19.12.2012 Views

IT Baseline Protection Manual - The Information Warfare Site

IT Baseline Protection Manual - The Information Warfare Site

IT Baseline Protection Manual - The Information Warfare Site

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

<strong>IT</strong> <strong>Baseline</strong> <strong>Protection</strong> of Generic Components<br />

_________________________________________________________________________________________<br />

1.4 Brief Outline of Existing Modules<br />

<strong>The</strong> overview which follows provides a brief outline of the modules which currently exist in the <strong>IT</strong><br />

<strong>Baseline</strong> <strong>Protection</strong> <strong>Manual</strong>. It gives a compact summary of the scope of the recommended safeguards<br />

contained in the <strong>IT</strong> <strong>Baseline</strong> <strong>Protection</strong> <strong>Manual</strong>.<br />

3.0 <strong>IT</strong> Security Management<br />

This chapter presents a systematic approach to establishing functional <strong>IT</strong> security management and<br />

adapting it over time in line with developments in business operations.<br />

3.1 Organisation<br />

This module lists the organisational procedures that are basically required for <strong>IT</strong> security. Examples<br />

are the determination of responsibilities, data media administration and procedures regarding the use<br />

of passwords. <strong>The</strong>y apply to every <strong>IT</strong> system.<br />

3.2 Personnel<br />

<strong>The</strong> Personnel module describes staff-related safeguards to be observed for the achievement of <strong>IT</strong><br />

security. Examples are arrangements during staff absences, training activities, and controlled<br />

procedures in the case of termination of employment. <strong>The</strong>y apply regardless of the type of <strong>IT</strong> system<br />

employed.<br />

3.3 Contingency Planning Concept<br />

This module presents a procedure for drawing up a contingency planning concept and is especially<br />

important for larger <strong>IT</strong> systems.<br />

3.4 Data Backup Policy<br />

This module shows how a sound data backup policy can be systematically developed. It is especially<br />

intended for larger <strong>IT</strong> systems or <strong>IT</strong> systems on which a large amount of data is stored.<br />

3.5 Data Privacy <strong>Protection</strong><br />

This module presents the basic conditions for realistic data privacy and shows the interrelationship of<br />

<strong>IT</strong> security and <strong>IT</strong> baseline protection. It was developed under the lead of the Federal Data Privacy<br />

Officer (BfD) in co-operation with the data privacy officers of the German state and the individual<br />

German Länder, and can be obtained from the BfD.<br />

3.6 Computer Virus <strong>Protection</strong> Concept<br />

<strong>The</strong> aim of the computer virus protection concept is to create a suitable package of safeguards which<br />

will enable penetration of an organisation's <strong>IT</strong> systems by computer viruses to be prevented or<br />

detected as early as possible so that countermeasures can be taken and possible damage can be<br />

minimised.<br />

3.7 Crypto Concept<br />

This module describes a procedure whereby in a heterogeneous environment both the data stored<br />

locally and the data to be transmitted can be protected effectively through cryptographic procedures<br />

and techniques.<br />

3.8 Handling of Security Incidents<br />

To maintain <strong>IT</strong> security in ongoing operations, it is necessary to have developed and practised a policy<br />

for the handling of security incidents. A security incident is an event whose impact could cause<br />

_________________________________________________________________________________________<br />

<strong>IT</strong>-<strong>Baseline</strong> <strong>Protection</strong> <strong>Manual</strong>: Otober 2000

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!