19.12.2012 Views

IT Baseline Protection Manual - The Information Warfare Site

IT Baseline Protection Manual - The Information Warfare Site

IT Baseline Protection Manual - The Information Warfare Site

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

<strong>IT</strong> <strong>Baseline</strong> <strong>Protection</strong> of Generic Components<br />

_________________________________________________________________________________________<br />

Completeness check<br />

In the final step a check should be performed as to whether the entire system has been modelled<br />

without any gaps. It is recommended that the network plan or a similar overview of the <strong>IT</strong> assets is<br />

used here and that the individual components are checked systematically. Every component should<br />

either be assigned to a group or else be modelled separately. If the complete network has been divided<br />

into subnetworks in connection with Tier 4, a check should be performed as to whether<br />

- every subnetwork has been completely represented and<br />

- the sum of all the subnetworks completely describes the whole system.<br />

It is important that not only all hardware and software components are represented from a technical<br />

perspective, but that the related organisational, personnel and infrastructural aspects are fully covered<br />

also. This can be checked using the tables provided in Section 2.3.2, in which for a few typical<br />

components those modules of the <strong>IT</strong> <strong>Baseline</strong> <strong>Protection</strong> <strong>Manual</strong> which should be included in the<br />

modelling in every case are specified.<br />

If, when performing these checks, any gaps are revealed in the modelling, the relevant missing<br />

components must be added. Otherwise there is a risk that important elements of the complete system<br />

or important security aspects will be overlooked when using the <strong>IT</strong> <strong>Baseline</strong> <strong>Protection</strong> <strong>Manual</strong>.<br />

If it is not possible to perform all the modelling because some modules which are needed are missing<br />

from the <strong>IT</strong> <strong>Baseline</strong> <strong>Protection</strong> <strong>Manual</strong>, we would ask you to notify your requirements to the BSI’s <strong>IT</strong><br />

<strong>Baseline</strong> <strong>Protection</strong> Hotline.<br />

Bundesamt für Organisation und Verwaltung (Federal Agency for Organisation and<br />

Administration, BOV) - Part 8<br />

<strong>The</strong> table below is an excerpt from the modelling performed for the fictitious BOV Department.<br />

No. Name of module Target object / Sample Contact Notes<br />

target group<br />

person<br />

3.1 Organisation Bonn site <strong>The</strong> Organisation module must be<br />

worked through separately for the<br />

Bonn and Berlin sites, as Berlin has its<br />

own organisational procedures.<br />

3.1 Organisation Berlin site<br />

3.2 Personnel Entire BOV <strong>The</strong> BOV’s Human Resources<br />

Department is located centrally in<br />

Bonn.<br />

4.3.3 Storage Media<br />

Archives<br />

_________________________________________________________________________________________<br />

<strong>IT</strong>-<strong>Baseline</strong> <strong>Protection</strong> <strong>Manual</strong>: Otober 2000<br />

R U.02 (Bonn) <strong>The</strong> backup data media are kept in this<br />

room.<br />

5.3 Laptop PC C5 1 in<br />

R 1.06<br />

(Bonn)<br />

5.3 Laptop PC C6 1 in<br />

R 2.01<br />

(Berlin)<br />

A sample will be selected from all the<br />

laptops, both in Bonn and Berlin.<br />

7.5 WWW Server S5 S5 functions as the server for the<br />

Intranet.<br />

9.2 Databases S5 A database is used on server S5.

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!