19.12.2012 Views

IT Baseline Protection Manual - The Information Warfare Site

IT Baseline Protection Manual - The Information Warfare Site

IT Baseline Protection Manual - The Information Warfare Site

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

Threats Catalogue Deliberate Acts Remarks<br />

____________________________________________________________________ .........................................<br />

T 2.66 Lack of or Inadequate <strong>IT</strong> Security<br />

Management<br />

<strong>The</strong> complexity of the <strong>IT</strong> systems used in many enterprises today and the<br />

trend towards networking these systems makes it imperative to proceed in an<br />

organised fashion with regard to planning, implementation and monitoring of<br />

the <strong>IT</strong> security process. Experience shows that it is not sufficient simply to<br />

arrange for safeguards to be implemented, as often the individuals concerned,<br />

especially the <strong>IT</strong> users, do not have the technical expertise and/or time that are<br />

needed to implement them properly. As a result, security measures frequently<br />

fail to be implemented at all so that it is impossible to attain a satisfactory<br />

level of security. Even if a satisfactory level of security is achieved, it must be<br />

continuously nurtured if it is to remain current.<br />

Inadequate <strong>IT</strong> security management is often a symptom of a poor overall<br />

organisation of the <strong>IT</strong> security process and hence of <strong>IT</strong> operations as a whole.<br />

Examples of specific threats which result from inadequate <strong>IT</strong> security<br />

management include the following:<br />

- Lack of personal responsibility. If no <strong>IT</strong> security Management Team has<br />

been set up in an organisation or if no <strong>IT</strong> Security Officer has been<br />

appointed and personal responsibilities for implementing individual<br />

measures have not been clearly defined, then it is likely that many <strong>IT</strong> users<br />

will decline to take responsibility for <strong>IT</strong> security, maintaining that it is the<br />

responsibility of those above them in the organisational hierarchy.<br />

Consequently safeguards which at the outset nearly always require extra<br />

work on top of one’s normal duties remain unimplemented.<br />

- Inadequate support from management. Usually <strong>IT</strong> Security Officers are not<br />

members of an organisation’s management team. If the latter does not<br />

unambiguously support the <strong>IT</strong> Security Officers in their work, this could<br />

make it difficult to effectively require that the necessary measures are<br />

implemented, including by <strong>IT</strong> users who are above them in the<br />

organisational hierarchy. In these circumstances, there is no guarantee that<br />

the <strong>IT</strong> security process will be fully implemented.<br />

- Inadequate strategic and conceptual requirements. In many organisations<br />

the job of drawing up an <strong>IT</strong> security concept is commissioned, its content is<br />

known to only a few insiders and its requirements are either deliberately or<br />

unconsciously not adhered to in those parts of the organisation where<br />

organisational effort would be required in order to implement it. To the<br />

extent that the <strong>IT</strong> security concept contains strategic objectives, these are<br />

often viewed simply as a collection of declarations of intent, and<br />

insufficient resources are made available to implement them. Frequently it<br />

is falsely assumed that in an automated environment security is<br />

automatically generated. Sometimes spurts of activity are triggered in<br />

response to a damaging incident in the organisation or in other<br />

organisations with a similar structure, but at best only a subset of the issues<br />

are properly addressed.<br />

- Insufficient or misdirected investment. If the Management of an<br />

organisation is not kept informed of the security status of the <strong>IT</strong> systems<br />

and applications and of existing shortcomings through regular <strong>IT</strong> security<br />

____________________________________________________________________ .........................................<br />

<strong>IT</strong>-<strong>Baseline</strong> <strong>Protection</strong> <strong>Manual</strong>: Oktober 2000<br />

Uncoordinated approach<br />

Shortcomings in overall<br />

organisation

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!