19.12.2012 Views

IT Baseline Protection Manual - The Information Warfare Site

IT Baseline Protection Manual - The Information Warfare Site

IT Baseline Protection Manual - The Information Warfare Site

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

Safeguard Catalogue - Organisation Remarks<br />

____________________________________________________________________ .........................................<br />

S 2.169 Developing a system management strategy<br />

Initiation responsibility: Head of <strong>IT</strong> Section, <strong>IT</strong> Security Management<br />

Implementation responsibility: Head of <strong>IT</strong> Section, Administrator<br />

Administrators have to carry out regular administration work on the<br />

components in a network. <strong>The</strong> duties to be performed range from setting up<br />

new users to installing new software; the distributed nature of the software<br />

requires the installation of part software on each individual computer<br />

(workflow system, document management system, etc.). In large organisations<br />

merely setting up a new user who is supposed to be able to log on at all<br />

computers to which he or she has access means a great deal of administrative<br />

work, because if the computers are run in stand-alone operation each one has<br />

to be configured accordingly. Today’s network-capable operating systems<br />

(such as Unix, Windows NT or Novell) therefore include mechanisms that are<br />

intended to reduce the amount of administrative work (for example central<br />

user administration). However, if the administration of all hardware and<br />

software components in a local network is to be performed in a uniform<br />

manner at all levels (in both technical and organisational terms), technical aids<br />

in the form of management systems must be employed, but whether or not<br />

they are used successfully is also dependent on the management strategy that<br />

is to be drawn up. <strong>The</strong> specifications and rules imposed by the management<br />

strategy are then put into practice by system administration with the aid of the<br />

management software. Each management strategy must be adapted to the<br />

needs of the respective company or agency on a case-by-case basis. This<br />

entails working through the following steps.<br />

Determining the objects to be administered by the management system<br />

After the inventory has been taken (see S 2.168 <strong>IT</strong> system analysis before the<br />

introduction of a system management system) it must be established which<br />

areas of the <strong>IT</strong> system are to be administered by the management system that<br />

is to be procured:<br />

- Which computers and other hardware are to be incorporated in the<br />

management system?<br />

- Which software is to be included?<br />

- Which users and/or user groups are to be included?<br />

Determining the security guidelines to be applied in the management<br />

system<br />

In addition to these decisions, existing regulations and methods also have to<br />

be incorporated into the system. For example, the established security policy<br />

at the agency or company, the privacy protection guidelines and the guidelines<br />

on the introduction of new software have to be brought into the management<br />

concept because the regulations currently in force also have to be observed<br />

and implemented when a management system is put in place. Rules also have<br />

to be adopted on the use of the management system itself, or the validity of<br />

existing rules has to be examined, and where necessary they must be adapted<br />

before being applied. This applies in the following fields, in particular:<br />

____________________________________________________________________ .........................................<br />

<strong>IT</strong>-<strong>Baseline</strong> <strong>Protection</strong> <strong>Manual</strong>: Oktober 2000

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!