IT Baseline Protection - Standard Security Measures

advertisement

IT Baseline Protection -

Standard Security Measures

OECD Workshop on IT Security Management

Paris 2001-04-19

Dr. Harald Niggemann

Federal IT Security Agency, Germany

Bundesamt für Sicherheit in der Informationstechnik

Summary of the IT security process

Planning

1. establish an IT security policy

2. build up an IT security concept

Implementation

3. implement IT security safeguards

4. train users and increase awareness

Maintenance

5. keep up IT security in daily work

Bundesamt für Sicherheit in der Informationstechnik

Summary of the IT security process balanced

IT security concept

Bundesamt für Sicherheit in der Informationstechnik

Summary of the IT security process

Traditional method

 Perform a risk analysis (RA) .

But

RA is an individual process  not reusable.

RA must be applied to each IT system in use.

RA can be highly complex.

RA is often not feasible.

Bundesamt für Sicherheit in der Informationstechnik

IT Baseline Protection

Main ideas

The whole system consists of typical components

(e.g. server and client computers, operating systems)

Threads and their probabilities are lumped together.

Suitable groups of Standard Security Safeguards are recommended.

Detailed pieces of advice for the implementation of these safeguards are included.

Bundesamt für Sicherheit in der Informationstechnik

IT Baseline Protection

Advantages

A simple target/performance comparison allows for economic application and procedures.

Resulting IT security concepts are compact due to references to standard source.

Practical, reliable, and effective safeguards are implemented.

The concept is expandable and continuously updated.

Bundesamt für Sicherheit in der Informationstechnik

IT Baseline Protection

The aim is to achieve a security level for IT installations by appropriate employment of organisational, personnel, infrastructural, and technical standard security measures which is adequate and sufficient for average protection requirements and may also serve as a basis for IT applications with higher protection requirements.

Bundesamt für Sicherheit in der Informationstechnik

Structure of the

IT Baseline Protection Manual

Chapters

("modules")

Threads

Catalogues

Safeguards

Catalogues

Bundesamt für Sicherheit in der Informationstechnik

Structure of the

IT Baseline Protection Manual

Modules (examples)

Personnel

Contingency Planning

Data Media Archives

Windows NT

Unix-Server

Lotus Notes

Remote Access

Mobile phone

About 50 modules on technical and non-technical aspects of IT security

Bundesamt für Sicherheit in der Informationstechnik

Structure of the

IT Baseline Protection Manual

Threads Catalogues

T 1 Force majeure

T 2 Organisational Shortcomings

T 3 Human Failure

T 4 Technical Failure

T 5 Deliberate Acts

Bundesamt für Sicherheit in der Informationstechnik

Structure of the

IT Baseline Protection Manual

Safeguards Catalogues

S 1 Infrastructure

S 2 Organisation

S 3 Personnel

S 4 Hardware/Software

S 5 Communications

S 6 Contingency planning

Bundesamt für Sicherheit in der Informationstechnik

How to apply the

IT Baseline Protection Manual

Network chart

Modelling

Interviews/Inspection

Evaluation register all components map modules to components not needed/yes/partly/no status quo and improvements

Bundesamt für Sicherheit in der Informationstechnik

Some facts about the

IT Baseline Protection Manual

 about 4500 voluntarily registers users worldwide

 has become one of the de-facto standard reference manuals for IT security in Germany

 available as a printed loose-leaf edition (German only)

 available on CD-ROM (English and German)

 available on the Internet (English and German) http://www.bsi.bund.de/gshb

 a certification scheme will be available soon

Bundesamt für Sicherheit in der Informationstechnik

Other reference works?

BS 7799 / ISO 17799

Common Criteria

COBIT

ISO TR 13335

Bundesamt für Sicherheit in der Informationstechnik

Task Force Catalogue

Catalogue of measures against

distributed denial of service attacks

http://www.bsi.de/ddos

Bundesamt für Sicherheit in der Informationstechnik

Download