19.12.2012 Views

IT Baseline Protection Manual - The Information Warfare Site

IT Baseline Protection Manual - The Information Warfare Site

IT Baseline Protection Manual - The Information Warfare Site

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

Safeguard Catalogue - Organisation Remarks<br />

____________________________________________________________________ .........................................<br />

- Data volume: what volume of data needs to be protected?<br />

- Frequency: how often is there a requirement for cryptographic services?<br />

- Performance: how fast do cryptographic functions have to operate (off-line,<br />

on-line rate)?<br />

Personnel and organisational aspects<br />

- User-friendliness: do users require basic knowledge of cryptography? Does<br />

the use of a crypto product hamper them in their work?<br />

- Reasonableness: what burden of extra work can users reasonably be<br />

expected to take on (working time, waiting time)?<br />

- Reliability: how reliably will users handle the crypto technology?<br />

- Training requirements: to what extent do users need training?<br />

- Personnel requirements: are additional staff required, for example for<br />

installation, operation or key management?<br />

- Availability: is it possible that availability will be reduced by the use of a<br />

crypto product?<br />

Economic aspects<br />

- Financial constraints: how much is cryptographic protection allowed to<br />

cost? How high are the<br />

- non-recurring investment costs<br />

- running costs, including personnel costs<br />

- licence fees?<br />

- Investment protection: do the planned cryptographic procedures and<br />

products conform to existing standards? Are they interoperable with other<br />

products?<br />

Key recovery<br />

If the keys used for encryption are lost, this generally also means that the data<br />

protected by the keys is also lost. Many crypto products therefore include<br />

functions for data recovery in such instances. Before these functions are used,<br />

it is important to be clear about the risks involved: if it is possible to restore<br />

confidential keys by these means, it must be ensured that this can only be done<br />

by those with the appropriate authorisation. If it is possible to access the<br />

original key user’s data without his or her knowledge, the user has no<br />

possibility of proving that malicious manipulation has taken place. On account<br />

of the mistrust with which it is viewed, the use of key recovery mechanisms<br />

also often results in reservations being expressed within the company or<br />

organisation where they are used, but also among communication partners.<br />

Generally, therefore, key recovery should not be used in relation to data<br />

transmission. <strong>The</strong>re is no need for this, either, because if a key or data is lost,<br />

it can simply be sent again. Careful thought should be given to the use of key<br />

recovery when data is stored locally (see also S 6.56 Data backup when using<br />

cryptographic procedures). <strong>The</strong> CD-ROM accompanying the <strong>IT</strong> <strong>Baseline</strong><br />

<strong>Protection</strong> <strong>Manual</strong> contains an article on the possibilities and risks of key<br />

recovery in the Auxiliary Materials directory.<br />

____________________________________________________________________ .........................................<br />

<strong>IT</strong>-<strong>Baseline</strong> <strong>Protection</strong> <strong>Manual</strong>: Oktober 2000

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!