19.12.2012 Views

IT Baseline Protection Manual - The Information Warfare Site

IT Baseline Protection Manual - The Information Warfare Site

IT Baseline Protection Manual - The Information Warfare Site

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

<strong>IT</strong> <strong>Baseline</strong> <strong>Protection</strong> of Generic Components<br />

_________________________________________________________________________________________<br />

Supplementary security analysis<br />

<strong>The</strong> standard security safeguards aimed at securing baseline protection will normally provide a<br />

reasonable and sufficient level of protection. However, if the protection requirement is high or very<br />

high it may be appropriate to check whether more stringent <strong>IT</strong> security safeguards are needed either in<br />

addition to or instead of the safeguards required to achieve <strong>IT</strong> baseline protection. To select a set of<br />

suitable <strong>IT</strong> security safeguards, a supplementary security analysis is performed. This can entail the use<br />

of a variety of methods, for example,<br />

- risk analysis,<br />

- penetration testing and<br />

- differential security analysis.<br />

An overview of these methods is presented in Section 2.5. <strong>The</strong> successful carrying out of the<br />

supplementary security analysis depends critically on the expertise of the project team. It may<br />

therefore be appropriate to employ the services of specialist external consultants.<br />

Implementation of <strong>IT</strong> security concepts<br />

A satisfactory level of <strong>IT</strong> security can only be established if existing weaknesses are ascertained in the<br />

security analysis, the status quo is determined in a security concept, the safeguards that are necessary<br />

are identified and, above all, these safeguards are also implemented systematically. Section 2.6<br />

describes the factors which should be considered when planning the implementation of <strong>IT</strong> security<br />

safeguards.<br />

<strong>IT</strong> <strong>Baseline</strong> <strong>Protection</strong> Certification<br />

<strong>The</strong> <strong>IT</strong> <strong>Baseline</strong> <strong>Protection</strong> <strong>Manual</strong> is used today not only to assist in drawing up <strong>IT</strong> security concepts<br />

but also increasingly as a reference work in the sense of a security standard. By achieving <strong>IT</strong> <strong>Baseline</strong><br />

<strong>Protection</strong> certification, an organisation can provide documentary evidence to the outside world that it<br />

has implemented <strong>IT</strong> baseline protection to the depth required. Section 2.7 introduces the idea of <strong>IT</strong><br />

<strong>Baseline</strong> <strong>Protection</strong> Certification and defines the certification scheme that this entails. <strong>The</strong> certification<br />

level is assigned to one of three different classes which differ both in relation to quality (i.e. the degree<br />

of implementation of security safeguards that is necessary) and to assurance. <strong>The</strong> lowest level can be<br />

demonstrated by an employee of the agency/company, while the highest level requires testing by an<br />

independent third party.<br />

_________________________________________________________________________________________<br />

<strong>IT</strong>-<strong>Baseline</strong> <strong>Protection</strong> <strong>Manual</strong>: Otober 2000

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!