19.12.2012 Views

IT Baseline Protection Manual - The Information Warfare Site

IT Baseline Protection Manual - The Information Warfare Site

IT Baseline Protection Manual - The Information Warfare Site

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

Safeguard Catalogue - Organisation Remarks<br />

____________________________________________________________________ .........................................<br />

S 2.66 <strong>The</strong> importance of certification for<br />

procurement<br />

Initiation responsibility: Agency/company management<br />

Implementation responsibility: Procurer<br />

When procuring <strong>IT</strong> products and <strong>IT</strong> systems, it must be checked at an earlier<br />

stage whether the assurances by the manufacturer or distributor regarding<br />

security functions can be considered as sufficient. Particularly with regard to<br />

high or very high protection requirements, the trustworthiness of the products<br />

concerning <strong>IT</strong> security can only be guaranteed by having these evaluated by<br />

independent testing agencies.<br />

<strong>The</strong> harmonised European "Criteria for the Evaluation of the Security of <strong>IT</strong><br />

Systems (<strong>IT</strong>SEC)" and the evaluation manual <strong>IT</strong>SEM have offered a<br />

generally-accepted basis for these evaluations since 1991 as has the globallyagreed<br />

"Common Criteria for the Examination and Evaluation of the Security<br />

of <strong>IT</strong> Systems" / Common Criteria (CC) since 1998. In Germany, the BSI<br />

itself and testing bodies acknowledged by the BSI, conduct evaluations of this<br />

kind. In the event that the evaluation results are positive and the conditions of<br />

<strong>IT</strong>SEC and <strong>IT</strong>SEM or the Common Criteria are fulfilled, a safety certificate is<br />

issued by BSI as the certifying body for the assessed product or system.<br />

<strong>The</strong> certification report states at which test level each functionality was<br />

investigated and what the result of the evaluation was. <strong>The</strong> test level ranges<br />

from evaluation level E 1 (lowest test level) to evaluation level E 6 (highest<br />

test level) for the <strong>IT</strong>SEC and from evaluation assurance level EAL 1 (lowest<br />

test level) to evaluation assurance level EAL 7 (highest test level) for the CC.<br />

Evaluation level E 1 of the <strong>IT</strong>SEC approximately corresponds to evaluation<br />

assurance level EAL 2 of the CC and so on.Additionally, the strength of the<br />

security functions is stated, which represents the degree of difficulty in<br />

overcoming the security functions. <strong>The</strong> <strong>IT</strong>SEC and CC differentiate between<br />

the strengths low, medium and high. Indications are also given regarding the<br />

conditions which must be observed when using the product.<br />

In the event that several products with an acceptable price/performance<br />

relationship are available when procuring <strong>IT</strong>, an existing safety certificate can<br />

be considered as a positive criteria for selection. Safety certificates should be<br />

particularly considered if the evaluated function (mainly) corresponds with the<br />

minimum functionality and the security strength corresponds with the<br />

protection requirement (c.f. S 4.41 Use of a suitable PC security product). <strong>The</strong><br />

higher the test level stated in the certificate, the higher the trustworthiness of<br />

the effectiveness of the security functions of the product.<br />

<strong>The</strong> certification bodies regularly issue summaries of which products have a<br />

certificate. A summary of the <strong>IT</strong> products and systems certified by the BSI can<br />

be obtained from the BSI: BSI 7148 - BSI Certificates. <strong>The</strong> BSI also publishes<br />

recently-issued certificates in the magazine KES, a magazine for<br />

communication and EDP security. This information can also be obtained from<br />

the BSI server.<br />

____________________________________________________________________ .........................................<br />

<strong>IT</strong>-<strong>Baseline</strong> <strong>Protection</strong> <strong>Manual</strong>: Oktober 2000

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!