19.12.2012 Views

IT Baseline Protection Manual - The Information Warfare Site

IT Baseline Protection Manual - The Information Warfare Site

IT Baseline Protection Manual - The Information Warfare Site

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

<strong>IT</strong> <strong>Baseline</strong> <strong>Protection</strong> of Generic Components<br />

_________________________________________________________________________________________<br />

2.4.1 Organisational Preliminary Work<br />

To ensure that the target versus actual comparison proceeds smoothly, a certain amount of preliminary<br />

work is required. It is necessary first to inspect all the in-house documentation which controls <strong>IT</strong><br />

security-relevant processes, e.g. organisational instructions, work instructions, security instructions,<br />

manuals and "informal" procedures. <strong>The</strong>se documents can be helpful in ascertaining the degree of<br />

implementation, especially for questions about existing organisational procedures. It is further<br />

necessary to clarify who is currently responsible for their content, in order to be able subsequently to<br />

determine the correct contact person.<br />

It must then be established whether and to what extent any external parties need to be involved in<br />

ascertaining the implementation status. For example, this might be necessary if there are any external<br />

computer centres, external parent organisations, companies to which parts of the <strong>IT</strong> operations have<br />

been outsourced or building authorities which are responsible for infrastructural measures.<br />

Another step which needs to be performed before the target versus actual comparison can be carried<br />

out is to ascertain who are the right people to interview. Here one should start by establishing a<br />

primary point of contact for every individual module which has been used in modelling the existing <strong>IT</strong><br />

assets.<br />

- For the modules in Tier 1 "Higher order aspects of <strong>IT</strong> security" a suitable contact person will<br />

generally be found from the subject matter dealt with in the module. For example, for module 3.2<br />

Personnel someone who works in the relevant Human Resources Department should be selected as<br />

point of contact. For the design modules, e.g. module 3.4 Data Backup Policy, ideally the person<br />

who is responsible for updating the relevant document should be made available. Otherwise the<br />

person whose terms of reference include the updating of procedures in the area under consideration<br />

should be interviewed.<br />

- For Tier 2 " Infrastructure" the selection of suitable contact persons should be agreed with the<br />

general services and/or site technical services sections. Depending on the size of the<br />

agency/company being examined, different contact persons could be responsible, for example, for<br />

the two infrastructural areas Cabling and Protective Cabinets. In small organisations the caretaker<br />

will often be able to provide information. It should be noted that in the infrastructural area it may<br />

be necessary to involve external parties. This applies especially to larger companies and agencies.<br />

- In the modules of Tier 3 "<strong>IT</strong> systems" and Tier 4 "Networks" there is a heavy emphasis on<br />

technical aspects in the security safeguards to be checked. This means that generally the main point<br />

of contact will be the administrator for the component or group of components to which the module<br />

in question has been assigned during modelling.<br />

- For the modules in Tier 5 "<strong>IT</strong> applications" persons who support or are responsible for the<br />

individual <strong>IT</strong> applications should be selected as the main points of contact.<br />

In many cases the main point of contact will not be able to provide information on every aspect of the<br />

relevant module. In such cases it is useful to include one or more additional persons in the interview.<br />

Guidance as to which persons should be involved is provided in the entries "Initiation responsibility"<br />

and "Implementation responsibility" which are to be found at the beginning of every safeguard<br />

description.<br />

A schedule, possibly including alternative dates, should be prepared to cover the interviews with the<br />

system administrators, administrators and other contact persons. Special attention should be given here<br />

to co-ordinating appointments with persons from other organisational units or other<br />

agencies/companies.<br />

_________________________________________________________________________________________<br />

<strong>IT</strong>-<strong>Baseline</strong> <strong>Protection</strong> <strong>Manual</strong>: Otober 2000

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!