HostedDB - Dedicated UNIX Servers

-->
IT Baseline Protection Manual S 6.56 Data backup when using cryptographic procedures

S 6.56 Data backup when using cryptographic procedures

Initiation responsibility: Head of IT Section, IT Security Management

Implementation responsibility: IT Security Officer

When a company or agency is using cryptographic procedures, it is important not to neglect the subject of data backup. Apart from the question of how a backup of the encrypted data should best be performed, it is also necessary to consider whether the cryptographic keys should be backed up, and if so, how. It also makes sense to back up the configuration data relating to the crypto products that are used.

Backing up the keys

Very careful thought must be given to the question of whether and how to back up the cryptographic keys, because every copy of a key is a potential weak point.

Nevertheless, there may be various reasons why it is necessary to store cryptographic keys. A variety of methods can be used for storing keys:

The following points always have to be observed in this connection:

Backing up encrypted data

Particular care needs to be taken when backing up encrypted data or when using encryption during a backup procedure. If errors occur at such times, it usually means that all of the data will be unusable, not just a few records.

The long-term storage of encrypted or signed data is associated with many additional problems. It is not only necessary to see to it that the data media are regularly refreshed and that the technical components for processing these media are available at all times, it must also be ensured that the cryptographic algorithms and the key lengths still represent the state of the art. As far as the long-term archiving of data is concerned, it may therefore make more sense to store the data unencrypted and instead store it in an appropriately secure location, for example in a safe.

As a precaution, the crypto modules should always be archived because experience shows that even after a number of years data may crop up which has not been stored in the archive.

Backing up the configuration data of the products used

When using relatively complex crypto products, it is important not to forget to back up their configuration data (see also S 4.78 Careful modifications of configurations). Once chosen, the configuration should be documented so that it can be set up again quickly after a system failure of if reinstallation becomes necessary.

Additional controls:


© Copyright by
Bundesamt für Sicherheit in der Informationstechnik
July 1999
home