19.12.2012 Views

IT Baseline Protection Manual - The Information Warfare Site

IT Baseline Protection Manual - The Information Warfare Site

IT Baseline Protection Manual - The Information Warfare Site

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

Safeguard Catalogue - Organisation Remarks<br />

____________________________________________________________________ .........................................<br />

analysis. <strong>The</strong> BSI <strong>IT</strong> Security <strong>Manual</strong> describes how to perform a risk<br />

analysis. It can be performed as follows:<br />

4.1 Analysis of vulnerabilities and threats<br />

<strong>The</strong> aim of the analysis of vulnerabilities and threats is to identify as<br />

many as possible of the existing vulnerabilities and all "significant"<br />

threats.<br />

4.2 Assessment of the risks identified<br />

This step entails assessing current risks posed by threats in terms of<br />

the damage these could cause and the frequency of such damage.<br />

4.3 Determination of appropriate security measures<br />

Additional measures must be selected for any risks identified in the<br />

previous analysis as being intolerable, taking into account the<br />

current security situation and the vulnerabilities and threats<br />

identified.<br />

5. Consolidation of all measures<br />

For the <strong>IT</strong> security measures identified in steps 3 and 4 as being<br />

necessary, a check must be made as to whether these are complementary<br />

or have negative effects on each other. If appropriate, <strong>IT</strong> baseline<br />

protection safeguards can be replaced by more stringent measures. During<br />

the consolidation process, these overlaps are removed.<br />

6. Consideration of cost-benefit trade-off, overall cost<br />

<strong>The</strong> safeguards contained in the <strong>IT</strong> <strong>Baseline</strong> <strong>Protection</strong> <strong>Manual</strong> are<br />

standard security measures. In other words, they constitute a set of<br />

requirements to be implemented so as to afford a state of the art protection<br />

to the <strong>IT</strong> systems under consideration. <strong>The</strong>se safeguards may thus be<br />

generally considered to be reasonable. Most of them do not require any<br />

financial investment. However, some of them, especially safeguards<br />

presented as optional, do require financial resources.<br />

It is important to prepare a cost plan. This will give the person responsible<br />

a good idea of the costs that will be incurred. Approval should be sought<br />

from Management for the necessary labour and financial resources.<br />

7. Consideration of residual risk<br />

If the personnel and financial resources provided for <strong>IT</strong> security are not<br />

sufficient to implement all the missing <strong>IT</strong> security measures, those which<br />

have priority should be implemented. However, if some of the safeguards<br />

are not implemented, some security loopholes may remain for the time<br />

being. <strong>The</strong> resulting residual risk, defined in terms of the amount of<br />

possible damage and an assessment of the quantitative or qualitative<br />

likelihood of occurrence, should be presented to Management for approval.<br />

If necessary, additional residual risks can be reduced if the budget is<br />

increased.<br />

<strong>The</strong> security concept is a document which in practice is often used to check<br />

out the implementation of specific security measures or to review their<br />

currency. It should therefore be structured so that<br />

____________________________________________________________________ .........................................<br />

<strong>IT</strong>-<strong>Baseline</strong> <strong>Protection</strong> <strong>Manual</strong>: Oktober 2000<br />

Structure

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!