19.12.2012 Views

IT Baseline Protection Manual - The Information Warfare Site

IT Baseline Protection Manual - The Information Warfare Site

IT Baseline Protection Manual - The Information Warfare Site

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

Safeguard Catalogue - Organisation Remarks<br />

____________________________________________________________________ .........................................<br />

S 2.166 Provisions governing the use of crypto<br />

modules<br />

Initiation responsibility: <strong>IT</strong> Security Management<br />

Implementation responsibility: <strong>IT</strong> Security Management<br />

A range of security requirements on the use of crypto modules also has to be<br />

imposed in the course of ongoing operation. <strong>The</strong>se must be appropriately<br />

integrated into the technical and organisational environment in which they are<br />

used.<br />

To achieve this, certain organisational regulations have to be put in place:<br />

- Certain members of staff must be nominated as having responsibility for<br />

drawing up the cryptographic concept, for selecting the cryptographic<br />

products and for ensuring their reliable operation.<br />

- Suitable personnel measures must be specified and implemented (training,<br />

user support, deputisation arrangements, obligations, apportioning of<br />

functions).<br />

- Users should not only be trained in how to handle the crypto modules that<br />

they are to operate, they should also be made aware of the benefit and the<br />

necessity of the cryptographic procedures and be given an overview of<br />

basic cryptographic terms (see also S 3.23).<br />

- <strong>The</strong>re must be a clear definition of what needs to be done if problems occur<br />

in the use of crypto modules, or if there is even a suspicion of a security<br />

incident. All users must be informed of the relevant procedures and<br />

reporting channels.<br />

- Within the framework of the cryptographic concept it must be established<br />

who is obliged or allowed to use which crypto products when, and what<br />

marginal conditions need to be observed (e.g. key escrow).<br />

- <strong>The</strong>re should be regular checks that the crypto modules are being used<br />

correctly. It should also be regularly examined whether the cryptographic<br />

procedures in use still represent the state of the art (for further details see<br />

also S 2.35 Obtaining information on security weaknesses of the system).<br />

- Replacement crypto modules should be held in reserve in accordance with<br />

the defined availability requirements, in order to guarantee smooth<br />

operation. This is important in particular where access to encrypted data is<br />

dependent on the functional capability of an individual crypto module, for<br />

example in the case of data archiving or ISDN encryption.<br />

Reliable, secure operation of the crypto modules must be ensured; this<br />

includes:<br />

- Before they are put into operation, the optimum configuration of the crypto<br />

modules must be determined, for example regarding key lengths, operating<br />

modes or crypto algorithms.<br />

- Once defined, the configuration must be documented so that it can be set<br />

up again quickly after a system failure of if reinstallation becomes<br />

necessary.<br />

____________________________________________________________________ .........................................<br />

<strong>IT</strong>-<strong>Baseline</strong> <strong>Protection</strong> <strong>Manual</strong>: Oktober 2000

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!