Information technology - Guidelines for the management of IT Security - Part 4: Selection of safeguards

Technologies de l'information — Lignes directrices pour la gestion de sécurité IT — Partie 4: Sélection de sauvegardes

General Information

Status
Withdrawn
Publication Date
01-Mar-2000
Withdrawal Date
01-Mar-2000
Current Stage
9599 - Withdrawal of International Standard
Start Date
04-Jun-2008
Completion Date
08-Nov-2025
Ref Project

Relations

Technical report
ISO/IEC TR 13335-4:2000 - Information technology -- Guidelines for the management of IT Security
English language
61 pages
sale 15% off
Preview
sale 15% off
Preview

Frequently Asked Questions

ISO/IEC TR 13335-4:2000 is a technical report published by the International Organization for Standardization (ISO). Its full title is "Information technology - Guidelines for the management of IT Security - Part 4: Selection of safeguards". This standard covers: Information technology - Guidelines for the management of IT Security - Part 4: Selection of safeguards

Information technology - Guidelines for the management of IT Security - Part 4: Selection of safeguards

ISO/IEC TR 13335-4:2000 is classified under the following ICS (International Classification for Standards) categories: 03.100.70 - Management systems; 35.030 - IT Security; 35.040 - Information coding. The ICS classification helps identify the subject area and facilitates finding related standards.

ISO/IEC TR 13335-4:2000 has the following relationships with other standards: It is inter standard links to ISO/IEC 27005:2008. Understanding these relationships helps ensure you are using the most current and applicable version of the standard.

You can purchase ISO/IEC TR 13335-4:2000 directly from iTeh Standards. The document is available in PDF format and is delivered instantly after payment. Add the standard to your cart and complete the secure checkout process. iTeh Standards is an authorized distributor of ISO standards.

Standards Content (Sample)


