19.12.2012 Views

IT Baseline Protection Manual - The Information Warfare Site

IT Baseline Protection Manual - The Information Warfare Site

IT Baseline Protection Manual - The Information Warfare Site

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

Networked Systems<br />

_________________________________________________________________________________________<br />

In order to address the individual components of the system to be managed, the manager exchanges<br />

information with the agents. <strong>The</strong> type of protocol used for the communication has a considerable<br />

impact on the capabilities and, in particular, the security of the management system.<br />

Management systems can basically be divided into three categories according to the communication<br />

protocol used (see also S 2.144 Selection of a suitable network management protocol):<br />

1. SNMP (Simple Network Management Protocol), the widespread standard protocol of the TCP/IPbased<br />

system management, is used.<br />

2. CMIP (Common Management <strong>Information</strong> Protocol), the less-common standard protocol of the<br />

ISO/OSI-based system management, is used.<br />

3. A manufacturer-specific protocol is used. It is normally possible to use what are known as adapters<br />

to integrate the standard protocols, whereby there is usually only a SNMP connection.<br />

<strong>The</strong> SNMP protocol is used most often. SNMP is an extremely simple protocol which only recognises<br />

five types of messages and is therefore easy to implement. CMIP is mainly used to manage<br />

telecommunications networks and is irrelevant in management based on the Internet or Intranet, as it<br />

uses the OSI protocol stack rather than the TCP/IP stack.<br />

Although system management systems usually have a centralist structure to allow the system to be<br />

managed from a management station, the exact architecture depends on the possible size of the<br />

systems which can be managed and on the range of functions offered. <strong>The</strong>se systems range from<br />

simple collections of management tools which can be used next to each other in small networks<br />

without being integrated to management platforms which can manage a world-wide company network<br />

containing thousands of computers.<br />

Certain management platforms use proprietary protocols for communication between the components.<br />

<strong>The</strong>se systems usually have a higher performance range and are not only used for network and system<br />

management but also offer resource management for entire organisations. Through the insufficientlyspecified<br />

security mechanisms in the few existing standards, the manufacturers' own solutions provide<br />

security-relevant mechanisms such as cryptographic techniques.<br />

Threat Scenario<br />

<strong>The</strong> following typical threats are assumed for the <strong>IT</strong> baseline protection of a management system:<br />

_________________________________________________________________________________________<br />

<strong>IT</strong>-<strong>Baseline</strong> <strong>Protection</strong> <strong>Manual</strong>: Otober 2000

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!