19.12.2012 Views

IT Baseline Protection Manual - The Information Warfare Site

IT Baseline Protection Manual - The Information Warfare Site

IT Baseline Protection Manual - The Information Warfare Site

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

Other <strong>IT</strong> Components Telecommuting<br />

_________________________________________________________________________________________<br />

It is advisable to install the database server in a separate server room. <strong>The</strong> appropriate measures are<br />

described in Chapter 4.3.2. If an office is used simultaneously as a server room, the safeguards<br />

described in Chapter 4.3.1 must also be implemented.<br />

If the database server is installed in a protective cabinet, also refer to Chapter 4.4 Protective Cabinets.<br />

<strong>The</strong> following essential steps must also be taken for databases:<br />

1. Determining the requirements to be fulfilled by the database software.<br />

First prepare a requirements catalogue to allow the selection of a suitable standard database<br />

software (S 2.80 and S 2.124).<br />

2. Training administrators<br />

Before the database software is used in a productive environment, the responsible administrators<br />

must be trained (S 3.11). If possible, this should be done before procuring the software package.<br />

3. Design a database concept<br />

Before using the database software, design a database concept which describes the installation and<br />

configuration of the database software, the suitable concept for database users and their access<br />

rights, as well as the application-specific database. Depending on the capacity and environment of<br />

the database as well as the selected standard database software, such a concept can be very<br />

extensive (S 2.125, S 2.128, S 2.129 and S 2.126).<br />

4. Operating the database<br />

Commissioning and operation of the database include the implementation of the database concept,<br />

as well as continuous monitoring of the DBMS in order to ensure the availability, data integrity and<br />

protection of confidential data. <strong>The</strong> most important safeguards here concern documentation (S<br />

2.25, S 2.31, S 2.34), administration (S 2.130, S 2.133) and utilisation of the database.<br />

5. Contingency planning<br />

In addition to the general safeguards relating to this topic, it is important to consider databasespecific<br />

circumstances in order to keep data losses and recovery times within reasonable limits in<br />

the event of a system crash or database crash. (S 6.32, S 6.49, S 6.50).<br />

<strong>The</strong> safeguard package for databases is listed in the following:<br />

_________________________________________________________________________________________<br />

<strong>IT</strong>-<strong>Baseline</strong> <strong>Protection</strong> <strong>Manual</strong>: Otober 2000

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!