19.12.2012 Views

IT Baseline Protection Manual - The Information Warfare Site

IT Baseline Protection Manual - The Information Warfare Site

IT Baseline Protection Manual - The Information Warfare Site

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

<strong>IT</strong> <strong>Baseline</strong> <strong>Protection</strong> of Generic Components <strong>IT</strong>-Security Management<br />

_________________________________________________________________________________________<br />

3.0 <strong>IT</strong> Security Management<br />

Description<br />

As the requirement for information technology grows, the<br />

complexity of people’s requirements has grown continuously.<br />

Increasingly, implementation and maintenance of a<br />

reasonable level of <strong>IT</strong> security is requiring planned and<br />

organised action on the part of all those involved. <strong>The</strong><br />

efficient implementation of <strong>IT</strong> security measures and review<br />

of their efficacy therefore necessitates a well thought out,<br />

controlled <strong>IT</strong> security process. This planning and control task is referred to as <strong>IT</strong> security management.<br />

It is imperative that functional <strong>IT</strong> security management is established at the start of the <strong>IT</strong> security<br />

process.<br />

However, functional <strong>IT</strong> security management must be integrated into the existing management<br />

structures of a given organisation. It is therefore virtually impossible to specify a single <strong>IT</strong> security<br />

management structure will be directly usable within every organisation. Instead, modifications to<br />

organisation-specific circumstances will frequently be necessary.<br />

This chapter is intended to present a systematic approach to establishing functional <strong>IT</strong> security<br />

management and improving it over time in line with developments in business operations. <strong>The</strong><br />

approach presented is therefore intended to be viewed as a framework which can be modified in line<br />

with specific characteristics of a given organisation.<br />

Note: In some other sections of this manual the term <strong>IT</strong> security management is also used to refer to<br />

the <strong>IT</strong> Security Management Team, i.e. to that group of persons which is responsible for the <strong>IT</strong><br />

security process within an organisation.<br />

Threat Scenario<br />

Threats in the environment of <strong>IT</strong> security management can be of a varied nature. <strong>The</strong> threat listed<br />

below is covered in this chapter and may be viewed as typical:<br />

Organisational Shortcomings:<br />

- T 1.1 Lack of or inadequate <strong>IT</strong> Security Management<br />

Recommended Countermeasures<br />

Safeguard S 2.191 Establishment of the <strong>IT</strong> security process should be worked through at the outset in<br />

every case. This safeguard describes a procedure for initiating and implementing a complete <strong>IT</strong><br />

security process. <strong>The</strong> steps and activities which are necessary for this are described, and these in turn<br />

are covered in detail in the safeguards which follow.<br />

<strong>The</strong> safeguards package for the area "<strong>IT</strong> security management" is summarised below.<br />

_________________________________________________________________________________________<br />

<strong>IT</strong>-<strong>Baseline</strong> <strong>Protection</strong> <strong>Manual</strong>: Otober 2000<br />

<strong>IT</strong> Security<br />

- Competence<br />

- Responsibility<br />

- Costs<br />

- Control<br />

-

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!