Home

The GSTOOL Manual - BSI

image

Contents

1. 221 GSTOOL 3 1 User Manual Administration of rights In the ROLE TYPE selection window you can choose between All roles Rights roles and User roles The list displays all the existing roles consistent with the entry selected in the ROLE TYPE field New If you have been assigned the role System or your role contains the right ENTER DELETE USERS AND ROLES when you click the New button the ERI window will open where you can create a new role IS Irrespective of the chosen role type the Open and New role buttons always open the window in which you can edit the rights roles It is not possible to create or edit user roles Open If you have been assigned the role System or your role contains the right ENTER DELETE USERS AND ROLES when you click the Open button the RR window will open in which you can edit a rights role delete existing rights and assign new rights If you do not have the right specified and the System role has not been assigned to you either you can only view the rights included in the role IS The Import 3 0 and System roles are predefined and cannot be either amended or deleted Irrespective of your particular rights the Open button will only enable you to view a user role The Data tab card does not contain any entries The IT asset sets and Target objects tab cards show all the existing tar
2. Subtype or ZOS_ ID etc e Asa minimum the table must contain the columns Name NAME Type ZOT_ID and Subtype ZOS_ID You are free to choose which of the other columns should be included or left out e Inthe other lines the data to be imported is written line by line mirroring the column names contained in the first line Certain values157 can be specified either as numbers or as text ziojxi 2E amp gt Ausblenden Suchen Zur ck Vorwarts Drucken Protection requirement confidentiality SBK_ID_CONF Inhalt Index Suchen Favoriten Glossary Zu suchendes Schl sselwort Field list Export Import rights a Information can be entered either numerically or textually In the latter case the designations must be identical with those of the protection requirement assessment Textual information can be entered in any language in accordance with the protection requirement categories defined by the BSI Filter define Filter show The following protection requirement categories are available e 17 low to medium e 2 high e 3 very high 157 This applies to Protection requirement confidentiality SBK_ID_VERTR IT system status STA_ID Employee role ROL_ID Application urgency DRG_ID 264 GSTOOL 3 1 User Manual Appendix Example 1 or Low to moderate etc ATTA 3h correctly for a target object import is to
3. general building il No Reverse Update Cancel Selection of target objects in the list results in links according to the following rules e Al All the target objects contained in the list are selected e None All the target objects contained in the list are deselected The None option also deletes all the markings that were in place when the window was opened If you then immediately click OK all the original links to the target object in this case ll Data media archive will be deleted Reverse Reverses the selection indicated in column 1 all target objects not currently selected will be selected and all target objects currently selected will be deselected OK Creates a link between all the target objects selected in the list and the target object selected in the tree in this case f_ Data media archive Any links that existed originally but which have been deselected in column 1 will be deleted when you click OK e Cancel Closes the window without changing the links Step 2 104 GSTOOL 3 1 User Manual The next step entails directly linking the room to the IT asset Structure of target objects view Set i z building As a result of changing the indirect link in step 1 f_1 Eee Mom media archive has now been deleted from the list for f room wie Room under building Gs Head office in IT asset set se ftw Sa
4. cccccssssssseeeeeeeeeeseeeeeeneeeeeeeeeeeeeesseeneeeeeeeeseesneeees 20 15 1 Database Servenscciedes ct escivis ieena ciasestecensiavheeast eel a a a 21 15 2 Data DaS S s sees cvcceiveccsaSh ctx ter rdesiacetadtedaguecaden cctadbelweseanesneatadectterseund avracetsandd aimee 22 General information on working with GSTOOL 3 1 25 2 1 Starting the Programm ccasss es sienssssncviencaieiiwsrasucctentsacediseantndetenssendteawerennrsnmeataneeneantis 25 ee Weck Selecting ING seNe a aana aaa aa a aa A a a aaa aAa aiia atone 25 21 2 Selecting INE database meinir creirie oerni eigy a a a a e E a ri eaaa 26 2 1 3 Registration type arsirora enia aa a E AAAA ARA aT A aa 28 2 2 User interla Ee a e sieas visa cues ar aap rea a ivous ins ssesdbaiesss devs devas these aaaeei 29 22T Meni ba e a E a a a a ibacnenes 29 222 PODAT a a e See a e 29 GSTOOL 3 1 User Manual Table of contents 2 2 9 Navigator seata Sates ee he aa a E a a a aaa aiae 30 PATA RCC E EET EE 31 22 97 GING WINDOW i ienirt eieiei naeris a AAA EAER TAAA AE ES aia 33 2 2 6 Changing the window WIGKI ac qr acs zcncs sd ticeatats a teava dacvareadapetsha aaobaaditacinhanlasctene atetshs 36 2 3 Default SQUIN GS vccesesninceswiccensccvsnssavet san tnees en teivadaseavervtvadesonsuwaaiavendensdinbenetteinwerscctendeae 36 23 1 STOO Z SROS u Prana a tdeu ih sie acct ines etna ea ea Aete N aa 37 PR P ST OOS O E aie ce ON a eS hoa Soe ed ee Or AT 37 2 3 3 ST OOIS gt lt Pa
5. This Progress tab card is not applicable for a text file export of target object 9 2 Target object import from text file This menu allows target objects to be imported into GSTOOL 3 1 Target objects can be imported from either TXT or CSV files 201 GSTOOL 3 1 User Manual Export Import view In the editing window Import tab card click New to open the EAMA exelag Window which has the two tab cards Common and Progress Tab card Common Common Progress IMPORT FILE In this field you should select the name and path of the file to be imported using the Browse button IS GSTOOL 3 1 can automatically recognise from the selected import file what kind of import this will be Further Information regarding imports from text files on Format requirements Processing of import files and Post processing of imported target objects can be found starting on page 263 in the Appendix IMPORT TYPE The type is automatically recognised from the import file chosen NAME Every new import has to be given a name This can be any name you like including hyphenated names To start the import operation click Run An information window provides you with information about the export 202 GSTOOL 3 1 User Manual Export Import view GSTOOL 3 1 x 10 target objects were imported 2data records could not be imported due to errors This tells you how many data reco
6. have been assigned to target object Head office of type Gis building Ee CRCR ASHE j a i ity i i E M 9 05 Archivi Target object generic aspects of IT security with its lige ideo rchiving modules is automatically created in the object model for every n ace n a 7 B M 4 02 Cablin IT asset set on the basis of the IT BPM and irrespective of wt Mw ieedit E 2 J net S 1 20 Selection of a cabl whether any target objects are linked to an asset set and if so o pt S 1 21 sufficient dimensior 9 S 1 22 Physical protection which ones o S 1 39 Prevention of trans o Bt S 2 19 Neutral documente o 5 2 20 Monitoring of existit o Bt 55 1 Removal or short ci o npc S 5 2 Selection of an appr npc S 5 3 Selection of cable ty o npc S 5 4 Dokumentation on o apc S 5 5 Damage minimising 1 9 5 6 18 Provision of redunc 76 The user should complete any missing module assignments in the Modeling as appropriate For example it could be that a user defined module is defined for employees of subtype System Administrator which contains specific safeguards of relevance to a System Administrator 118 GSTOOL 3 1 User Manual Layer model In the layer model the five layers are presented directly below the IT asset set Each layer contains the modules which according to the IT BPM belong to the target objects that are linked to this asset set T
7. Modeling See Deleting a safeguard page 123ff You need to reinsert any missing safeguards into the module see 5 2 2 Adding a safeguard page 121ff For this purpose use the predefined filter Missing Deletions Problem Cause Solution An IT asset set cannot be deleted in Master data The BSI asset set created during the installation of GSTOOL 3 1 cannot be deleted even if it has been renamed To determine whether the IT asset concerned was originally called BSI activate display of the ID column via menu selection lt Tools gt lt Options gt Display page 49 The original BSI asset has the ID 1 272 GSTOOL 3 1 User Manual Reports Problem Cause Appendix Solution Although a module is highlighted in the tree the Modeling modules or Modeling safeguards report does not contain any data The report templates Modeling modules and Modeling safeguards generate reports based on the layer model If only one module is selected in the tree then the report will not have any information regarding the higher layers and will therefore be empty As well as the desired module you should also select the superordinate asset set or generic aspects of IT security This will have the effect of incorporating all the associated modules and safeguards into the report Alternatively you can choose the IT Baseline
8. Responsible Add for the SELECTION In accordance with BPM role assignment When the employees were created no roles were assigned to them or at least not the roles that are necessary for certain safeguards in the IT BPM Modify employee role assignment via Master data administration In the KKI LER CEUCLE window tab card Common field IN TARGET OBJECT not all existing target objects of the same type are offered as reference source A target object that references itself cannot also serve as reference source Choose the same reference source that has already been chosen for the target object that you really want to be the reference source for the target object that you are currently working on See also section 5 4 Referencing page 135ff 271 GSTOOL 3 1 User Manual Problem Cause Appendix Solution Individual menu commands or buttons have been deactivated The activation of menu commands and buttons in GSTOOL 3 1 is determined by rights and context For further information see Activation of menu options and buttons on page 29 In Modeling has been specified as the qualification level achieved for a module even though all the safeguards contained in the module which are necessary for the relevant qualification level have been implemented At least one of the safeguards necessary for the desired qualification level was deleted in
