19.12.2012 Views

IT Baseline Protection Manual - The Information Warfare Site

IT Baseline Protection Manual - The Information Warfare Site

IT Baseline Protection Manual - The Information Warfare Site

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

Safeguard Catalogue - Organisation Remarks<br />

____________________________________________________________________ .........................................<br />

most of their other duties during this phase. <strong>The</strong> decision as to whether staff<br />

should be released and to what extent this is appropriate will depend on the<br />

distribution of tasks between the <strong>IT</strong> Security Management Team and the <strong>IT</strong><br />

Security Officer. <strong>The</strong> final decision here lies with Management. Whatever<br />

arrangements are adopted, the <strong>IT</strong> Security Management Team should meet<br />

regularly to ensure continuous oversight of the <strong>IT</strong> security process.<br />

Area <strong>IT</strong> security officer, <strong>IT</strong> project and <strong>IT</strong> system security officers<br />

In large organisations it can be necessary to employ separate <strong>IT</strong> Security<br />

Officers in each of the various business units (referred to below as the "Area<br />

<strong>IT</strong> Security Officer"). <strong>The</strong> Area <strong>IT</strong> Security Officer is responsible for all<br />

security aspects of the <strong>IT</strong> systems and applications in his area (e.g.<br />

department, branch etc.). Depending on the size of the business unit, the task<br />

of Area <strong>IT</strong> Security Officer can be assumed by somebody who is already<br />

entrusted with similar tasks, e.g. the person might already perform the role of<br />

Divisional <strong>IT</strong> Officer (if such a position exists). Care should be taken during<br />

selection of the Area <strong>IT</strong> Security Officer to ensure that he is familiar with the<br />

tasks, conditions and work processes in the relevant business unit.<br />

<strong>The</strong> various <strong>IT</strong> systems and applications within an organisation often have<br />

different <strong>IT</strong> security requirements, which may be compiled in a separate <strong>IT</strong><br />

system security policy document and require different <strong>IT</strong> security measures.<br />

<strong>The</strong> analogous situation applies to the <strong>IT</strong> project Security Officer, with the<br />

distinction that his role is <strong>IT</strong> project-specific instead of <strong>IT</strong> system-specific.<br />

<strong>The</strong> tasks of the <strong>IT</strong> Project, <strong>IT</strong> System and Area Security Officers include:<br />

- implementing the procedures defined by the <strong>IT</strong> Security Officer,<br />

- implementing the <strong>IT</strong> security measures in accordance with the <strong>IT</strong> system<br />

security policy,<br />

- collecting <strong>IT</strong> system-specific information and forwarding it to the <strong>IT</strong><br />

Security Officer,<br />

- acting as contact person for the local <strong>IT</strong> users,<br />

- being involved in the selection of <strong>IT</strong> security measures used to implement<br />

the <strong>IT</strong> system security policy,<br />

- passing information about <strong>IT</strong> users’ training or <strong>IT</strong> security awareness<br />

promotion requirements to the <strong>IT</strong> Security Officer,<br />

- monitoring and evaluating log files at regular intervals, and<br />

- reporting any security-relevant incidents to the <strong>IT</strong> Security Officer.<br />

Persons in these roles should possess the following qualifications:<br />

- in-depth <strong>IT</strong> knowledge, as this makes it easier to talk to <strong>IT</strong> users on-site<br />

and facilitates the search for <strong>IT</strong> security safeguards for the special <strong>IT</strong><br />

systems;<br />

- knowledge of project management - this is helpful when it comes to<br />

interviewing <strong>IT</strong> users and drawing up plans for the implementation and<br />

monitoring of <strong>IT</strong> security measures.<br />

____________________________________________________________________ .........................................<br />

<strong>IT</strong>-<strong>Baseline</strong> <strong>Protection</strong> <strong>Manual</strong>: Oktober 2000

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!