TECHNICAL ISO/IEC
REPORT TR
13335-4
First edition
2000-03-01
Information technology — Guidelines for
the management of IT Security —
Part 4:
Selection of safeguards
Technologies de l'information — Lignes directrices pour la gestion de
sécurité IT —
Partie 4: Sélection de sauvegardes
Reference number
©
ISO/IEC 2000
PDF disclaimer
This PDF file may contain embedded typefaces. In accordance with Adobe's licensing policy, this file may be printed or viewed but shall not
be edited unless the typefaces which are embedded are licensed to and installed on the computer performing the editing. In downloading this
file, parties accept therein the responsibility of not infringing Adobe's licensing policy. The ISO Central Secretariat accepts no liability in this
area.
Adobe is a trademark of Adobe Systems Incorporated.
Details of the software products used to create this PDF file can be found in the General Info relative to the file; the PDF-creation parameters
were optimized for printing. Every care has been taken to ensure that the file is suitable for use by ISO member bodies. In the unlikely event
that a problem relating to it is found, please inform the Central Secretariat at the address given below.
© ISO/IEC 2000
All rights reserved. Unless otherwise specified, no part of this publication may be reproduced or utilized in any form or by any means, electronic
or mechanical, including photocopying and microfilm, without permission in writing from either ISO at the address below or ISO's member body
in the country of the requester.
ISO copyright office
Case postale 56 � CH-1211 Geneva 20
Tel. + 41 22 749 01 11
Fax + 41 22 734 10 79
E-mail copyright@iso.ch
Web www.iso.ch
Printed in Switzerland
© ISO/IEC 2000 – All rights reserved
ii
Table of Contents
FOREWORD. vi
INTRODUCTION. vii
1 SCOPE. 1
2 REFERENCES . 1
3 DEFINITIONS. 1
4 AIM. 1
5 OVERVIEW. 2
6 INTRODUCTION TO SAFEGUARD SELECTION AND THE CONCEPT OF BASELINE
SECURITY. 4
7 BASIC ASSESSMENTS . 8
7.1 IDENTIFICATION OF THE TYPE OF IT SYSTEM . 8
7.2 IDENTIFICATION OF PHYSICAL/ENVIRONMENTAL CONDITIONS . 8
7.3 ASSESSMENT OF EXISTING/PLANNED SAFEGUARDS . 9
8 SAFEGUARDS . 9
8.1 ORGANIZATIONAL AND PHYSICAL SAFEGUARDS. 10
8.1.1 IT Security Management and Policies. 10
8.1.2 Security Compliance Checking . 10
8.1.3 Incident Handling. 11
8.1.4 Personnel. 11
8.1.5 Operational Issues. 12
8.1.6 Business Continuity Planning . 13
8.1.7 Physical Security. 13
8.2 IT SYSTEM SPECIFIC SAFEGUARDS. 18
8.2.1 Identification and Authentication (I&A). 18
8.2.2 Logical Access Control and Audit. 19
8.2.3 Protection against Malicious Code. 19
8.2.4 Network Management . 20
8.2.5 Cryptography . 21
9 BASELINE APPROACH: SELECTION OF SAFEGUARDS ACCORDING TO THE TYPE OF IT
SYSTEM. 24
9.1 GENERALLY APPLICABLE SAFEGUARDS . 25
9.2 IT SYSTEM SPECIFIC SAFEGUARDS. 26
10 SELECTION OF SAFEGUARDS ACCORDING TO SECURITY CONCERNS AND THREATS. 27
10.1 ASSESSMENT OF SECURITY CONCERNS . 27
10.1.1 Loss of confidentiality. 28
10.1.2 Loss of integrity. 28
10.1.3 Loss of availability. 28
10.1.4 Loss of accountability . 29
10.1.5 Loss of authenticity . 29
10.1.6 Loss of reliability . 29
10.2 SAFEGUARDS FOR CONFIDENTIALITY. 30
10.2.1 Eavesdropping . 30
© ISO/IEC 2000 – All rights reserved
iii
10.2.2 Electromagnetic radiation . 30
10.2.3 Malicious code. 31
10.2.4 Masquerading of user identity . 31
10.2.5 Misrouting/re-routing of messages . 31
10.2.6 Software failure. 31
10.2.7 Theft . 32
10.2.8 Unauthorized access to computers, data, services and applications . 32
10.2.9 Unauthorized access to storage media . 32
10.3 SAFEGUARDS FOR INTEGRITY. 33
10.3.1 Deterioration of storage media. 33
10.3.2 Maintenance error . 33
10.3.3 Malicious code. 33
10.3.4 Masquerading of user identity . 33
10.3.5 Misrouting/re-routing of messages . 34
10.3.6 Non-Repudiation. 34
10.3.7 Software failure. 34
10.3.8 Supply failure (power, air conditioning). 34
10.3.9 Technical failure . 35
10.3.10 Transmission errors . 35
10.3.11 Unauthorized access to computers, data, services and applications . 35
10.3.12 Use of unauthorized programmes and data. 36
10.3.13 Unauthorized access to storage media . 36
10.3.14 User error . 36
10.4 SAFEGUARDS FOR AVAILABILITY. 36
10.4.1 Destructive attack . 37
10.4.2 Deterioration of storage media. 37
10.4.3 Failure of communication equipment and services. 37
10.4.4 Fire, water . 38
10.4.5 Maintenance error . 38
10.4.6 Malicious code. 38
10.4.7 Masquerading of user identity . 38
10.4.8 Misrouting/re-routing of messages . 39
10.4.9 Misuse of resources. 39
10.4.10 Natural disasters. 39
10.4.11 Software failures . 39
10.4.12 Supply failure (power, air conditioning).40
10.4.13 Technical failures. 40
10.4.14 Theft . 40
10.4.15 Traffic overloading . 40
10.4.16 Transmission errors . 41
