19.12.2012 Views

IT Baseline Protection Manual - The Information Warfare Site

IT Baseline Protection Manual - The Information Warfare Site

IT Baseline Protection Manual - The Information Warfare Site

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

Safeguard Catalogue - Hardware & Software Remarks<br />

____________________________________________________________________ .........................................<br />

S 4.42 Implementation of security functions in the <strong>IT</strong><br />

application<br />

Initiation responsibility: Head of <strong>IT</strong> Section, <strong>IT</strong> security management,<br />

data privacy officer, persons responsible for<br />

individual <strong>IT</strong> applications<br />

Implementation responsibility: Application developer<br />

<strong>The</strong>re may be several reasons why it might be necessary to implement security<br />

functions such as access control, administration and checking of access rights<br />

or logging within the application programs themselves:<br />

- If the logging facilities of the <strong>IT</strong> system, including the additional <strong>IT</strong><br />

security products used, are not sufficient to guarantee adequate verification<br />

security, then these protocol elements must be implemented in the<br />

application program. (Example: BDSG, Appendix to § 9, Input<br />

Monitoring: “to guarantee that it is subsequently possible to check and<br />

ascertain which person-related data have been entered into data processing<br />

systems at what time and by whom“.)<br />

- If the granularity of the <strong>IT</strong> system’s access rights inclusive of additional<br />

security products used is not sufficient to guarantee proper operation, then<br />

administration and monitoring of access rights must be implemented in the<br />

application program. (Example: a data base with a joint data pool. It should<br />

be assumed that access is only permissible to certain fields depending on<br />

the user’s role.)<br />

- If it is not possible with the <strong>IT</strong> system, including the additional <strong>IT</strong> security<br />

products used, to prevent the administrator from gaining access to certain<br />

data or at least to log this access and monitor it, then this must be<br />

implemented where necessary by additional security features in the<br />

application program. For example, by encrypting the data it is possible to<br />

prevent the administrator from reading this data in plain text if he does not<br />

possess the appropriate key.<br />

<strong>The</strong>se additional requirements on <strong>IT</strong> applications must be taken into account<br />

at the time of planning and development, as subsequent implementation is<br />

usually no longer possible for reasons of cost.<br />

Additional controls:<br />

- When developing new <strong>IT</strong> applications, is there a systematic determination<br />

of the security functions the application must provide?<br />

____________________________________________________________________ .........................................<br />

<strong>IT</strong>-<strong>Baseline</strong> <strong>Protection</strong> <strong>Manual</strong>: Oktober 2000

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!