19.12.2012 Views

IT Baseline Protection Manual - The Information Warfare Site

IT Baseline Protection Manual - The Information Warfare Site

IT Baseline Protection Manual - The Information Warfare Site

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

<strong>IT</strong> <strong>Baseline</strong> <strong>Protection</strong> in the Area of Infrastructure<br />

_________________________________________________________________________________________<br />

4.3.2 Server Room<br />

Description<br />

<strong>The</strong> server room primarily serves to accommodate a server,<br />

e.g. a LAN server, a UNIX host computer or a server for a<br />

PBX facility. In addition, server-specific documentation,<br />

small numbers of data media, additional hardware (star<br />

coupler, logging printer, air conditioning system) may be kept<br />

in that room.<br />

A server room is not occupied by regular staff; it is used only<br />

sporadically and for short-term assignments. However, it must be borne in mind that, on account of the<br />

accumulation of <strong>IT</strong> devices and data, significantly greater damage may be caused in a server room<br />

than, for instance, in an office room.<br />

Threat Scenario<br />

<strong>The</strong> following threats (T) are assumed as regards <strong>IT</strong> baseline protection of a server room:<br />

Force Majeure<br />

- T 1.4 Fire<br />

- T 1.5 Water<br />

- T 1.7 Inadmissible temperature and humidity<br />

Organisational shortcomings:<br />

- T 2.1 Lack of, or insufficient, rules<br />

- T 2.6 Unauthorised admission to rooms requiring protection<br />

Technical Failure:<br />

- T 4.1 Disruption of power supply<br />

- T 4.2 Failure of internal supply networks<br />

- T 4.6 Voltage variations / overvoltage / undervoltage<br />

Deliberate Acts:<br />

- T 5.1 Manipulation/destruction of <strong>IT</strong> equipment or accessories<br />

- T 5.2 Manipulation of data or software<br />

- T 5.3 Unauthorised entry into a building<br />

- T 5.4 <strong>The</strong>ft<br />

- T 5.5 Vandalism<br />

Recommended Countermeasures (S)<br />

For the implementation of <strong>IT</strong> baseline protection, selection of the required packages of safeguards<br />

("modules") as described in chapters 2.3 and 2.4, is recommended.<br />

In the following, the safeguard package for "Server Room" is set out:<br />

_________________________________________________________________________________________<br />

<strong>IT</strong>-<strong>Baseline</strong> <strong>Protection</strong> <strong>Manual</strong>: Otober 2000

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!