19.12.2012 Views

IT Baseline Protection Manual - The Information Warfare Site

IT Baseline Protection Manual - The Information Warfare Site

IT Baseline Protection Manual - The Information Warfare Site

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

<strong>IT</strong> <strong>Baseline</strong> <strong>Protection</strong> in the Area of Infrastructure<br />

_________________________________________________________________________________________<br />

4.3.4 Technical Infrastructure Room<br />

Description<br />

As a rule, technical infrastructure rooms house those<br />

equipment items and facilities which require no, or<br />

infrequent, human attendance. Usually, these will be<br />

distributors of internal supplies (e.g. PTT cable transfer room,<br />

high-tension lead-in room, medium-voltage lead-in room,<br />

low-voltage main distributor). In instances, these rooms may<br />

also house the fuses for power supply. Installation of other<br />

devices/equipment (uninterruptible power supply, star coupler, etc.) is also conceivable. Even a<br />

network server might be accommodated here if a specific room (Chapter 4.3.2, Server Room) is not<br />

available.<br />

Threat Scenario<br />

<strong>The</strong> following typical threats (T) are assumed as regards <strong>IT</strong> baseline protection of a technical infrastructure<br />

room:<br />

Force Majeure<br />

- T 1.4 Fire<br />

- T 1.5 Water<br />

- T 1.7 Inadmissible temperature and humidity<br />

Organisational shortcomings:<br />

- T 2.1 Lack of, or insufficient, rules<br />

- T 2.6 Unauthorised admission to rooms requiring protection<br />

Technical Failure:<br />

- T 4.1 Disruption of power supply<br />

- T 4.2 Failure of internal supply networks<br />

- T 4.6 Voltage variations / overvoltage / undervoltage<br />

Deliberate Acts:<br />

- T 5.1 Manipulation/destruction of <strong>IT</strong> equipment or accessories<br />

- T 5.3 Unauthorised entry into a building<br />

- T 5.4 <strong>The</strong>ft<br />

- T 5.5 Vandalism<br />

Recommended Countermeasures (S)<br />

For the implementation of <strong>IT</strong> baseline protection, selection of the required packages of safeguards<br />

("modules") as described in chapters 2.3 and 2.4, is recommended.<br />

In the following, the safeguard package for "Technical Infrastructure Room" is set out:<br />

_________________________________________________________________________________________<br />

<strong>IT</strong>-<strong>Baseline</strong> <strong>Protection</strong> <strong>Manual</strong>: Otober 2000

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!