10.4.17 Unauthorized access to computers, data, services and applications . 41
10.4.18 Use of unauthorized programmes and data. 41
10.4.19 Unauthorized access to storage media . 42
10.4.20 User error . 42
10.5 SAFEGUARDS FOR ACCOUNTABILITY,AUTHENTICITY AND RELIABILITY. 42
10.5.1 Accountability . 42
10.5.2 Authenticity . 42
10.5.3 Reliability. 43
11 SELECTION OF SAFEGUARDS ACCORDING TO DETAILED ASSESSMENTS. 43
11.1 RELATION BETWEEN PART 3 AND PART 4 OF THIS TECHNICAL REPORT. 43
11.2 PRINCIPLES OF SELECTION . 43
12 DEVELOPMENT OF AN ORGANIZATION-WIDE BASELINE . 45
13 SUMMARY. 46
BIBLIOGRAPHY . 46
© ISO/IEC 2000 – All rights reserved
iv
ANNEX A CODE OF PRACTICE FOR INFORMATION SECURITY MANAGEMENT. 47
ANNEX B ETSI BASELINE SECURITY STANDARD FEATURES AND MECHANISMS . 49
ANNEX C IT BASELINE PROTECTION MANUAL. 51
ANNEX D NIST COMPUTER SECURITY HANDBOOK . 53
ANNEX E MEDICAL INFORMATICS: SECURITY CATEGORISATION AND PROTECTION FOR
HEALTHCARE INFORMATION SYSTEMS . 55
ANNEX F TC68 BANKING AND RELATED FINANCIAL SERVICES - INFORMATION SECURITY
GUIDELINES. 56
ANNEX G PROTECTION OF SENSITIVE INFORMATION NOT COVERED BY THE OFFICIAL
SECRETS ACT - RECOMMENDATIONS FOR COMPUTER WORKSTATIONS. 58
ANNEX H CANADIAN HANDBOOK ON INFORMATION TECHNOLOGY SECURITY. 60
© ISO/IEC 2000 – All rights reserved
v
Foreword
ISO (the International Organization for Standardization) and IEC (the International Electrotechnical
Commission) form the specialized system for worldwide standardization. National bodies that are
members of ISO or IEC participate in the development of International Standards through technical
committees established by the respective organization to deal with particular fields of technical
activity. ISO and IEC technical committees collaborate in fields of mutual interest. Other international
organizations, governmental and non-governmental, in liaison with ISO and IEC, also take part in the
work.
International Standards are drafted in accordance with the rules given in the ISO/IEC Directives,
Part 3.
In the field of information technology, ISO and IEC have established a joint technical committee,
ISO/IEC JTC 1. Draft International Standards adopted by the joint technical committee are circulated
to national bodies for voting. Publication as an International Standard requires approval by at least
75 % of the national bodies casting a vote.
In exceptional circumstances, when a technical committee has collected data of a different kind from
that which is normally published as an International Standard ("state of the art", for example), it may
decide by a simple majority vote of its participating members to publish a Technical Report. A
Technical Report is entirely informative in nature and does not have to be reviewed until the data it
provides are considered to be no longer valid or useful.
Attention is drawn to the possibility that some of the elements of this part of ISO/IEC TR 13335 may
be the subject of patent rights. ISO and IEC shall not be held responsible for identifying any or all
such patent rights.
ISO/IEC TR 13335-4 was prepared by Joint Technical Committee ISO/IEC JTC 1, Information
technology, Subcommittee SC 27, IT Security techniques.
ISO/IEC TR 13335 consists of the following parts, under the general title Information technology —
Guidelines for the management of IT Security:
� Part 1: Concepts and models for IT Security
� Part 2: Managing and planning IT Security
� Part 3: Techniques for the management of IT Security
� Part 4: Selection of safeguards
� Part 5: Safeguards for external connections
© ISO/IEC 2000 – All rights reserved
vi
Introduction
The purpose of this Technical Report (ISO/IEC TR 13335) is to provide guidance, not solutions, on
management aspects of IT security. Those individuals within an organization that are responsible for
IT security should be able to adapt the material in this report to meet their specific needs.
The main objectives of this Technical Report are:
� to define and describe the concepts associated with the management of IT security,
� to identify the relationships between the management of IT security and management of IT in
general,
� to present several models which can be used to explain IT security, and
� to provide general guidance on the management of IT security.
ISO/IEC TR 13335 is organized into five parts. Part 1 provides an overview of the fundamental
concepts and models used to describe the management of IT security. This material is suitable for
managers responsible for IT security and for those who are responsible for an organization's overall
security programme.
Part 2 describes management and planning aspects. It is relevant to managers with responsibilities
relating to an organization's IT systems. They may be:
