19.12.2012 Views

IT Baseline Protection Manual - The Information Warfare Site

IT Baseline Protection Manual - The Information Warfare Site

IT Baseline Protection Manual - The Information Warfare Site

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

Safeguard Catalogue - Organisation Remarks<br />

____________________________________________________________________ .........................................<br />

S 2.143 Development of a network management<br />

concept<br />

Initiation responsibility: Head of <strong>IT</strong> Section, <strong>IT</strong> Security Management<br />

Implementation responsibility: Administrators<br />

<strong>The</strong> diversity of <strong>IT</strong> systems grouped in a local network, such as server<br />

systems, terminal devices, printers, active network components etc. should be<br />

capable of being managed and monitored centrally from a suitable point.<br />

Preference should be given to central instead of decentral management of<br />

network components, as the former approach requires a lower administrative<br />

effort and allows central definition and control of security requirements.<br />

Central network management is primarily used to ensure the availability and<br />

integrity of the network, as well as the integrity and confidentiality of the<br />

transmitted data. This is a very complex task which needs to be supported<br />

through the use of a network management tool.<br />

Before such a network management system is procured and put into operation,<br />

it is first necessary to prepare a concept which formulates all security<br />

requirements for the network management system and proposes appropriate<br />

measures to be implemented on the occurrence of an error or alarm. During<br />

the preparation of this concept, the following aspects of network management<br />

should be considered in particular and represented in a global context.<br />

- Performance measurements for network analysis (refer to S 2.140 Analysis<br />

of the existing network environment)<br />

- Responses to error messages from the monitored network components<br />

- Remote maintenance / remote control, particularly of active network<br />

components<br />

- Generation of trouble tickets and escalation on the occurrence of network<br />

problems (links with the system management and user helpdesk or external<br />

message communicators such as pagers and facsimile machines can be<br />

established via this feature).<br />

- Logging and auditing (online and/or offline)<br />

- Integration of any existing proprietary systems, or systems with different<br />

management protocols (e.g. in the area of telecommunications)<br />

- Configuration management of all <strong>IT</strong> systems in use (also refer to. S 4.82<br />

Secure configuration of active network components)<br />

- Distributed access to network management functions. Remote access to<br />

network management functions might be necessary for administration or<br />

auditing; a particularly careful definition and allocation of access rights is<br />

necessary here.<br />

<strong>The</strong> specific requirements to be fulfilled by a network management tool are<br />

described in S 2.145 Requirements for a network management tool. <strong>The</strong><br />

management tool must allow the implementation of the network management<br />

concept.<br />

____________________________________________________________________ .........................................<br />

<strong>IT</strong>-<strong>Baseline</strong> <strong>Protection</strong> <strong>Manual</strong>: Oktober 2000

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!