HostedDB - Dedicated UNIX Servers

-->
IT Baseline Protection Manual S 4.29 Use of an encryption product for laptop PCs

S 4.29 Use of an encryption product for laptop PCs

Initiation responsibility: Head of IT Section, IT Security Management

Implementation responsibility: IT-user

In order to prevent sensitive data being read from a laptop PC which, despite all precaution, has been stolen, an encryption program should be used. By means of the commercially-available products, individual files, certain areas or the entire hard disk can be encrypted in such a way that only the individual holding the secret key will be able to read and to use the data.

For secure encryption, three different requirements are of crucial importance:

Such encryption can be effected either online or offline. "Online" means that all data of the hard disk (or of a partition) is encrypted without any active intervention by the user. Offline encryption is explicitly requested by the user. In that case, he will also have to decide which files are to be encrypted. For the selection and use of cryptographic procedures, chapter 3.7 Crypto-concept should also be read.

For use on stationary and portable PCs, BSI can, under certain basic prerequisites, provide public agencies with an offline encryption program meeting medium-level protection requirements. A printed request form is located in the section covering Auxiliary Materials of this IT Baseline Protection Manual.

Additional controls:


© Copyright by
Bundesamt für Sicherheit in der Informationstechnik
July 1999
home