19.12.2012 Views

IT Baseline Protection Manual - The Information Warfare Site

IT Baseline Protection Manual - The Information Warfare Site

IT Baseline Protection Manual - The Information Warfare Site

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

Safeguard Catalogue - Organisation Remarks<br />

____________________________________________________________________ .........................................<br />

whether these <strong>IT</strong> systems and this information are very important,<br />

important or less important to task performance.<br />

1.2 Assessment of the captured <strong>IT</strong> systems and the information to be<br />

handled<br />

This stage involves determining the maximum damage which could<br />

be sustained in the event of loss of the three basic parameters of<br />

availability, integrity and confidentiality by every <strong>IT</strong> system and by<br />

the information handled thereon. <strong>The</strong> potential damage can be<br />

classified into various damage scenarios.<br />

<strong>The</strong>se might include:<br />

- violation of laws, regulations or contracts<br />

- impairment of informational self-determination,<br />

- physical injury,<br />

- impaired performance of duties,<br />

- negative consequences for the image and<br />

- financial consequences<br />

Based on the amount of potential damage and the consequences of<br />

this, a distinction is made between two protection requirements<br />

categories:<br />

- basic to moderate<br />

- high to very high<br />

2. Capture of information relating to the current security situation<br />

To determine the current security situation it is necessary to examine the <strong>IT</strong><br />

systems in-depth. This should entail collecting information both about<br />

existing security measures and also about security shortcomings<br />

(comparison between planned and actual situation).<br />

3. Selection of <strong>IT</strong> baseline protection safeguards<br />

For all the <strong>IT</strong> systems and information under investigation, irrespective of<br />

the protection requirements category to which they have been assigned, the<br />

recommended safeguards contained in the present manual should now be<br />

implemented.<br />

4. Supplementary security analysis<br />

<strong>The</strong>re are a number of reasons for carrying out an <strong>IT</strong> security analysis. For<br />

example, this can be appropriate where the protection requirement for an<br />

<strong>IT</strong> system and the information to be handled on it is "high" or "very high",<br />

or where the <strong>IT</strong> systems concerned have not yet been covered in the <strong>IT</strong><br />

<strong>Baseline</strong> <strong>Protection</strong> <strong>Manual</strong> so that no <strong>IT</strong> baseline protection safeguards yet<br />

exist for them.<br />

In addition to penetration testing and vulnerability analysis for selected<br />

areas, risk analysis is another possible procedure for such an <strong>IT</strong> security<br />

____________________________________________________________________ .........................................<br />

<strong>IT</strong>-<strong>Baseline</strong> <strong>Protection</strong> <strong>Manual</strong>: Oktober 2000

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!