19.12.2012 Views

IT Baseline Protection Manual - The Information Warfare Site

IT Baseline Protection Manual - The Information Warfare Site

IT Baseline Protection Manual - The Information Warfare Site

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

<strong>IT</strong> <strong>Baseline</strong> <strong>Protection</strong> of Generic Components<br />

_________________________________________________________________________________________<br />

Annexes<br />

<strong>The</strong> last section of the manual contains supplementary aids, forms, brief descriptions of tools covering<br />

all aspects of <strong>IT</strong> baseline protection and a list of registered users of the manual.<br />

Interpretation of the manual<br />

<strong>The</strong> modules, which all have the same structure, form the most important part of the <strong>IT</strong> <strong>Baseline</strong><br />

<strong>Protection</strong> <strong>Manual</strong>. Each module starts with a brief description of the component, procedure or <strong>IT</strong><br />

system under consideration.<br />

This is followed by a description of the threat scenario. <strong>The</strong> threats here are divided into the<br />

aforementioned categories of Force Majeure, Organisational Shortcomings, Human Error, Technical<br />

Failure and Deliberate Acts.<br />

To make it easier to see which modules are relevant and to avoid redundancies, in each case only a<br />

reference is provided to the text in which the threat is described in more detail. An example is<br />

provided below as to how a threat would be cited within a module:<br />

- T 4.1 Disruption of power supply<br />

In the code T x.y, the letter "T" stands for threat. <strong>The</strong> number x before the decimal point refers to the<br />

Threats Catalogue (in this case T 4 = Technical Failure) and the number y after the decimal point is<br />

the serial number of the threat within the catalogue concerned. This is followed by the name of the<br />

threat. It is recommended that the user then reads the text of the threat referenced for the sake of<br />

gaining awareness and understanding the safeguards which apply, but it is not absolutely essential to<br />

read this text in order to be able to draw up an <strong>IT</strong> security concept on the basis of the <strong>IT</strong> <strong>Baseline</strong><br />

<strong>Protection</strong> <strong>Manual</strong>.<br />

<strong>The</strong> recommended safeguards which are listed after the section on the threat scenario constitute the<br />

major part of a given module. Brief information is presented first of all on the safeguard package<br />

concerned. In some modules these statements contain, for example, information on the recommended<br />

sequence to follow in implementing the necessary safeguards.<br />

As was done with the threats, the safeguards themselves are grouped according to the headings in the<br />

Safeguards Catalogues, i.e. in this case, under the headings Infrastructure, Organisation, Personnel,<br />

Hardware & Software, Communications and Contingency Planning. <strong>The</strong> same procedure is followed<br />

as in the handling of threats, i.e. in each case only a reference is provided to the relevant safeguard. An<br />

example is provided below as to how a recommended safeguard would be cited within a module:<br />

- S 1.15 (1) Closed windows and doors<br />

In the code S x.y, "S" refers to a safeguard, and the number x before the decimal point refers to the<br />

Safeguards Catalogue (in this case S 1 = Infrastructure). <strong>The</strong> number y after the decimal point is the<br />

serial number of the safeguard within the relevant catalogue.<br />

<strong>The</strong> number in brackets - in this case (1) - assigns a priority to each safeguard. This is extremely<br />

important when drawing up a plan for the implementation of safeguards which have not previously<br />

been implemented or have only partially been implemented. In practice, it is during this phase that<br />

problems in finding sufficient financial or staff resources and/or with timescales frequently occur. If<br />

these would mean that full implementation of all the necessary safeguards would have to be delayed,<br />

then the starting point in determining the sequence to be followed in implementing any missing<br />

safeguards should be the priority assigned to each of the various safeguards in the modules. <strong>The</strong><br />

following priority levels have been assigned:<br />

_________________________________________________________________________________________<br />

<strong>IT</strong>-<strong>Baseline</strong> <strong>Protection</strong> <strong>Manual</strong>: Otober 2000

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!