19.12.2012 Views

IT Baseline Protection Manual - The Information Warfare Site

IT Baseline Protection Manual - The Information Warfare Site

IT Baseline Protection Manual - The Information Warfare Site

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

Safeguard Catalogue - Hardware & Software Remarks<br />

____________________________________________________________________ .........................................<br />

via a router and public communication networks are to be equipped with<br />

layer-2 encryption components. <strong>The</strong> router has to evaluate the addresses of<br />

layer 3 in order to forward the LAN packets via the public network. However,<br />

as all layer-3 data is hidden as a result of layer-2 encryption, evaluation of the<br />

layer-3 addresses cannot be successfully carried out. Data transmission is<br />

prevented because of this. To remedy this situation, the encryption<br />

components must be used for layer 3 (upper sublayer) or higher.<br />

Example 2: In future, a large proportion of a certain institution’s<br />

correspondence is to be sent electronically using X.400 (layer 7). In order to<br />

safeguard data integrity, the institution plans to use layer-4 crypto components<br />

in the terminal devices (in this case PCs). For security purposes, cryptographic<br />

checksums are assigned to the data packets at the sender on layer 4; these are<br />

then checked by the associated layer-4 crypto component belonging to the<br />

receiver. Only packets with correct checksums are to be delivered. However,<br />

if some MTAs (Message Transfer Agents, i.e. the intermediaries for electronic<br />

messages on layer 7) are not equipped with interoperable crypto components,<br />

the MTAs with no crypto component cannot generate valid checksums. This<br />

means that subsequent MTAs or terminal devices with a crypto component<br />

have to discard the data, in accordance with the specification.<br />

However, even if all of the MTAs that are used are equipped with<br />

interoperable crypto components and security parameters in the same way as<br />

the terminal devices, data integrity is not assured. Although it is possible to<br />

safeguard the data transmission section by section, corruption of the data<br />

within the MTAs can occur without being noticed. Furthermore (depending on<br />

the protocol) individual layer-4 data packets could be lost, which would result<br />

in gaps in the message as a whole – and it is the integrity and completeness of<br />

this that is actually supposed to be protected. One remedy is to protect the<br />

integrity of the data on layer 7.<br />

As the examples illustrate, it is essential to investigate precisely the nature of<br />

the network topology and to determine which network areas have to be<br />

secured, and how, so that an appropriate solution can be found with the<br />

desired (security) features.<br />

Section-by-section security end-to-end security<br />

Users of communication systems often expect security services to be provided<br />

seamlessly throughout the system (end-to-end security), in other words from<br />

the input of information (data, speech, images, text) at terminal A through to<br />

output of the information at a remote terminal B. If there is no guarantee of<br />

continuous security service, there are other systems - apart from the terminal<br />

equipment - on which the information is present in an insecure form. For<br />

example, if there is no end-to-end encryption to safeguard the confidentiality<br />

of a communications relationship between two parties, the data is available in<br />

unencrypted form in at least one other network element. <strong>The</strong>se network<br />

elements must be located, and secured by additional safeguards. Staff who<br />

have access to insecure network elements, in particular (such as<br />

administrators) must be accordingly trustworthy. In this case security services<br />

are not provided seamlessly but section by section. Care must be taken that all<br />

relevant sections are appropriately secured.<br />

____________________________________________________________________ .........................................<br />

<strong>IT</strong>-<strong>Baseline</strong> <strong>Protection</strong> <strong>Manual</strong>: Oktober 2000

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!