19.12.2012 Views

IT Baseline Protection Manual - The Information Warfare Site

IT Baseline Protection Manual - The Information Warfare Site

IT Baseline Protection Manual - The Information Warfare Site

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

Safeguard Catalogue - Organisation Remarks<br />

____________________________________________________________________ .........................................<br />

they should not be stored on those systems. In that case, manual entry as<br />

needed is the obvious answer. Another possibility would be to transfer the<br />

keys to an external data medium, which would then have to be kept securely,<br />

however, as described in the section on the archiving of keys. From the<br />

security point of view, therefore, preference is to be given to the use of<br />

hardware encryption components, where the keys are loaded directly into the<br />

encryption component from the data medium (such as a chip card) and never<br />

leave the encryption component in unencrypted form.<br />

It must always be ensured that preset keys are changed on installation of the<br />

encryption procedure.<br />

Archiving of keys<br />

For the purpose of archiving, it should also be possible to store the<br />

cryptographic key material outside the crypto module in an encrypted form,<br />

and if necessary reload it. To do this, several keys can be combined in one<br />

record, which is then likewise encrypted with the aid of a KEK (key<br />

encryption key). Accordingly, the KEK must also be kept securely (for<br />

example on a chip card in a safe). If the KEK is split into two partial keys, the<br />

two-person rule can be implemented: two different people each have access to<br />

a separate data medium (e.g. a chip card or floppy disk) on which only one of<br />

the two partial keys is stored. In order to generate the KEK, both data media<br />

must be inserted in the crypto module’s reading unit at the same time or<br />

immediately one after the other.<br />

Access and deputisation arrangements<br />

Matters relating to access rights and deputisation rights should be settled in the<br />

security policy. <strong>The</strong> relevant mechanisms must be supported by key<br />

management and by the crypto modules and devices that are to be used (e.g.<br />

key escrow in the event that a member of staff leaves the company or is absent<br />

for a long period due to illness; see also archiving of keys).<br />

Changing keys<br />

Details of when and how often keys need to be changed must be laid down in<br />

the crypto concept, on the basis of the security policy. <strong>The</strong> larger the quantity<br />

of encrypted data that is available to an attacker for analysis, the greater the<br />

chance with some algorithms that the analysis process will be successful.<br />

Changing keys on a regular basis minimises the opportunities for attacking<br />

encrypted data. <strong>The</strong> frequency of changing is dependent on a variety of<br />

factors. <strong>The</strong> type of encrypted medium (for example long-term data medium<br />

or data transmission medium) is just as significant as the cryptographic<br />

algorithm, the detection of attacks (such as theft of loss of a key) and the<br />

degree to which the data is worth protecting. Other factors playing a part in<br />

determining the frequency of change are how often the key is used, the<br />

relevant threat potential and the security of the local key storage facility.<br />

Depending on which procedure is used, new keys have to be negotiated for<br />

every single communication connection, i.e. session keys have to be used.<br />

This should of course be controlled by the procedures, without the user<br />

noticing. Changing keys in this case means exchanging the master keys that<br />

form the basis on which the session keys are generated, and should of course<br />

also be carried out regularly.<br />

____________________________________________________________________ .........................................<br />

<strong>IT</strong>-<strong>Baseline</strong> <strong>Protection</strong> <strong>Manual</strong>: Oktober 2000

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!