19.12.2012 Views

IT Baseline Protection Manual - The Information Warfare Site

IT Baseline Protection Manual - The Information Warfare Site

IT Baseline Protection Manual - The Information Warfare Site

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

Safeguard Catalogue - Organisation Remarks<br />

____________________________________________________________________ .........................................<br />

Life span of cryptographic procedures<br />

Cryptographic procedures and products must be checked regularly to establish<br />

whether they still represent the state of the art. <strong>The</strong> algorithms that are used<br />

may become too weak as a result of technical developments, such as faster or<br />

cheaper <strong>IT</strong> systems, or because of new mathematical knowledge. <strong>The</strong><br />

cryptographic products in use may exhibit implementation errors. A time limit<br />

for the use of cryptographic procedures should therefore be stipulated at the<br />

time of their selection. When the time limit is reached, a thorough review<br />

should take place again as to whether the crypto modules in use still offer the<br />

expected level of protection.<br />

Legal framework<br />

Various general legal conditions must be observed in relation to the use of<br />

cryptographic products. In some countries, for example, cryptographic<br />

procedures are not allowed to be used without approval. It is therefore<br />

necessary to examine the following points (see S 2.165 Selection of a suitable<br />

cryptographic product):<br />

- Whether restrictions on the use of cryptographic products have to be<br />

observed in the countries belonging to the area of use (there are no<br />

restrictions of any kind within Germany)<br />

- Whether any export restrictions applying to products under consideration<br />

have to be observed<br />

However, there are not only maximum requirements applying to the<br />

cryptographic algorithms or procedures used, there are also minimum<br />

requirements. For example, encryption procedures with a sufficient key length<br />

must be used for the transmission of person-related data.<br />

Examples of technical solutions:<br />

In the following there are a number of examples of application relating to the<br />

various fields of use for cryptographic procedures. It can be seen that most<br />

products cover several fields of use at the same time.<br />

Example 1: Hard disk encryption<br />

<strong>The</strong> sensitive data stored on the hard disk of a standalone PC needs to be<br />

protected in such a way that the following conditions apply:<br />

- <strong>The</strong> PC can only be booted by authorised users<br />

- Only authorised users are given access to the stored data<br />

- <strong>The</strong> stored data must be adequately protected against perusal by<br />

unauthorised users when the PC is switched off - also in the event of it<br />

being stolen.<br />

<strong>The</strong> foremost priority in this case is the safeguarding of confidentiality. With<br />

this in mind, the PC is to be protected against the following threats:<br />

- Unauthorised disclosure of the data stored on the hard disk<br />

- Manipulation of the data stored on the hard disk<br />

- Manipulation of the crypto system<br />

____________________________________________________________________ .........................................<br />

<strong>IT</strong>-<strong>Baseline</strong> <strong>Protection</strong> <strong>Manual</strong>: Oktober 2000

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!