� IT managers who have responsibility for overseeing the design, implementation, testing,
procurement, or operation of IT systems, or
� managers who are responsible for activities that make substantial use of IT systems.
Part 3 describes security techniques relevant to those involved with the management activities during a
project life-cycle, such as planning, designing, implementing, testing, acquisition, or operations.
Part 4 provides guidance for the selection of safeguards, and how this can be supported by the use of
baseline models and controls. It also describes how this complements the security techniques
described in part 3, and how additional assessment methods can be used for the selection of
safeguards.
© ISO/IEC 2000 – All rights reserved
vii
TECHNICAL REPORT ISO/IEC TR 13335-4:2000(E)
Information technology — Guidelines for the management of IT
Security —
Part 4:
Selection of safeguards
1 Scope
This part of ISO/IEC TR 13335 provides guidance on the selection of safeguards, taking into account
business needs and security concerns. It describes a process for the selection of safeguards according
to security risks and concerns and the specific environment of an organization. It shows how to
achieve appropriate protection, and how this can be supported by the application of baseline security.
An explanation is provided on how the approach outlined in this part of ISO/IEC TR 13335 supports
the techniques for the management of IT security laid out in ISO/IEC TR 13335-3.
2 References
ISO/IEC 13335-1: 1997 Guidelines for the Management of IT Security - Part 1: Concepts and
Models
ISO/IEC 13335-2: 1997 Guidelines for the Management of IT Security - Part 2: Managing and
Planning IT Security
ISO/IEC 13335-3: 1997 Guidelines for the Management of IT Security - Part 3: Techniques for
the Management of IT Security
ISO/IEC 10181-2: 1996 Information technology - Open Systems Interconnection - Security
frameworks for open systems: Authentication framework
ISO/IEC 11770-1: 1996 Key Management - Part 1: Framework
3 Terms and definitions
For the purposes of this part of ISO/IEC TR 13335, the terms defined in ISO/IEC TR 13335-1 apply:
accountability, asset, authenticity, availability, baseline controls, confidentiality, data integrity, impact,
integrity, IT security, IT security policy, reliability, residual risk, risk, risk analysis, risk management,
safeguard, system integrity, threat, and vulnerability. In addition, the following terms are used:
3.1
authentication
provision of assurance of the claimed identity of an entity (ISO/IEC 10181-2)
3.2
identification
process of uniquely determining the unique identity of an entity
4Aim
The aim of this part of ISO/IEC TR 13335 is to provide guidance on the selection of safeguards. This
guidance is provided for the situations where, for an IT system, a decision is taken to select
© ISO/IEC 2000 – All rights reserved
safeguards:
� according to the type and characteristics of the IT system,
� according to broad assessments of security concerns and threats,
� in accordance with the results of a detailed risk analysis review.
In addition to this guidance, cross references are provided to indicate where safeguard selection can be
supported by the use of publicly available manuals containing safeguards.
This part of ISO/IEC TR 13335 also shows how an organization (or part of the organization) - wide
baseline security manual can be produced. Detailed network security safeguards are mainly dealt with
in the documents referenced in the annexes A - H; ISO is currently developing several other
documents on network security.
5Overview
Clause 6 provides an introduction to safeguard selection and to the concept of baseline security.
Clauses 7 to 10 deal with the establishment of baseline security for an IT system. In order to select the
appropriate safeguards, it is necessary to make some basic assessments, no matter whether more
detailed risk analyses will follow later. These assessments are described in clause 7 which includes the
consideration of:
� what type of IT system is involved (e.g. a standalone PC, or connected to a network),
� what are the IT system's location(s) and surrounding environmental conditions like,
� what safeguards are already in place and/or planned, and
� whether the assessments made provide enough information to select baseline safeguards for the IT
system?
Clause 8 provides an overview of safeguards to be selected, divided into organizational and physical
safeguards (which are selected according to security relevant needs, concerns and constraints) and IT
system specific safeguards, both grouped into safeguard categories. For each safeguard category, the
most typical types of safeguards are described, including a brief explanation about the protection they
