19.12.2012 Views

IT Baseline Protection Manual - The Information Warfare Site

IT Baseline Protection Manual - The Information Warfare Site

IT Baseline Protection Manual - The Information Warfare Site

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

Safeguard Catalogue - Organisation Remarks<br />

____________________________________________________________________ .........................................<br />

Example of a vulnerability: An analysis of performance and traffic flow<br />

reveals an overloaded active network component. During a determination of<br />

the protection requirements by the affected communications route, high<br />

requirements concerning availability and performance were established. This<br />

vulnerability requires an adaptation of the network segmentation or a<br />

replacement of the network components with a more efficient model (refer to<br />

S 5.61 Suitable physical segmentation, S 5.62 Suitable logical segmentation,<br />

S 5.1 Removal, or short-circuiting ond gournding, of unneeded lines and S<br />

5.13 Appropriate use of equipment for network coupling).<br />

Additional controls:<br />

- Has the existing network environment been documented in sufficient<br />

detail?<br />

- Is sufficient know-how available for a security analysis of the network<br />

environment?<br />

- Have requirements concerning the confidentiality, availability and integrity<br />

of the network been defined and documented?<br />

____________________________________________________________________ .........................................<br />

<strong>IT</strong>-<strong>Baseline</strong> <strong>Protection</strong> <strong>Manual</strong>: Oktober 2000

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!