9. To help the user of the tool to assimilate the tree display in Modeling all the tree elements are preceded by distinctive icons These have the following meanings e The first level of the tree always contains the view object model vs layer model plus the name of the institution ae La model viewl linstitution 74 See section DISPLAY SAFEGUARD AND MODULE NUMBERS page 48ff 113 GSTOOL 3 1 User Manual The qualification icon shows which qualification level has been achieved by that institution An empty icon e means that no qualification level has yet been achieved otherwise the qualification level is indicated by the letter inside the icon Pd BY Ey e The second level shows the IT asset sets in the institution Sia P lasset set Once again the qualification icon uses letters as described above to indicate the qualification level achieved for each asset set e The way that the third level of the tree is presented depends on whether the layer model or the object model has been chosen In the layer model the five layers defined in the IT BPM are displayed the same way for each IT asset set taf WW oreo l name of the layer The icon we stands for layer The colour bar in this case Wogreen indicates the implementation status of the modules that belong to the layer The meaning of the colours and the internal dependencies in this display are e
10. 0 2 3 Modeling of the IT Baseline Protection Manual in GSTOOL 3 1 GSTOOL 3 1 supports the development of IT security concepts based on the IT BMP Essentially it reproduces Chapter 2 of the IT BMP GSTOOL 3 1 User Manual Introduction IT BMP 2 1 IT Structure Analysis The IT structure analysis entails gathering data about and structuring the present situation This is not supported by GSTOOL 3 1 and has to be carried out using other tools outside of GSTOOL 3 1 The results of this work flow into Master data group size and Structure of target objects links IT BPM 2 2 Assessment of Protection Requirements The assessment of protection requirements is supported by GSTOOL 3 1 to the extent that the conclusions and rationale can be incorporated into Master data and the inheritance of protection requirements is effected in Structure of target objects IT BPM 2 3 IT Baseline Protection Modeling The IT assets also have to be defined by the user in order to use GSTOOL 3 1 The collection of this information is not supported by the tool The assignment of target objects to the various layers is performed entirely using GSTOOL 3 1 on the basis of the target object type and subtype selected by the user Similarly the Modeling module of the tool is used to carry out a first pass assignment of modules in accordance with section 2 3 1 of the IT BPM However this assignment should be viewed only as a working s
11. 7 4 6 Deleting a safeguard Only Adapted or User defined safeguards can be deleted However the effects of right clicking and then choosing lt Delete gt from the pop up menu clicking Delete in the toolbar and clicking the Delete button are different for each of the two types Deleting an adapted safeguard Adapted safeguards can be restored to their original state type BSl standard by clicking OK at the prompt which appears during the deletion operation All the data collected during the Basic Security Check page 140ff is retained Deleting a user defined safeguard An entire user defined safeguard is deleted from the database currently edited by clicking OK at the prompt which appears 188 GSTOOL 3 1 User Manual BPM user defined view during the deletion operation The data gathered for this safeguard during the Basic Security Check page 140ff is lost 7 5 Tab card Threats Target object type Target object subtypes Modules Safeguards Threats Protection requirement category FS eS No Name Type Catalog Obsolete f lt Takt Loss of personnel BSI standard Force majeure ELZ Failure of the IT system BSI standard Force majeure Ths Lightning BSI standard Force majeure T14 Fire BSI standard Force majeure T15 Water BSI standard Force majeure T1 6 Burning cables BSI standard Force majeure ERE Inadmissible temperature and humidity BSI standard Force majeu
12. During the standard import information for temporary editing was imported from another source database To return the data a re export is carried out in the target database 133 See section 4 3 Creating a target object page 108ff 134 See section 4 2 1 Direct indirect linking page 98ff 135 See section 9 5 2 Export scope Delete the dummy IT asset set page 210 209 GSTOOL 3 1 User Manual Export Import view 9 5 1 Tab card Properties Properties IT asset sets Target objects Progress o E Name Return by Comments EXPORT TYPE From the options available choose Re export NAME The export must be given a name This can be any name you like including hyphenated names RETURN BY This field shows the date entered during the creation of the underlying standard export This date is only entered for information purpose and does not undergo any evaluation within the tool 9 5 2 Export scope The scope of the re export is specified on the IT asset sets and Target objects tab cards The list can be limited to target objects of one particular type in the selection field TARGET OBJECT TYPE Each re export or re import can only be carried out once If some of the target objects that were contained in the standard export are not selected for the re export it will not be possible to return these to the source database later on in a second re export re import opera
13. Example The target object Record store type Building type building room is linked to The user defined target object type By storey is now created and type LA building is selected to be its father The tool automatically creates the dummy target object Storey The room Records store is detached from Building in accordance with the new structure and is linked to Storey The dummy target object is equivalent to the original target object in every respect and can be renamed like all the other target objects IS When you delete a user defined target object type and all the associated target objects the original link displaced by the dummy target object is not restored Creating user defined target object subtypes When a new target object type is created a target object subtype of the same name is automatically created On the Subtypes tab card this subtype is initially the only one to have square brackets around it Additional subtypes can be created either now or later by clicking New IS The target object subtypes created here will be offered later on in the SUBTYPE field whenever you create a target object Renaming a target object type First of all select the target object type in the tree that is to be renamed On the Common tab card enter the new name of 40 General information on working with GSTOOL 3 1 BSI H set of IT assets B
14. Key Implementation status stated Implementation status not stated Implementation status not relevant to inheritance process 155 Safeguards designated Unnecessary are treated in the same way as ones with implementation Yes when it comes to the passing on of implementation status to the module 242 GSTOOL 3 1 User Manual The inheritance mechanism 12 2 2 Inheritance from modules to layer or target object The selection made in the EDITED field in the LUCEA Window has the effect of colour coding the implementation identifiers for the safeguards as follows and yes The implementation identifier is passed across from the IN TARGET OBJECT not referenced _S eguards in accordance with the inheritanoe rules a a3 The implementation identifier is adopted from the module IN TARGET OBJECT other target object OTN EDITED dispensible The implementation identifier is set to Wotue irrespective of the and implementation identifiers of the safeguards The qualification IN TARGET OBJECT not referenced level achieved is stated as tv EDITED no The implementation identifier is set to Yeg irrespective of the and L implementation identifiers of the safeguards The qualification IN TARGET OBJECT not referenced _ level achieved is stated as jz 2 2 0000 Once again it is always the implementation status that is least favourable for IT security that is passed from the module to th
15. Reports Opens an HTML page from the Baseline Protection Manual that is relevant to the data record currently on display Has the same effect as EE View in the toolbar If there is no information in the BPM then an empty page is displayed Opens the GSTOOL 3 1 Information window Copies the currently selected object to the application clipboard Has the same effect as a New in the toolbar and is available in the following views Master data BPM user defined Structure of target objects Modeling Export import In BPM local and BPM online Ctrl P initiates the printing of selected text and in Reports it initiates the printing of a report In BPM local and BPM online it has the same effect as 6 Print in the toolbar 262 GSTOOL 3 1 User Manual Appendix Ctrl S Saves the selected or adapted object Has the same effect as EJ Save in the toolbar and Save in screen layouts and windows Ctri U In Modeling it has the effect of toggling between the layer model and object model presentations Has the same effect as Model in the toolbar 14 2 Conventions for the numbering of modules In the IT BPM module numbering follows a scheme that takes the subject matter into account as follows e M3 x Management organisation concepts personnel e M4 x Buildings rooms technical infrastructure e M5 x Non networked systems and clients e M6 x Networked sy
