19.12.2012 Views

IT Baseline Protection Manual - The Information Warfare Site

IT Baseline Protection Manual - The Information Warfare Site

IT Baseline Protection Manual - The Information Warfare Site

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

<strong>IT</strong> <strong>Baseline</strong> <strong>Protection</strong> of Generic Components<br />

_________________________________________________________________________________________<br />

It is very important during this survey to make sure that the summary produced is complete. It only<br />

takes one critical connection to be omitted for the overall security to be compromised. Thus, for<br />

example, all the modems used must be recorded as potentially critical connections to the outside world<br />

could run from them. Often, however, these modem external connections are viewed as objects<br />

conferring prestige on their "owners" and their existence is denied in order to obtain personal<br />

advantage, or modems are purchased and classified as consumables without those responsible for <strong>IT</strong><br />

being informed of the purpose for which they are to be used. However, if <strong>IT</strong> security is to be<br />

maximised, such critical devices and connections must not be overlooked.<br />

Assessment of protection requirements for <strong>IT</strong> rooms<br />

When it comes to <strong>IT</strong> baseline protection modelling and planning of the target versus actual<br />

comparison, it will be helpful if a summary has been drawn up of the rooms in which <strong>IT</strong> systems are<br />

installed or which are used for <strong>IT</strong> operations. <strong>The</strong>se include both rooms which are used solely for <strong>IT</strong><br />

operations (e.g. server rooms, data media archives) and rooms in which <strong>IT</strong> systems happen to be<br />

operated (e.g. offices). Where an <strong>IT</strong> system is housed in a protective cabinet instead of in a special<br />

technology room, the protective cabinet should be classified as a room.<br />

Note: the installation locations should have already been recorded when information was being<br />

gathered about the <strong>IT</strong> systems.<br />

<strong>The</strong> protection requirements for each room should then be derived from the results of the assessment<br />

of the protection requirements of the <strong>IT</strong> systems. This protection requirement is derived from the<br />

protection requirements of the <strong>IT</strong> systems or the data media stored in the room according to the<br />

maximum principle. During this assessment the possibility of a cumulative effect should be considered<br />

where a relatively large number of <strong>IT</strong> systems are located in a single room, such as is frequently the<br />

case in server rooms. In addition, the reasoning behind the assessed protection requirement should be<br />

documented.<br />

Once again, it is helpful to draw up a table containing the necessary information.<br />

Bundesamt für Organisation und Verwaltung (Federal Agency for Organisation and<br />

Administration, BOV) - Part 7<br />

<strong>The</strong> table below shows an extract of the results obtained for the BOV:<br />

Designation<br />

_________________________________________________________________________________________<br />

<strong>IT</strong>-<strong>Baseline</strong> <strong>Protection</strong> <strong>Manual</strong>: Otober 2000<br />

Room <strong>IT</strong> assets <strong>Protection</strong> requirement<br />

Type Location <strong>IT</strong> systems / data media Confidentiality<br />

R U.02 Data media<br />

archive<br />

R B.02 Technology<br />

room<br />

Bonn building Backup data media<br />

(weekly backups of<br />

servers S1 to S5)<br />

Bonn building Private Branch<br />

Exchange<br />

Integrity Availabilit<br />

y<br />

High High Modera<br />

te<br />

Modera<br />

te<br />

Modera<br />

te<br />

R 1.01 Server room Bonn building S1, N4 High High Modera<br />

te<br />

R 1.02 -<br />

R 1.06<br />

Offices Bonn building C1 High Modera<br />

te<br />

R 3.11 Protective<br />

cabinet in room<br />

R 3.11<br />

Bonn building Backup data media<br />

(daily backups of<br />

servers S1 to S5)<br />

High<br />

Modera<br />

te<br />

High High Modera<br />

te

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!