19.12.2012 Views

IT Baseline Protection Manual - The Information Warfare Site

IT Baseline Protection Manual - The Information Warfare Site

IT Baseline Protection Manual - The Information Warfare Site

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

Safeguard Catalogue - Organisation Remarks<br />

____________________________________________________________________ .........................................<br />

<strong>The</strong> key aspects from the economic standpoint are:<br />

- Rationalisation aspects, for example using a product with transparent<br />

encryption instead of manual activation<br />

- Estimates as to quantities required and procurement costs<br />

- Anticipated administration and maintenance costs<br />

Using this survey as a basis, an operations and requirements concept as close<br />

to practical reality as possible can be drawn up; this is then used as the starting<br />

point for actual implementation decisions and the selection of suitable crypto<br />

components and products (see S 2.165 Selection of a suitable cryptographic<br />

product).<br />

<strong>The</strong> approach described above is intended to help staff responsible for security<br />

to determine, assess and coordinate the use of security technology in various<br />

system localities, network gateways and terminal equipment, as well as the<br />

extent to which the technology is to be used. In addition, the question of the<br />

appropriateness of <strong>IT</strong> security is to be answered in the course of the planning<br />

phase by determining the necessary degree of protection (protection<br />

requirements). <strong>The</strong> course of action outlined here is a pragmatic approach and<br />

takes account of security aspects in open, distributed <strong>IT</strong> infrastructures, as<br />

found in many instances.<br />

<strong>The</strong> investment in security viewed in this way must be economically<br />

justifiable for the respective field of use. <strong>The</strong> mode of operation of security<br />

strategies that are put into practice must take account of the expectations of<br />

the end users with regard to flexibility, transparency and performance. <strong>The</strong><br />

security services, whether planned or integrated, must not impose any<br />

restrictions on the end users over and above that which is necessary.<br />

____________________________________________________________________ .........................................<br />

<strong>IT</strong>-<strong>Baseline</strong> <strong>Protection</strong> <strong>Manual</strong>: Oktober 2000

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!