19.12.2012 Views

IT Baseline Protection Manual - The Information Warfare Site

IT Baseline Protection Manual - The Information Warfare Site

IT Baseline Protection Manual - The Information Warfare Site

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

Safeguard Catalogue - Organisation Remarks<br />

____________________________________________________________________ .........................................<br />

- Can an existing network management system be integrated into the<br />

system?<br />

- Can an existing data backup system be integrated into the system?<br />

- What applications from third parties are available for this product?<br />

- Reliability and security against failure<br />

- Are there any statements or even guarantees as to maximum<br />

downtimes?<br />

- Is it possible to hot-swap central components?<br />

- Does the system have its own backup and recovery mechanism? In<br />

the event of failure of the management system, there must be<br />

mechanisms for regulated restarting within the management system.<br />

<strong>The</strong>se may include the loading of data from a backup and automatic<br />

checking of consistency – ideally with the resolution of conflicts if<br />

inconsistencies are detected.<br />

- Are updates regularly made available? Are they easy to install?<br />

- Security: restrictions for accessing management functions<br />

- Can access be restricted at the user ID level (which user is allowed<br />

to do what)?<br />

- Can access be restricted at the component level (which computer is<br />

allowed to do what)?<br />

- Can access to executable commands be restricted on a userdependent<br />

or system-dependent basis?<br />

- Can administration tasks be divided up? For example, can the<br />

administration of components be restricted to certain areas (e.g. only<br />

the department computers)?<br />

- Security: administration of computers via the network<br />

- How is remote access secured?<br />

- Can remote access be performed using encryption?<br />

- Is it ensured that (strong) authentication is required before remote<br />

administration is carried out?<br />

- Is it possible to restrict the authorisation for remote administration to<br />

certain individuals or roles?<br />

- Is the user automatically informed of remote accesses?<br />

- Security: data integrity, privacy protection<br />

- Is the data that is gathered securely stored (access restrictions,<br />

encryption)?<br />

- Does data transfer between the management components take place<br />

on a secure basis (authentication, encryption, protection of<br />

integrity)?<br />

____________________________________________________________________ .........................................<br />

<strong>IT</strong>-<strong>Baseline</strong> <strong>Protection</strong> <strong>Manual</strong>: Oktober 2000

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!