19.12.2012 Views

IT Baseline Protection Manual - The Information Warfare Site

IT Baseline Protection Manual - The Information Warfare Site

IT Baseline Protection Manual - The Information Warfare Site

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

<strong>IT</strong> <strong>Baseline</strong> <strong>Protection</strong> of Generic Components<br />

_________________________________________________________________________________________<br />

<strong>The</strong> applications are then in each case assigned to the <strong>IT</strong> systems which are necessary to run them.<br />

This can be the <strong>IT</strong> systems on which the <strong>IT</strong> applications are processed, but it could also include <strong>IT</strong><br />

systems which transfer data generated within the applications.<br />

<strong>The</strong> result of this exercise is a summary of which major <strong>IT</strong> applications are processed on which <strong>IT</strong><br />

systems, used by which <strong>IT</strong> systems and/or transferred by which <strong>IT</strong> systems. It is recommended that the<br />

results are documented in tabular form.<br />

Example: Bundesamt für Organisation und Verwaltung (Federal Agency for Organisation and<br />

Administration, BOV) - Part 3<br />

<strong>The</strong> table below shows an excerpt from the data collected on <strong>IT</strong> applications and their assignment to<br />

the <strong>IT</strong> systems concerned in the fictitious example of the BOV.<br />

Applicn<br />

no.<br />

Description of the <strong>IT</strong> applications <strong>IT</strong>-Systems<br />

<strong>IT</strong> application / information Person<br />

related<br />

data<br />

A1 Processing of HR data X X<br />

A2 Benefits processing X X<br />

A3 Travel expense accounting X X<br />

_________________________________________________________________________________________<br />

<strong>IT</strong>-<strong>Baseline</strong> <strong>Protection</strong> <strong>Manual</strong>: Otober 2000<br />

S1 S2 S3 S4 S5 S6 S7<br />

A4 User authentication X X X<br />

A5 System management X<br />

A6 Exchange (e-mail, diary) X X<br />

A7 Central document administration X<br />

Key: Ai X Sj = Execution of <strong>IT</strong> application Ai depends on <strong>IT</strong> system Sj .<br />

Legende Kapitel 2.1

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!