19.12.2012 Views

IT Baseline Protection Manual - The Information Warfare Site

IT Baseline Protection Manual - The Information Warfare Site

IT Baseline Protection Manual - The Information Warfare Site

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

<strong>IT</strong> <strong>Baseline</strong> <strong>Protection</strong> of Generic Components<br />

_________________________________________________________________________________________<br />

Priority<br />

T<br />

1.<br />

7<br />

T<br />

1.<br />

8<br />

T<br />

1.<br />

9<br />

T<br />

2.<br />

3<br />

T<br />

2.<br />

10<br />

_________________________________________________________________________________________<br />

<strong>IT</strong>-<strong>Baseline</strong> <strong>Protection</strong> <strong>Manual</strong>: Otober 2000<br />

T<br />

2.<br />

17<br />

T<br />

2.<br />

18<br />

T<br />

2.<br />

19<br />

S 1.36 2* X X X X X X X X<br />

T<br />

3.<br />

1<br />

S 2.3 2 X X X X X X X X X X X<br />

S 2.42 2 X X<br />

S 2.43 1 X X X X<br />

S 2.44 1 X X X X X X X X X<br />

All the tables are structured in the same way. <strong>The</strong> column headings show the threats listed in the<br />

associated modules together with their numbers. <strong>The</strong> column at the far left shows the numbers of the<br />

safeguards. Column 2 shows the priority assigned to a given safeguard in the module under<br />

consideration. If this column contains an asterisk, then the safeguard concerned should be viewed as<br />

"optional" in this module.<br />

<strong>The</strong> other columns show the relationship between safeguards and threats. An "X" in a given cell means<br />

that the corresponding safeguard is effective against the relevant threat. <strong>The</strong> effect of the safeguard<br />

may be either of a preventive nature or else aimed at mitigating the loss or damage.<br />

Where it is not possible to implement a recommended safeguard, it is possible to see from these tables<br />

which threats, if any, are not properly protected against. In such cases consideration should be given as<br />

to whether an alternative safeguard should be implemented. When using these tables, the number of<br />

"X" entries next to a given safeguard should not be interpreted as an indication of the relative<br />

importance of that safeguard. <strong>The</strong>re are cases of safeguards which are only effective against a single<br />

threat but which are still absolutely essential.<br />

Finally it should be pointed out that all the modules, threats, safeguards, tables and additional aids are<br />

contained on the CD-ROM which comes with the <strong>IT</strong> <strong>Baseline</strong> <strong>Protection</strong> <strong>Manual</strong>. <strong>The</strong> related text may<br />

be reused to assist in drawing up a security concept and/or implementing safeguards.<br />

T<br />

3.<br />

3<br />

T<br />

3.<br />

12<br />

T<br />

3.<br />

13<br />

T<br />

4.<br />

7<br />

T<br />

5.<br />

1<br />

T<br />

5.<br />

2<br />

T<br />

5.<br />

4<br />

T<br />

5.<br />

9<br />

T<br />

5.<br />

23<br />

T<br />

5.<br />

29<br />

T<br />

5.<br />

43

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!