19.12.2012 Views

IT Baseline Protection Manual - The Information Warfare Site

IT Baseline Protection Manual - The Information Warfare Site

IT Baseline Protection Manual - The Information Warfare Site

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

Safeguard Catalogue - Organisation Remarks<br />

____________________________________________________________________ .........................................<br />

In the Unix world, "rdist" is a program that can be used for the administration<br />

and distribution of software, for example, enabling software to be installed or<br />

updated on remote computers. One feature is that it is possible to pick out<br />

from a central software pool precisely those products which staff require to<br />

perform their particular tasks and install them on the relevant computers.<br />

Other add-on programs, some of them available free of charge (usually from<br />

the university world), allow monitoring of the network via SNMP, for<br />

example.<br />

Solutions assembled in this way provide a cost-effective alternative for<br />

relatively small and medium-sized networks. Generally, though, they are<br />

dependent upon a skilled administrator, someone who in some cases may<br />

make adaptations to local circumstances with extra programming, or who is<br />

able to integrate additional functionality.<br />

Such solutions are unsuitable for larger and very large networks, however,<br />

because the functionalities are incorporated in various non-integrated tools.<br />

<strong>The</strong> only practicable solutions for large corporate or agency networks are<br />

system management systems. Before any such system is introduced, it should<br />

be noted that this generally constitutes a considerable intrusion into the<br />

running system and must be well planned. It is not rare for the introduction to<br />

take more than 12 months, with investment of at least a six-figure sum for<br />

relatively large networks. It is therefore important to choose well suited<br />

management system. <strong>The</strong> following criteria should be taken into account when<br />

choosing the system to be procured:<br />

- What range of functions does the product offer?<br />

- Costs<br />

- Purchasing the software<br />

- Purchasing additional hardware (in some systems one or more<br />

central management servers will have to be purchased)<br />

- Installation and operating expenses (in some cases it may even be<br />

necessary to employ external staff)<br />

- Training of staff<br />

- Miscellaneous (e.g. migration costs on an existing platform,<br />

adaptation/new development of local software, building work – for<br />

example a secure server room)<br />

- Safeguarding of investment<br />

- To what extent is the system management product scalable (e.g.<br />

number of computers expandable)?<br />

- Can the platform grow with the company (e.g. number of possible<br />

management domains, delegation of tasks)?<br />

- What are the migration paths to the platform?<br />

- What are the migration paths from this platform to another platform?<br />

- Possibility of integration with other products<br />

- Which server and client system platforms are supported?<br />

____________________________________________________________________ .........................................<br />

<strong>IT</strong>-<strong>Baseline</strong> <strong>Protection</strong> <strong>Manual</strong>: Oktober 2000

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!