19.12.2012 Views

IT Baseline Protection Manual - The Information Warfare Site

IT Baseline Protection Manual - The Information Warfare Site

IT Baseline Protection Manual - The Information Warfare Site

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

Safeguard Catalogue - Organisation Remarks<br />

____________________________________________________________________ .........................................<br />

should be noted that little prior knowledge is needed to implement the<br />

methodology used to establish baseline <strong>IT</strong> protection. On the other hand, a<br />

high level of specialist knowledge is needed for detailed risk analyses, and<br />

especially to identify vulnerabilities and safeguards that will protect against<br />

them.<br />

<strong>The</strong> BSI therefore recommends that any baseline <strong>IT</strong> protection safeguards<br />

which are not already in place should be implemented for all <strong>IT</strong> systems and<br />

that, in parallel, a detailed security analysis should be performed for those<br />

elements which require a high level of protection. In this way, a<br />

comprehensive level of <strong>IT</strong> security can be achieved in a relatively short time,<br />

so that even during the transition period up to the point where the detailed<br />

security analyses have been completed any <strong>IT</strong> systems which have a high<br />

protection requirement will have a certain degree of protection.<br />

<strong>The</strong> procedure to be followed in drawing up a security concept is described in<br />

detail in S 2.195 Drawing up an <strong>IT</strong> security concept.<br />

Step 5: Implementation of <strong>IT</strong> security measures<br />

<strong>The</strong> implementation of the <strong>IT</strong> security measures identified during the process<br />

of drawing up the <strong>IT</strong> security concept must be organised and specified in an<br />

implementation plan. This will serve as a planning tool when it comes to coordinating<br />

implementation of the measures and as a control instrument to be<br />

used during actual implementation. All the actions and responsibilities<br />

necessary to update or implement security measures should be specified in<br />

writing in this plan.<br />

Once implementation is complete, it is necessary to establish in every case<br />

whether all the measures have been implemented in accordance with plan and<br />

"work" as intended. During testing of the effectiveness of these measures, it<br />

may be sufficient to perform spot checks in previously determined areas.<br />

<strong>The</strong> procedure to be followed in preparing an implementation plan for <strong>IT</strong><br />

security measures and their implementation is described in S 2.196<br />

Implementation of the <strong>IT</strong> security concept in accordance with an<br />

implementation plan.<br />

Step 6: <strong>IT</strong> security in ongoing operations<br />

In order that an <strong>IT</strong> security concept can be effective in everyday operations, it<br />

is necessary that all employees of a company or agency correctly implement<br />

the measures which affect them, identify any remaining vulnerabilities and<br />

play an active role in eliminating these. This requires that all staff receive<br />

adequate training on <strong>IT</strong> security issues and that steps are taken to ensure that<br />

their awareness of the risks and of the possibilities for improvement during<br />

ongoing operations is built up and continually enhanced. <strong>The</strong>se points are also<br />

essential to staff acceptance of the <strong>IT</strong> security measures.<br />

Safeguards S 2.197 Drawing up a training concept for <strong>IT</strong> security and<br />

M 2.198 Making staff aware of <strong>IT</strong> security issues present principles and<br />

possible approaches for achieving this objective.<br />

Step 7: Maintaining secure operations<br />

____________________________________________________________________ .........................................<br />

<strong>IT</strong>-<strong>Baseline</strong> <strong>Protection</strong> <strong>Manual</strong>: Oktober 2000

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!