16. Target object type Target object subtype Safeguards Threats Notepad Catalog All A _ No Name Catalog Priority o 51 33 Safe keeping of laptop PCs durin Infrastructure 1 o S 1 34 Safe keeping of laptop PCs durin Infrastructure 2 3 oO 1 35 Pooled storage of a number of lap Infrastructure im s23 Data media control Organisation 2 o 24 Maintenance repair regulations Organisation 2 o 529 Ban on using non approved softw Organisation 2 oO 2 10 Survey of the software held Organisation 3 oO 213 Correct disposal of resources req Organisation 2 oO 3 2 22 Escrow of passwords Organisation 3 ha Reverse Delete New e Reverse Reverses the selection indicated in column 1 all the safeguards not currently selected will be selected and all the safeguards currently selected will be deselected 174 GSTOOL 3 1 User Manual BPM user defined view e Delete clears the selected safeguards from the module When safeguards are deleted during adaptation of modules in BPM user defined the effects of this extend to the entire database When safeguards are deleted all the information captured in relation to the safeguards is lost as well Once deleted this information cannot be restored again i The deletion of safeguards during the adaptation process does not affect the Inheritance of qualification level achieved 12 3 page 245ff The inheritance proces
17. cccccecceeee eee eeeeenneeeeeeeeeeeetennnneneeeeees 55 2 4 3 lt File gt lt Import gt lt Update BPM metadata cccccccccecccceccceceeeeeeeeeeeeeeeeeees 58 24A PCO ISIE a a a a a e e cmt e da 59 2 4 5 COPYING objects siss erise ien eann takrka krn deore cap ovens EEA ENEK EEIN et eee ened 60 24 O ORE AREO O a r a aea e a a a a a 61 2 4 7 lt Edit gt lt Modeling gt cater sti c 201 seta nd cmon cates cetera ttagaatotes ais auaadaaeadopenssactataiteathateis tases 61 2 4 8 lt View gt lt NOLCDAA gt cccccccccccccccececceecceecceeeceeeeeeeeeeeeeeeeeeeeseeeeeeeeeeeeeeeeeeseeeeeeeetiness 61 249 lt Tools gt SEI CIY UO css cece tg Be Sa heh Se wae Fa Dead Se ae avo eae Phd este eee 61 2 4 10 lt Database gt lt Data backup and LOCOVELY gt cccceeeceeeeeeeeeeecnneeeeeeeeteeeteneneeeeeeees 63 2 4 11 NEW PRIOR CHANGED display eecceeeeeeeeeeeeeeeeeeaeeeeeeeeaaeeeeeseaeeeeeeeeaeeeeeeeaes 67 DA TZ IS CORY E E E lirica Saree te ee un Geeta aioe E 68 P aE ONeMMO El Pia EEEE A A T E cs 69 2 4 14 Configuring the database eeseeeeeeeeesiirieeetteettritttttetetktttntntnsssstttnnnnnastateennnnnn 70 3 Master data view iciiccsscccccoscsccccctitncs ects cee ete 75 3 1 Determining the target object type ssssunnnssssnnnnnunnnnnnnnnnnnnnnnnnnnnnnnunnnnnnnnnnnnnnnn 77 3 2 Creating a new target object sssssssssnununnnnnnnnnnnunnnnnnnnnnnnnnnnnnnnnnnnannnnnnnnnnn nannan 78 3 2
18. e Upgrading an installation If a working version of GSTOOL 3 0 is installed on the PC with the standard database BSIDB_V305_DATA mdf 10 attached to it the next window will tell you how to handle the attached databases 10 This database was automatically created and attached to the tool when GSTOOL 3 0 was installed 11 GSTOOL 3 1 User Manual Installation first time use deinstallation ji GSTOOL 3 1 InstallShield Wizard x GSTOOL 3 0 application found GSTOOL 3 0 application will be uninstalled Current databases will not be deleted Their data can be written onto GSTOOL 3 1 after installation The standard database BSIDB_305_data mdf that may be in GSTOOL 3 0 will be automatically appended onto GSTOOL 3 1 User installed databases must be appended manually via the Help program Configure database onto GSTOOL 3 1 before data tranfer Attention Some option settings and altered path settings specifically the path for storing the chiasmus key are not automatically taken over into GSTOOL 3 1 These settings must be repeated after installing GSTOOL 3 1 InstallShield Gancel IS Some options and also changed path settings especially the path for storing the Chiasmus key are not automatically transferred to GSTOOL 3 1 These settings will have to be re specified once the installation is complete e User information i GSTOOL 3 1 InstallShield Wizard x Customer Information
19. of target objects 2 2 eee eeeeeeeeeentteeeeeenaes 93 sub types ASSIQNING ic2 etecoes tices ikea einen heels 79 CHANGING i eninge erie 85 supplementary attributes COMMON 202 5 scsi Seeder dation bie iadi 42 Appendix user defined c ccccceeeeeeeeeeeceeceeeeeeeeeeneees 35 system requirements ee eeeeeee sete eeeeenteeeeeeees 6 T tab card Audit information cccecceeeeeeeeesteeeees 83 COMMON aereis he niei eiia 38 Common User sssrinin 235 BEE E AATE E N ATT 226 ENDIOVO Seaan AA 80 Filters Meerits naeia p aaen tate ERENT 162 IT asset Sets eni e en e 228 LinKk OPUONS eee e a 25 Linked With cccccceeeeeeneseeeeeeeteeeeeneees 161 LINKS arinin cronan eaaa e eaaa 84 Logon information ccccceeeeeeeeeeeeteeeeeeenaes 28 Modules 168 187 189 195 196 Notepad 20 cceeececcecceeceeeeeeeeeeceeeeeeeeeeteeeeees 34 Passworde teri tect cubed renee et beteeas ate 73 Person responsible no employees offered cra ete ent 275 Protection requirement ceeeeeeeee 81 protection requirement in networks 83 Protection requirement categories 197 ROGS oaeiae cet caxteabectsarhecesaety 189 237 Roles as per IT BPM 185 SafeQuards Soesi irinin rin iinei raaa 180 SCOPE ea ante es eles 160 S1 11 O E 4 EE A TENE EAA 73 Specialist task c ccccceeeeeeeeeeeeeeeeeeeeeeeees 81 MUDLY DOS nisor A A 38 Supplement COMMON fects S
20. serves as the basis for the employees offered on Tab card Responsible 5 5 4 page 146ff 3 2 2 Tab card Specific task This tab card is only available for target objects of the type BA application In the text field at the top you should explain the specific task When it comes to assessing importance for fulfilment of specific task four predefined categories are available to choose from If one of these is chosen then the GRUNDS field becomes a mandatory field 3 2 3 Tab card Protection requirement This tab card is available for the following target object types BA application A buildings E IT system amp network and A room 81 GSTOOL 3 1 User Manual Master data view IT system Protection requirement Link s Notepad Supplement Baseline Protection requirement Grounds Confidentiality a no entry Suggestion Integrity Suggestion Availability Suggestion Protection requirement determined no entry L User defined protection requirement Grounds For each of the three basic parameters of CONFIDENTIALITY INTEGRITY and AVAILABILITY you can individually specify the protection requirement for the target object that you are currently working on As soon as one of the three protection requirement levels is selected the GROUNDS field becomes a mandatory field In the SUGGESTION field the assessment of protection
21. License later Until the license key has been entered the window will appear every time the program is started whe Further information on how to acquire a license and with it a license key can be found on the internet at Wh j http www bsi bund de gstool vertrieb htm 17 GSTOOL 3 1 User Manual Installation first time use deinstallation 1 3 2 Test operation GSTOOL 3 1 can be used for evaluation purposes with full functionality but without a license for a period of 30 days15 If your version of GSTOOL has not yet been licensed the number of days remaining will be displayed in the window Once the test period has expired you will no longer be able to save any data within the tool GSTOOL 3 1 will warn you of this with two messages Between License later and the etsy hele Me Py C LICL ELELEE Window the following message will be displayed GSTOOL 3 1 i xj 2 Test period ended To save data from now on you will need a license key Click OK to start GSTOOL 3 1 as per normal If an attempt is made e g to create a new target object after the evaluation period has expired this will be denied and the following error message will be displayed GSTOOL 3 1 xj lt Save gt is deactivated To save you must enter a license key Existing data can still be viewed The license key can also be entered after the evaluation period has expired Once the key has been entered th
22. Protection survey report template This template creates the same report as the two others but this time in the object model so that it is no longer necessary to include the generic aspects of IT security or the IT asset set A user defined report is not shown in the browser window but instead the window is opened directly Only reports in whose template the option OPEN REPORT has been activated are displayed in the browser window Activate the OPEN REPORT option in the report template158 Creation of new target objects Problem Cause Solution During the creation of a new target object no subtypes are offered for selection in the SUBTYPE field on the first tab card As this means that the mandatory field cannot be completed it is not possible to save the target object It is likely that all the subtypes for the chosen target object type were deleted via menu option sequence lt Tools gt lt Target object types gt Define the subtypes necessary for the chosen target object type see Creating user defined target object subtypes on page 40 and then go back to creating the new target object 158 See chapter 6 9 3 Tab card Properties section EXTENDED PROPERTIES OPEN REPORT page 157ff 273 GSTOOL 3 1 User Manual Appendix 14 5 Glossary User As used in the manual users are persons who actually work on aPC with GSTOOL 3 1 and thus enter view
