19.12.2012 Views

IT Baseline Protection Manual - The Information Warfare Site

IT Baseline Protection Manual - The Information Warfare Site

IT Baseline Protection Manual - The Information Warfare Site

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

Other <strong>IT</strong> Components Standard software<br />

_________________________________________________________________________________________<br />

- S 4.73 (2) Specifying upper limits for selectable data records<br />

Communication<br />

- S 5.58 (1) Installation of ODBC drivers<br />

Contingency Planning<br />

- S 6.32 (1) Regular data backup<br />

- S 6.48 (2) Procedures in case of a loss of database integrity<br />

- S 6.49 (1) Data backup in a database<br />

- S 6.50 (1) Archiving database<br />

- S 6.51 (3) Restoring a database<br />

<strong>The</strong> following essential steps must also be taken for databases:<br />

1. Determining the requirements to be fulfilled by the database software.<br />

First prepare a requirements catalogue to allow the selection of a suitable standard database<br />

software (S 2.80 and S 2.124).<br />

2. Training administrators<br />

Before the database software is used in a productive environment, the responsible administrators<br />

must be trained (S 3.11). If possible, this should be done before procuring the software package.<br />

3. Design a database concept<br />

Before using the database software, design a database concept which describes the installation and<br />

configuration of the database software, the suitable concept for database users and their access<br />

rights, as well as the application-specific database. Depending on the capacity and environment of<br />

the database as well as the selected standard database software, such a concept can be very<br />

extensive (S 2.125, S 2.128, S 2.129 and S 2.126).<br />

4. Operating the database<br />

Commissioning and operation of the database include the implementation of the database concept,<br />

as well as continuous monitoring of the DBMS in order to ensure the availability, data integrity and<br />

protection of confidential data. <strong>The</strong> most important safeguards here concern documentation (S<br />

2.25, S 2.31, S 2.34), administration (S 2.130, S 2.133) and utilisation of the database.<br />

5. Contingency planning<br />

In addition to the general safeguards relating to this topic, it is important to consider databasespecific<br />

circumstances in order to keep data losses and recovery times within reasonable limits in<br />

the event of a system crash or database crash. (S 6.32, S 6.49, S 6.50).<br />

<strong>The</strong> safeguard package for databases is listed in the following:<br />

_________________________________________________________________________________________<br />

<strong>IT</strong>-<strong>Baseline</strong> <strong>Protection</strong> <strong>Manual</strong>: Otober 2000<br />

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!