are aimed at providing. Specific safeguards within these categories, and their detailed description, can
be found in baseline security documents which are referenced in annexes A to H of this document. In
order to facilitate the use of these documents, a cross-reference between the safeguard categories of
this document and the chapters of the various documents in the annexes is provided in a table for each
safeguard category.
If it is decided that the type of assessment described in clause 7 is detailed enough for the selection of
safeguards, clause 9 provides a list of applicable safeguards for each of the typical IT systems
described in 7.1. If safeguards are selected based on the type of IT system, separate baselines might be
necessary for standalone workstations, networked workstations or servers. To achieve the required
level of security, all that is necessary to select the safeguards applicable under the specific
circumstances, is to compare these with the safeguards already existing (or planned), and to implement
those which are not already implemented.
If it is decided that a more in-depth assessment is necessary for the selection of effective and suitable
safeguards, clause 10 provides support for that selection taking into account the high level view of
security concerns (according to the importance of the information) and likely threats. Hence, in this
section, the safeguards are suggested according to the security concerns identified, taking into account
the relevant threats, and finally the type of IT system is considered. The Figure 1 gives an overview of
the ways to select safeguards described in clauses 7, 9, and 10.
© ISO/IEC 2000 – All rights reserved
Basic Assessments
(Clause 7)
Identification of the Type of
IT System (Clause 7.1)
Identification of Physical/Environmental
Conditions (Clause 7.2)
Assessment of Existing/Planned Safeguards
(Clause 7.3)
More
Simple
Advanced
Approach Approach
Simple or More
Advanced Baseline
Approach?
Baseline Approach: Selection of Safeguards
Selection of Safeguards
According to the Type of IT System
According to Security Concerns and Threats
(Clause 9)
(Clause 10)
Generally Applicable Safeguards
Assessment of Security Concerns
(Clause 9.1)
(Clause 10.1)
IT System Specific Safeguards
Safeguards for Confidentiality
(Clause 9.2)
(Clause 10.2)
Safeguards for Integrity
(Clause 10.3)
Safeguards for Availability
(Clause 10.4)
Safeguards for Accountability, Authenticity
and Reliability (Clause 10.5)
Figure 1 — Selection of Safeguards According to the Type of IT System
or According to Security Concerns and Threats
Clauses 9 and 10 both describe a way to select safeguards from baseline security safeguard documents,
which can be applied either for an IT system, or to form a set of safeguards applicable to a range of IT
systems in defined circumstances. By focusing on the type of IT system considered, the approach
proposed in clause 9 yields the possibility that some risks are not adequately managed, and that some
safeguards are selected which are not necessary or not appropriate. The approach suggested in
clause 10 to focus on security concerns and associated threats is likely to produce a more optimised set
of safeguards. Clauses 9 and 10 can be used to support safeguard selection without more detailed
assessments in all instances that fall within the scope of baseline protection. However, if a more
detailed assessment, i.e. detailed risk analysis, is used, clauses 9 and 10 can still support the safeguard
selection.
Clause 11 deals with the situation where it is decided that detailed risk analysis is necessary because of
high security concerns and needs. Guidance on risk analysis is provided in ISO/IEC TR 13335-3.
Clause 11 describes the relationships between parts 3 and 4 of ISO/IEC TR 13335 and how the results
© ISO/IEC 2000 – All rights reserved
of the techniques described in part 3 can be used to support safeguard selection. It also describes other
factors which might influence the safeguard selection, like any constraints that have to be considered,
any legal or other requirements which have to be fulfilled, etc. The approach considered in clause 11 is
different from the approaches described in clauses 9 and 10 in that it gives guidance for selecting a set
of safeguards that is optimised to a particular situation. This approach is not a baseline approach, but
might nevertheless be used to select safeguards to complement (i.e. add to) baseline safeguards in
some circumstances. Alternatively, this approach might be used without any relation to baseline
protection.
Clause 12 deals with the establishment of a baseline security manual (or catalogue) for the whole
organization or for parts of the organization. For the establishment of a baseline security manual (or
