19.12.2012 Views

IT Baseline Protection Manual - The Information Warfare Site

IT Baseline Protection Manual - The Information Warfare Site

IT Baseline Protection Manual - The Information Warfare Site

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

Threats Catalogue Deliberate Acts Remarks<br />

____________________________________________________________________ .........................................<br />

T 2.61 Unauthorised collection of personal data<br />

When management systems are used, a large amount of auditing data usually<br />

arises which, as a rule, is produced and evaluated automatically. This is<br />

particularly true for the areas of network and system monitoring. Without<br />

keeping detailed records of the system activities it is, for example, also<br />

impossible to detect security violations. One requirement is that the<br />

monitoring system can determine when certain data has been accessed and<br />

which user has accessed it. <strong>The</strong>refore, a record of the monitored activities<br />

must be kept for each user. As a rule, the management strategy determines for<br />

the whole organisation, in agreement with the data security officer, which user<br />

activities should be monitored for security reasons. You must inform the<br />

affected users of this correspondingly. Within the framework of the system<br />

revision, you must check that the requirements laid down by the management<br />

strategy are adhered to. It is possible that the management system, while<br />

performing a normal function, draws up temporary log files which are then<br />

stored in the poorly-protected area for log files. <strong>The</strong> log files are then<br />

potentially accessible at least as long as they exist and may also contain user<br />

information.<br />

____________________________________________________________________ .........................................<br />

<strong>IT</strong>-<strong>Baseline</strong> <strong>Protection</strong> <strong>Manual</strong>: Oktober 2000

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!