19.12.2012 Views

IT Baseline Protection Manual - The Information Warfare Site

IT Baseline Protection Manual - The Information Warfare Site

IT Baseline Protection Manual - The Information Warfare Site

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

<strong>IT</strong> <strong>Baseline</strong> <strong>Protection</strong> of Generic Components<br />

_________________________________________________________________________________________<br />

Assessment of protection requirements<br />

<strong>The</strong> aim of the assessment of protection requirements is to ascertain what protection is adequate and<br />

reasonable for the information and the <strong>IT</strong> assets used. For each application and the information<br />

processed within it the potential damage which could occur as a result of loss of confidentiality,<br />

integrity or availability is considered. A realistic assessment of the possible consequential damage is<br />

also important here. It has proved useful to distinguish three protection requirements categories, "basic<br />

to moderate", "high" and "very high". Explanations and practical advice on the assessment of<br />

protection requirements are to be found in Section 2.2.<br />

Security concept<br />

It is customary today in both the public and private sectors to network large numbers of <strong>IT</strong> assets. It is<br />

therefore generally expedient when performing an <strong>IT</strong> security analysis or drawing up an <strong>IT</strong> security<br />

concept to consider the <strong>IT</strong> assets as a whole rather than individual <strong>IT</strong> systems. To make this task<br />

manageable, it is useful to break down the <strong>IT</strong> assets into logically distinct parts and to consider each<br />

part separately. Before the <strong>IT</strong> <strong>Baseline</strong> <strong>Protection</strong> <strong>Manual</strong> can be applied to a set of <strong>IT</strong> assets, detailed<br />

documentation regarding its structure must be available. This can be obtained, for example, through<br />

performing the <strong>IT</strong> structure analysis mentioned above. <strong>The</strong> <strong>IT</strong> <strong>Baseline</strong> <strong>Protection</strong> <strong>Manual</strong> modules<br />

must then be mapped onto the various components which make up the <strong>IT</strong> assets in a modelling stage.<br />

Section 2.3 of this manual describes how to model the <strong>IT</strong> assets using modules of the manual.<br />

Section 2.4 describes how to then gather information about existing <strong>IT</strong> protection using a basic<br />

security check.<br />

Basic security check<br />

<strong>The</strong> basic security check is an organisational tool which provides a rapid overview of the existing <strong>IT</strong><br />

security level. Interviews are used to establish the status quo of an existing set of <strong>IT</strong> assets (assuming<br />

<strong>IT</strong> baseline protection) in relation to the extent to which the security safeguards contained in the <strong>IT</strong><br />

<strong>Baseline</strong> <strong>Protection</strong> <strong>Manual</strong> have been implemented. <strong>The</strong> outcome of this check is a catalogue in<br />

which the implementation status of each of the relevant safeguards is classified "Unnecessary", "Yes",<br />

"Partially" or "No". By identifying safeguards which have not yet been implemented or have only<br />

been partially implemented it is possible to identify where there is scope for improving the security of<br />

the <strong>IT</strong> assets concerned. Section 2.4 describes an action plan for performing a basic security check.<br />

This takes into account both the organisational aspects and also the technical requirements during<br />

project implementation.<br />

<strong>IT</strong> security audit<br />

<strong>The</strong> security safeguards contained in the <strong>IT</strong> <strong>Baseline</strong> <strong>Protection</strong> <strong>Manual</strong> can also be used to carry out<br />

an audit of <strong>IT</strong> security. By way of example, checklists based on the modules<br />

- 3.1 Organisation<br />

- 3.2 Personnel<br />

- 5.5 PC under Windows NT<br />

- 5.6 PC with Windows 95<br />

have been developed which are intended to support <strong>IT</strong> security management in reviewing the <strong>IT</strong><br />

security implemented in the agency/company. Checklists are contained on the CD-ROM which comes<br />

with the <strong>IT</strong> <strong>Baseline</strong> <strong>Protection</strong> <strong>Manual</strong> (see Annex: Additional Aids). <strong>The</strong> current versions of the<br />

checklists should not be viewed as definitive; they merely serve as the basis for discussions and<br />

exchanges of experience with users of the <strong>IT</strong> <strong>Baseline</strong> <strong>Protection</strong> <strong>Manual</strong>. Comments and suggestions<br />

for improvement can be forwarded by e-mail to itbpm@bsi.de.<br />

_________________________________________________________________________________________<br />

<strong>IT</strong>-<strong>Baseline</strong> <strong>Protection</strong> <strong>Manual</strong>: Otober 2000

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!