19.12.2012 Views

IT Baseline Protection Manual - The Information Warfare Site

IT Baseline Protection Manual - The Information Warfare Site

IT Baseline Protection Manual - The Information Warfare Site

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

Safeguard Catalogue - Organisation Remarks<br />

____________________________________________________________________ .........................................<br />

In the event of the PC or hard disk being stolen or lost, the offender has a great<br />

deal of time available to gain unauthorised knowledge of the data. A<br />

protective measure must guarantee the confidentiality of the stored data even<br />

when subject to such extended-length attacks.<br />

<strong>The</strong> protective measure used should therefore be a product with boot<br />

protection and hard disk encryption. Various solutions are available on the<br />

market. <strong>The</strong> choice lies between encryption software (solution A), a hardware<br />

encryption component (solution B) or a combination of a hardware component<br />

and a software component (solution C). Solution C will typically consist of<br />

encryption software in combination with a chip-card reader to provide access<br />

control. Which solution is chosen is dependent on various decision criteria:<br />

- Security (crypto algorithm and key length, encryption operating mode,<br />

access protection, key generation / distribution/ storage / entry, integration<br />

in the operating system, etc.)<br />

Depending on the operating system platform on which encryption is<br />

performed, certain limits are inevitably reached with software solutions<br />

(solutions A and C). If there cannot be assumed to be a secure operating<br />

system with a strict separation of tasks and memory areas (to date, that has<br />

not been reliably proved of any operating system), the key used during<br />

encryption and decryption must be held unprotected in the memory of the<br />

PC for at least a short time. <strong>The</strong> confidentiality of the key is therefore no<br />

longer guaranteed. Hardware encryption components (solution B) may<br />

offer more (but not necessarily). <strong>The</strong> key can be loaded into the hardware<br />

component and stored there in a form that secures it against being read out.<br />

<strong>The</strong> key will never leave the hardware component again, and is protected<br />

against attempts to search it out. It can only be activated by authorised<br />

users with the appropriate ownership and knowledge (e.g. chip card and<br />

password). Other aspects are also important, such as the algorithms used<br />

for encryption (usually a block encipherment algorithm), their modes of<br />

operation (e.g. CBC) and the way in which they are integrated into the PC<br />

system. Ideally, the encryption hardware should be integrated in such a<br />

way that it compulsorily encrypts the entire hard disk and cannot be<br />

deactivated or bypassed by attacks without this being noticed. If contrary to<br />

this only individual files are encrypted, there is a risk that the contents of<br />

these files may additionally be written to the hard disk in plain text in an<br />

uncontrollable manner at least in part (for example to the swap files of<br />

various operating systems or to backup files).<br />

- Performance (speed of executable programs)<br />

Software encryption utilises the system resources of the PC; it is therefore<br />

a burden on the CPU and uses main memory. At the latest when the entire<br />

hard disk is encrypted, the performance of the PC will fall. Hardware<br />

components with their own processor may perform encryption without<br />

burdening the PC’s CPU and consequently without any notable loss of<br />

performance. In this respect the throughput rate of the encryption hardware<br />

used is one of the crucial factors, depending on the design.<br />

____________________________________________________________________ .........................................<br />

<strong>IT</strong>-<strong>Baseline</strong> <strong>Protection</strong> <strong>Manual</strong>: Oktober 2000

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!