19.12.2012 Views

IT Baseline Protection Manual - The Information Warfare Site

IT Baseline Protection Manual - The Information Warfare Site

IT Baseline Protection Manual - The Information Warfare Site

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

Safeguard Catalogue - Organisation Remarks<br />

____________________________________________________________________ .........................................<br />

Safeguards against unauthorised retrieval<br />

Retrieval of data by unauthorised persons must be prevented by means of<br />

suitable precautions:<br />

- Every user must be uniquely identified and authenticated to the <strong>IT</strong> systems<br />

from which the person-related data is retrieved.<br />

- Authorisation should be blocked after a specified number of unsuccessful<br />

attempts.<br />

- Passwords must be changed at regular intervals. As far as possible, this<br />

must be enforced by the relevant programs.<br />

- Program-controlled checking procedures should be used to review the log<br />

files.<br />

- <strong>The</strong> type and scope of logging must be specified (see also S 2.110 Data<br />

Privacy Guidelines for Logging Procedures).<br />

- Random sampling checks should be performed or else continuous logging<br />

should be carried out.<br />

- <strong>The</strong> place at which logging is performed must be specified (the retrieving<br />

and/or originating party).<br />

- Logging must be designed in such a way that it is possible to determine<br />

after the event which retrieval permissions were used when data was<br />

retrieved.<br />

- <strong>The</strong> reasons for retrieving the data must be logged.<br />

- Where data is retrieved, which connection and which terminal devices<br />

were used during transmission must be logged.<br />

Measures for organisational supervision<br />

- All staff, especially those in the office which retrieves the data must be<br />

under an obligation to maintain confidentiality of the data. Passing on of<br />

data to third parties must be contractually prohibited.<br />

Additional controls:<br />

- Have the technical and organisational measures implemented been<br />

documented?<br />

- Is there a concept covering the review and assessment of the reliability of<br />

data transmissions involving automated retrieval?<br />

____________________________________________________________________ .........................................<br />

<strong>IT</strong>-<strong>Baseline</strong> <strong>Protection</strong> <strong>Manual</strong>: Oktober 2000

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!