19.12.2012 Views

IT Baseline Protection Manual - The Information Warfare Site

IT Baseline Protection Manual - The Information Warfare Site

IT Baseline Protection Manual - The Information Warfare Site

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

Safeguard Catalogue - Communications Remarks<br />

____________________________________________________________________ .........................................<br />

S 6.33 Development of a data backup policy<br />

Initiation responsibility: <strong>IT</strong> Security Management<br />

Implementation responsibility: Head of <strong>IT</strong> Section; <strong>IT</strong> Security Management;<br />

staff responsible for the individual <strong>IT</strong><br />

applications<br />

<strong>The</strong> procedure of data backup is determined by a large number of factors,<br />

including the <strong>IT</strong> system, volume of data, frequency of modification of the<br />

data, and requirements concerning availability. <strong>The</strong> data backup policy<br />

attempts to find a solution which takes these factors, as well as profitability,<br />

into account.<br />

<strong>The</strong>re are numerous technical possibilities of data backup. However, their<br />

selection is always determined by the aforementioned factors. For this reason,<br />

the decisive parameters of the <strong>IT</strong> system and their related applications need to<br />

be determined first and documented clearly. Subsequently, a suitable<br />

procedure must be developed and documented. Finally, the procedure must be<br />

implemented by the agency/company management.<br />

In order to ensure that the data-backup system functions correctly, the data<br />

backup policy must involve the restorability of data by means of practical<br />

exercises (c.f. S 6.41 Training data reconstruction)<br />

<strong>The</strong> results should be listed as part of the data backup policy, and updated<br />

according to requirement. An example of a data backup policy is shown in the<br />

following table of contents:<br />

Table of contents - Data Backup Policy<br />

1. Definitions<br />

- Application data, system data, software, protocol data<br />

- Full backup, incremental backup<br />

2. Threat scenario as motivational background<br />

- Dependence of the institution on the data stock<br />

- Typical threats like usage by untrained personnel, joint usage of data<br />

stocks, computer viruses, hackers, power failure, hard disk errors.<br />

- Causes of damage specific to individual institutions<br />

- In-house cases of damage<br />

3. Influential factors of an <strong>IT</strong> system<br />

- Specifying the data to be backed up<br />

- Data availability requirements of the <strong>IT</strong> applications<br />

- Effort required for data reconstruction without data backup<br />

- Data volumes<br />

- Modification volumes<br />

- Modification times<br />

____________________________________________________________________ .........................................<br />

<strong>IT</strong>-<strong>Baseline</strong> <strong>Protection</strong> <strong>Manual</strong>: Oktober 2000

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!