19.12.2012 Views

IT Baseline Protection Manual - The Information Warfare Site

IT Baseline Protection Manual - The Information Warfare Site

IT Baseline Protection Manual - The Information Warfare Site

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

<strong>IT</strong> <strong>Baseline</strong> <strong>Protection</strong> of Generic Components<br />

_________________________________________________________________________________________<br />

2.5 Supplementary Security Analysis<br />

As explained in Section 2.2 "Assessment of <strong>Protection</strong><br />

Requirements", the standard security measures aimed at<br />

securing baseline protection will normally provide a<br />

reasonable and sufficient level of protection. However, if in<br />

the course of assessing protection requirements it has<br />

transpired that an <strong>IT</strong> application together with its data has a<br />

high or very high protection requirement, it may be<br />

appropriate to check whether the standard security safeguards<br />

need to be supplemented or replaced by more stringent <strong>IT</strong><br />

security safeguards, which will generally also be more expensive. <strong>The</strong> additional measures which are<br />

appropriate can be determined after the basic <strong>IT</strong> baseline protection security check has been performed<br />

using a supplementary security analysis.<br />

To limit the amount of effort devoted to a supplementary security analysis to what is strictly<br />

necessary, it may be appropriate to concentrate on the sensitive areas rather than analysing all the <strong>IT</strong><br />

assets. For this purpose the areas which possess a high or very high protection requirements or are<br />

classified as sensitive should be extracted from the results of the protection requirements assessment.<br />

<strong>The</strong>se might be as follows:<br />

- <strong>IT</strong> systems which have a high protection requirement,<br />

- communications links to the outside world,<br />

- communications links over which highly sensitive data is passed,<br />

- communications links which should not be used to transport particular data,<br />

- <strong>IT</strong> rooms which have a high protection requirement.<br />

A supplementary security analysis is then performed on this subset of the <strong>IT</strong> assets, comprising only<br />

the sensitive items. Various methods can be used here. <strong>The</strong>se include<br />

- risk analysis,<br />

- penetration testing and<br />

- differential security analysis.<br />

It should be mentioned in advance that the success of the supplementary security analysis depends<br />

critically on the expertise of the project team. It is essential that the team members have in-depth<br />

specialist knowledge in the areas of information technology and <strong>IT</strong> security, ideally supplemented by<br />

broad background experience. Otherwise there is a danger that significant weaknesses or safeguards<br />

could be overlooked and that the results could convey an unwarranted impression of security. It may<br />

therefore be appropriate to have the supplementary security analysis performed by specialist external<br />

consultants.<br />

Risk analysis<br />

In a risk analysis, an attempt is made to identify the threats to which an <strong>IT</strong> system is exposed due to<br />

existing security weaknesses. <strong>The</strong> probability of each of these threats occurring is then estimated and<br />

combined with the protection requirements to rate the existing risks. For any risks which are<br />

unacceptable a set of <strong>IT</strong> security measures is then selected so as to reduce the probability of<br />

occurrence and/or the extent of the potential damage.<br />

Estimation of probabilities is particularly difficult and prone to error. Usually no statistical information<br />

is available. It is especially difficult to make these estimates for threats which entail wilful action by<br />

_________________________________________________________________________________________<br />

<strong>IT</strong>-<strong>Baseline</strong> <strong>Protection</strong> <strong>Manual</strong>: Otober 2000<br />

Security analysis <strong>IT</strong> baseline<br />

protection<br />

<strong>IT</strong> security concept

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!