19.12.2012 Views

IT Baseline Protection Manual - The Information Warfare Site

IT Baseline Protection Manual - The Information Warfare Site

IT Baseline Protection Manual - The Information Warfare Site

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

<strong>IT</strong> <strong>Baseline</strong> <strong>Protection</strong> of Generic Components<br />

_________________________________________________________________________________________<br />

<strong>The</strong> safeguards listed in the <strong>IT</strong> <strong>Baseline</strong> <strong>Protection</strong> <strong>Manual</strong> are standard security measures, i.e.<br />

measures which should be implemented for the modules concerned using the latest available<br />

technology in order to achieve a reasonable level of security. In some cases these safeguards also<br />

provide a higher level of protection than that required simply to implement a baseline level of<br />

protection; nevertheless, they are the minimum security precautions which it is reasonable to<br />

implement in the areas concerned.<br />

Security concepts which are drawn up using the <strong>IT</strong> <strong>Baseline</strong> <strong>Protection</strong> <strong>Manual</strong> are compact, since all<br />

that is required within the concept is to reference the relevant safeguards in the manual. This makes<br />

them easier to understand and view in perspective. To facilitate implementation of the recommended<br />

measures, the safeguards are described in sufficient detail in the manual that they can serve as specific<br />

implementation instructions. With regard to the technical terminology used, care has been taken to<br />

ensure that the safeguard descriptions will be comprehensible to those who have to implement them.<br />

Accordingly, a distinction is made in the style and terminology used between safeguards which need<br />

to be implemented by an experienced administrator and those which a user is expected to implement.<br />

To simplify implementation of the safeguards, the text of the manual is also available in its entirety in<br />

electronic form. In addition, implementation of the safeguards is also supported by aids and sample<br />

solutions, some of which have been provided by the BSI and some by users of the manual.<br />

Bearing in mind the pace of innovation and version changes in the <strong>IT</strong> area, the <strong>IT</strong> <strong>Baseline</strong> <strong>Protection</strong><br />

<strong>Manual</strong> has been designed so as to make it easy to expand and update. It therefore has a modular<br />

structure incorporating modules and catalogues and, as a collection of loose-leaf sheets, it is easy to<br />

expand. <strong>The</strong> BSI re-works and updates the existing modules at regular intervals in order to keep the<br />

recommendations made in the manual in line with the latest technological developments. In addition,<br />

new modules are regularly added to the existing body of documentation. In updating the <strong>IT</strong> <strong>Baseline</strong><br />

<strong>Protection</strong> <strong>Manual</strong>, the BSI is guided by requests expressed by users which are obtained regularly<br />

from surveys. Only in this way can it be sure that in the long-term the document evolves in line with<br />

users’ requirements. <strong>The</strong> BSI therefore offers all users the opportunity to register on a voluntary basis.<br />

Registration is free of charge. Registered users received information at regular intervals about topical<br />

subjects. Its pool of registered users also serves as the basis for its user surveys. It is only through a<br />

continuous exchange of experiences with users of the manual that the document can evolve in a<br />

manner which reflects users’ needs. One of the aims of the BSI’s efforts here is to be able to give upto-date<br />

recommendations on the kinds of <strong>IT</strong> security problems currently actually experienced.<br />

Recommendations which are not continuously updated and expanded rapidly become out of date or<br />

else of necessity they become so generic that they fail to deliver the intended benefit of identifying<br />

security weaknesses and simplifying the specific task of implementing security measures.<br />

_________________________________________________________________________________________<br />

<strong>IT</strong>-<strong>Baseline</strong> <strong>Protection</strong> <strong>Manual</strong>: Otober 2000

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!