19.12.2012 Views

IT Baseline Protection Manual - The Information Warfare Site

IT Baseline Protection Manual - The Information Warfare Site

IT Baseline Protection Manual - The Information Warfare Site

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

Safeguard Catalogue - Organisation Remarks<br />

____________________________________________________________________ .........................................<br />

S 2.161 Development of a cryptographic concept<br />

Initiation responsibility: <strong>IT</strong> Security Management<br />

Implementation responsibility: <strong>IT</strong> Security Management<br />

Nowadays companies and agencies are increasingly dependent on their<br />

information technology infrastructure. This is why it is necessary to have<br />

security services which go beyond mere encryption, and why they have to be<br />

integrated into the system as a whole.<br />

Given the diversity of cryptographic problem situations and variety of<br />

influencing factors, there are also many different approaches to solutions and<br />

possible means of implementation. It cannot be assumed that there is one<br />

solution which is capable of dealing with all security problems in computer<br />

networks and/or communication systems. On the contrary, what is important is<br />

harmonised interaction between appropriately selected components in order to<br />

achieve the necessary degree of security. It is therefore necessary to develop a<br />

cryptographic concept that is integrated into the agency’s or company’s <strong>IT</strong><br />

security concept.<br />

<strong>The</strong> choice of suitable cryptographic components must be based on this<br />

concept. A critical element in the whole crypto concept is key management.<br />

Concepts and approaches to solutions can only be successfully devised and<br />

put into practice precisely where they are needed when it is clear which<br />

specific security functionalities and security services are required. Beyond this<br />

there are also a number of system-related questions and aspects which do not<br />

specifically belong in the field of security technology. This includes<br />

performance requirements, for example, or requirements relating to system<br />

links, interoperability and conformity with standards.<br />

Figure: Perspectives and aspects in the selection of cryptographic procedures<br />

and components<br />

____________________________________________________________________ .........................................<br />

<strong>IT</strong>-<strong>Baseline</strong> <strong>Protection</strong> <strong>Manual</strong>: Oktober 2000<br />

Sichtweisen und Aspekte<br />

Einflußfaktoren Realisierungsmöglichkeiten Nutzbarkeit<br />

technisch organisatorisch wirtschaftlich politisch/<br />

gesetzlich<br />

system- sicherheitstechnisch<br />

technisch<br />

Systemanbindung<br />

Lokalisierung<br />

Datenvolumen<br />

Zeitabhängigkeit<br />

Synchronisation<br />

Sicherheitsniveau<br />

Schutzbedarf<br />

Gefährdungen<br />

Manipulationsstärke<br />

Funktionsumfang<br />

Verfügbarkeit/ Einsatz-<br />

Zuverlässigkeit bedingungen<br />

Personalaufwand<br />

Schlüsselverteilung<br />

und<br />

-organisation<br />

Interoperabilitätsanforderungen<br />

Rationalisierung<br />

Integrationsanforderungen<br />

Standardkonformitätsanforderungen<br />

Anschaffungskosten<br />

Administrationskosten<br />

Wartungskosten<br />

Investitionsschutz<br />

Ausfuhrbeschränkungen<br />

Datenschutzrichtlinien<br />

Verschlußsachenanweisung<br />

Geheimschutzrichtlinien<br />

VS-Einstufungslisten<br />

Front-end<br />

Firewall<br />

Bündelverschlüssler<br />

Kryptoknoten<br />

integrierbare<br />

Spezialkomponente<br />

Chipkarte<br />

Arbeitsplatz<br />

LAN-Bereich<br />

Rechnerkopplung<br />

TK-Anlage<br />

Mobilfunkeinrichtung<br />

öffentliches<br />

Festnetz

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!