19.12.2012 Views

IT Baseline Protection Manual - The Information Warfare Site

IT Baseline Protection Manual - The Information Warfare Site

IT Baseline Protection Manual - The Information Warfare Site

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

Safeguard Catalogue - Organisation Remarks<br />

____________________________________________________________________ .........................................<br />

Working together with <strong>IT</strong> users requires a high degree of skill as these users<br />

must first be convinced of the necessity of <strong>IT</strong> security, which some of them<br />

may perceive as a burden. Equally difficult is questioning <strong>IT</strong> users about<br />

sensitive incidents and weak spots. In order to guarantee success here, the <strong>IT</strong><br />

users must be convinced that honest answers will not cause them problems.<br />

<strong>The</strong> <strong>IT</strong> Security Management Team<br />

<strong>The</strong> <strong>IT</strong> Security Management Team supports the <strong>IT</strong> Security Officer with the<br />

performance of his tasks by co-ordinating measures which impact the entire<br />

organisation, compiling information and performing supervisory tasks. <strong>The</strong><br />

precise shape of the team will depend on the size of the organisation<br />

concerned, the aspired-to level of <strong>IT</strong> security and the available resources. In<br />

extreme cases the <strong>IT</strong> Security Management Team may consist of only one<br />

person, the <strong>IT</strong> Security Officer, who in this case is responsible for all the tasks<br />

in the <strong>IT</strong> security process.<br />

Tasks of the <strong>IT</strong> Security Management Team include:<br />

- specifying <strong>IT</strong> security objectives and strategies and developing the<br />

<strong>Information</strong> Security Policy,<br />

- reviewing implementation of the <strong>Information</strong> Security Policy,<br />

- initiating, directing and monitoring the <strong>IT</strong> security process,<br />

- helping to draw up the <strong>IT</strong> security concept,<br />

- examining whether the <strong>IT</strong> security measures planned in the <strong>Information</strong><br />

Security Policy function as intended and are appropriate and effective,<br />

- approving the <strong>IT</strong> security measure implementation plan and making<br />

available the necessary resources,<br />

- preparing the programme of <strong>IT</strong> security and <strong>IT</strong> security awareness<br />

promotion training courses, and<br />

- advising the <strong>IT</strong> Co-ordination Committee and Management on <strong>IT</strong> security<br />

issues.<br />

In order to be able to carry out its tasks effectively, the <strong>IT</strong> Security<br />

Management Team members should have knowledge of <strong>IT</strong> security, technical<br />

knowledge of <strong>IT</strong> systems and experience in organisation and administration.<br />

In addition, the <strong>IT</strong> Security Management Team should reflect the different<br />

operational areas within the organisation. As a minimum, the <strong>IT</strong> Security<br />

Management Team should include an <strong>IT</strong> Officer, the <strong>IT</strong> Security Officer and<br />

an <strong>IT</strong> user representative. If a similar body already exists in the organisation,<br />

its tasks could be extended accordingly. However, to underline the importance<br />

of <strong>IT</strong> security it is advisable to set up an <strong>IT</strong> Security Management Team and to<br />

place at its disposal the resources it needs.<br />

Only a few organisations, either very large ones or ones with high <strong>IT</strong> security<br />

requirements, will be able to make full-time staff available to the <strong>IT</strong> Security<br />

Management Team. Normally these tasks will have to be performed in<br />

addition to the employees' primary duties. An exception to this, however,<br />

might be the first occasion that the <strong>IT</strong> security process is set up. If possible,<br />

the members of the <strong>IT</strong> Security Management Team should be released from<br />

____________________________________________________________________ .........................................<br />

<strong>IT</strong>-<strong>Baseline</strong> <strong>Protection</strong> <strong>Manual</strong>: Oktober 2000<br />

Co-operation<br />

Composition of the team<br />

Team members to have<br />

sufficient time available

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!