19.12.2012 Views

IT Baseline Protection Manual - The Information Warfare Site

IT Baseline Protection Manual - The Information Warfare Site

IT Baseline Protection Manual - The Information Warfare Site

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

Safeguard Catalogue - Organisation Remarks<br />

____________________________________________________________________ .........................................<br />

- <strong>The</strong> crypto products must be pre-configured by the administrator for the<br />

users so as to automatically achieve the maximum possible degree of<br />

security.<br />

- If the crypto products are relatively complex, suitable manuals must be<br />

available.<br />

- <strong>The</strong> crypto modules must be securely installed and subsequently tested (for<br />

example whether they encrypt correctly and whether they can be operated<br />

by the users).<br />

- <strong>The</strong> demands on the usage environment must be determined; if necessary,<br />

supplementary measures may have to be taken in the <strong>IT</strong> environment. <strong>The</strong><br />

security-related requirements applicable to the <strong>IT</strong> systems on which the<br />

cryptographic procedures are used are shown in the respective systemspecific<br />

modules, for example Chapter 5 for clients (including laptops) and<br />

Chapter 6 for servers.<br />

- It must be determined who has to maintain the crypto modules, and how<br />

often.<br />

Various specifications also have to be laid down in relation to key<br />

management (see S 2.46 Appropriate key management):<br />

- Specifications on the generation and selection of keys<br />

- Specifications on the secure storage of cryptographic keys<br />

- Stipulation of the key change strategy and intervals<br />

Additional controls:<br />

- Have regulations been defined for the use of cryptographic procedures?<br />

- Is the crypto concept up to date?<br />

- Who is responsible for answering users' queries concerning the use of<br />

crypto modules?<br />

____________________________________________________________________ .........................................<br />

<strong>IT</strong>-<strong>Baseline</strong> <strong>Protection</strong> <strong>Manual</strong>: Oktober 2000

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!