19.12.2012 Views

IT Baseline Protection Manual - The Information Warfare Site

IT Baseline Protection Manual - The Information Warfare Site

IT Baseline Protection Manual - The Information Warfare Site

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

Safeguard Catalogue - Communications Remarks<br />

____________________________________________________________________ .........................................<br />

S 5.51 Security-related requirements for<br />

communications links between telecommuting<br />

workstations and the institution<br />

Initiation responsibility: Head of <strong>IT</strong> Section, <strong>IT</strong> Security management<br />

Implementation responsibility: Administrators , Telecommuters<br />

<strong>The</strong> exchange of business data between a telecommuting workstation and the<br />

communications computer at the institution normally takes place via public<br />

communications networks. As neither the institution nor the telecommuter can<br />

fully guarantee the confidentiality, integrity and availability of their<br />

information in such public communications networks, additional safeguards<br />

might be required if the networks do not offer a sufficiently high level of<br />

security.<br />

In general, data transmission between home workstations and the institution<br />

must meet the following security requirements:<br />

- Ensuring the confidentiality of transmitted data: A sufficiently reliable<br />

encryption mechanism must be used to prevent the contents of data from<br />

being recovered even if these data are intercepted during transmission<br />

between the home workstation and the communications computer at the<br />

institution. In addition to a suitable encryption technique, this also requires<br />

appropriate key management and a change of keys at regular intervals.<br />

- Ensuring the integrity of transmitted data: <strong>The</strong> employed transfer protocols<br />

must be able to identify and reverse coincidental changes to data during<br />

their transmission. If required, an additional error detection mechanism can<br />

be used to identify intentional manipulation during data transmission.<br />

- Ensuring the availability of data transmission lines: If time delays during<br />

telecommuting are very difficult to tolerate, the selected public<br />

communications network should provide redundant routes which prevent a<br />

complete breakdown in communications should one of the routes fail.<br />

Under certain circumstances, redundant network links between the<br />

interfaces of the telecommuting workstation and communications computer<br />

at the institution can be dispensed with.<br />

- Ensuring the authenticity of data: During the transmission of data between<br />

telecommuters and the institution, it should be possible to reliably<br />

determine whether communications are taking place between the correct<br />

parties, in order to preclude masquerading. This means that the indicated<br />

source of data should be identical to the actual source of the data. In<br />

addition, it should be possible to clearly establish whether data apparently<br />

transmitted by the institution actually originated from that institution.<br />

- Ensuring the reproducibility of data transmission: To render data<br />

communications reproducable, logging functions can be used to<br />

subsequently ascertain which data were transmitted to which location.<br />

- Ensuring the reception of data: If the correct reception of data is of<br />

importance during telecommuting, acknowledgement routines can be used<br />

to determine whether transmitted data have been received correctly.<br />

____________________________________________________________________ .........................................<br />

<strong>IT</strong>-<strong>Baseline</strong> <strong>Protection</strong> <strong>Manual</strong>: Oktober 2000

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!