HostedDB - Dedicated UNIX Servers

-->
IT Baseline Protection Manual S 4.41 Use of a suitable PC security product

S 4.41 Use of a suitable PC security product

Initiation responsibility: Head of IT Section, IT security management, data privacy officer, persons responsible for individual IT applications

Implementation responsibility: Procurement department, administrator

Provision of a PC security product must be arranged for the DOS PC with several users. The following minimum functionality may be used as a standard for procuring a product or for reviewing products already in use. The aim of this minimum functionality is to ensure that

Recommended minimum functionality for PC security products for use in DOS PC's with several users:

Sensible minimum evaluation depth and minimum strength of mechanisms for certificates in accordance with ITSEC: E2, medium.

Additional requirements of the PC security product:

Desirable additional functionality of the PC security product:

Implementation of this functionality may be effected in both hardware and software. Safeguard S 2.66 Consideration of the Contribution of Certification to Procurement should be taken into account when procuring a new product.

Temporary Solution:

An encryption product may be utilised as a temporary solution if it is not possible to purchase or implement the use of such a PC security product at short notice. When work commences, every user must use this product to decrypt the data allocated to him and must encrypt it when work ends. This makes it possible to ensure that confidentiality of the data is maintained but does not prevent encrypted data from being manipulated. Manipulation of the data is generally identified on decrypting as the result is data which does not make sense.

For use on stationary and portable PCs, BSI can, under certain basic prerequisites, provide public agencies with an offline encryption program meeting medium-level protection requirements (see appendix auxiliary materials).


© Copyright by
Bundesamt für Sicherheit in der Informationstechnik
last update:
October 2000
home