HostedDB - Dedicated UNIX Servers

-->
IT Baseline Protection Manual S 2.80 Drawing up a requirements catalogue for standard software

S 2.80 Drawing up a requirements catalogue for standard software

Initiation responsibility: Head of the Specialist Department

Implementation responsibility: Specialist Department, Head of IT Section

In order to solve a task processed with IT, there are a number of similar standard software products available on the market. These are similar in their basic functions but differ in certain criteria, such as purchase and operating costs, additional functions, compatibility, administration, ergonomics and IT security.

Requirements Catalogue

When selecting a suitable product, a Requirements Catalogue must first be compiled. The Requirements Catalogue should contain information on the following points:

Security Requirements

Dependent on whether the product must have security features, security functions can be stipulated in the Requirements Catalogue. Typical security functions which are relevant here are briefly explained. Further details are to be found in the ITSEC.

Further security requirements in addition to ITSEC can be placed on standard software.

Strength of the Mechanisms

Security functions are implemented by mechanisms. Depending on the field of usage, these mechanisms must be of various strengths which provide defence against attacks. The necessary strength of the mechanisms is set forth in the Requirements Catalogue. According to ITSEC, differentiations are made between three mechanism strengths:

Examples of Requirements on Security Features

Below are examples of some important security functions which highlight typical requirements placed on security features.

In the event that the product is to have an identification and authentication mechanism, the following requirements could be made, for example:

If the product is to have access control, the following requirements can be placed, for instance:

In the event that the product is to keep log records, the following requirements are recommended:

In the event that the product is to have a protocol evaluation feature, the following requirements are recommended:

In the event that the product is to have functions concerning incorruptibility, the following requirements can be placed, for example:

In the event that the product is to have functions regarding data backup, the following requirements can be placed, for example:

In the event that the product is to have encryption components, the following requirements are recommended:

In the event that the product is to have an integrity test feature, the following requirements are recommended:

In the event that person-related data are to be processed with the product, the following requirements concerning data privacy are placed, for example:

Assessment Scale

In order to be able to carry out a comparison of various products, criteria must be available as to what extent the various requirements are fulfilled. To do this, it is necessary to assess the quantitative and qualitative importance of the various requirements for the IT-supported task.

This assessment can take place in three steps, for example. In the first step, it is determined which features stipulated in the Requirements Catalogue are necessary and which are desirable. If a necessary feature is not fulfilled, the product is rejected (so-called K.O. criterion). In the event that a desirable feature is not fulfilled, this is considered as a negative aspect, but the product is not necessarily rejected as a result.

As a second step, the importance of the desirable features is determined. This can be quantitative, for example, with values between 1 for low and 5 for high. Necessary features must not be assessed quantitatively. In the event that this is necessary, however, these features must be of a higher value than the desirable features (in order to highlight the importance of a necessary feature, it can represent a value of 10, for example).

In the third step, a confidence factor is determined for the feature with regard to fulfilment of its intended task (e.g. with values between 1 for low and 5 for high). On the basis of this confidence factor, a decision is taken as regards the extent to which feature is to be tested. The confidence factor of the security mechanisms must be determined in accordance with their strengths.

These guidelines should be checked according to the individual cases.

Examples:

In extracts, security requirements for some typical standard software products are described below:

Word processing programs:

File compression program:

Appointment calendar:

Travel expenses calculation system:

Example of an assessment scale:

A specialist department intends to purchase a compression program for data backup purposes. After a Requirements Catalogue has been drawn up, the features specified in the catalogue could be assessed as follows:

Additional controls:


© Copyright by
Bundesamt für Sicherheit in der Informationstechnik
July 1999
home