19.12.2012 Views

IT Baseline Protection Manual - The Information Warfare Site

IT Baseline Protection Manual - The Information Warfare Site

IT Baseline Protection Manual - The Information Warfare Site

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

<strong>IT</strong> <strong>Baseline</strong> <strong>Protection</strong> of Generic Components<br />

_________________________________________________________________________________________<br />

If these two criteria do not lend themselves to a suitable division of the full network (for example<br />

because some of the resulting subnetworks are too large or too small), as an alternative the division<br />

into subnetworks may proceed at the organisational level. Under this approach, the subnetworks are<br />

defined so that they correspond to discreet areas of responsibility of the different administrators or<br />

teams of administrators.<br />

It is not possible to make a definite recommendation as to how best to subdivide the complete network<br />

into subnetworks, as the requirements stated above might be incompatible with the existing <strong>IT</strong> assets.<br />

Instead, a decision should be made in the individual case as to what is the most practical way of<br />

splitting up the complete network, bearing in mind the modules of the <strong>IT</strong> <strong>Baseline</strong> <strong>Protection</strong> <strong>Manual</strong><br />

which are to be used.<br />

- Module 6.7 Heterogeneous Networks must generally be applied to every subnetwork. However, if<br />

the subnetworks are small and several subnetworks fall within the responsibility of the same team<br />

of administrators, it may be sufficient to apply module 6.7 only once to all of these subnetworks.<br />

- Module 6.8 Network and System Management must be applied to every network or system<br />

management system used on the <strong>IT</strong> assets under consideration.<br />

- Module 7.2 Modem must be applied to every <strong>IT</strong> system equipped with a modem or to each<br />

corresponding sample thereof.<br />

- Module 7.3 Firewall must be applied to every external connection to third party <strong>IT</strong> systems or<br />

networks where <strong>IT</strong> systems in the internal network which have a high protection requirement can<br />

be accessed over this external connection. This applies also if no firewall system is in use there yet.<br />

Examples here are Internet connections, remote access facilities and links to networks owned by<br />

business partners.<br />

- Module 7.6 Remote Access must be applied once wherever remote access to the internal network<br />

is possible by a route other than over a dedicated leased line (e.g. telework, linking of staff working<br />

out in the field over analogue dial-up lines, ISDN or mobile phone).<br />

- Module 8.4 LAN integration of an <strong>IT</strong> system via ISDN must be applied to all external<br />

connections which are implemented over ISDN.<br />

Tier 5: Security in applications<br />

<strong>The</strong> lowest tier entails modelling of the applications. Modern applications are seldom limited to a<br />

single <strong>IT</strong> system. In particular, core applications used across an entire organisation are generally<br />

implemented as client/server applications. In many cases servers themselves access other servers<br />

downstream, e.g. database systems. <strong>The</strong> security of the applications must therefore be considered<br />

independently of the <strong>IT</strong> systems and networks.<br />

- Module 7.1 Exchange of Data Media should be used once for every application which serves as a<br />

source of data for an exchange of data media or processes data received by this route.<br />

- Module 7.4 E-Mail must be applied to every e-mail system (internal or external) of the <strong>IT</strong> assets<br />

under consideration.<br />

- Module 7.5 WWW Server must be applied to every WWW service (e.g. Intranet or Internet) of the<br />

<strong>IT</strong> assets under consideration.<br />

- Module 8.5 must be applied to every fax server or to every sample of the same from a<br />

corresponding group.<br />

- Module 9.2 Databases should be used once for every database system or sample of the same.<br />

_________________________________________________________________________________________<br />

<strong>IT</strong>-<strong>Baseline</strong> <strong>Protection</strong> <strong>Manual</strong>: Otober 2000

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!