19.12.2012 Views

IT Baseline Protection Manual - The Information Warfare Site

IT Baseline Protection Manual - The Information Warfare Site

IT Baseline Protection Manual - The Information Warfare Site

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

Safeguard Catalogue - Hardware & Software Remarks<br />

____________________________________________________________________ .........................................<br />

S 4.72 Database encryption<br />

Initiation responsibility: Head of <strong>IT</strong> Section, <strong>IT</strong> Security Management<br />

Implementation responsibility: Administrators, application developers<br />

Depending on the type of information stored in a database and the related<br />

requirements of confidentiality and integrity, it might be necessary to encrypt<br />

this data. A distinction can be made between online and offline encryption<br />

here:<br />

- During online encryption, the data are encrypted and decrypted while the<br />

<strong>IT</strong> systems are in operation, without the involved users being aware of this<br />

process. For this purpose, tools can be used which either encrypt the entire<br />

hard disk at the operating-system level, or only encrypt the application data<br />

of the database.<br />

- During offline encryption, the data are only encrypted after having been<br />

processed, and decrypted before undergoing further processing. In general,<br />

this is done with tools which are not part of the database system. This<br />

technique can prove particularly useful for data backups and data<br />

transmissions. In this case, it must be ensured that sufficient disk space is<br />

available, as encrypting and decrypting can only be carried out successfully<br />

if the hard disk is capable of holding both the original and the encrypted<br />

version of the database.<br />

Furthermore, it is possible to save data as plain text in the database, but<br />

transmit it in encrypted form during access via a network. This can be<br />

realised, for example, with the Secure Network Services of the Oracle<br />

SQL*Net product group.<br />

Which data should be encrypted using which techniques is best decided on<br />

during selection of the standard database software (refer to S 2.124 Selection<br />

of suitable database software). During this process, the requirements of data<br />

encryption should be compared with the corresponding features of the<br />

database software. However, it should at least be ensured that the passwords<br />

of the database user IDs are stored in encrypted form.<br />

If the encryption requirements cannot be fulfilled completely by any of the<br />

standard database software available on the market, the use of add-ons should<br />

be considered for the purpose of closing the security gaps. If no add-ons are<br />

available either, a concept for implementing an encryption strategy at the<br />

corporation or authority should be prepared.<br />

Additional controls:<br />

- Are appropriate encryption techniques offered by the database or add-ons?<br />

- Have the responsible persons been briefed on proper key management?<br />

____________________________________________________________________ .........................................<br />

<strong>IT</strong>-<strong>Baseline</strong> <strong>Protection</strong> <strong>Manual</strong>: Oktober 2000

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!