19.12.2012 Views

IT Baseline Protection Manual - The Information Warfare Site

IT Baseline Protection Manual - The Information Warfare Site

IT Baseline Protection Manual - The Information Warfare Site

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

<strong>IT</strong> <strong>Baseline</strong> <strong>Protection</strong> of Generic Components<br />

_________________________________________________________________________________________<br />

perpetrators. <strong>The</strong> estimates only needs to be a little on the low side to produce a risk which appears to<br />

be acceptable so that no additional measures are taken even though these are in fact necessary.<br />

A description of how to perform a risk analysis is provided in the <strong>IT</strong> Security <strong>Manual</strong> (see<br />

References).<br />

Penetration testing<br />

Penetration testing is used to estimate in advance the prospects of a deliberate attack on a set of <strong>IT</strong><br />

assets succeeding and to deduce from this what additional measures are necessary. It entails simulating<br />

the aggressive behaviour of a wilful insider or external aggressor and ascertaining what existing<br />

security weaknesses could be used and what potential damage could be caused. <strong>The</strong> following are<br />

some of the approaches commonly used:<br />

- attacks involving the guessing of passwords or dictionary attacks,<br />

- attacks involving recording of and tampering with network traffic,<br />

- attacks involving the import of false data packets,<br />

- attacks involving exploitation of known software weaknesses (macro languages, operating system<br />

errors, remote access services etc.).<br />

A distinction should be made here between two different forms of penetration testing:<br />

- Black box approach: the aggressor does not have any information about the <strong>IT</strong> assets in advance.<br />

This approach is used to simulate an external aggressor.<br />

- White box approach: the aggressor is in possession of information about the internal structure,<br />

applications and services used. Typically this would be information available to an insider.<br />

A further distinction is whether penetration testing is only co-ordinated with Management or whether<br />

the staff concerned are given advance warning. Penetration testing requires in-depth knowledge and<br />

experience to perform effectively, as otherwise the possibility that the "attacks" implemented during<br />

testing may cause unintended damage cannot be excluded.<br />

Differential security analysis<br />

One approach to identifying the more stringent <strong>IT</strong> security measures that are necessary for those <strong>IT</strong><br />

assets which are particularly sensitive is to perform a differential security analysis. <strong>The</strong> first step here<br />

is to investigate which <strong>IT</strong> security safeguards go beyond baseline protection or which <strong>IT</strong> baseline<br />

protection safeguards that have been implemented are classified as optional. A comparison is then<br />

performed as to whether the more stringent safeguards taken correspond to the standard solutions<br />

which have been established in practice for highly sensitive <strong>IT</strong> areas. It should be noted here that the<br />

relevant basic parameters (confidentiality, integrity and availability) are critical in determining<br />

whether the more stringent safeguards are appropriate. Thus, for example, cryptographic measures will<br />

assist in raising confidentiality and integrity aspects of security but generally they will have little<br />

effect on availability or they may even have a negative impact on achieving this objective of<br />

protection. It is also important to ensure that any products needed are suitable and that the more<br />

stringent safeguards are correctly implemented so that they can achieve their full effect.<br />

Typical more stringent measures in the area of <strong>IT</strong> systems include the use of certified operating<br />

systems or special security versions of operating systems, the use of authentication tokens or even<br />

isolation of <strong>IT</strong> systems. Examples of more stringent measures which might be used in the area of<br />

communications links are: capping of external connections, line encryption or end-to-end encryption,<br />

armoured cable runs or pressure-monitored cables, redundant communications lines or redundant cable<br />

routing and the use of multi-level firewalls combined with intrusion detection tools. In the area of<br />

_________________________________________________________________________________________<br />

<strong>IT</strong>-<strong>Baseline</strong> <strong>Protection</strong> <strong>Manual</strong>: Otober 2000

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!