19.12.2012 Views

IT Baseline Protection Manual - The Information Warfare Site

IT Baseline Protection Manual - The Information Warfare Site

IT Baseline Protection Manual - The Information Warfare Site

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

Data Transmission Systems E-Mail<br />

_________________________________________________________________________________________<br />

Organisation:<br />

- S 2.30 (2) Provisions governing the designation of users and of user groups<br />

- S 2.42 (2) Determination of potential communications partners<br />

- S 2.46 (2) Appropriate key management (optional)<br />

- S 2.118 (1) Determination of a security policy for the use of e-mail<br />

- S 2.119 (1) Regulations concerning the use of e-mail services<br />

- S 2.120 (1) Configuration of a mail centre<br />

- S 2.121 (2) Regular deletion of e-mails<br />

- S 2.122 (2) Standard e-mail addresses<br />

- S 2.123 (2) Selection of a mail provider<br />

Personnel:<br />

- S 3.4 (1) Training before actual use of a program<br />

- S 3.5 (1) Education on <strong>IT</strong> security measures<br />

- S 3.10 (1) Selection of a trustworthy administrator and his substitute<br />

- S 3.11 (1) Training of maintenance and administration staff<br />

Hardware & Software:<br />

- S 4.33 (1) Use of a virus scanning program when exchanging of data media and data<br />

transmission<br />

- S 4.34 (2) Using encryption, checksums or digital signatures (optional)<br />

- S 4.44 (2) Checking of incoming data for macro viruses<br />

- S 4.64 (1) Verification of data before transmission / elimination of residual information<br />

- S 4.65 (2) Testing of new hardware and software<br />

Communications:<br />

- S 5.22 (2) Compatibility check of transmission and reception systems (optional)<br />

- S 5.32 (1) Secure use of communications software<br />

- S 5.53 (2) <strong>Protection</strong> against mail bombs<br />

- S 5.54 (2) <strong>Protection</strong> against mail overload and spam<br />

- S 5.55 (2) Checking of alias files and distribution lists<br />

- S 5.56 (1) Secure operation of a mail server<br />

- S 5.57 (1) Secure configuration of mail clients<br />

- S 5.63 (2) Use of PGP (optional)<br />

- S 5.67 (3) Use of a time stamp service (optional)<br />

Contingency Planning:<br />

- S 6.23 (2) Procedure in case of computer virus infection<br />

- S 6.38 (2) Backup copies of transferred data (optional)<br />

_________________________________________________________________________________________<br />

<strong>IT</strong>-<strong>Baseline</strong> <strong>Protection</strong> <strong>Manual</strong>: Otober 2000

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!