19.12.2012 Views

IT Baseline Protection Manual - The Information Warfare Site

IT Baseline Protection Manual - The Information Warfare Site

IT Baseline Protection Manual - The Information Warfare Site

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

Safeguard Catalogue - Organisation Remarks<br />

____________________________________________________________________ .........................................<br />

Maximum<br />

Financial outlay<br />

[Aufwand]<br />

Figure: Cost-benefit trade-off for <strong>IT</strong> security<br />

After the overall security level for the agency/company has been specified<br />

using the approach described above, the <strong>IT</strong> security objectives which go<br />

with that security level must be defined.<br />

Examples of possible <strong>IT</strong> security objectives are listed below:<br />

- ensuring the high reliability of actions, particularly with regard to<br />

deadlines (<strong>IT</strong> availability is required here), correctness (the integrity<br />

of the <strong>IT</strong>) and confidentiality;<br />

- ensuring the good reputation of the institution in the eyes of the<br />

public;<br />

- preserving the value of the investment in technology, information,<br />

work processes and knowledge;<br />

- protecting the high and possibly irretrievable value of information<br />

processed;<br />

- protecting the quality of information, e.g. where it serves as the basis<br />

for major decisions;<br />

- satisfying the requirements resulting from statutory provisions;<br />

- reducing the costs arising in the event of damage (through both<br />

avoidance and prevention of damage), and<br />

- ensuring the continuity of the work processes within the<br />

organisation.<br />

<strong>The</strong> individual <strong>IT</strong> security objectives can be implemented in different<br />

ways. In this connection general <strong>IT</strong> security strategies should be developed.<br />

Some examples of possible <strong>IT</strong> security strategies are:<br />

- rigorous data backups in all <strong>IT</strong> areas,<br />

- strict encryption of all information leaving the organisation,<br />

- use of strong authentication procedures for all accesses to <strong>IT</strong><br />

systems,<br />

- isolation of particularly sensitive <strong>IT</strong> applications on stand-alone <strong>IT</strong><br />

systems.<br />

<strong>The</strong>se general <strong>IT</strong> security objectives and strategies apply to most<br />

organisations working with <strong>IT</strong> support. In order to determine the specific<br />

<strong>IT</strong> security objectives and <strong>IT</strong> security strategies of an organisation, it is<br />

essential to express these objectives in relation to the work and projects<br />

carried out in the organisation.<br />

Example: Where person related data which falls within the ambit of the<br />

Data Privacy Act is handled (e.g. in Human Resources), the requirements<br />

regarding confidentiality and integrity specified in that Act must be<br />

____________________________________________________________________ .........................................<br />

<strong>IT</strong>-<strong>Baseline</strong> <strong>Protection</strong> <strong>Manual</strong>: Oktober 2000<br />

<strong>IT</strong> security objectives<br />

<strong>IT</strong> security strategies<br />

Specific requirements

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!