19.12.2012 Views

IT Baseline Protection Manual - The Information Warfare Site

IT Baseline Protection Manual - The Information Warfare Site

IT Baseline Protection Manual - The Information Warfare Site

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

Safeguard Catalogue - Organisation Remarks<br />

____________________________________________________________________ .........................................<br />

as to whether and when data to be transmitted should be encrypted and<br />

signed digitally (also refer to S 4.34 Using Encryption, Checksums or<br />

Digital Signatures). A central body must determine the applications to be<br />

employed by users for the encryption and use of digital signatures. <strong>The</strong>se<br />

applications must be made available to the users, who should be briefed<br />

beforehand on how to handle the applications.<br />

- Before the introduction of electronic communications systems, clarification<br />

is required as to the circumstances under which incoming and outgoing emails<br />

also need to be printed out.<br />

- File transfer can be documented (optionally). In this case, every file<br />

transfer, together with the contents and recipient of the information, is<br />

registered in a log. Legal regulations concerning logging must be observed<br />

during the transfer of person related data.<br />

E-mail intended for internal dispatch must not be allowed to leave the internal<br />

network. This must be ensured by appropriate administrative measures. For<br />

example, the transfer of e-mail between the various departments of an<br />

organisation should take place via internal, dedicated lines and not via the<br />

Internet.<br />

In principle, messages intended for internal addresses must not be forwarded<br />

to external addresses. If an exception needs to be made, all employees must be<br />

informed duly. For example, e-mails might need to be forwarded to external<br />

points where they can be accessed by staff on external duty or other<br />

employees on business trips.<br />

Additional controls:<br />

- Does a security policy governing the use of e-mail exist?<br />

- Who is responsible for answering users' queries concerning e-mail?<br />

____________________________________________________________________ .........................................<br />

<strong>IT</strong>-<strong>Baseline</strong> <strong>Protection</strong> <strong>Manual</strong>: Oktober 2000

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!