19.12.2012 Views

IT Baseline Protection Manual - The Information Warfare Site

IT Baseline Protection Manual - The Information Warfare Site

IT Baseline Protection Manual - The Information Warfare Site

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

Safeguard Catalogue - Organisation Remarks<br />

____________________________________________________________________ .........................................<br />

S 2.201 Documentation of the <strong>IT</strong> security process<br />

Initiation responsibility: <strong>IT</strong> Security Management Team<br />

Implementation responsibility: <strong>IT</strong> Security Officer<br />

<strong>The</strong> individual phases of the <strong>IT</strong> security process and the results of the process<br />

should be documented. Such documentation is important to maintaining <strong>IT</strong><br />

security and hence to ensuring that the process continues to develop in an<br />

efficient manner. It facilitates identification of the causes of problems and<br />

operations which have gone wrong and their elimination. It is important here<br />

that not only should the latest version of the documents concerned be easy to<br />

get hold of, but central archiving of superseded versions should also be<br />

undertaken. This will ensure continuous traceability of developments in the<br />

area of <strong>IT</strong> security, so that it is clear what decisions have been made.<br />

Documentation of the <strong>IT</strong> security process should as a minimum extend to the<br />

following documents:<br />

- <strong>Information</strong> Security Policy,<br />

- schedules of <strong>IT</strong> assets (including connectivity plans etc),<br />

- <strong>IT</strong> security concept(s),<br />

- plans for implementation of <strong>IT</strong> security measures.<br />

- procedures for the proper and secure use of <strong>IT</strong> facilities,<br />

- documentation of reviews (checklists, interview notes etc.),<br />

- minutes of meetings and decisions made by the <strong>IT</strong> Security Management<br />

Team,<br />

- management reports on <strong>IT</strong> security,<br />

- <strong>IT</strong> security training plans and<br />

- reports on security-relevant incidents.<br />

It is the task of the <strong>IT</strong> Security Officer to keep documentation up-to-date at all<br />

times. He should also ensure that controlled access to the documentation is<br />

possible. Here he must ensure that information can be passed to authorised<br />

persons rapidly, while at the same time safeguarding the confidentiality of<br />

details internal to the organisation.<br />

Additional controls:<br />

- Do procedures aimed at safeguarding the confidentiality of documentation<br />

exist?<br />

- How up-to-date are existing documents?<br />

____________________________________________________________________ .........................................<br />

<strong>IT</strong>-<strong>Baseline</strong> <strong>Protection</strong> <strong>Manual</strong>: Oktober 2000<br />

Controlled access

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!