19.12.2012 Views

IT Baseline Protection Manual - The Information Warfare Site

IT Baseline Protection Manual - The Information Warfare Site

IT Baseline Protection Manual - The Information Warfare Site

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

Safeguard Catalogue - Organisation Remarks<br />

____________________________________________________________________ .........................................<br />

When writing management reports it should be borne in mind that the people<br />

who will be reading them are generally not technical experts. Accordingly, the<br />

text should be concise and easy to understand. <strong>The</strong> author should concentrate<br />

on the major points, i.e. in particular on existing vulnerabilities but also on<br />

successes achieved, and not attempt to convey a "complete" picture.<br />

Management reports - especially those prepared in response to particular<br />

events -should always end with a list of recommended actions, clearly<br />

prioritised, together with a realistic assessment of the expected cost of<br />

implementation of each of these actions. This will ensure that the decisions<br />

needed can be obtained from Management without undue delay.<br />

Wherever possible, the "<strong>IT</strong> Security" management report should not simply be<br />

provided to Management in writing but should also be presented in person by<br />

a member of the <strong>IT</strong> Security Management Team. Personal delivery of the<br />

report in this way allows special emphasis to be placed on important points,<br />

especially on any existing or anticipated security defects. At the same time,<br />

the person responsible for <strong>IT</strong> security making the presentation is directly<br />

available for further questions and also to provide fuller explanations, and<br />

experience shows that this in turn speeds up the decision process. At the same<br />

time, such personal contact offers the opportunity to establish a "small official<br />

channel", whose existence could prove extremely useful in an emergency.<br />

Instead of or in addition to personal presentation of the management report,<br />

another option which should be considered is to make one senior manager<br />

who has the appropriate technical background and interest available as a point<br />

of contact. Such a course of action can also prepare the way for Management<br />

decisions and eliminate problems in advance.<br />

As part of the ongoing <strong>IT</strong> security process, all the "<strong>IT</strong> security" management<br />

reports, if appropriate annotated with the decisions made, should be archived<br />

in a systematic fashion together with the other <strong>IT</strong> security-relevant documents<br />

and be made readily accessible to all those in positions of responsibility for<br />

security on demand (see S 2.201 Documentation of the <strong>IT</strong> security process).<br />

As the <strong>IT</strong> security management reports will generally contain sensitive<br />

information about existing security loopholes and residual risks, they must be<br />

kept confidential. Reliable means must be adopted to ensure that they are not<br />

disclosed to unauthorised person.<br />

Additional controls:<br />

- Are the "<strong>IT</strong> Security" management reports archived together with other<br />

documents relating to the <strong>IT</strong> security process?<br />

- Are there any "suitable" senior managers in the organisation with whom<br />

the management report can be agreed in advance so as to prepare the way<br />

for its submission?<br />

____________________________________________________________________ .........................................<br />

<strong>IT</strong>-<strong>Baseline</strong> <strong>Protection</strong> <strong>Manual</strong>: Oktober 2000<br />

Basic principle:<br />

keep it brief and easy to<br />

understand<br />

White Paper<br />

Suitable presentation<br />

Co-operation with<br />

Management<br />

Documentation<br />

Confidentiality

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!