19.12.2012 Views

IT Baseline Protection Manual - The Information Warfare Site

IT Baseline Protection Manual - The Information Warfare Site

IT Baseline Protection Manual - The Information Warfare Site

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

Other <strong>IT</strong> Components Telecommuting<br />

_________________________________________________________________________________________<br />

<strong>The</strong> package of measures for the area of telecommuting is listed in the following:<br />

Organisation:<br />

- S 2.9 (2) Ban on using non-approved software<br />

- S 2.22 (2) Escrow of passwords<br />

- S 2.23 (3) Issue of PC Use guidelines (optional)<br />

- S 2.64 (2) Checking the log files (on the workstations at home and the institution)<br />

- S 2.113 (2) Requirements documents concerning telecommuting<br />

- S 2.114 (2) Flow of information between the telecommuter and the institution<br />

- S 2.115 (2) Care and maintenance of workstations for telecommuting<br />

- S 2.116 (1) Regulated use of communications facilities<br />

- S 2.117 (1) Regulation of access by telecommuters<br />

Personnel:<br />

- S 3.4 (1) Training before actual use of a program<br />

- S 3.5 (1) Education on <strong>IT</strong> security measures<br />

- S 3.21 (1) Training and further education of telecommuters as regards security-related issues<br />

- S 3.22 (2) Regulations concerning substitution of telecommuters<br />

Hardware & Software:<br />

- S 4.3 (2) Periodic runs of a virus detection program<br />

- S 4.30 (2) Utilisation of the security functions offered in application programs<br />

- S 4.33 (1) Use of a virus scanning program when exchanging of data media and data<br />

transmission<br />

- S 4.44 (2) Checking of incoming data for macro viruses<br />

- S 4.63 (1) Security-related requirements for telecommuting computers<br />

Communications:<br />

- S 5.51 (1) Security-related requirements for communications links between telecommuting<br />

workstations and the institution<br />

- S 5.52 (1) Security-related requirements for communications computers<br />

Contingency Planning:<br />

- S 6.13 (2) Development of a data backup plan<br />

- S 6.22 (2) Sporadic checks of the restorability of backups<br />

- S 6.23 (2) Procedure in case of computer virus infection<br />

- S 6.32 (1) Regular data backup<br />

- S 6.38 (2) Back-up copies of transferred data<br />

- S 6.47 (2) Storage of backup copies as part of telecommuting<br />

_________________________________________________________________________________________<br />

<strong>IT</strong>-<strong>Baseline</strong> <strong>Protection</strong> <strong>Manual</strong>: Otober 2000<br />

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!