19.12.2012 Views

IT Baseline Protection Manual - The Information Warfare Site

IT Baseline Protection Manual - The Information Warfare Site

IT Baseline Protection Manual - The Information Warfare Site

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

Safeguard Catalogue - Hardware & Software Remarks<br />

____________________________________________________________________ .........................................<br />

S 4.88 Operating system security requirements when<br />

using crypto modules<br />

Initiation responsibility: <strong>IT</strong> Security Management<br />

Implementation responsibility: <strong>IT</strong> Security Management<br />

Whenever crypto modules are used, the way in which they are integrated into<br />

or dependent on the operating system running on the host system is<br />

particularly significant. <strong>The</strong> interaction between the operating system and the<br />

crypto module must ensure that:<br />

- the crypto module cannot be deactivated or circumvented (for example by<br />

manipulation or by the exchange of drivers);<br />

- the keys used or stored by the module cannot be compromised (for<br />

example by the reading out of RAM areas);<br />

- the data being protected can be stored on data media (including being<br />

stored without encryption) or may leave the information-processing system<br />

(for example if there is a network connection) only with the knowledge of<br />

and under the control of the user;<br />

- attempts at manipulation of the crypto module will be detected.<br />

<strong>The</strong> level of the operating system security requirements is liable to vary<br />

according to the type of crypto module (implementation in hardware or<br />

software, strategy for integration into the <strong>IT</strong> component etc.), the conditions in<br />

which it is used and the degree of protection required for the data. Where<br />

crypto modules are implemented in software, the use of a secure operating<br />

system is particularly important. Commercial PC operating systems are<br />

generally so complex and subject to such short innovation cycles that it is<br />

barely possible to verify or prove the security of data or a system. One<br />

exception may be proprietary operating systems or operating systems<br />

optimised for special applications (such as special-purpose operating systems<br />

in cryptographic devices). It is therefore important when using cryptographic<br />

products with standard operating systems for such purposes as file encryption<br />

or the safeguarding of e-mails that all standard security measures for the<br />

operating system are put in place. <strong>The</strong> security-related requirements for these<br />

<strong>IT</strong> systems are described in the respective system-specific sections, for<br />

example for clients in Chapter 5 and for servers in Chapter 6.<br />

Crypto modules implemented in hardware can be designed so as to<br />

compensate for deficiencies in operating system security, or to eliminate them<br />

altogether. <strong>The</strong> responsibility for satisfying the requirements specified above<br />

lies solely with the crypto module. It must be able to recognise, for example,<br />

whether or not authorisation is required to write unencrypted data to data<br />

media or other device interfaces, bypassing the module. <strong>The</strong> user must decide<br />

what combination of operating system and crypto module is required, in<br />

compliance with the security policy drawn up for his particular working<br />

environment.<br />

____________________________________________________________________ .........................................<br />

<strong>IT</strong>-<strong>Baseline</strong> <strong>Protection</strong> <strong>Manual</strong>: Oktober 2000

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!