19.12.2012 Views

IT Baseline Protection Manual - The Information Warfare Site

IT Baseline Protection Manual - The Information Warfare Site

IT Baseline Protection Manual - The Information Warfare Site

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

Safeguard Catalogue - Organisation Remarks<br />

____________________________________________________________________ .........................................<br />

involved in all relevant procedures and decisions. <strong>The</strong> roles should be<br />

integrated into the organisational structure in such a way that all those<br />

involved can communicate with each other. <strong>The</strong> roles of <strong>IT</strong> Security Officer<br />

and of being a member of the <strong>IT</strong> Security Management Team should be<br />

entrusted to staff who possess the relevant specialist skills. If necessary, to<br />

support these roles tasks can be delegated to the specific <strong>IT</strong> Security Officers<br />

appointed for a given division or department, <strong>IT</strong> project or <strong>IT</strong> system.<br />

<strong>The</strong> <strong>IT</strong> Security Officer<br />

As the responsibility for <strong>IT</strong> security is delegated in the same way as the<br />

responsibility for task accomplishment, the danger presented by unclear<br />

delegation is that <strong>IT</strong> security is transformed into "someone else's problem".<br />

<strong>The</strong> result is that the responsibility for <strong>IT</strong> security is shifted around until no<br />

one takes responsibility for it any longer. To avoid this happening,<br />

responsibility for <strong>IT</strong> security should be given directly to a specific role, that of<br />

the <strong>IT</strong> Security Officer. This person is responsible for looking after all matters<br />

of <strong>IT</strong> security within the organisation. <strong>The</strong> tasks of the <strong>IT</strong> Security Officer are:<br />

- to be involved in the entire <strong>IT</strong> security process,<br />

- to draw up <strong>IT</strong> system security policy documents,<br />

- to co-ordinate drawing up of the <strong>Information</strong> Security Policy,<br />

- to co-ordinate drawing up of the contingency planning concept and other<br />

policy documents,<br />

- to prepare the plan for implementation of <strong>IT</strong> security measures and initiate<br />

and review the implementation,<br />

- to report to the <strong>IT</strong> Security Management Team and Management,<br />

- to ensure a smooth flow of information between the<br />

divisional/departmental, project and system <strong>IT</strong> Security Officers,<br />

- and to identify and examine any security-relevant incidents which occur.<br />

In order to carry out these tasks, it is desirable that the <strong>IT</strong> Security Officer has<br />

knowledge and experience in the areas of <strong>IT</strong> security and <strong>IT</strong>. As this task<br />

requires a variety of skills, the person appointed to this position should<br />

possess the following qualifications and attributes:<br />

- He should identify with the objectives of <strong>IT</strong> security and appreciate the<br />

necessity of <strong>IT</strong> security.<br />

- He should be able to liaise and work as a member of a team. (Few other<br />

projects require such a high degree of skill in working with other people:<br />

Management must always be involved in central issues of the <strong>IT</strong> security<br />

process, decisions must be sought and the <strong>IT</strong> users must be involved in the<br />

<strong>IT</strong> security process, possibly with the help of the divisional/departmental<br />

<strong>IT</strong> Security Officer).<br />

- He must possess experience in project management, ideally in the area of<br />

systems analysis (these are the main aspects which are also important in the<br />

"<strong>IT</strong> Security" project and particularly in risk analysis).<br />

____________________________________________________________________ .........................................<br />

<strong>IT</strong>-<strong>Baseline</strong> <strong>Protection</strong> <strong>Manual</strong>: Oktober 2000<br />

Requirements profile

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!