catalogue), the safeguards previously identified for IT systems or groups of IT systems are considered
and a common set of safeguards is identified. Depending on security needs, concerns, and constraints,
different levels of baseline security can be chosen. The advantages and disadvantages are discussed in
order to facilitate a suitable decision for each organization.
Finally, this part of ISO/IEC TR 13335 is summarized in clause 13 and a bibliography and annexes A
to H give an overview of the safeguard manuals referenced in clause 8.
6 Introduction to Safeguard Selection and the Concept of Baseline
Security
The following clause gives a brief overview of the topic of safeguard selection, and how and when the
concept of baseline security can be used in that process. There are two main approaches to safeguard
selection, i.e. using a baseline approach and carrying out detailed risk analyses. There are several
different ways of conducting detailed risk analyses, one of which is described in detail in
ISO/IEC TR 13335-3 and is called detailed risk analysis. Part 3 also discusses the advantages and
disadvantages of the different approaches to risk analysis, and thus safeguard selection.
Conducting a detailed risk analysis has the advantage that a comprehensive view of the risks is
achieved. This can be used to select safeguards which are justified by the risks, and thus should be
implemented. This avoids the provision of too much or too little protection. As this can require a
considerable amount of time, effort and expertise, it may be most suitable for IT systems at high risk,
whereas a simpler approach can be considered to be sufficient for lower risk systems. Using a high
level risk analysis can identify the lower risk systems. This high level risk analysis does not need to be
a formalized or complex process. Safeguards for low risk systems can be selected by applying baseline
security. Baseline security is at least the minimum level of security defined by an organization for each
type of IT system. This level of baseline security is achieved by implementing a minimum set of
safeguards known as baseline safeguards.
Because of differences in the safeguard selection process, two different ways of applying the baseline
approach are considered in this document:
� using a baseline approach where safeguards are recommended according to the type and
characteristics of the IT system considered, and
� using a baseline approach where safeguards are recommended according to security concerns and
threats, as well as taking into account the IT system considered.
In order to have an overview of the different parallel ways of safeguard selection this document
provides, it helps to view Figure 1 as part of a bigger picture (shown in Figure 2) which also gives an
idea of the relation between parts 3 and 4 of ISO IEC TR 13335.
© ISO/IEC 2000 – All rights reserved
Start of Risk Analysis
Process (see also Parts
2 and 3)
High Level
Risk Analysis
Baseline
Detailed
Approach
Risk
Analysis
(Part 3)
seeFigure1
Simple or More
Advanced
Baseline
Approach?
Selection of Selection of
Safeguards Safeguards According
According to the to Security Concern
Type of IT System and Threats
Figure 2 — Ways of Safeguard Selection
The baseline approach to be used should be chosen depending on the resources which can be spent on
the selection process, the perceived security concerns, and the type and characteristics of the IT system
considered. If an organization does not wish to spend a lot of time and effort on the selection of
safeguards (for whatever reason), a baseline approach suggesting safeguards without further
assessments may be suitable. However, if the organization's business operations are moderately
dependent on the IT system or service, and/or the information handled is sensitive, it is very likely that
additional safeguards will be required. In this case, it is highly recommended that at least a high level
view is taken of the importance of the information and likely threats to gain a better focus of the
safeguards needed to protect the IT system most effectively. If the organization's business operations
are heavily dependent on the IT system or service, and/or the information handled is very sensitive, the
risks may be high, and a detailed risk analysis is the best way to identify appropriate safeguards.
Specific safeguards should be identified based on detailed risk analysis where
� the type of IT system considered is not represented appropriately by the types considered in this
report,
� it is felt that the business or the security needs are not commensurate with the solutions suggested
in these clauses, or
© ISO/IEC 2000 – All rights reserved
� a more detailed assessment is warranted anyway due to potential high risks or the significance of
