19.12.2012 Views

IT Baseline Protection Manual - The Information Warfare Site

IT Baseline Protection Manual - The Information Warfare Site

IT Baseline Protection Manual - The Information Warfare Site

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

<strong>IT</strong> <strong>Baseline</strong> <strong>Protection</strong> of Generic Components<br />

_________________________________________________________________________________________<br />

the target versus actual comparison as being inadequate or missing and those identified for <strong>IT</strong> assets<br />

which are still at the planning stage.<br />

To map a generally complex set of <strong>IT</strong> assets to the modules in the manual it is recommended that the<br />

<strong>IT</strong> security aspects are considered as groups arranged according to particular topics.<br />

Tier 1<br />

Tier 2<br />

Tier 3<br />

Tier 4<br />

Tier 5<br />

_________________________________________________________________________________________<br />

<strong>IT</strong>-<strong>Baseline</strong> <strong>Protection</strong> <strong>Manual</strong>: Otober 2000<br />

Universally applicable aspects<br />

Infrastructure<br />

<strong>IT</strong> systems<br />

Networks<br />

<strong>IT</strong> applications<br />

Figure: Tiers in the <strong>IT</strong> baseline protection model<br />

<strong>The</strong> <strong>IT</strong> security aspects of a set of <strong>IT</strong> assets are assigned to the individual tiers as follows:<br />

- Tier 1 covers all the general <strong>IT</strong> security aspects which apply equally to all or large numbers of the<br />

<strong>IT</strong> assets, particularly any universally applicable concepts and the procedures derived therefrom.<br />

Typical Tier 1 modules include <strong>IT</strong> Security Management, Organisation, Data Backup Policy and<br />

Computer Virus <strong>Protection</strong> Concept.<br />

- Tier 2 is concerned with architectural and structural factors, in which aspects of the infrastructural<br />

security are brought together. This concerns especially the Buildings, Rooms, Protective Cabinets<br />

and Working Place at Home (Telecommuting) modules.<br />

- Tier 3 concerns the individual <strong>IT</strong> systems in the set of <strong>IT</strong> assets which may be grouped together.<br />

<strong>The</strong> <strong>IT</strong> security aspects considered here relate not only to clients but also to servers and stand-alone<br />

systems. Thus, for example, the modules UNIX System, Laptop PC, Windows NT Network and<br />

Telecommunications System (Private Branch Exchange) fall within Tier 3.<br />

- Tier 4 considers the networking aspects of the <strong>IT</strong> systems, which refer to the network connections<br />

and communications rather than to particular <strong>IT</strong> systems. <strong>The</strong> modules which are relevant here<br />

include, for example, Heterogeneous Networks, Network and System Management and Firewalls.<br />

- Finally Tier 5 is concerned with the actual <strong>IT</strong> applications which are used on the <strong>IT</strong> assets. In this<br />

tier, the modules used for modelling purposes could include E-Mail, WWW Server, Fax Servers and<br />

Databases.<br />

Using this tier approach has the following advantages.<br />

- <strong>The</strong> complexity of the <strong>IT</strong> security is reduced because the individual aspects are divided up in a<br />

meaningful manner.<br />

- As higher order aspects and common infrastructural issues are considered separately from the <strong>IT</strong><br />

systems, duplication of effort is avoided as those aspects only need to be dealt with once and not<br />

repeated for every <strong>IT</strong> system.<br />

- <strong>The</strong> various tiers have been defined so that responsibilities for the aspects under consideration are<br />

grouped. Tier 1 is concerned with fundamental issues relating to the use of <strong>IT</strong>, Tier 2 with site<br />

technical services, Tier 3 with matters that concern administrators and <strong>IT</strong> users, Tier 4 with matters

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!