19.12.2012 Views

IT Baseline Protection Manual - The Information Warfare Site

IT Baseline Protection Manual - The Information Warfare Site

IT Baseline Protection Manual - The Information Warfare Site

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

Safeguard Catalogue - Organisation Remarks<br />

____________________________________________________________________ .........................................<br />

S 2.176 Selection of a suitable Internet service<br />

provider<br />

Initiation responsibility: Head of <strong>IT</strong> Section, <strong>IT</strong> Security Management<br />

Implementation responsibility: Head of <strong>IT</strong> Section<br />

A provider via which users are connected to the Internet accumulates<br />

information not only about incoming and outgoing e-mail but also about all of<br />

the WWW pages which the users call up. In addition, all data that is<br />

exchanged between the user’s computer and a server in the Internet passes<br />

through the provider’s <strong>IT</strong> systems.<br />

When selecting an Internet service provider, the following questions should be<br />

asked:<br />

- Whether staff are available around the clock to deal with technical<br />

problems, and how competent they are.<br />

- How well the provider is prepared for the failure of one or more of his <strong>IT</strong><br />

systems (contingency planning, data backup concept).<br />

- What level of availability the provider can guarantee (maximum<br />

downtime).<br />

- Whether the provider regularly checks whether the connections to<br />

customers are still stable, and if not, whether he takes appropriate steps.<br />

- What the provider does to ensure the security of his <strong>IT</strong> systems and that of<br />

his customers.<br />

Confirmation of secure operation of the provider's <strong>IT</strong> systems should be<br />

obtained, i.e. for example proof that the conditions specified in S 2.174 Secure<br />

operation of a WWW server have been fulfilled. All relevant measures<br />

specified in Chapter 6 on networked systems and in Chapter 7 on data<br />

communication equipment should be put into practice. An <strong>IT</strong> security concept<br />

and security guidelines should be a matter of course with every provider. It<br />

should be possible for external users to inspect the security guidelines. <strong>The</strong><br />

staff of the provider should be made aware of <strong>IT</strong> security aspects and be under<br />

obligation to observe the security guidelines; they should also be given regular<br />

training (not only in security matters).<br />

<strong>The</strong> provider stores user data for invoicing purposes (name, address, user ID,<br />

bank account) as well as connection data and transmitted contents (over a<br />

period of time which varies from one provider to another).<br />

Users should ask their provider for how long which items of data concerning<br />

them remain stored. When selecting a provider, it should be taken into account<br />

that German providers must comply with data privacy regulations applying to<br />

the processing of this information.<br />

Supplementary checks:<br />

- According to which criteria has the provider been selected?<br />

- Which security measures does the provider implement?<br />

____________________________________________________________________ .........................................<br />

<strong>IT</strong>-<strong>Baseline</strong> <strong>Protection</strong> <strong>Manual</strong>: Oktober 2000

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!