19.12.2012 Views

IT Baseline Protection Manual - The Information Warfare Site

IT Baseline Protection Manual - The Information Warfare Site

IT Baseline Protection Manual - The Information Warfare Site

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

Safeguard Catalogue - Communications Remarks<br />

____________________________________________________________________ .........................................<br />

S 6.6 Study of internally and externally available<br />

alternatives<br />

Initiation responsibility: Head of <strong>IT</strong> Section, <strong>IT</strong> Security Management<br />

Implementation responsibility: Staff responsible for the individual <strong>IT</strong><br />

applications<br />

In order to avoid capacity shortfalls during restricted <strong>IT</strong> operations, internally<br />

and externally available alternatives must be explored.<br />

When studying such alternatives, particular consideration must be given to the<br />

technical specifications of the alternative <strong>IT</strong> system. <strong>The</strong> compatibility and<br />

sufficient capacity (cf. S 6.4 Documentation on the capacity requirements of<br />

<strong>IT</strong> applications) of the alternative <strong>IT</strong> system are the basic prerequisites for its<br />

use.<br />

<strong>The</strong> primary objective is the internal transfer of <strong>IT</strong> applications from one <strong>IT</strong><br />

system to another (e.g. recourse to the development computer in case of<br />

failure of the production computer). External alternatives will have to be relied<br />

on when it is no longer possible to meet the availability requirements in an<br />

economically feasible way.<br />

Alternatives for non <strong>IT</strong>-specific components should also be considered. In the<br />

infrastructure domain, for instance, consideration is to be given to alternatives<br />

regarding <strong>IT</strong> rooms.<br />

Additional controls:<br />

- Have internally and externally available alternatives been checked for their<br />

effectiveness?<br />

- Are the configuration, capacity and compatibility of internal and external<br />

alternatives being adapted to the current status of procedures?<br />

- Are the integrity and confidentiality of <strong>IT</strong> application and data moved to<br />

external resources ensured in the case of recourse to external alternatives?<br />

____________________________________________________________________ .........................................<br />

<strong>IT</strong>-<strong>Baseline</strong> <strong>Protection</strong> <strong>Manual</strong>: Oktober 2000

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!