HostedDB - Dedicated UNIX Servers

-->
IT Baseline Protection Manual S 2.162 Determining the need to use cryptographic procedures and products

S 2.162 Determining the need to use cryptographic procedures and products

Initiation responsibility: IT Security Management

Implementation responsibility: Administrators; staff responsible for the individual IT applications

In order to arrive at realistic, reliable and appropriate indications of requirements and basic conditions for the use of cryptographic procedures and products in relation to the processing and transmission of sensitive information, it is first necessary to identify and assess the data that is worth protecting.

Identification of the data to be protected

First it is necessary to identify the tasks for which cryptographic procedures are to be used and the data which these procedures are intended to protect. The use of cryptographic procedures may be necessary for a variety of reasons (see also S 3.23 ):

It may make sense to use various different cryptographic methods, such as encryption or hash functions, depending on the intended purpose. The typical fields of use for cryptographic procedures are:

  1. Local encryption
  1. Communication security, at the application level and/or at the transmission level
  1. Authentication
  1. Non-repudiation
  1. Integrity

A number of examples from the various typical fields of use for cryptographic procedures are described below:

In order to establish which cryptographic procedures and products are required and which data needs to be protected by these means, the first step should be to determine the current IT structure (see also Chapter 2 on recording the details of IT systems and applications). The following facts should be established:

Degree of protection required for the data (confidentiality, integrity, authenticity, non-repudiation)

All applications and data for which there are particular requirements in terms of confidentiality, integrity, authenticity or non-repudiation should be identified (see Chapter 2). However, cryptographic products are not required solely for IT systems, applications or information with high-level protection requirements, they are also needed for those with medium-level protection requirements.

Examples of data with particular requirements regarding confidentiality include:

Note: The accumulation of data increases the protection requirements of a data collection, such that encryption may become necessary even if the individual records in the collection are not particularly sensitive.

Examples of data with particular requirements regarding integrity include:

An example of applications with particular authenticity requirements is remote access. An example of data with particular requirements regarding non-repudiation would be orders or bookings where the person ordering or booking should be identifiable.

Once the protection requirements have been determined, the next step should be to establish which applications or data are to be protected by cryptographic means. This stipulation can be further refined later, and should be revised regularly.

The result obtained in this way is an overview of all storage locations and transmission links which have to be secured by cryptographic means. The outcome is therefore effectively an IT map with crypto areas marked on it.

Survey of needs and requirements

As an aid to investigating what is required, it makes sense to use a set of questions covering the subject areas in the breakdown shown in the table below. The technical, organisational and economic aspects can each be divided into 4 further subcategories.

Figure: Classification criteria for creating a questionnaire

Among the technical aspects it is important to find out under "User services and applications" for example whether the data concerned is mainly real-time or not. In the utilisation profile category it is necessary to identify the applications and data for which cryptographic procedures are to be used, for example for external communications or for the short-term or longer-term processing of confidential data. Furthermore, information about the network infrastructure and the terminal needs to be established, for example the connection configuration.

The organisational aspects to be considered are the field of use, i.e. user domain or network domain, the question of whether there is an existing migration concept, the envisaged timescale and the operational circumstances for the end user.

The key aspects from the economic standpoint are:

Using this survey as a basis, an operations and requirements concept as close to practical reality as possible can be drawn up; this is then used as the starting point for actual implementation decisions and the selection of suitable crypto components and products (see S 2.165 Selection of a suitable cryptographic product).

The approach described above is intended to help staff responsible for security to determine, assess and coordinate the use of security technology in various system localities, network gateways and terminal equipment, as well as the extent to which the technology is to be used. In addition, the question of the appropriateness of IT security is to be answered in the course of the planning phase by determining the necessary degree of protection (protection requirements). The course of action outlined here is a pragmatic approach and takes account of security aspects in open, distributed IT infrastructures, as found in many instances.

The investment in security viewed in this way must be economically justifiable for the respective field of use. The mode of operation of security strategies that are put into practice must take account of the expectations of the end users with regard to flexibility, transparency and performance. The security services, whether planned or integrated, must not impose any restrictions on the end users over and above that which is necessary.


© Copyright by
Bundesamt für Sicherheit in der Informationstechnik
July 1999
home