19.12.2012 Views

IT Baseline Protection Manual - The Information Warfare Site

IT Baseline Protection Manual - The Information Warfare Site

IT Baseline Protection Manual - The Information Warfare Site

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

Safeguard Catalogue - Organisation Remarks<br />

____________________________________________________________________ .........................................<br />

- Access rights to management information<br />

- Documentation of the management system<br />

- Drafting or adjustment of emergency plans to deal with the failure of the<br />

management system or individual components<br />

<strong>The</strong> response to violations of security policies in the field of system<br />

management should also be determined in advance. In much the same way as<br />

in other fields of <strong>IT</strong>, a security policy must be defined for the field of system<br />

management or the company’s or agency’s existing security policy must be<br />

applied to the field of system management. As a management system interacts<br />

with important network and system components and administers and monitors<br />

their operation, violations of the security policies in this sphere are to be<br />

viewed particularly seriously. In particular, provisions and procedures must be<br />

defined which will be deployed in the event of any such security violation.<br />

<strong>The</strong>se are on the one hand technical (for example assigning new passwords for<br />

all users after compromising of the management console), but also of an<br />

organisational nature.<br />

Auditing, data privacy officers and <strong>IT</strong> security management should become<br />

involved during the planning phase. After the management system is<br />

introduced, the duties incumbent upon them in relation to the management<br />

system must be clear. Example: the data privacy officer can pay attention to<br />

the observance of the privacy protection guidelines during the planning phase,<br />

for example monitoring which user information is intended to be or allowed to<br />

be recorded as part of the system management process. After the system is<br />

introduced, the privacy officer must also be in a position to check the<br />

observance of the guidelines. Much the same applies to the areas of<br />

responsibility of the auditor and the <strong>IT</strong> security officer.<br />

Determining the boundary conditions for selecting the management<br />

system product<br />

<strong>The</strong> introduction of a system management system calls for extensive and<br />

careful planning. Parts of the system management strategy are also dependent<br />

on whether or not they can be implemented with a specific product.<br />

Consequently the drafting of the management strategy and the selection (or<br />

preselection) of a product must be reexamined.<br />

<strong>The</strong> following points should be taken into consideration when drawing up the<br />

system management strategy:<br />

- Is more than one management domain needed? If so: how are they to be<br />

formed? Management domains allow the components of the administered<br />

system to be divided into groups. <strong>The</strong> individual groups can be<br />

administered separately from each other. Breaking a system down into<br />

various management domains is not obligatory for small or medium-sized<br />

systems, but it does encourage structured system management. For large<br />

systems, dividing the system into various management domains is<br />

generally a necessity. <strong>The</strong> planning of the management regions is<br />

dependent on a number of factors:<br />

- Network topology<br />

____________________________________________________________________ .........................................<br />

<strong>IT</strong>-<strong>Baseline</strong> <strong>Protection</strong> <strong>Manual</strong>: Oktober 2000

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!