19.12.2012 Views

IT Baseline Protection Manual - The Information Warfare Site

IT Baseline Protection Manual - The Information Warfare Site

IT Baseline Protection Manual - The Information Warfare Site

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

Safeguard Catalogue - Organisation Remarks<br />

____________________________________________________________________ .........................................<br />

d) Complete-trust model<br />

This model involves relationships of mutual trust between all the domains of a<br />

network. Resources as well as user and group accounts are managed in each<br />

domain. A complete-trust model is shown in the following diagram:<br />

This model allows the departments of an organisation to manage user accounts<br />

Domäne A<br />

as well as resources. No central department is required for management. This<br />

model can be scaled to any required number of users. However, it also has<br />

major disadvantages. For example, it is hard to check compliance with the<br />

applicable security policy. This makes it difficult not only to set up a central<br />

security management, but also to co-ordinate the activities of the individual<br />

administrators. Many trust relationships need to be managed in a network<br />

containing a large number of domains, so that a clear overview is ultimately<br />

lost.<br />

No general recommendations can be made as to which of the domain models<br />

described should be used in an organisation. This can only be ascertained<br />

individually, on the basis of the physical and logical network structure, as well<br />

as the distribution of data, applications and users in the network. For this<br />

reason, a determination of the ideal domain structure requires a detailed<br />

analysis, which can prove quite elaborate for extensive networks and might<br />

need to be supported with planning software.<br />

Additional controls:<br />

- Have the selected network structure and any trust relationships existing<br />

between domains been documented?<br />

- Is the structure adapted to changes in the operational environment<br />

____________________________________________________________________ .........................................<br />

<strong>IT</strong>-<strong>Baseline</strong> <strong>Protection</strong> <strong>Manual</strong>: Oktober 2000<br />

Domäne B<br />

Domäne C Domäne D

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!