23. User Manual Installation first time use deinstallation 1 Installation first time use deinstallation GSTOOL 3 1 can only be installed by a System Administrator this will normally be the work admin for your system We do not recommend temporarily granting the Administrator rights required to carry out the installation to a user The software to be installed requires around 180MB of hard disk space GSTOOL 3 1 itself takes up about 70MB and the system programs about 110MB The system programs will be automatically copied to the appropriate subdirectory of the active system partition normally CH IS Network installation i e where the executable files are held on the server and called by the client is not possible IS However it is possible for several computers to have shared access to a database installed with GSTOOL that is stored on a network This database can be held separately on an SQL Server 2000 or on a GSTOOL installation 1 1 Installation Between the installation of GSTOOL 3 1 and Configuring the sa password 1 2 page 16ff unauthorised third parties will be able to gain access to GSTOOL 3 1 and hence to access the entire system by using the default sa password of bs If a network exists you should therefore take the installation computer off the network by pulling out the patch cable or the modem lead prior to starting the installation The computer should not be reconnect
24. decision must now be made as regards the budget that will be made available to implement the outstanding IT security safeguards If the budget is not sufficient to cover all the outstanding safeguards the resulting residual risk must be made transfather The next step is to determine the sequence in which these outstanding safeguards are to be implemented Here it is imperative that any logical or technical dependencies between safeguards are considered Other criteria which should be considered in determining a sensible sequence are the priorities 1 3 or certification identifiers A C Z and the wider impact of the IT security safeguards In addition for every safeguard to be implemented and for control purposes it is necessary to define responsibilities and the relevant deadlines To ensure that the organisational and technical IT security safeguards introduced are also accepted by the workforce they must be given awareness training on possible security problems Otherwise there is a danger that security mechanisms could be circumvented either knowingly or unknowingly and thus be rendered ineffective The outcome of this stage is an implementation plan that documents the decisions that have been made and the plans for every safeguard to be implemented 13 3 7 IT Baseline Protection Certificate To give companies and agencies the opportunity to make the successful implementation of IT Baseline Protection transfather both within the
25. displayed In the lower part of the tree every target object is displayed irrespective of links A newly created IT asset set is only added to the list of Basic filter after GSTOOL 3 1 has been restarted Tab card Basic filter The following six Basic filter are offered in gt Master data ASSET SET NAME SELECTION Only target objects that belong to the selected set of IT asset 8 are displayed TARGET OBJECT CALCULATED PROTECTION REQUIREMENT Only target objects whose calculated protection 68 Only one asset set can be selected and the user must have at least read permission for this IT asset set 92 GSTOOL 3 1 User Manual Structure of target objects view requirement matches the selection in this field are displayed TARGET OBJECT TYPE Only target objects of the selected type are displayed TARGET OBJECT SUBTYPE Only target objects of the selected subtype are displayed TARGET OBJECT ADMINISTRATOR In the selection field all existing target objects of type Ah employee are offered Only target objects with which the selected employee is linked are displayed i As A employee can only be linked to target objects of types ey set of IT asset m IT system and BA application when this field is selected only the aforementioned three target object types can be displayed in the tree 4 employee which is used as a filter cannot therefore be displayed as well TARGE
26. ji a room El Record store A employee H a room ea a Record store BIT system ae network bA application A employee GSTOOL 3 1 User Manual Administration of rights Rights regarding target objects are determined by the last Generic aspects none three selection options The rights determined here apply Generic aspects read across the board to all target objects directly linked to the IT Generic aspects write asset set both now and in the future145 Generic aspects auditor Target objects none Target objects read gt Target objects can simultaneously be directly linked to Target objects write more than one IT asset set Where different rights are granted to IT asset sets a target object that has more than one direct link will always be treated as having the wider right irrespective of the actual IT asset set in which the target object is accessed Tab card Target objects e The Target objects tab card displays in a list all the target objects that exist in the database currently being edited and the rights regarding access to them in the present role i This Rights columns cannot be concealed by selecting menu option sequence lt Tools gt lt Options gt Display DISPLAY RIGHTS COLUMN Data IT asset sets Target objects Description Filter All x Abbreviation Name Description Target object type Rights l Admin Administrator employee read DMS Data media arch
27. modules and safeguards in Modeling Here the tool follows the requirements laid down in the IT BPM These requirements cannot be directly altered by the user i e for every new target object linking suggestions are created in the IT asset set in accordance with these stipulations However it is possible and it may even be necessary to modify the suggestions that the tool comes up with in gt Modeling to reflect the actual circumstances within your organisation gt In every case the Modeling instructions contained in the IT BPM section 2 3 1 regarding the five layers must be followed and if necessary the default suggestions offered by GSTOOL 3 1 should be modified Not only are the suggestions for the linking of target objects modules and safeguards amended in this view but all the data relating to the implementation status of safeguards is collected in this view as well This is part of the Basic Security Check A lot of extra information relating to modules and safeguards can also be entered with GSTOOL 3 1 This information when contained in reports for example may provide information that is valuable when it comes to establishing IT security 5 1 General To enable individual changes to the linking of target objects and to optimise the clarity of the tree Modeling offers some functions which go beyond pure Modeling In Modeling you can create modify and delete target objects essentially in the same manner as
28. moved The existing link to IT asset set BSI will be deleted Method B Select menu option sequence lt Edit gt lt Structure of target objects gt lt Update links gt or right click and then choose lt Update links gt Both sequences will take you to a sub menu in which you select lt Buildings gt as you want to change the link to a building Structure of target objects view BSI Be set of IT assets El a BSI amp building B A Head office a room a Data media archive g IT system A employee A employee M room a Data media archive IT system A employee IT system S network A application AR employee Location 1 I y building A Outpost 1 room A employee a room 2 IT system S network A application Th employee gt building A Head office Outpost 1 a room E 2 ee IT system A employee e IT system Move link Create link IT asset set Building Room IT system fdetyort Application Employee 72 It does not matter whether it is moved from the upper or the lower section of the tree 103 GSTOOL 3 1 User Manual Structure of target objects view All the existing buildings are now listed in the Maintain links EJ window The present link between the data media archive and the Head office has a tick in column 1 and is colour coded for emphasis 4 Maintain links to o xi g ieee e o eo Head office buida general building e a a
29. 1 GSTOOL 3 1 User Manual The third icon in this case C indicates the qualification level achieved for the target object as a whole The meanings correspond to those in the layer model IS GSTOOL 3 1 automatically creates the target object Generic aspects of IT security for each IT asset set The link between this target object and the asset set cannot be deleted unlike all the others The nature and number of the target objects listed below an asset set depends on the links between target objects and asset sets that have previously been defined e The fourth level in the tree is the same whether you are viewing the layer model or the object model mm Wiel Iname of modulel The module icon can take either of two forms amp means that this module can be directly edited means that this module references another module so that it will normally be edited from there Further information on the Referencing of modules can be found in section 5 4 page 135ff As above the colour bar indicates the implementation status and the third icon shows the qualification level achieved for the module e The fifth level in the tree contains the safeguards that belong to the module Wira BC name of safeguard The icon stands for safeguard the colour bar indicates the implementation status of the safeguard as above The third icon indicates the qualification level for which this
30. 2 5 Delete a target object subtype To delete a user defined target object subtype press Del or right click and then choose lt Delete gt from the pop up menu or click the Delete button or click Delete in the toolbar 8 Target object subtypes of the type BSI standard cannot be deleted 7 2 6 View explanations for a target object subtype For target object subtypes of type user defined right click the target object subtype in question and then choose lt Open link gt from the pop up menu or click View in the toolbar and a browser window will open Here under the name of the target object subtype the text for the EXPLANATIONS field from the editing screen for the target object subtype will be displayed 7 3 Tab card Modules This tab card contains all the modules after the FILTER settings have been applied Target object type Target object subtypes Modules Safeguards Threats Protection requirement category Fre Eas ofan rt V LAN Rules user defined adapted generic aspects of IT security uM 7 89 V LAN user defined adapted Security in the network M 3 00 IT Security Management BSI standard generic aspects of IT security M 3 01 Organisation BSI standard generic aspects of IT security M 3 02 Personnel BSI standard generic aspects of IT security M 3 03 Contingency Planning BSI standard generic aspects of IT security M 3 04 Data Backup Policy BSI standard generic aspects of IT secur
