HostedDB - Dedicated UNIX Servers

-->
IT Baseline Protection Manual S 2.118 Determination of a security policy for the use of e-mail

S 2.118 Determination of a security policy for the use of e-mail

Initiation responsibility: Head of IT Section, IT Security Management

Implementation responsibility: Administrators

Before e-mail systems can be approved for use, their intended purpose must be determined. This purpose, in turn, shapes requirements concerning the confidentiality, availability, integrity and non-repudiation of the data to be transmitted as well as the e-mail program to be employed. Clarification is required as to whether e-mail is to be used exclusively for the transmission of non-binding and informal information, or whether some or all of the business transactions processed previously in writing are now to be carried out via e-mail. If the latter is true, clarification is required as to how previously hand-written remarks concerning procedures and orders, signatures and initials should now be placed electronically.

The institution must specify a security policy which describes the following items:

Organisational rules and technical measures are required to meet, in particular, the following conditions for the proper transfer of files:

Email intended for internal dispatch must not be allowed to leave the internal network. This must be ensured by appropriate administrative measures. For example, the transfer of e-mail between the various departments of an organisation should take place via internal, dedicated lines and not via the Internet.

In principle, messages intended for internal addresses must not be forwarded to external addresses. If an exception needs to be made, all employees must be informed duly. For example, e-mails might need to be forwarded to external points where they can be accessed by staff on external duty or other employees on business trips.

Additional controls:


© Copyright by
Bundesamt für Sicherheit in der Informationstechnik
July 1999
home