19.12.2012 Views

IT Baseline Protection Manual - The Information Warfare Site

IT Baseline Protection Manual - The Information Warfare Site

IT Baseline Protection Manual - The Information Warfare Site

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

Safeguard Catalogue - Organisation Remarks<br />

____________________________________________________________________ .........................................<br />

Responsibility for implementation lies with the persons in charge of<br />

individual <strong>IT</strong> applications and the application-specific administrator,<br />

insofar as the integrity constraints need to be realised in the form of<br />

relations, primary keys or general database objects.<br />

<strong>The</strong> following items must be prepared as part of planning an <strong>IT</strong><br />

application:<br />

- A data model which maps the database objects as well as their<br />

mutual relationships<br />

- A technical concept which includes a description of the conditions<br />

under which data can be manipulated.<br />

<strong>The</strong> following points must be observed during the realisation of an <strong>IT</strong><br />

application:<br />

- <strong>The</strong> actual implementation of the data model specified during the<br />

conceptual phase must be described. This includes the definition and<br />

creation of tables, indices, value ranges etc.<br />

- Triggers and stored procedures are defined during the realisation of<br />

the technical concept. Triggers and stored procedures can be used<br />

within an application (in the programs) and in the database (for<br />

tables). Triggers used on the database level act independently of the<br />

overlying applications, and must thus be managed centrally.<br />

Example: 'Update' trigger for a table:<br />

Whenever a data record in the table is modified, the statements<br />

defined for the trigger need to be executed. One of these statements<br />

can comprise the invocation of a stored procedure.<br />

Where applications are concerned, integrity can be ensured through the<br />

suitable use of commit and rollback for transactions.<br />

Additional controls:<br />

- Are all the integrity control techniques described above implemented?<br />

- Have all the integrity constraints been agreed with the administrators of the<br />

individual <strong>IT</strong> applications?<br />

____________________________________________________________________ .........................................<br />

<strong>IT</strong>-<strong>Baseline</strong> <strong>Protection</strong> <strong>Manual</strong>: Oktober 2000

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!