19.12.2012 Views

IT Baseline Protection Manual - The Information Warfare Site

IT Baseline Protection Manual - The Information Warfare Site

IT Baseline Protection Manual - The Information Warfare Site

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

Safeguard Catalogue - Organisation Remarks<br />

____________________________________________________________________ .........................................<br />

S 2.165 Selection of a suitable cryptographic product<br />

Initiation responsibility: <strong>IT</strong> Security Management<br />

Implementation responsibility: <strong>IT</strong> Security Management<br />

<strong>The</strong> spectrum of cryptographic applications is very wide, ranging from simple<br />

programs for file encryption on a single-user PC through firewall computers<br />

with crypto functions for protecting a local network to the real-time hardware<br />

encryption of video conferences. Given this range, it is plain that<br />

recommendations on the selection of cryptographic products have been kept to<br />

generalities.<br />

Before a selection is made, the user should determine all requirements that the<br />

product is expected to meet. <strong>The</strong> selected product should cover the user’s<br />

requirements to as great an extent as possible.<br />

Functionality<br />

<strong>The</strong> selected product must exhibit the functionality specified by the user; in<br />

particular, it must:<br />

- perform the required basic cryptographic services<br />

- satisfy any special requirements imposed by the application environment<br />

(e.g. single-user/multi-user PC, LAN environment, WAN link)<br />

- exhibit the required technical performance characteristics (e.g. throughput<br />

rates)<br />

- offer the required security functionalities; in particular the cryptographic<br />

mechanisms used must be of the required strength<br />

Interoperability<br />

<strong>The</strong> selected product is generally incorporated into an existing <strong>IT</strong><br />

environment. It must be as interoperable as possible within that environment.<br />

It is essential to observe internal standards in order to ensure interoperability<br />

with the <strong>IT</strong> system and system components already in place. <strong>The</strong> use of<br />

international standards for cryptographic techniques should be a matter of<br />

course; among other things it makes it easier to evaluate the security of the<br />

cryptographic component.<br />

Cost-effectiveness<br />

<strong>The</strong> selected product should be as cost-effective as possible. Procurement<br />

costs, the quantities required and the costs of maintenance and product<br />

updating must be taken into account, but also the savings made through any<br />

rationalisation effects.<br />

Certified products<br />

Over the past decades, an internationally recognised methodology for<br />

evaluating <strong>IT</strong> security products has become established: the European <strong>IT</strong>SEC<br />

(<strong>Information</strong> Technology Security Evaluation Criteria) and the subsequent<br />

development, CC (<strong>The</strong> Common Criteria for <strong>Information</strong> Technology Security<br />

Evaluation). <strong>The</strong> <strong>IT</strong>SEC and CC provide a framework within which the<br />

security functionalities of an <strong>IT</strong> product can be fitted into a precisely specified<br />

____________________________________________________________________ .........................................<br />

<strong>IT</strong>-<strong>Baseline</strong> <strong>Protection</strong> <strong>Manual</strong>: Oktober 2000

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!