31. Administration of rights Target objects that are directly linked with IT asset set 01 are however visible in the lower part of the tree in keeping with the read write rights and can be edited there e For IT asset set 02 the role confers read right On the eK LLAMA ELA 1 kel kaa Window no entries or changes can therefore be made for this IT asset set Because of the read right for this IT asset set the user can exercise the rights granted vis a vis this IT asset set for directly linked target objects In keeping with the read write right he can also edit the directly linked target objects in the associated MLJ Slate well Clee GALII window as he pleases e For IT asset set 03 the role confers read write right On the Bede Slate im Cla ARISA Window any entries or changes can therefore be made for this IT asset set As the role does not confer any rights for target objects directly linked to IT asset set 03 target objects that are only directly linked to this IT asset set are not visible Target objects which are simultaneously directly linked with other IT asset sets for which read or read write is entered in the RIGHTS TARGET OBJECTS column are also displayed in IT asset set 03 in their link and can also be edited there in accordance with the rights conferred for the other asset sets The wider right is always implemented here 11 3 3 Rights
32. BSI and now appears in the corresponding list for building an mR employee m A system z Outpost 1 of asset set a Location 1 Tes application AL employee As the direct link has not yet been changed _ Data media Ze 7 Gy buildin archive is still listed under f Room in IT asset set fa BSI Gs Outpost whereas it is still missing from the corresponding list for IT asset TB Gl Data media archive set a Location 1 E run a A employee 2 IT selom S network application employee building Head office a Gutpost 1 There are several ways to change the direct link E pee employee Method A from the upper part of the tree B IT system we e Using drag and drop move a Data media archive out of the Il room list in IT asset set S BSI and over IT asset set fa Location 1 When you release the left mouse button a pop up menu appears in which you should choose the lt Move link gt option This has the effect of deleting the existing link to IT asset set 4 BSI and after you have confirmed your intention at the prompt a new link to IT asset set A Location 1 is created Move link Create link If you now select the lt Create link gt option the previous link will remain in place but a new link to IT asset set 3 Location 1 will be automatically created Method B from the lower part of the tree e Using drag and drop move il _ Data media arc
33. Baseline Protection Manual that is accessed via g BPM local METADATA You can choose the language in which metadata is presented e Reports You can choose the language in which the reports are presented This affects the names of reports and also all the report text that does not come from the structured data or which has been entered by the user Logo e Logo file for program start Here you can specify which logo is displayed when the program first starts up To revert to the default start up logo you need to delete the entry in this field i The graphic should be 520x250 width x height pixels big Graphics of a different size will be distorted to fit these dimensions This change can only be implemented by the System Administrator3 Tool Administrator sa rights are not sufficient 31 The right to make changes in the registry is required to implement this change 44 GSTOOL 3 1 User Manual General information on working with GSTOOL 3 1 Edit e Save without query If this option is chosen then in Structure of target objects and Modeling when you change to a different tree element the changes just made will be saved without the user being prompted During the entry of new target objects in Master data and Structure of target objects this option allows you to enter several target objects in succession without interruption to the data entry dialogue When you click the New button
34. COMMENTS In the case of yes no and untreated it is up to the user to decide whether anything should be entered in this field and if so what In the case of partially and disuesable this field becomes a mandatory field In the case of partially which parts of the safeguard have and have not been implemented and why not should be explained here In the case of dispensable the reasons why the safeguard is regarded as dispensable must be entered i If a safeguard is regarded as dispensable it still remains part of the security concept As far as the passing on of implementation status of safeguards and qualification level attained is concerned an dispensable safeguard is treated as equivalent to one that has been imple mented A safeguard that has been removed during Modeling because it is dispensable is treated as the equivalent of a safeguard with implementation status no when it comes to the passing on of implementation status etc For further information see section 12 The inheritance mechanism page 240ff IMPLEMENT BY This field is only available when the implementation status is partially or no In this field you can enter a date that can be used as filter criterion in order for example to prepare a report that states which safeguards have to be implemented by the specified date You can set the current date as the deadline by a single click in
35. Cancel WY ROLE NAME Every role has to be given a name GSTOOL 3 1 allows different roles to have the same name but this should be avoided 223 GSTOOL 3 1 User Manual Administration of rights Tab card Data The Data tab card offers all the rights for handling data MANAGE METADATA This right is required for all work on the metadata use of gt BPM user defined editing of target object types and subtypes updates of metadata e DEFINE IT ASSET SETS This right is required to create new IT asset sets IS A user can edit existing IT asset sets even without this right using the rights granted on the IT asset sets tab card e DEFINE TARGET OBJECTS This right is needed to create new target objects IE A user can edit and delete existing IT asset sets even without this right using the rights granted on the Target objects tab card ENTER DELETE USERS AND ROLES A user with this right can create additional users This right can only be granted to other users by someone possessing the System role sa users automatically possess this System role IE A user whose role includes this right is free to choose all the rights for this role with the exceptions of CREATE DELETE USERS AND ROLES and BACK UP DATABASE Such a user can also assign rights which are not actually assigned to sa users to the role The changes thus made by a user to a role take effect for all users i
36. Creating a new target object page 78ff As the assignment of subtype to a target object serves as the basis for the correct assignment of modules in the Modeling see also note on page 79 when the subtype of a target object is changed the user is asked in a separate dialogue box to specify how the modules assigned up to this point are to be handled GSTOOL 3 1 i x Target object subtype changed Should modules that are no longer valid be deleted from modeling Yes No Cancel Yes The modules that are no longer valid are deleted from the Modeling The entries relating to these modules that were made in Modeling will be irrevocably lost 85 GSTOOL 3 1 User Manual Master data view Modules which belong both to the old and also to the new subtype will be retained in their entirety Modules that are relevant to the newly chosen subtype will be supplemented No Modules that are relevant to the newly chosen subtype will be supplemented in Modeling All the modules assigned to the target object up to now through the old subtype will be retained These can be deleted afterwards at any time 9 Cancel The changes made to the subtype will be discarded 3 4 Deleting a target object There are two ways of deleting target objects e deleting individual target objects e deleting several target objects at the same time i The deletion of target objects is always irrevocable Target objects c
37. GSTOOL 3 1 User Manual Structure of target objects view Only target objects of the following types can be IT system subordinated to a target object of type ei IT system standard PC i network a network yA application yi application hen F employee Ah employee Only target objects of the following type can be subordinated network to a target object of type network Ef LAN SX employee A employee Only target objects of the following types can be c i application subordinated to a target object of type pA application WAd Database 78 l application bf application amp u employee Ady employee dth employ No further target objects can be subordinated through linking A employee to a target object of type A employee A stuff i Target objects of user defined types see section 2 3 4 lt Tools gt lt Target object types gt page 37ff can always be linked to an IT asset set and depending on where the type sits in the Structure of target objects to the defined father and child types as well Link hierarchy When links are created using drag and drop GSTOOL 3 1 ensures that the link hierarchy is not violated Thus it does not make any difference whether for example an IT asset set is linked to a building or the building to an IT asset set The result is the same in both cases the building is placed in the correct position in the hierarchy bel
