19.12.2012 Views

IT Baseline Protection Manual - The Information Warfare Site

IT Baseline Protection Manual - The Information Warfare Site

IT Baseline Protection Manual - The Information Warfare Site

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

<strong>IT</strong> <strong>Baseline</strong> <strong>Protection</strong> of Generic Components<br />

_________________________________________________________________________________________<br />

themselves, the various communications links must now be considered. In this analysis, the following<br />

communications links should be regarded as critical:<br />

- Communication links to the outside world, i.e. which lead into or through uncontrolled areas (e.g.<br />

to the Internet or over land to which the public have access). <strong>The</strong>se links are potentially exposed to<br />

the threat of attempts to penetrate the system to be protected from outside and the danger of<br />

computer viruses or Trojan horses being imported. Moreover, an internal perpetrator could pass<br />

confidential information to the outside world over such connection.<br />

- Communications links over which information which has a high protection requirement is<br />

transmitted. <strong>The</strong> information concerned may have a high protection requirement as regards either<br />

one or more of the basic parameters of confidentiality, integrity and availability. <strong>The</strong>se links could<br />

be targeted for wilful bugging or tampering. Moreover, failure of such a link could have a<br />

detrimental effect on the operational capability of significant numbers of <strong>IT</strong> assets.<br />

- Communications links over which certain highly sensitive information may not be transmitted.<br />

Here the primary concern is the transmission of confidential information. If any network switching<br />

elements are configured inappropriately or incorrectly, it could be possible for precisely this<br />

information which should not be transmitted over such a connection to nevertheless be transmitted<br />

and as a result become vulnerable to attack.<br />

One approach to gathering information about critical communications links is as follows. Initially all<br />

"external connections" are identified and recorded as critical connections. All the connections which<br />

lead from an <strong>IT</strong> system with a high or very high protection requirement are then investigated. In this<br />

way the connections over which information having a high protection requirement is transmitted are<br />

identified. <strong>The</strong> connections over which this sensitive data is transmitted downstream are then<br />

investigated. Finally the communication links over which such information is not supposed to be<br />

transmitted must be identified. <strong>The</strong> information collected should include:<br />

- the communications routes;<br />

- whether the connection has an outside link;<br />

- whether information having a high protection requirements is transmitted and whether this<br />

protection requirement is related to confidentiality, integrity or availability;<br />

- whether information having a high protection requirement is not allowed to be transmitted over the<br />

line.<br />

<strong>The</strong> data collected during this exercise can either be documented in tabular form or else highlighted<br />

graphically on the network plan.<br />

Bundesamt für Organisation und Verwaltung (Federal Agency for Organisation and<br />

Administration, BOV) - Part 6<br />

In our fictitious example of the BOC, there are the following critical connections:<br />

_________________________________________________________________________________________<br />

<strong>IT</strong>-<strong>Baseline</strong> <strong>Protection</strong> <strong>Manual</strong>: Otober 2000

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!