19.12.2012 Views

IT Baseline Protection Manual - The Information Warfare Site

IT Baseline Protection Manual - The Information Warfare Site

IT Baseline Protection Manual - The Information Warfare Site

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

Safeguard Catalogue - Hardware & Software Remarks<br />

____________________________________________________________________ .........................................<br />

S 4.29 Use of an encryption product for laptop PCs<br />

Initiation responsibility: Head of <strong>IT</strong> Section, <strong>IT</strong> Security Management<br />

Implementation responsibility: <strong>IT</strong>-user<br />

In order to prevent sensitive data being read from a laptop PC which, despite<br />

all precaution, has been stolen, an encryption program should be used. By<br />

means of the commercially-available products, individual files, certain areas<br />

or the entire hard disk can be encrypted in such a way that only the individual<br />

holding the secret key will be able to read and to use the data.<br />

For secure encryption, three different requirements are of crucial importance:<br />

- <strong>The</strong> encryption algorithm must be designed in such a way that it is<br />

impossible to reconstruct the plain text from the encrypted text without<br />

knowledge of the relevant key, i.e. the effort required to crack the<br />

algorithm or cipher should be much greater than the value of the<br />

information obtained as a result.<br />

- A suitable key should be selected. If possible, it should be generated<br />

randomly. If a key can be selected like a password, the relevant instructions<br />

in S 2.11 Provisions governing the use of passwords must be observed.<br />

- <strong>The</strong> encryption algorithm (the program), the cipher text and the keys must<br />

not be saved on the same data media. It is advisable to store the key<br />

separately. This can be done by recording it on pasteboard and then<br />

keeping it like a credit card in the purse/wallet. If the keys are stored on<br />

floppy disks, the diskettes should be kept separate from the laptop (e.g. in a<br />

briefcase).<br />

Such encryption can be effected either online or offline. "Online" means that<br />

all data of the hard disk (or of a partition) is encrypted without any active<br />

intervention by the user. Offline encryption is explicitly requested by the user.<br />

In that case, he will also have to decide which files are to be encrypted. For<br />

the selection and use of cryptographic procedures, chapter 3.7 Crypto-concept<br />

should also be read.<br />

For use on stationary and portable PCs, BSI can, under certain basic<br />

prerequisites, provide public agencies with an offline encryption program<br />

meeting medium-level protection requirements. A printed request form is<br />

located in the section covering Auxiliary Materials of this <strong>IT</strong> <strong>Baseline</strong><br />

<strong>Protection</strong> <strong>Manual</strong>.<br />

Additional controls:<br />

- Are the users trained in the use of the encryption program?<br />

- Are the data and keys stored separately?<br />

____________________________________________________________________ .........................................<br />

<strong>IT</strong>-<strong>Baseline</strong> <strong>Protection</strong> <strong>Manual</strong>: Oktober 2000

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!