HostedDB - Dedicated UNIX Servers

-->
IT Baseline Protection Manual S 2.214 Concept of IT operations

S 2.214 Concept of IT operations

Initiation responsibility: Agency/company management, Head of IT Section, IT Security Management

Implementation responsibility: Head of IT Section, IT Security Management

In order to be able to guarantee proper and secure IT operations, a comprehensive concept is essential. Procedures and requirements for the use of IT systems and IT products in the various parts of the organisation should exist. These should be well harmonised and reflect the security objectives of the agency/company.

Guidelines for IT procedures and IT security principles

All organisational units involved in IT planning and IT operation must agree on a set of wide-ranging IT security principles which are to be applied to all areas (e.g. requirements regarding passwords). The subject of authentication and the granting of rights must be fully covered (see S 2.220 Guidelines for access control).

Responsibilities for the operation of all IT components must be clearly specified. These include the appointment of administrators and contact persons for the users (see also 2.79 Determining responsibilities in the area of standard software).

Every purchase of new IT components should be preceded by preparation of a proper plan as to how these will be used. This should include the subject of their integration into the existing IT network and the effects of this on existing IT security mechanisms which may need to be modified (see S 2.216 Approval procedure for IT components).

Similarly, not only must the process of ordering IT equipment be covered but also how the IT components delivered are to be handled must be covered (see S 2.90 Checking delivery). Before any new hardware components or new software are used, it must be tested (see S 4.65 Testing of new hardware and software).

Every installation of IT components must comply with the basic IT security objectives of the agency/company and be based on controlled procedures. Depending on the particular IT component concerned and its security requirements, access rules, user rights and other security-relevant settings must be configured. Every IT installation must be clearly documented (see S 2.87 Installation and configuration of standard software).

Guidelines for secure IT operations

In order to be able to maintain security of all IT systems in ongoing operations, a number of factors must be considered. Therefore all the tasks that are necessary for maintaining proper and secure operations must be written down and clearly assigned. The following aspects must be covered here, among others:

Standard solutions for hardware or software components used

The larger an institution is, the more important it is to use standard components for IT equipment and IT operations where possible. This affects both hardware components, such as routers, printers and graphics cards, and also software products such as operating systems, word processing programs and tools. Otherwise there is a danger that the entire system ceases to be possible to administer due to interoperability problems and burgeoning complexity.

In-house standards for hardware and software components should therefore be specified and documented and these should be followed during procurement. This will enable tried and tested solutions to be used and interoperability and compatibility problems to be avoided as far as possible. Moreover, this will have the effect of reducing the administrative effort and the amount of expert knowledge required. In many cases the costs of storing consumables can be lowered as well. When combined with framework agreements and/or quantity discounts, it is often possible to make additional financial savings as well.

Due to the rapid pace of technical developments in the area of information processing, in-house standards for IT components must be updated regularly. This generally results in a mixture of different "generations" of in-house standards being necessary. Hence when revising the in-house standards it is important to check that the new and old IT components and/or products are compatible and can be used together.

One particularly important application for in-house standards is PC workstations. Here in-house standards should be drawn up both for the hardware components of the PCs, such as processors, internal memory, graphics cards etc, and also for the installed software and its configuration. Otherwise, due to the multitude of possible ways in which a PC can be configured, there is a danger that the PC workstations used could become unwieldy, making administration no longer possible. Medium-sized agencies and companies in which compulsory in-house standards have not be laid down are finding simply the maintenance of the necessary hardware drivers for operating systems no longer manageable. In-house standards for PC workstations also facilitate the use of system management products.

Note: when defining in-house standards for hardware and software components it is important not just to consider the most popular products on the market. Rather, selection should be oriented towards the functional requirements and the (IT) security requirements. A "monoculture", i.e. in which a single product has a stranglehold on the market, can even lead to security problems, for in such a case any software weaknesses that exist in the product will be particularly widespread and can therefore, if exploited, cause huge cumulative damage. Computer viruses, Trojan horses and other threats from wilful action are often directed at products that are in widespread use.

Conventions for name, address and number spaces

Within an institution generally a variety of different name and number spaces co-exist. Especially popular are ones which are used outside of the agency/company, for example, e-mail addresses, DNS names, telephone numbers and designations of organisational units. But even purely internal naming conventions, such as inventory numbers, IP addresses and identity pass numbers, often play an important role for the organisation and IT management.

For information processing to flow smoothly and to ensure that the IT assets used can be properly administered, it is necessary that an organisation-wide concept is developed for the name and number spaces used. When designing this, the following aspects should be considered:

Interface definitions for the interaction of components

Information processing generally entails a number of small processing steps which are supported by suitable hardware or software components. The transfer of data between these components normally involves files, databases or networks

To ensure smooth IT operations it is therefore necessary to clearly define the interfaces through which the individual components will interact. All interface definitions that are not obvious from the components used should be documented.

Important aspects of interface definitions between IT components include file and data formats and network protocols. In order to be able to exchange individual components as smoothly as possible when required (protection of investment) and resort to tried and tested solutions, as far as possible standard formats and standard protocols, such as EDI, XML and HTTP, should be used.

All changes to interface definitions between the IT components used must be documented and checked to see what effects they have on the security of the IT network. If necessary the IT security concept should be supplemented or modified accordingly.

Additional controls:


© Copyright by
Bundesamt für Sicherheit in der Informationstechnik
last update:
July 2001
home