the IT system to the business.
It should be noted that even when a detailed risk analysis is undertaken, it may still be useful to apply
baseline safeguards to an IT system.
The first decision an organization has to make is whether to use a baseline approach on its own, or as
part of a more comprehensive risk analysis strategy (see ISO/IEC TR 13335-3). In taking this
decision, it should be noted that in using the baseline approach on its own the resultant process for the
selection of safeguards may result in less optimised security than if a wider risk analysis strategy was
adopted. However, the lower costs and less resources needed for the selection of security safeguards,
and the achievement of at least a minimum level of security for all IT systems, could be reasons for
deciding to follow a baseline approach on its own.
Baseline protection for an IT system can be achieved through the identification and application of a set
of relevant safeguards which are appropriate in a variety of low risk circumstances, i.e. they fulfil at
least the minimum security needs. For example, the appropriate baseline security safeguards can be
identified through the use of catalogues which suggest sets of safeguards for types of IT systems to
protect them against the most common threats. These catalogues of safeguards contain information on
safeguard categories or detailed safeguards, or both, but generally do not indicate which safeguards
should be applied in particular circumstances. It is possible that if an organization’s (or part of an
organization’s) IT systems are very similar in nature and service provided, that safeguards selected
through a baseline approach could apply to all IT systems. Figure 3 shows the different ways of using
a baseline approach discussed in this part of ISO/IEC TR 13335.
© ISO/IEC 2000 – All rights reserved
For a particular scope
� organisation,
� line of business, or
� service, etc.
Selection according to
thetypeofITsystem
(simplest approach)
(Clause 9)
Baseline
...
Approach
Selection according Safeguards Safeguards Safeguards
Safeguard Catalogue
to security concerns for situation 1 for situation 2 for situation n
and threats (more
refined approach)
(Clause 10)
Selection according
to detailed
Apply relevant
assessments (tailored
baseline
approach for each
safeguards
situation)
in each case
(Clause 11)
Standalone Servers Processes for which
Examples:
workstation connected confidentiality is a concern
to an internal considering the threat of use of
network software by unauthorised users.
Figure3—ApproachestoSafeguardSelection
If an organization decides to apply baseline security to either the whole organization or parts of it, it is
necessary to decide which parts of the organization are suitable to be protected by the same baseline,
and what level of security this baseline should be aimed at. In most cases when using baseline
security, a lesser level of security should not be allowed, whilst additional safeguards should be
implemented where justified and necessary to manage medium and high risks. Alternatively, the
baseline could reflect an average level for the organization, i.e. exceptions would be permitted above
and below the baseline if they were justified, for example, by the results of risk analysis.
© ISO/IEC 2000 – All rights reserved
One of the benefits of baseline security is that if it is applied to a group of IT systems, a certain
security level can be relied on throughout that group. In these circumstances, it is usually most
beneficial to develop and document an organization or department-wide baseline catalogue of security
safeguards.
7 Basic Assessments
The process of safeguard selection always requires some knowledge of the type and characteristic of
the IT system considered (for example, a standalone workstation, or a workstation connected to a
network), since this has significant influence on the safeguards selected to protect the system. Also, it
is helpful to have an idea of the infrastructure, in terms of buildings, rooms, etc. Another important
factor involved in the selection of safeguards is the assessment of existing and/or planned safeguards.
This avoids unnecessary work, and waste of time, effort, and money. Hence, it is highly recommended
that the assessments described in clause 7 always are used as a basis for the selection of safeguards.
When selecting safeguards, business requirements and the organization’s approach to security should
be taken into account (see also ISO/IEC TR 13335-2). Finally, it is necessary to determine whether
these assessments provide enough information for the selection of baseline safeguards, or whether a
more detailed assessment (as described in clause 10) or a detailed risk analysis (as covered in
