19.12.2012 Views

IT Baseline Protection Manual - The Information Warfare Site

IT Baseline Protection Manual - The Information Warfare Site

IT Baseline Protection Manual - The Information Warfare Site

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

Safeguard Catalogue - Organisation Remarks<br />

____________________________________________________________________ .........................................<br />

S 2.195 Drawing up an <strong>IT</strong> security concept<br />

Initiation responsibility: Agency/company management; <strong>IT</strong> Security<br />

Management Team<br />

Implementation responsibility: <strong>IT</strong> Security Management Team<br />

<strong>The</strong> <strong>IT</strong> security concept is the "central" document in the <strong>IT</strong> security process of<br />

a company/agency. Every security measure implemented must in the final<br />

analysis be derived from this.<br />

First of all an <strong>IT</strong> security concept contains a description of the current status of<br />

the <strong>IT</strong> assets and the information to be handled on them. "<strong>IT</strong> assets" refers<br />

here to all of the technical components which are used in connection with the<br />

performance of tasks. This includes the <strong>IT</strong> systems and the <strong>IT</strong> applications.<br />

<strong>The</strong> current status of the <strong>IT</strong> assets covers not only a description of the<br />

technical components, the <strong>IT</strong> applications operated and the information to be<br />

handled using these applications but also a list of any existing vulnerabilities,<br />

possible threats and measures already implemented.<br />

Depending on the protection requirements of the existing <strong>IT</strong> assets (which<br />

must be determined in advance, with rationale) and the information to be<br />

handled, the amount of effort involved in proceeding will be different. <strong>The</strong><br />

BSI's recommendation here is to implement the safeguards contained in this<br />

manual on every <strong>IT</strong> system and in parallel to perform a supplementary <strong>IT</strong><br />

security analysis for any components which have a high or very high<br />

protection requirement.<br />

All staff who come into contact with the <strong>IT</strong> assets to be examined and the<br />

information handled on them should be involved in the preparation of an <strong>IT</strong><br />

security concept in a manner which reflects their usage of the assets.<br />

Similarly, creation of an organisation-wide <strong>IT</strong> security concept presupposes<br />

that there are records of all the existing <strong>IT</strong> systems (see S 2.194 Drawing up a<br />

schedule of existing <strong>IT</strong> systems).<br />

When drawing up an <strong>IT</strong> security concept, the approach described below is<br />

recommended. (A detailed description of the recommended procedure for<br />

drawing up an <strong>IT</strong> security concept which provides <strong>IT</strong> baseline protection is<br />

provided in Chapter 2 of this manual.)<br />

1. Determination of protection requirements<br />

When determining the protection requirements, the question of how great<br />

the maximum damage would be if the availability, integrity and<br />

confidentiality of the <strong>IT</strong> systems to be examined and the information<br />

handled on them were to be impaired must be answered. To answer this<br />

question, the following steps must be carried out:<br />

1.1 Definition and recording of all components of the area under<br />

examination<br />

This step requires by its nature that all the <strong>IT</strong> systems to be<br />

examined and information handled on them are recorded and<br />

described with reference to the technical task involved. This<br />

description should be supplemented to include a statement as to<br />

____________________________________________________________________ .........................................<br />

<strong>IT</strong>-<strong>Baseline</strong> <strong>Protection</strong> <strong>Manual</strong>: Oktober 2000<br />

Status description<br />

<strong>Protection</strong> requirement<br />

Co-operation

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!