IT Baseline Protection Manual - Chapter 5.99 Stand-alone IT systems
5.99 Stand-alone IT systems
Description
Here, an IT system is considered which is not linked with
any other IT system. It can be based on any operating
system, run on any platform, and consist of a PC with or
without a hard disk, Unix workstation or Apple
Macintosh. The IT system can possess floppy disks and
CD drives, a hard disk, a mouse and other peripheral
components. If a printer is required, it is connected
directly to the system. A graphic user interface can also be
employed here.
This chapter provides an overview of the threats and IT security measures typical of stand-alone IT
systems. The overview applies, in general, to all operating systems. For more detailed information, refer
to additional chapters of the IT Baseline Protection Manual (e.g. Chapter 5.2 Stand-alone Unix system).
Threat Scenario
The following typical threats are assumed as regards IT baseline protection of a stand-alone IT system:
For the implementation of IT baseline protection, selection of the required packages of safeguards
("modules") as described in chapters 2.3 and 2.4, is recommended.
The safeguard package for "Stand-alone IT systems" is described in the following. The safeguards can
be subdivided as
Basic safeguards
Safeguards for multi-user operation
Depending on the operating system in use, this module might need to be supplemented with additional
safeguards.
The following basic safeguards need to be implemented:
Infrastructure:
S 1.29 (3) Adequate siting of an IT system (optional)
If an IT system is to be used by several persons, then administration of the computer and distinction
between users are absolutely necessary. In this case, the following safeguards and threats are to be
considered additionally for multi-user operation:
Threat Scenario
Organisational Shortcomings:
T 2.21 Inadequate organisation of the exchange of users