19.12.2012 Views

IT Baseline Protection Manual - The Information Warfare Site

IT Baseline Protection Manual - The Information Warfare Site

IT Baseline Protection Manual - The Information Warfare Site

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

Safeguard Catalogue - Organisation Remarks<br />

____________________________________________________________________ .........................................<br />

development team should include representatives of the <strong>IT</strong> users and the <strong>IT</strong><br />

operational team plus one or more additional employees who already<br />

possess sufficient knowledge and experience in matters of <strong>IT</strong> security.<br />

Ideally, a member of Management who is able to assess the importance of<br />

<strong>IT</strong> to the agency/company should be called in from time to time.<br />

Further information on this subject is provided in S 2.193 Establishment of<br />

a suitable organisational structure for <strong>IT</strong> security.<br />

3. Determination of the <strong>IT</strong> security objectives<br />

An assessment should be made at the outset as to what information and<br />

information processing systems contribute towards the accomplishment of<br />

tasks and what value should be attributed to them. To do this, it is<br />

important to classify the information, the technical infrastructure and the <strong>IT</strong><br />

applications of the agency/company. In the context of <strong>IT</strong> security what is<br />

of primary relevance here is the significance of <strong>IT</strong> for the organisation and<br />

its work. <strong>The</strong> strategic and operative importance of <strong>IT</strong> is particularly<br />

critical here. It is therefore important to consider more than just the<br />

material value of the <strong>IT</strong> itself and understand the extent to which the<br />

accomplishment of work within the organisation depends on the use of <strong>IT</strong><br />

and its smooth functioning. To assist in assessing the extent of such<br />

dependence, the following are some of the questions which need to be<br />

considered:<br />

- What critical tasks within the agency/company cannot be performed<br />

at all without <strong>IT</strong> support or can only be partially performed or with<br />

considerable additional effort?<br />

- What essential decisions made within the agency/organisation rely<br />

on the confidentiality, integrity and availability of information and<br />

information processing systems?<br />

- What are the consequences of deliberate or unintentional <strong>IT</strong> security<br />

incidents?<br />

- Are the <strong>IT</strong> assets used to process information which requires<br />

particular protection due to its confidential nature?<br />

- Do major decisions depend on information that is processed using <strong>IT</strong><br />

being correct and up-to-date?<br />

<strong>The</strong> outcome of these deliberations can now be used to specify what degree<br />

of <strong>IT</strong> security is sufficient and reasonable for this particular organisation.<br />

Some example criteria for an assessment of this kind are listed below. <strong>The</strong><br />

importance of <strong>IT</strong>, the specific threat situation and the relevant statutory<br />

requirements play a critical role here. <strong>The</strong> <strong>IT</strong> security level (low, moderate,<br />

high or maximum) which applies will be the one whose defining<br />

statements are the most relevant to the organisation.<br />

Maximum:<br />

- <strong>The</strong> protection of confidential information must be guaranteed and<br />

comply with strict secrecy requirements in critical areas.<br />

- It is critically important that the information is correct.<br />

____________________________________________________________________ .........................................<br />

<strong>IT</strong>-<strong>Baseline</strong> <strong>Protection</strong> <strong>Manual</strong>: Oktober 2000<br />

Classification of <strong>IT</strong><br />

applications

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!