19.12.2012 Views

IT Baseline Protection Manual - The Information Warfare Site

IT Baseline Protection Manual - The Information Warfare Site

IT Baseline Protection Manual - The Information Warfare Site

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

Safeguard Catalogue - Organisation Remarks<br />

____________________________________________________________________ .........................................<br />

- Confidentiality requirements<br />

- Integrity requirements<br />

- Data availability requirements<br />

- Performance requirements<br />

- Distribution of keys<br />

- Data volumes<br />

- Type of data (local / distributed (LAN/WAN))<br />

- Type of applications for which cryptographic procedures are to be used<br />

- Frequency of use of the cryptographic procedure<br />

- Requirements concerning the resistance of the algorithms and procedures<br />

(manipulation resistance)<br />

- Restorability of backed up data<br />

- Personnel costs<br />

- Required functionality<br />

- Costs including follow-up costs (maintenance, administration, updates, ...)<br />

- Knowledge and data-processing skills of <strong>IT</strong> users<br />

5. Determining the use of the concept<br />

- Type of cryptographic procedures<br />

- Conditions of use for the cryptographic products<br />

- Frequency and time of use<br />

- Nomination of staff responsible<br />

- Stipulation of organisational rules and regulations<br />

- Implementation of staff-related measures (training, deputisation<br />

arrangements, obligations, apportioning of functions)<br />

- Documentation of conditions of use / configuration<br />

- Interoperability, conformity with standards, protection of investment<br />

6. Key management<br />

Individual aspects of this concept are described in more detail in safeguards S<br />

2.162 Determining the need to use cryptographic procedures and products, S<br />

2.163 Determining the factors influencing cryptographic procedures and<br />

products, S 2.166 Provisions governing the use of crypto modules etc.<br />

Drawing up a crypto concept is not simply a once-only task, it is a dynamic<br />

process. Regular adaptation of the crypto concept to current circumstances is<br />

therefore essential.<br />

Additional controls:<br />

- Is the present concept up to date?<br />

- Are all relevant <strong>IT</strong> systems included in this policy?<br />

- How are staff members informed about the sections of the concept which<br />

are applicable to them?<br />

- Is adherence to the concept monitored?<br />

- How are changes in the influencing factors taken into account?<br />

____________________________________________________________________ .........................................<br />

<strong>IT</strong>-<strong>Baseline</strong> <strong>Protection</strong> <strong>Manual</strong>: Oktober 2000

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!