19.12.2012 Views

IT Baseline Protection Manual - The Information Warfare Site

IT Baseline Protection Manual - The Information Warfare Site

IT Baseline Protection Manual - The Information Warfare Site

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

Other <strong>IT</strong> Components Telecommuting<br />

_________________________________________________________________________________________<br />

- T 5.21 Trojan Horses<br />

- T 5.23 Computer viruses<br />

- T 5.24 Replay of messages<br />

- T 5.25 Masquerade<br />

- T 5.43 Macro viruses<br />

- T 5.71 Loss of confidentiality of classified information<br />

Recommended Countermeasures (S)<br />

For the implementation of <strong>IT</strong> baseline protection, selection of the required packages of safeguards<br />

("modules") as described in chapters 2.3 and 2.4, is recommended.<br />

A sufficiently reliable form of telecommuting is only achieved if <strong>IT</strong> security measures from several<br />

areas are allowed to overlap and complement each other. If any one of these areas is neglected, secure<br />

telecommuting can no longer be ensured. <strong>The</strong> individual areas and essential measures are:<br />

- Infrastructural reliability of the remote workstation: Measures to be implemented at the remote<br />

workstation are described in Chapter 4.5 titled "Working Place at Home".<br />

- Organisation of telecommuting: Secure telecommuting requires organisational regulations and<br />

measures for governing staff activities. <strong>The</strong>se are listed in the following under the general headings<br />

"Organisation" and "Personnel". Particular attention needs to be paid to the obligations and<br />

assignments of telecommuters, and rules concerning the usage of communications facilities. <strong>The</strong>y<br />

are described in the following measures:<br />

- S 2.113 Requirements documents concerning telecommuting<br />

- S 2.116 Regulated use of communications facilities<br />

- S 2.117 Regulation of access by telecommuters<br />

- S 3.21 Training and further education of telecommuters as regards security-related issues<br />

- Security of the telecommuting workstations: <strong>The</strong> remote computer must be configured so as to<br />

allow secure use even in an unsecure operational environment. In particular, only one authorised<br />

person should be able to use the remote computer in the online and offline states. <strong>The</strong> related<br />

measures are summarised under the general headings "Hardware/software" and "Contingency<br />

measures". In particular, the security requirements in S 4.63 Security requirements for remote<br />

computers should be observed.<br />

- Secure communications between telecommuting workstations and an institution: As<br />

communications take place via public networks, special security requirements concerning the<br />

exchange of data between telecommuting workstations and an institution need to be observed.<br />

<strong>The</strong>se are described in S 5.51 Security-related requirements for communications links between<br />

telecommuting workstations and the institution. For the linkage of a remote computer via the public<br />

network, refer to Chapter 8.4 titled "LAN linkage of an <strong>IT</strong> system via ISDN".<br />

- <strong>Protection</strong> of communications computers at institutions: To a certain extent, these computers<br />

constitute a publicly accessible interface via which telecommuters can make use of information<br />

technology and data at the institution. As misuse by unauthorised parties needs to be prevented<br />

here, special security requirements described in S 5.52 Security requirements for communications<br />

computers must be met.<br />

_________________________________________________________________________________________<br />

<strong>IT</strong>-<strong>Baseline</strong> <strong>Protection</strong> <strong>Manual</strong>: Otober 2000

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!