38. IT asset sets This tab card displays in a list all the asset sets that exist in the database currently being edited and the rights regarding access to them in the present role IS This rights columns cannot be concealed by selecting menu option sequence lt Tools gt lt Options gt Display RIGHTS COLUMN 144 See section 9 9 Deleting an export page 214ff 225 GSTOOL 3 1 User Manual Data IT asset set Target objects Description IT asset set Abbreviation Name Descri Rights on generic aspects Rights on target objects BSI BSI read write read write as Berlin IT asset set Berlin read write read as Chemnitz IT asset set Chemnitz read write as Erfurt IT asset set Erfurt read read write as Frankfurt IT asset set Frankfurt read read s Leipzig IT asset set Leipzig read as M nchen IT asset set M nchen as Rostock IT asset set Rostock read as Stuttgart IT asset set Stuttgart read write The owner of the role has the rights entered in the RIGHTS ON GENERIC ASPECTS column in relation to the generic aspects of this IT asset set The owner of the role has the rights entered in the RIGHTS OF TARGET OBJECTS column in relation to all the target objects directly linked to this IT asset set To change the rights select the IT asset set and right click to open the rights assignment sub menu why By combining the tt key with the left mouse button Ez you can select several IT asse
39. If necessary the database should be manually copied from the local system to a server in the network at regular intervals in order to include the data in an automatic backup system IS A PC that is switched off is not available as server to other instances of GSTOOL and they cannot establish a connection with it When a PC is switched off any existing connections are terminated and it is no longer possible to work on a database on that computer During the installation of GSTOOL 3 1 by default a database called BSIDB_V310_Data MDF is installed Any existing databases can be detached renamed deleted and additionally attached to a tool by the Tool Administrator 16 This database size will normally be sufficient to capture at least 1 500 target objects including the associated information 241 GSTOOL 3 1 User Manual Installation first time use deinstallation Microsoft SQL Server 2000 If your data volume requirements and or requirements for simultaneous access to the database are higher Microsoft SQL Server 2000 can be used instead This allows you to store and manage the database centrally on that server The interfaces to a Microsoft SQL Server 2000 are already integrated in GSTOOL 3 1 and can be enabled by an expert SQL Server administrator 1 5 2 Databases Databases that are attached to one of the two database servers supported MSDE 2000 see page 21 or Microsoft SQL Server 2000 see page 22 an
40. Link module gt e or right click with the mouse and then choose lt Link module gt All of these methods open the Bi iureye ti window iink module n Filter afen L dno Name Obsolete fal oO M 3 07 Crypto concept oO M 3 08 Handling of security incidents E oO M 3 09 Hardware and Software Management oO M 3 10 Outsourcing oO M 4 01 Buildings o M 4 02 Cabling o M 4 03 01 Office oO M 4 03 02 Server Room oO M 4 03 04 Technical Infrastructure Room x All None Revert OK Cancel A The list contains all the modules which have not yet been linked to the target object currently selected For illustrative purposes a module is to be added to a target object of subtype Data media archive Hence the above list does not contain module M 4 03 03 Data Media Archives Filter A full description of the filter function can be found in chapter 10 Filter page 216ff 85 If in the layer model the ws Top level aspects layer is presented in reduced form see page 120 then it is not possible to add any modules in this way since under the reduced presentation no target objects are displayed in this layer 125 GSTOOL 3 1 User Manual Modeling view e Predefined filters As well as All and New the following additional predefined filters are offered Missing Only modules that belong in the selected target object according to the IT BPM but which have been deleted from Modeling
41. Place at Home Telecommuting modules e Layer 3 covers the individual IT systems Examples here are the UNIX System Laptop PC and Telecommunications System Private Branch Exchange PBX modules e Layer 4 is concerned with the networking aspects of IT systems The modules which are relevant here include for example Heterogeneous Networks Network and System Management and Firewalls e Layer 5 is concerned with the actual IT applications Examples here are the E mail Web Servers and Databases modules Every module of the IT Baseline Protection Manual contains a brief description of the subject a list containing references to the relevant threat in question and a list of references to the relevant standard security safeguards in each case The threats and safeguards are broken down in turn into a series of independent catalogues 249 GSTOOL 3 1 User Manual The IT Baseline Protection methodology 13 2 1 Threat catalogues T1 Force Majeure ccecce e g T 1 13 Storms T2 Organisational Shortcomings e g T 2 29 Software testing with production data T3 Human Emosie R e g T 3 24 Inadvertent manipulation of data T4 Technical Failure 00 eee e g T 4 26 Failure of a database T5 Deliberate Acts e g T 5 24 Replay of messages 13 2 2 Safeguard Catalogues S1 Infrastructure oo ee e g S 1 54 Early detection of fires fire extinguishing techn
42. Properties ninine ra aaa a A AE Ea EEA EE 200 SRA 010E 01S PPE AEA EAE ETE 200 9 1 3 Carrying out the Oxport cis cceie ales cadet tiene cette vs ee eelasinesecdisentdela eee 201 9 2 Target object import from text file ccc ceceeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeseneeees 201 9 2 1 Database size with target object import from text file eee eeeeeeeteeeeeeeees 203 9 3 Standard export ws cess icecsscecsdcvecsdsccedecedevuedsvuecsncdaecawsevess cases ceveueversesvens sevens dennsenvetins 204 9 3 1 Tab Card Properties irmi sok asd to sne vs sr hun oe eel ey ea aaa aae lawinscdiadcanuuee eat AEE Eht 205 SEG A HEXPOMISCOPS ERPE EEEE EEEE T ET 205 9 3 3 Carrying out the Oxport iicieciec cei cavedcadeleadecnebecsenenianca ts everan vases delcucetieg chetyecteuactteadeee 206 9 4 SEAM ALG WMP OME iivenscvedcetedveceediseesdis eSenved cavetievesseadecsesecssvecdiuestahee abevteuresduceesteests 207 GSTOOL 3 1 User Manual Table of contents 10 11 12 941 Rabcard COMMON seacsss2s20c0oeog tess dahences a a E a a a aiia ias 207 9 4 2 Carrying Out the iMport sessesseeeeesessseserrrrrtttteettrtrittttetttirkrittttssssrttnnnnnsssstettenen nt 207 9 4 3 Processing a standard WMPOM x occneceipedcinedece eee Mecsededen deen ee Dua eon ene pleeedien a nibs 208 9 4 4 Standard import without IT asset Set cece cece cece cece eeeeeeeeeeeeeeeeeeeteeeeeeeeeeeeneeeds 209 9 5 FRO OX POM aeaaeae eie tae sa cain va sven ns
43. Tip 8 This value is designed for stand alone operation If a database is tsimultaneously accessed by several users processing delays can occur These can be reduced by increasing the amount of RAM a7 3 GSTOOL 3 1 User Manual Introduction 0 5 Naming and format conventions Menu commands are presented in lt talics enclosed in angle brackets gt Example lt File gt lt Exit gt Names of screen windows and formats are presented with a EM background Example Names of tab cards are shown in bold inside vertical lines Example Link options If the only difference between screen windows formats and tab cards which otherwise have identical content and functions is in the name the variable element is presented in italics between two slanting vertical lines Example QXGWMEleelcimele 2 e1 MEM ae 21 me 9 ce as 4 ee Buttons contained in screen formats the toolbar and the Navigator are presented in italics inside square brackets Example Close Field and column names in windows and screen formats are presented in SMALL CAPITAL LETTERS Example NAME Keys and key combinations are presented in curly brackets Examples Enter Ctrl N F5 The different views Master data to Export import that can be selected via the Navigator and the lt View gt menu option are presented in talics preceded by an arrow Example Structure of target objects Path details9 file names and intern
44. USD The default setting is EUR This function does not prevent choosing a different currency when processing particular safeguards You can enter the costs associated with each safeguard in the desired currency and then at the end use this function to convert all your costs to the same currency IS This function should not be confused with the currency adjustment carried out in connection with the data mirgation from GSTOOL 2 0 34 34 See section 2 4 1Currency adjustment page 54 51 GSTOOL 3 1 User Manual General information on working with GSTOOL 3 1 FIRST CURRENCY In this field you should enter the currency that is to be converted SECOND CURRENCY In this field you should enter the currency into which the first currency amount is to be converted EXCHANGE RATE The exchange rate results from dividing the amount in the first currency by the second currency For example if one unit of the first currency is equal to 1 25 units of the second currency then the exchange rate is 1 1 25 0 8 If one unit of the first currency is equal to 0 8 units of the second currency then the exchange rate is 1 0 8 1 25 IS Up to five decimal places of the exchange rate are taken into consideration IS This conversion is carried out for all the safeguards for which the user has write rights This conversion applies to all the users 2 4 Basic functions This section runs through all the functions
