19.12.2012 Views

IT Baseline Protection Manual - The Information Warfare Site

IT Baseline Protection Manual - The Information Warfare Site

IT Baseline Protection Manual - The Information Warfare Site

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

Networked Systems<br />

_________________________________________________________________________________________<br />

1.2 Definition of the concept (see S 2.169 Developing a system management strategy)<br />

2. Before purchasing the management system, it is first necessary<br />

2.1 to formulate the requirements for the management product resulting from the management<br />

concept (see S 2.170 Requirements to be met by a system management system) and, based on<br />

this,<br />

2.2 to select a suitable management product (see S 2.171 Selection of a suitable system<br />

management product)<br />

3. <strong>The</strong> security-relevant safeguards for the operation of the management system are divided into the<br />

areas:<br />

3.1 Installation with the implementation of the management concept (see S 4.9 Secure<br />

installation of a system management system) and<br />

3.2 the current operation of the management system (see S 4.92 Secure operation of a system<br />

management system). Of course, the previous safeguards for<br />

3.3 the current operation of the managed system should also be observed (see chapters 4 to 9).<br />

<strong>The</strong> following section presents the range of safeguards for the module Network and system<br />

management.<br />

_________________________________________________________________________________________<br />

<strong>IT</strong>-<strong>Baseline</strong> <strong>Protection</strong> <strong>Manual</strong>: Otober 2000

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!