clause 11) is necessary.
7.1 Identification of the Type of IT System
For the assessment of an existing or planned IT system, the IT system considered should be compared
with the following components, and the components representing the system should be identified. In
clause 9, safeguards are suggested for each of the components listed below. Components to choose
from are:
� standalone workstation,
� workstation (client without shared resources) connected to a network,
� server or workstation with shared resources connected to a network,
7.2 Identification of Physical/Environmental Conditions
The assessment of the environment includes the identification of the physical infrastructure supporting
the existing and planned IT system, as well as related existing and/or planned safeguards. Since all
safeguards should be compatible with the physical environment, these assessments are essential for a
successful selection. When considering the infrastructure, the following questions can be helpful. The
reader should also think of the environment of the organization and any special circumstances that
need to be taken into account.
� Perimeter and building
- Where is the building situated - within its own site with a perimeter fence, or on the street at a
place with lots of traffic etc.?
- Is the building single or multi-occupancy?
- If multi-occupancy, who are the other occupants?
- Where are the sensitive/critical areas?
� Access control
- Who has access to the building?
- Is there a physical access control system in place?
- How robust is the structure of the building?
- How robust are the doors, windows etc. and what protection is afforded to them?
- Is the building guarded and if so is it for 24 hours per day or only during working hours?
© ISO/IEC 2000 – All rights reserved
- Is the building and/or room housing critical IT equipment fitted with intruder alarms?
� Protection in place
- How is (are) the room(s) containing the IT system protected?
- What fire detection, alarm, and suppression facilities are fitted and where?
- What water/liquid leakage detection, alarm and dissipation facilities are fitted and where?
- Are support utilities like UPS, plumbing and air conditioning (to control the temperature and
humidity) in place?
By answering these questions, the existing physical and related safeguards can easily be identified. It
is worth noting that it is not a time consuming exercise when considering a building location to
identify issues concerning the doors, locks and physical access controls and procedures at the same
time.
7.3 Assessment of Existing/Planned Safeguards
After assessing the physical environment conditions and the components of the IT system, all other
safeguards already in place or planned for should be identified. This is necessary to avoid an already
existing or planned safeguard being reselected, and the knowledge of the safeguards implemented or
planned helps to select further safeguards acting in combination with them. When selecting
safeguards, the compatibility of the existing safeguards with the selected ones should also be
considered. A safeguard may conflict with another or hinder its successful operation and the protection
provided.
For the identification of existing or planned safeguards, the following activities can be helpful:
� have a look at documents containing information about the safeguards (for example, IT security
plans or concepts) - if the security process is well documented, all existing or planned safeguards
and the status of their implementation should be listed there,
� check with the persons responsible (e.g. IT system security officer, building manager or operations
manager) and the users as to which safeguards are really implemented for the IT system under
consideration, and
� walk through the building viewing the safeguards, compare those implemented with the list of
what safeguards should be there, and check those implemented as to whether they are working
correctly and effectively.
It may be determined that existing safeguards exceed current needs. In this case, consideration should
be given to removing these safeguards. If removing redundant or unnecessary safeguards is
considered, security and cost factors should be taken into account. Since safeguards influence each
other, removing a redundant safeguards might reduce the overall security in place. In addition, it can
be cheaper to leave safeguards in place then to remove them, or, especially if the safeguards have high
maintenance costs, it can be cheaper to remove them.
...

Questions, Comments and Discussion

Ask us and Technical Secretary will try to provide an answer. You can facilitate discussion about the standard in here.

Loading comments...