19.12.2012 Views

IT Baseline Protection Manual - The Information Warfare Site

IT Baseline Protection Manual - The Information Warfare Site

IT Baseline Protection Manual - The Information Warfare Site

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

Safeguard Catalogue - Organisation Remarks<br />

____________________________________________________________________ .........................................<br />

- What types of computer should be used as management servers? <strong>The</strong>re can<br />

generally be expected to be performance losses as the number of clients<br />

connected to one management server increases. This must be taken into<br />

consideration when planning.<br />

- What physical arrangement must the management servers have, and where<br />

will they be installed? <strong>The</strong> location of a server has an influence on, for<br />

example, how computers that are to be administered by the server are<br />

connected to it via the network. On some platforms, for example, there are<br />

minimum requirements for the communications bandwidth between the<br />

server and clients (e.g. TME 10 does not support the linking of clients via<br />

lines rated lower than 14.4 kbps). This has direct consequences on the<br />

possible management system configuration, and may make it necessary to<br />

purchase new computers or expand network connections.<br />

- Are gateways or proxies necessary, which allow hierarchically structured<br />

management and/or connection to products from third parties?<br />

- Some systems distinguish between what they refer to as managed nodes<br />

and endpoints. Both of these are workstations, but they differ in terms of<br />

the way they are integrated into the management system: endpoints, for<br />

example, in contrast with managed nodes, do not maintain a local database<br />

of their own with management information, nor can they be used for<br />

forwarding management information to other computers. It has to be<br />

decided which machines are to be incorporated into the management<br />

system as managed nodes and which are to be administered merely as<br />

endpoints. Generally speaking, most workstations should be included as<br />

endpoints.<br />

<strong>The</strong> management strategy drawn up in this way necessarily brings with it a<br />

series of demands on the management product that is to be purchased. Specific<br />

product selection can be made by weighting the requirements. <strong>The</strong><br />

management strategy must then be examined to determine whether it can be<br />

implemented in full with the available range of functions. It may be necessary<br />

to reformulate the strategy in certain areas as a result. Example: product<br />

selection reveals that the system that supports strong encryption unfortunately<br />

does not allow the delegation of administration tasks to subadministrators. <strong>The</strong><br />

management strategy has to be adapted as a result (assuming the weighting of<br />

the requirements is correct).<br />

____________________________________________________________________ .........................................<br />

<strong>IT</strong>-<strong>Baseline</strong> <strong>Protection</strong> <strong>Manual</strong>: Oktober 2000

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!