19.12.2012 Views

IT Baseline Protection Manual - The Information Warfare Site

IT Baseline Protection Manual - The Information Warfare Site

IT Baseline Protection Manual - The Information Warfare Site

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

<strong>IT</strong> <strong>Baseline</strong> <strong>Protection</strong> of Generic Components<br />

_________________________________________________________________________________________<br />

2.4 Basic Security Check<br />

Organisation<br />

In the discussion below it is assumed that for a given set of <strong>IT</strong><br />

assets a summary was prepared of the existing assets, their<br />

Personnel<br />

installation locations and the <strong>IT</strong> applications supported, based<br />

on the <strong>IT</strong> structure analysis of the <strong>IT</strong> assets. Building on this, Firewall Server Rome<br />

the protection requirements were then assessed, resulting in<br />

an overview of the protection requirements of the <strong>IT</strong><br />

Modem<br />

UNIX system<br />

applications, the <strong>IT</strong> systems, the rooms in which <strong>IT</strong> assets are<br />

used and the communication links. This information was then<br />

used to perform <strong>IT</strong> baseline protection modelling of the <strong>IT</strong><br />

assets, in the course of which the <strong>IT</strong> assets under consideration were mapped to modules in the<br />

manual.<br />

This <strong>IT</strong> baseline protection module is now used as a test plan to establish, using a target versus actual<br />

comparison, which standard security safeguards have been adequately implemented and which have<br />

not been satisfactorily implemented.<br />

This section describes how to perform the basic security check in the context of the central task of<br />

drawing up an <strong>IT</strong> security concept which affords <strong>IT</strong> baseline protection. This basic security check<br />

consists of three different steps. <strong>The</strong> first step entails making the organisational preparations and in<br />

particular selecting the relevant contact persons for the target versus actual comparison. In step 2 the<br />

target versus actual comparison is performed using interviews and sampling checks. In the final step,<br />

the results of the target versus actual comparison are documented, together with the reasoning behind<br />

it.<br />

<strong>The</strong>se three stages of the basic security check are described in detail below.<br />

_________________________________________________________________________________________<br />

<strong>IT</strong>-<strong>Baseline</strong> <strong>Protection</strong> <strong>Manual</strong>: Otober 2000

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!