19.12.2012 Views

IT Baseline Protection Manual - The Information Warfare Site

IT Baseline Protection Manual - The Information Warfare Site

IT Baseline Protection Manual - The Information Warfare Site

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

Safeguard Catalogue - Organisation Remarks<br />

____________________________________________________________________ .........................................<br />

<strong>IT</strong> Co-ordination<br />

Committee<br />

<strong>IT</strong> user<br />

representatives<br />

____________________________________________________________________ .........................................<br />

<strong>IT</strong>-<strong>Baseline</strong> <strong>Protection</strong> <strong>Manual</strong>: Oktober 2000<br />

Agency /<br />

Company<br />

Management<br />

<strong>IT</strong> Security<br />

Officer<br />

Project / System<br />

<strong>IT</strong> Security<br />

Officer<br />

<strong>Information</strong><br />

Security<br />

Policy and<br />

procedures<br />

Entire organisation<br />

Specific systems/projects<br />

Project /<br />

System<br />

<strong>Information</strong><br />

Security Policy<br />

and procedures<br />

Figure 2: Organisational structure of <strong>IT</strong> security management in a mediumsized<br />

organisation<br />

<strong>IT</strong> Officer<br />

Agency /<br />

Company<br />

Management<br />

<strong>IT</strong> Security<br />

Officer<br />

<strong>Information</strong><br />

Security Policy<br />

and<br />

procedures<br />

Figure 3: Organisational structure of <strong>IT</strong> security management in a small<br />

organisation<br />

At this point it should be made clear that these central roles do not necessarily<br />

have to be performed by more than one person. Staffing arrangements should<br />

reflect the size of the organisation concerned, the existing resources and the<br />

aspired-to level of <strong>IT</strong> security. On the other hand, it should be emphasised that<br />

<strong>IT</strong> security comes at a price. Those in positions of responsibility must have<br />

sufficient resources at their disposal so that they can devote sufficient effort to<br />

the "<strong>IT</strong> security" task. This will have more than paid for itself if there are<br />

fewer damaging incidents due to lack of security provision.<br />

<strong>IT</strong> security management tasks, responsibility and authority<br />

<strong>The</strong> <strong>IT</strong> Security Officer and the <strong>IT</strong> Security Management Team must have<br />

clearly defined tasks, responsibilities and authorities, which must be laid down<br />

by Management. In order to be able to perform their tasks, they should both be<br />

Necessary resources<br />

Integration into the<br />

organisational structure

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!