45. assssnnnassssnnnnnnnnnnnnnnnnnnnnnnnnnnnnnnnnnnnnnnn nenna 220 TIT RONGS 2 oeccescsceceacet secede aeaaeae Erea ade Eaa e a eae eds tame ccc aoe ce eae 221 11 1 1 Creating and editing FOES sey sances2 feet alas ee cen that el eo eae tes che ese eottaty 221 ME2Z e E T A N A A 230 11 2 1 Creating and editing USCIS i sic sencc sce ex esd ccceseeens peedas need ieecd neeeteyennecliaee vee eeedeent ees 230 We le 2 NI SCIST OIGS ahead asia te care tatu a A comer nae A AAE E Gase eE hited 235 11 3 Dynamic assignment Of permissions ccccccceeeeeeeeneneeeeeeeeeeeeeeeeeeeeeeeeeeenenees 236 11 3 1 Rights relating to a user s own target ODjeCtS ccc ceeeeeeeeeeeeeeetteeeeeeeeeeeeenaaeees 236 11 3 2 Rights relating to directly linked target Objects 0 00 eee eeeeeeeteeeeeeeeeeeeennaaeees 237 11 3 3 Rights relating to a user POl ceceeeeeeeeeceeeeeseseceeceeeeeeeeeneneesseeneeeeeeeeeeenseeeneees 238 The inheritance MECHANISIM ccceeeeeeeeeeeeeeeeeeeeeeeeeeeeeseeeaeeneneees 240 12 1 Inheritance of the protection requirement seeesseeeeeeeeeeeeeeeeeeeeees 240 12 2 Inheritance of implementation StatuS 0 ceeeeeeseeeeeeeeeeeeeeeeneeeeeeeeeeeeees 241 12 2 1 Inheritance from safeguards to module ccccceeteeccce eee eeeeeeeeeeeneneeeeneeeeeeeeeeneee 241 12 2 2 Inheritance from modules to layer or target object ee ceeeeeeeeeeeeeeeeentaaeees 243 12 2 3 Inheritance
46. be overwritten through the restore operation you must attach a new database to GSTOOL 3 1 before the restore operation s 43 See section 1 5 2 Databases Creating an additional database page 23ff 66 GSTOOL 3 1 User Manual General information on working with GSTOOL 3 1 e To start the restore operation click Recover e The progress of the restore operation is displayed in the PROGRESS field The bottom line of the window informs you when the restore operation has been completed successfully Checking user rights Because of the rights structure used within the tool the following provisions apply to the users of a restored database e If the target database is on a server to which the users are known the known users and their rights will be retained as they applied in the backed up database prior to the backup e If the backup is restored to the original database and additional users have been created since the backup these will be lost e If the backup is restored to the original database and any users have been deleted since the backup those users will not be recreated even though the database has been restored e If the backup is restored to a database on a server to whom the original users are not known all the users apart from sa will have to be recreated 4 2 4 11 NEW PRIOR CHANGED display In BPM user defined the screen layouts for target object types target object subtypes mo
47. be selected To clear all the selected dependent objects from the selection right click and then choose lt Deselect dependent objects gt from the pop up menu e f you keep the Ctrl key pressed down you can select and deselect individual IT asset sets target objects and modules from those available by then clicking the left mouse button Objects selected for the report are presented using the chosen Colour settings The IT asset set from which objects have been selected for a report is also colour coded 6 4 Choosing a report template Having specified the report scope the user can now select the required report template from the list of report templates The list will be modified in line with the selection in the tree Some reports are available both in a short version and also in a detailed version Which report is which is indicated by the inclusion of the word short or long in the title in the relevant report templates The meaning of linked is explained within the hint in 6 3 Report scope page 150ff 6 5 Creating a report After you have decided what information is to be included in the report and selected a report template click Create to initiate the process of report generation Depending on the scope and 108 See section 2 3 9 lt Tools gt lt Options gt Display Colour settings page 48ff 151 GSTOOL 3 1 User Manual Reports view nature of the report this
48. become only optional In this event they can then be deleted without further consequences DEFINED ON In this field you can note the date on which the information in the LKI ILEEK TEGELI iel format was collected or entered Tab card Survey Common Survey Threats Notepad Survey director te Persons surveyed C Abbevition Name In the SURVEY DIRECTOR selection field it is possible to select one person from a list of all the employees created to act as survey manager To complete the PERSONS SURVEYED field click Add and an additional window also containing the list of all employees created will open so that you can make the appropriate selection 88 On this point see the description for the TO BE IMPLEMENTED BY field on tab card Implementation in the BELGE KM dace deity area page 143 129 GSTOOL 3 1 User Manual Modeling view zox Filter ey __ Abbreviation Name oO pol person 01 staff group p02 person 02 single person p03 person 03 technique group oO p 04 person 04 oO p05 person 05 All None Reverse OK Cancel 0 To effect your choice check the desired persons in column 1 and then click OA Filter A full description of the filter function can be found in chapter 10 Filter page 216ff e Predefined filters No additional predefined filters are offered Tab card Basic filter The following four Basic filter are of
49. by the layer or target object as if all the safeguards contained in them have been implemented 244 GSTOOL 3 1 User Manual The inheritance mechanism 12 3 Inheritance of qualification level achieved Inheritance of qualification level achieved is based on the entries that are made in the editing windows LAOUEN IECES in the IMPLEMENTATION field o AER TCE iel in the EDITED field These entries correspond to the qualification requirements of safeguards which are indicated by the icons ABC BC or C Safeguards with the icon are ignored during the inheritance process e If all the safeguards in a module whose icon contains the letter A have been implemented then the module bears the identifier Av e If all the safeguards in a module whose icon contains the letter B have been implemented then the module bears the identifier B e lf all the safeguards in a module whose icon contains the letter C have been implemented or if the module is shown as dispesable Woiue in the IMPLEMENTATION field then the module bears the identifier tv Layers and target objects inherit the qualification level achieved by the associated modules following the principle that the lowest qualification level achieved in the modules is the one inherited The same applies for the inheritance of qualification level achieved from layers or target objects to I
50. can take some time The report will be displayed in a browser window IS If the option OPEN REPORT 9 has not been enabled in the template for a report then you will be taken directly to the window without the report being displayed in the browser window 6 6 Saving a report To save the report you have just created click Save and the report will be saved both as an XML file and also as an HTM file in the location you have defined in EAEI The XML file contains only the data content of the report and is primarily used for the further processing of report information outside of GSTOOL 3 1 The HTM file contains all the style information necessary to display it in the browser 6 7 External processing of a report Reports once saved can be further processed outside of GSTOOL 3 1 using suitable programs GSTOOL will expect the graphic files used in reports logo and bitmaps to be in certain directories The paths in which the files are stored depend on the installation location of the computer on which the reports are created Source computer The bitmaps are only needed for the IT asset structure report The logo is used for all reports If the installation files on the source computer are stored in directory C Program files BSI GSTOOL3 then the logo will be expected in C Program files BSI GSTOOL3 Reports Images and the bitmaps in C Program files BSI GSTOOL3 Report Images Structure If t
51. cannot be activated or deactivated like a standard import137 137 Cf 9 4 3 Processing a standard import page 208ff 212 GSTOOL 3 1 User Manual 9 7 One way export The one way export is used where either an entire database or part of a database is to be permanently edited in a different place The creation of a one way export the definition of the scope of the export and its actual execution are similar to the procedures described for the standard export in section 9 3 page 204ff The only difference is that the option One way export is selected in the EXPORT TYPE selection field on the Properties tab card IS Like the standard export as soon as a one way export is created the target objects to be exported are frozen to further editing Once again this is indicated by the blue colour of the target objects However if you want to work on the exported target objects you can delete a one way export from the list of exports without any consequences 9 8 One way import During a one way import one way export files are imported into a database for further editing Unlike the standard import no dedicated work areas are created for one way imports The imported objects are integrated into the work area that is currently active The one way import is carried out in exactly the same way as described for the standard import GSTOOL can tell what type of import it is from the file selected and automatically carri
52. change e The VALUE BEFORE CHANGE column shows the old value of the field immediately prior to the date of the change e The USER column shows the name of the person who was logged on when the change occurred Tracking of changes occurs at field level in GSTOOL 3 1 This means that the creation of user defined or adapted objects modules safeguards target object etc is not included in the changes tracked No changes are tracked until the field content has been changed for the first time following new creation or adaptation IS If no changes have yet been tracked this is advised in a message box Since there is only one subtype for each of the target object types IT asset set buildings employee changes in subtypes cannot be tracked for these target object types IS Entries in the history lists can neither be altered nor deleted IS Only users in possession of View history right can inspect the history 2 4 13 On line help GSTOOL 3 1 comes with comprehensive online help The help can be accessed via menu option lt Help gt which provides direct access to a choice of three functions lt Contents gt lt Index gt and lt Find gt In addition you can also access context sensitive help by placing the cursor in the relevant field and then pressing F1 69 GSTOOL 3 1 User Manual General information on working with GSTOOL 3 1 2 4 14 Configuring the database The function Configure d
