19.12.2012 Views

IT Baseline Protection Manual - The Information Warfare Site

IT Baseline Protection Manual - The Information Warfare Site

IT Baseline Protection Manual - The Information Warfare Site

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

Networked Systems<br />

_________________________________________________________________________________________<br />

3. Reliable operation of a network<br />

- Segmentation of a network (refer to S 5.61 Suitable physical segmentation and S 5.62<br />

Suitable logical segmentation)<br />

- Use of a network management software package (refer to S 2.145 Requirements for a<br />

network management tool and S 2.146 Reliable operation of a network management system)<br />

- Auditing of a network (refer to S 4.81 Auditing and logging of activities in a network and S<br />

2.64 Checking the log files)<br />

4. Contingency planning<br />

- Redundant arrangement of network components (refer to S 6.53 Redundant arrangement of<br />

network components)<br />

- Backup of configuration files (refer to S 6.52 Regular backup of configuration data of active<br />

network components and S 6.22 Sporadic checks of the restorability of backups)<br />

<strong>The</strong> complete package of safeguards for the area of heterogeneous networks is presented in the<br />

following; this package includes measures of a fundamental nature which need to be noted in addition<br />

to the measures described above.<br />

_________________________________________________________________________________________<br />

<strong>IT</strong>-<strong>Baseline</strong> <strong>Protection</strong> <strong>Manual</strong>: Otober 2000

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!