HostedDB - Dedicated UNIX Servers

-->
IT Baseline Protection Manual - Table of contents

IT Baseline Protection Manual

       
  Preface    
  Changes    
  Introduction    
       
Finding Your Way Around the IT Baseline Protection Manual Using the IT Baseline Protection Manual
1.1 IT Baseline Protection: the Aim, Concept and Central Idea 2.0 Using the IT Baseline Protection Manual
1.2 Structure and Interpretation of the Manual 2.1 IT Structure Analysis
1.3 Using the IT Baseline Protection Manual 2.2 Assessment of Protection Requirements
1.4 Brief Outline of Existing Modules 2.3 IT Baseline Protection Modelling
1.5 Resources 2.3.1 Modelling a Set of IT Assets
1.6 Information Flow and Points of Contact 2.3.2 Modelling of an Individual IT System
    2.4 Basic Security Check
    2.5 Supplementary Security Analysis
    2.6 Implementation of IT Security Safeguards
    2.7 IT Baseline Protection Certificate
       
Generic Components Infrastructure
3.0 IT Security Management 4.1 Buildings
3.1 Organisation 4.2 Cabling
3.2 Personnel 4.3.1 Office
3.3 Contingency Planning 4.3.2 Server Room
3.4 Data Backup Policy 4.3.3 Data Media Archives
3.5 Data Privacy Protection 4.3.4 Technical Infrastructure Room
3.6 Concept of computer virus protection 4.4 Protective Cabinets
3.7 Crypto-concept 4.5 Working place at home
3.8 Handling of security incidents 4.6 Computer Centres
3.9 Hardware- and Software-Management    
       
Non-Networked Systems Networked Systems
5.1 DOS-PC (single user) 6.1 Server-supported Network
5.2 Unix-System 6.2 Unix-Server
5.3 Laptop PC 6.3 Peer-to-Peer Network
5.4 DOS-PC (multiuser) 6.4 Windows NT Network
5.5 Windows NT PC 6.5 Novell Netware 3.x
5.6 Windows 95 PC 6.6 Novell Netware 4.x
5.99 Stand-alone IT systems 6.7 Heterogeneous Networks
    6.8 Network and System Management
       
Data Transmission Systems Telecommunications
7.1 Exchange of Data Media 8.1 Telecommunications System (PBX)
7.2 Modem 8.2 Fax Machine
7.3 Firewall 8.3 Answering Machine
7.4 E-Mail 8.4 LAN integration of an IT system via ISDN
7.5 WWW server 8.5 Fax server
7.6 Remote Access 8.6 Mobile Telephones
7.7 Lotus Notes    
       
Other IT Components    
9.1 Standard software    
9.2 Databases    
9.3 Telecommuting    
       
Safeguards Catalogues Threats Catalogues
S 1 Infrastructure T 1 Force majeure
S 2 Organisation T 2 Organisational Shortcomings
S 3 Personnel T 3 Human Failure
S 4 Hardware/Software T 4 Technical Failure
S 5 Communications T 5 Deliberate acts
S 6 Contingency planning    
       
  Hotline: gshb@bsi.bund.de    
IT Baseline Protection Manual - Index

© Copyright by
Bundesamt für Sicherheit in der Informationstechnik
last update:
July 2001
home