19.12.2012 Views

IT Baseline Protection Manual - The Information Warfare Site

IT Baseline Protection Manual - The Information Warfare Site

IT Baseline Protection Manual - The Information Warfare Site

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

Safeguard Catalogue - Organisation Remarks<br />

____________________________________________________________________ .........................................<br />

S 2.118 Determination of a security policy for the use<br />

of e-mail<br />

Initiation responsibility: Head of <strong>IT</strong> Section, <strong>IT</strong> Security Management<br />

Implementation responsibility: Administrators<br />

Before e-mail systems can be approved for use, their intended purpose must<br />

be determined. This purpose, in turn, shapes requirements concerning the<br />

confidentiality, availability, integrity and non-repudiation of the data to be<br />

transmitted as well as the e-mail program to be employed. Clarification is<br />

required as to whether e-mail is to be used exclusively for the transmission of<br />

non-binding and informal information, or whether some or all of the business<br />

transactions processed previously in writing are now to be carried out via email.<br />

If the latter is true, clarification is required as to how previously handwritten<br />

remarks concerning procedures and orders, signatures and initials<br />

should now be placed electronically.<br />

<strong>The</strong> institution must specify a security policy which describes the following<br />

items:<br />

- <strong>The</strong> persons who are to receive e-mail connections<br />

- <strong>The</strong> rules to be observed by e-mail administrators and e-mail users<br />

- <strong>The</strong> degree of confidentiality and integrity up to which information may be<br />

dispatched via e-mail<br />

- <strong>The</strong> manuals which need to be procured<br />

- How users should be trained<br />

- How to ensure a constant availability of technical assistance for users<br />

Organisational rules and technical measures are required to meet, in particular,<br />

the following conditions for the proper transfer of files:<br />

- E-mail programs intended for users should be pre-configured by the<br />

administrator so as to automatically achieve the highest possible level of<br />

security for the users (also refer to S 5.57 Secure Configuration of Mail<br />

Clients).<br />

- Data should only be transferred following successful identification and<br />

authentication of the sender by the transmission system.<br />

- Before making use of e-mail services for the first time, users must be<br />

briefed on how to handle the related applications. Users must be familiar<br />

with internal organisational rules concerning file transfer.<br />

- To identify the sender of an e-mail, a signature is appended to the end of<br />

the e-mail. <strong>The</strong> contents of this signature should resemble those of a<br />

letterhead, i.e. include the user name, organisation name, telephone number<br />

etc. A signature should not be too large, as this would take up unnecessary<br />

transmission time and storage space. <strong>The</strong> agency / company should<br />

determine a standard for signature design.<br />

- <strong>The</strong> security mechanisms in use determine the degree of confidentiality and<br />

integrity up to which files may be sent via e-mail. Clarification is required<br />

____________________________________________________________________ .........................................<br />

<strong>IT</strong>-<strong>Baseline</strong> <strong>Protection</strong> <strong>Manual</strong>: Oktober 2000

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!