19.12.2012 Views

IT Baseline Protection Manual - The Information Warfare Site

IT Baseline Protection Manual - The Information Warfare Site

IT Baseline Protection Manual - The Information Warfare Site

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

Safeguard Catalogue - Communications Remarks<br />

____________________________________________________________________ .........................................<br />

Data confidentiality and integrity requirements:<br />

<strong>The</strong> higher these requirements are, the more important it is to prevent data<br />

from being intercepted, copied or manipulated by unauthorised persons<br />

during transport. Encryption or cryptographic measures against<br />

manipulation must be considered for such data transmissions. Secure<br />

containers and routes must be selected for physical transport, and the<br />

degree and usefulness of encryption procedures should also be evaluated<br />

here.<br />

Storage modes<br />

As part of the data backup policy, it must also be established whether storage<br />

or erasure deadlines need to be maintained for certain data.<br />

Deadlines:<br />

If storage deadlines need to be maintained, this can be achieved by<br />

archiving a data backup generation. In the case of extended storage<br />

deadlines, additional consideration must be given to the required inventory<br />

of reading devices and the fact that a refresh (renewed import of<br />

magnetically stored data) might become necessary, as such media are<br />

demagnetised over long periods of time, so that their data content is<br />

eventually lost.<br />

If erasure deadlines are to be maintained, appropriate organisation is<br />

necessary; availability of the required erasure devices must also be<br />

ensured. Erasure is to be initiated and executed at the specified intervals.<br />

Additional controls:<br />

- Are data backup procedures updated in accordance with changes to the <strong>IT</strong><br />

system?<br />

- Are data restoration exercises carried out periodically?<br />

- Is adherence to the conditions stipulated in the data backup policy being<br />

checked?<br />

- Are the persons responsible for data backup sufficiently trained?<br />

____________________________________________________________________ .........................................<br />

<strong>IT</strong>-<strong>Baseline</strong> <strong>Protection</strong> <strong>Manual</strong>: Oktober 2000

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!