19.12.2012 Views

IT Baseline Protection Manual - The Information Warfare Site

IT Baseline Protection Manual - The Information Warfare Site

IT Baseline Protection Manual - The Information Warfare Site

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

Safeguard Catalogue - Organisation Remarks<br />

____________________________________________________________________ .........................................<br />

S 2.64 Checking the Log Files<br />

Initiation responsibility: Head of <strong>IT</strong> Section, <strong>IT</strong> Security Management<br />

Implementation responsibility: Person-in-charge of the various <strong>IT</strong><br />

applications, Auditor<br />

Keeping records of security-relevant events is only effective as a safeguard if<br />

the recorded data is evaluated by an Auditor at regular intervals. If it is not<br />

possible either by technical or personnel means to implement the role of an<br />

independent Auditor of log files, they can also be evaluated by the<br />

Administrator. If this is the case, it should be noted that it is difficult to<br />

monitor the Administrator's activities. <strong>The</strong> result of the evaluation should<br />

therefore be passed to the <strong>IT</strong> Security Officer, the person responsible for <strong>IT</strong> or<br />

another, specifically named person.<br />

Regular checks followed by deletion of the logged data also ensure that the<br />

volume of log files does not grow to an inordinate size. Depending on the type<br />

of logged data, it may be appropriate to archive it to external data media.<br />

As log files usually contain person-related data, steps must be taken to ensure<br />

that this data is only used for the purposes of monitoring adherence to data<br />

protection requirements, data backup or ensuring that operations are being<br />

carried out in the proper manner (cf. §14. Para 4 of the Federal Data<br />

<strong>Protection</strong> Act (BDSG) and S 2.110 Data Privacy Guidelines for Logging<br />

Procedures). <strong>The</strong> scope of logging and the criteria used in evaluating log files<br />

should be documented and agreed within the organisation.<br />

<strong>The</strong>re may be either statutory minimum periods for which logged data has to<br />

be kept or alternatively there may be statutory upper limits on the length of<br />

time for which logged data can be retained. Thus, it might be the case that<br />

deletion was required in order to comply with data protection legislation (see<br />

also S 2.110 Data Privacy Guidelines for Logging Procedures on this point).<br />

On the other hand, for certain types of logged data there may be statutory<br />

minimum periods for which the data must be kept, e.g. where it provides<br />

information about business processes. <strong>The</strong>se legal stipulations must be<br />

adhered to in every case. Prior to deleting any logged data it is therefore<br />

necessary to check carefully whether there are any such legal requirements<br />

which have to be complied with and, if so, what retention periods result from<br />

these. <strong>The</strong> legal department should be involved here.<br />

<strong>The</strong> following evaluation criteria are intended as examples to assist detection<br />

of any security weaknesses, manipulation attempts or other irregularities:<br />

- Are the log-on and log-off times outside of normal working times<br />

(suggesting a tampering attempt)?<br />

- Is the number of incorrect log-on attempts increasing (suggesting an<br />

attempt to guess a password)?<br />

- Is the number of unauthorised attempts at access increasing (suggesting<br />

tampering attempts)?<br />

- Are there any particularly long periods of time when no protocol data were<br />

recorded (suggesting the records could have been deleted)?<br />

____________________________________________________________________ .........................................<br />

<strong>IT</strong>-<strong>Baseline</strong> <strong>Protection</strong> <strong>Manual</strong>: Oktober 2000

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!