19.12.2012 Views

IT Baseline Protection Manual - The Information Warfare Site

IT Baseline Protection Manual - The Information Warfare Site

IT Baseline Protection Manual - The Information Warfare Site

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

Safeguard Catalogue - Organisation Remarks<br />

____________________________________________________________________ .........................................<br />

S 2.140 Analysis of the existing network environment<br />

Initiation responsibility: Head of <strong>IT</strong> Section, <strong>IT</strong> Security Management<br />

Implementation responsibility: Administrators<br />

This analysis is based on the results of the examinations performed in<br />

accordance with S 2.139 Survey of the existing network environment and<br />

requires a specialised knowledge of network topology, network topography<br />

and network-specific vulnerabilities. A further prerequisite here is experience<br />

in the evaluation of the confidentiality, integrity and availability of the<br />

individual <strong>IT</strong> applications employed. As this extremely complex subject not<br />

only requires an in-depth knowledge of all the aspects mentioned, but is also<br />

very time-consuming, it might be advisable to hire external consultants for an<br />

analysis of the existing network situation. Within the scope of the federal<br />

German administration, the BSI can provide assistance here.<br />

An analysis of the existing network situation essentially involves a structural<br />

analysis, a determination of protection requirements, and an examination of<br />

vulnerabilities.<br />

A structural analysis involves an evaluation of the documentation prepared<br />

as part of S 2.139 Survey of the existing network environment. A structural<br />

analysis must be performed by an analysis team capable of interpreting and<br />

deducing all possible communications relations. As an outcome, the analysis<br />

team must possess a full understanding of the operation of the network and be<br />

informed about the principal possibilities of communication. <strong>The</strong> construction<br />

vulnerabilities in a network can often be identified already during structural<br />

analysis.<br />

A successful structural analysis is a prerequisite for a subsequent, detailed<br />

determination of the protection requirements and an analysis of vulnerabilities.<br />

Detailed determination of the protection requirements<br />

A structural analysis is followed by a determination of the protection<br />

requirements exceeding the scope of the measures stipulated in Chapter 2.<br />

Requirements concerning the confidentiality, availability and integrity of<br />

individual subnetworks and network segments are also considered here. In this<br />

context, it is necessary to determine the requirements generated by the various<br />

<strong>IT</strong> procedures in use, and how they influence the existing segmentation of the<br />

network. As an outcome, it must be possible to identify the network segments<br />

in which special protection requirements need to be fulfilled.<br />

Analysis of vulnerabilities in the network<br />

An analysis of the vulnerabilities in the network is performed on the basis of<br />

the results obtained so far. Given corresponding requirements of availability,<br />

this includes, in particular, an identification of non-redundant network<br />

components (single-points-of-failure). Furthermore, it is necessary to specify<br />

the areas in which requirements concerning availability, confidentiality and<br />

integrity cannot be fulfilled or require special attention. It is also necessary to<br />

determine whether the selected segmentation is suitable in terms of bandwidth<br />

and performance (based on the results of traffic flow analysis described in S<br />

2.139 Survey of the existing network situation).<br />

____________________________________________________________________ .........................................<br />

<strong>IT</strong>-<strong>Baseline</strong> <strong>Protection</strong> <strong>Manual</strong>: Oktober 2000

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!