19.12.2012 Views

IT Baseline Protection Manual - The Information Warfare Site

IT Baseline Protection Manual - The Information Warfare Site

IT Baseline Protection Manual - The Information Warfare Site

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

Safeguard Catalogue - Communications Remarks<br />

____________________________________________________________________ .........................................<br />

Incremental backups can be made more frequently, e.g. immediately after the<br />

set-up of important files or several times per day. Compatibility with current<br />

operations must be ensured.<br />

As regards the software used, it will, as a rule, suffice to keep the original data<br />

media and their backup copies. It will then not be necessary to include such<br />

software in regular backup arrangements.<br />

All users should be informed of the data backup procedures so that they are<br />

able to point out any deficiencies (e.g. intervals too short for their<br />

requirements) or to take supplementary measures on an individual basis (e.g.<br />

interim mirroring of essential data on their own disks). It is also important to<br />

inform users as to the length of time for which data is kept and is therefore<br />

available should it need to be restored. If, for example, only two generations<br />

are retained in a system where a full backup is taken once a week, then,<br />

depending on the point of time at which the loss occurs, it will only be<br />

possible to restore lost data which is a maximum of two to three weeks old.<br />

If, in the case of networked computers, backups are made only of the server<br />

disks, steps must be taken to ensure that the data to be saved is regularly<br />

transferred to those disks either by the users or else automatically.<br />

Confidential data should if possible be encrypted prior to backup. Care should<br />

be taken here to ensure that decryption of the data will still be possible after an<br />

extended period (see S 6.56 Data backup when using cryptographic<br />

procedures).<br />

Hard copy printouts of data are not considered an appropriate means of data<br />

backup.<br />

Additional controls:<br />

- Is all computer data backed up?<br />

- Are completed data backups documented?<br />

- Does the data backup procedure comply with existing data backup policy?<br />

____________________________________________________________________ .........................................<br />

<strong>IT</strong>-<strong>Baseline</strong> <strong>Protection</strong> <strong>Manual</strong>: Oktober 2000<br />

Inform users<br />

Encryption of<br />

confidential data

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!