19.12.2012 Views

IT Baseline Protection Manual - The Information Warfare Site

IT Baseline Protection Manual - The Information Warfare Site

IT Baseline Protection Manual - The Information Warfare Site

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

Safeguard Catalogue - Organisation Remarks<br />

____________________________________________________________________ .........................................<br />

- Who can communicate with whom with or without cryptographic<br />

protection?<br />

- Who is allowed to assign certain rights, etc.?<br />

On this basis and in accordance with the basic systems engineering conditions<br />

regarding<br />

- the data volume under consideration and time dependence<br />

- availability requirements and the risk situation<br />

- the type and frequency of applications to be protected etc.<br />

suitable implementation options can be analysed and a conception drawn up<br />

and technical design finalised for specific fields of use, such as a PC<br />

workstation, within a LAN or in connection with a PBX system. A holistic<br />

approach of this nature is essential in order to assemble the fundamental data<br />

and conditions needed to take decisions about cryptographic products if their<br />

application and use is both appropriate from a security point of view and is<br />

economically justifiable. It should be pointed out, however, that the<br />

subdivision described above is by no means obligatory or of fundamental<br />

significance, but is at best helpful. <strong>The</strong> only key factor is that the scope of the<br />

questions must consistently reflect the starting scenario after the situation has<br />

been clarified as comprehensively as possible. In practice, of course, there are<br />

reciprocal effects and dependencies between certain questions and answers,<br />

but in general these contribute to completing the overall picture.<br />

<strong>The</strong> various influencing variables affecting the use of cryptographic<br />

procedures must be established and must be documented in a comprehensible<br />

form (see S 2.163 Determining the factors influencing cryptographic<br />

procedures and products). Subsequently, a suitable course of action must be<br />

developed and documented for their use. Finally, implementation must be<br />

arranged by the agency or company management.<br />

<strong>The</strong> results should be recorded within the crypto concept in a form which can<br />

be updated and expanded as required. An example of a crypto concept is<br />

shown in the following table of contents:<br />

Crypto concept: Table of contents<br />

1. Definitions<br />

- Cryptographic procedures<br />

- ...<br />

2. Threat scenario as motivational background<br />

- Dependence of the institution on the data stock<br />

- Typical threats such as ...<br />

- Causes of damage specific to individual institutions<br />

- In-house cases of damage<br />

3. Specifying the organisation’s internal security policy<br />

- Specification of responsibilities<br />

- Objective, security level<br />

4. Influencing factors<br />

- Identification of the data to be protected<br />

____________________________________________________________________ .........................................<br />

<strong>IT</strong>-<strong>Baseline</strong> <strong>Protection</strong> <strong>Manual</strong>: Oktober 2000

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!