19.12.2012 Views

IT Baseline Protection Manual - The Information Warfare Site

IT Baseline Protection Manual - The Information Warfare Site

IT Baseline Protection Manual - The Information Warfare Site

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

Safeguard Catalogue - Organisation Remarks<br />

____________________________________________________________________ .........................................<br />

taken into account. In the case of over-encryption, consideration must be<br />

given to how the accompanying key is protected.<br />

In addition, the following points can be considered: which file changes if a<br />

key is changed? By comparing this file before and after the change in the<br />

code, the point can be determined at which this key is stored. Is it possible<br />

to make changes at this point to activate new keys which are then<br />

employed by the user, without the latter noticing the illicit change?<br />

- Are there keys which have been pre-set by the manufacturer which have to<br />

be changed before the first use of the program?<br />

- What happens if an incorrect key is entered during decryption?<br />

- Following the encryption of a file, is the unencrypted variant deleted? If so,<br />

is it reliably overwritten? Is a check made before deletion as to whether the<br />

encryption was successful?<br />

Logging:<br />

- Is access to protocol data denied to unauthorised persons?<br />

- Are the activities to be logged fully recorded?<br />

- Does the administrator have the option, by virtue of his privileged rights, of<br />

obtaining access to protocol data without authorisation and unobserved, or<br />

can he deactivate the logging without being noticed?<br />

- How does the program react if the logging memory overruns?<br />

In addition to this it must be ascertained whether, as a result of the new<br />

product, security features will be circumvented elsewhere. Example: the<br />

product to be tested offers an interface to the operating system environment,<br />

previously however, the <strong>IT</strong> system was configured in such a way that no such<br />

interfaces existed.<br />

Pilot application<br />

Following the conclusion of all other tests a pilot application, i.e. use under<br />

real conditions, might still be considered necessary.<br />

If the test is carried out in the production environment using actual data, the<br />

correct and error-free operating method of the program must have been<br />

confirmedto begin with a sufficient number of tests, in order not to jeopardise<br />

the availability and integrity of the production environment. For example, the<br />

product may be installed at the premises of selected users who will then use it<br />

for a set period in actual production conditions.<br />

Test evaluation<br />

Using the decision criteria specified, the test results must be assessed and all<br />

results must be assembled and submitted along with the test documentation to<br />

the procurer, or the person responsible for the test.<br />

With the aid of the test results a final judgement should be made regarding a<br />

product to be procured. If no product has passed the test, consideration must<br />

____________________________________________________________________ .........................................<br />

<strong>IT</strong>-<strong>Baseline</strong> <strong>Protection</strong> <strong>Manual</strong>: Oktober 2000

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!