warfare Site

IT Baseline Protection Manual - The Information Warfare Site

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

Safeguard Catalogue - Organisation Remarks<br />

____________________________________________________________________ .........................................<br />

<strong>The</strong> <strong>Information</strong> Security Policy must be made available to all the staff<br />

affected by it in a suitable form. By this means, Management can ensure that<br />

there is full visibility of the importance of <strong>IT</strong> security to the organisation.<br />

Full details of this task are provided in S 2.192 Drawing up an <strong>Information</strong><br />

Security Policy.<br />

Step 2: Selection and establishment of an appropriate organisational<br />

structure for <strong>IT</strong> security<br />

If a functioning <strong>IT</strong> security process is to be established, it is essential that an<br />

appropriate organisational framework is created and that the relevant<br />

responsibilities are delegated. <strong>The</strong> choice of such an organisational structure<br />

must reflect the size of the agency or company. This should entail<br />

establishment in a suitable manner of an <strong>IT</strong> Security Management Team<br />

and/or appointment of an <strong>IT</strong> Security Officer. In addition, responsibilities,<br />

tasks and authorities must be assigned in a systematic manner and notified.<br />

This subject is described in more detail in S 2.193 Establishment of a suitable<br />

organisational structure for <strong>IT</strong> security.<br />

Step 3: Preparing a schedule of existing <strong>IT</strong> systems<br />

It is absolutely critical for the <strong>IT</strong> security concept, which is created in Step 4,<br />

that there is a complete schedule of the <strong>IT</strong> systems employed in the company<br />

or agency, the <strong>IT</strong> applications run on them and the data handled thereby. If<br />

such a schedule does not already exist, then it must be drawn up at this stage.<br />

A list of the information that is absolutely essential to the creation of the <strong>IT</strong><br />

security concept will be found in S 2.194 Drawing up a schedule of existing <strong>IT</strong><br />

systems.<br />

Step 4: Definition of the procedure for drawing up the <strong>IT</strong> security<br />

concept<br />

To raise <strong>IT</strong> security to an appropriate level, it is necessary to identify existing<br />

vulnerabilities and to select and implement appropriate <strong>IT</strong> security measures.<br />

A number of possible procedures for ascertaining vulnerabilities and selecting<br />

appropriate measures are available. <strong>The</strong>se include:<br />

- baseline protection analysis following the recommendations contained in<br />

this manual,<br />

- performing a risk analysis based on the <strong>IT</strong> Security <strong>Manual</strong>,<br />

- performing vulnerability analysis in selected areas (e.g. networking) and<br />

- penetration testing.<br />

As well as deciding on the methodical approach, a decision must be made as<br />

to the sequence in which existing <strong>IT</strong> provision will be examined and to what<br />

extent.<br />

In general it should be noted that standard security measures consistent with<br />

<strong>IT</strong> baseline protection are also essential to <strong>IT</strong> systems with a high protection<br />

requirement. A further consideration is that where high security systems are in<br />

use, any standard security measures employed are likely to need to be<br />

supplemented by more stringent measures. When selecting the approach, it<br />

____________________________________________________________________ .........................................<br />

<strong>IT</strong>-<strong>Baseline</strong> <strong>Protection</strong> <strong>Manual</strong>: Oktober 2000

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!