53. clicking it23 the databases that run on that server and are locally attached to GSTOOL 3 1 will be listed in the DATABASE field The BSIDB_V310_Data database is the database locally created and attached to the tool during the installation of GSTOOL 3 1 l GSTOOL 3 1 logon to database x Account Connection Select database server J Server name DOMAENE B BSI 7 Database Concept 02 BSIDB_ 31 Concept 01 C once it 02 Stop Continue Server status Coet 23 This selection is remembered for the next time you start the program 26 GSTOOL 3 1 User Manual General information on working with GSTOOL 3 1 I amp S The query which generates this list may be reported by an installed firewall system The required database is selected by clicking it If you select a database for which you do not have the required access right or which is not a GSTOOL 3 1 database an error message will be displayed and the program will be terminated IS If the list of databases is not complete you should check whether the missing database has been correctly attached to the tool 4 I amp S If no database is displayed please consult section 14 4 2 Database integration on page 268 Server status The traffic lights show the status of the server you have selected as follows red light the server is not active yellow light the server is in the process of starting up or closing down e
54. creation of users the definition of roles and the linking of users with roles always apply only to the database currently open The effect of this is that rights regarding particular databases are not assigned to a user in GSTOOL 3 1 rather it is a case of authorised users being assigned to a particular database IS Rights work in more or less the same fashion in every view of GSTOOL 3 1 Thus it is not possible for example to assign different rights for Structure of target objects from those assigned for Modeling 11 1 Roles Roles also known as rights roles are used to define the rights of all the users to whom this role has been assigned Rights can be granted separately for every target object IS You can only grant rights in respect of target objects that exist at the point in time when the role was defined Additional scope for the assignment of rights is possible via Dynamic assignment of permissions section 11 3 page 236ff 11 1 1 Creating and editing roles To create a new role or edit or delete an existing one select menu option sequence lt Tools gt lt Roles gt and the following window will open ELAI roles lL x Role type Rights roles Description Import 3 0 This role enables to migrate data of GSTOOL 3 0 role 01 Description of role 01 role 02 Description of role 02 System This role has already been allocated and cannot be changed within the application
55. data source Of ceeeeeetttteee 53 USER ID OF m inpre re ieden aea teei 53 H history display Of airig A ETR 69 279 Appendix number of changes tracked 05 48 68 OW ATICIG ci cic As T TET Ae into ces 68 holiday block cc eeeeeeeeeeeeeeeeeeeteeeeeteeeeeees 237 l icons in the modelling ee eee eeteeeee eee 114 ID column toggling On and Offas ocorren o 49 implementation status inheritance Qf mee aaa ieas 245 presentation of in the tree 143 import NOEPOSSIDlE toci ianiai aaah 273 import Work area ececeecceceeeeeeeeeeeeeeeeeeeees 200 imports of target Objects cccececeeeeeeeeeeestteeeees 203 One way IMPOFt eee eset teeeeeeeeeeeeaes 215 PE IMPOMt issse et acheter es 213 Standard impott cccccceeeeeeeseeeeeeeeees 209 standard import without IT asset set 211 inheritance of implementation statuS 0ee 245 of protection requirement 00cee 244 of qualification level ccceeeeeeeees 249 installation CUSIOMISEO naii eae ee E aai eal 13 installation path CHANGING TNE erenn 13 IT Baseline Protection Certificate 261 L language COMPIQUIING eye ars eaaa raaa 43 layer model 0 ceeeeeeeeeeeees 31 113 120 253 reduced tree display eeeeeeeesseereeeeee 120 licensing entering Key cceceeeeceececeeeeeeeeeeeeteeeeeeee
56. data was maintained in a second currency in GSTOOL 2 1 then you should enter 1 in this field IS It is not possible to convert cost data to two currencies simultaneously in GSTOOL 3 1 To subsequently convert currency data in GSTOOL 3 1 see section 2 3 12 lt Tools gt lt Translate currency gt page 51ff 2 4 2 lt File gt lt Data migration from GSTOOL 3 0 gt This menu option enables data from version 3 0 to be imported into version 3 1 in its entirety The data import can only be carried out by a user who has the appropriate rights 37 The GSTOOL sa or someone in the role of Import 3 0 55 GSTOOL 3 1 User Manual General information on working with GSTOOL 3 1 Import of data from target objects During the installation of GSTOOL 3 1 any existing database BSIDB_V305_Data mdb is automatically attached to the tool If you have attached any other databases to GSTOOL 3 0 or renamed the BSIDB_V305_Data mdb database you will have to attach this manually to GSTOOL 3 1 before you can start the data import process 8 4 Data migration from GSTOOL 3 0 ul x Import Progress m Registration type SQL Server security User name C Apply database security Password m Select database server Server name v Database 7 Status m Options MV Data migration from GSTOOL 3 0 F Greate all adapted elements as user defined Aun Cancel You
57. database is not supported by a graphical user interface in the MSDE 2000 database server software supplied and installed with GSTOOL 3 1 In an SQL Server environment the command DBCC SHRINKDATABASE is available 131 See section 2 3 9 lt Tools gt lt Options gt Display Colour settings page 48ff 204 GSTOOL 3 1 User Manual Export Import view 9 3 1 Tab card Properties Properties IT asset set Target objects Progress Export type Name export set of IT assets 01 Return by 07 12 2004 Comments a EXPORT TYPE From the options available choose Standard export NAME The export must be given a name This can be any name you like including hyphenated names The chosen name is displayed in the bottom line of the GSTOOL user interface during Processing a standard import 9 4 3 page 208ff IS If Standard is chosen as the name then Standard is displayed in the bottom line and also in the standard and import work areas It is then only possible to distinguish between the two work areas in the Export import view RETURN BY In this field you can enter a date by which the exported data has to be returned to the source database This date is only entered for information purpose and does not undergo any evaluation within the tool 9 3 2 Export scope It is necessary to specify which IT assets sets and which target objects are to be exported Tab card
58. do not meet your requirements GSTOOL 3 1 also allows you to create your own report templates 6 1 Tree presentation Sorting Sorting in the tree in the Reports view works the same way as in Modeling see section 5 1 2 Tree presentation Sorting page 112ff Maximize minimize See Maximizing and minimizing the tree on page 32 6 2 Filters The filter options and settings are identical to those in the Modeling view 6 3 Report scope The elements which are to be included in the report have to be selected in the tree I amp S Target objects that are only indirectly linked to an IT asset set are not presented in the tree in Reports Target objects that are only indirectly linked can only be included in reports whose templates have been adapted to include such items linked reports 107 See section 4 2 1 Direct indirect linking page 98ff 150 GSTOOL 3 1 User Manual Reports view There are two possible ways of selecting and deselecting thedependent items below IT asset sets and target objects Right click with the mouse and then select the lt Select dependent objects gt option from the pop up menu or else press the key combination Ctrl A If an IT asset set is selected all the related target objects will be selected for inclusion in the report along with their modules and safeguards or if a target object is selected the related modules and their associated safeguards will
59. each safeguard by adding your own entries Through the Reports module you can then generate the necessary tables IT BPM 2 7 IT Baseline Protection Certificate In GSTOOL 3 1 all safeguards are identified according to which of the three certification qualification levels they are necessary for Thanks to an inheritance mechanism you can tell in Modeling for each hierarchical level which qualification level has been achieved See also section 13 3 4 Basic Security Check page 254ff See also section 13 3 5 Supplementary security analysis page 255ff See also section 13 3 6 Implementation of IT security safeguards page 256ff See also section 13 3 7 IT Baseline Protection Certificate page 257ff 5 GSTOOL 3 1 User Manual Introduction In addition you can enter specific audit information for each set of IT assets in Structure of target objects I amp S To ensure that you can effectively use the numerous functions that GSTOOL 3 1 offers you should be thoroughly conversant with the IT Baseline Protection methodology as explained in detail in Chapter 2 of the IT BPM A streamlined overview of this methodology is presented in Chapter 13 The IT Baseline Protection methodology page 247ff 0 2 4 Further development GSTOOL has been developed to support people working with the IT BPM Experience with version 3 0 shows that the numerous functions offered which in some cases go well beyond the IT BPM have met w
60. either by clicking i New in the toolbar or by pressing the key combination Ctrl N You will now be asked to confirm your action GSTOOL 3 1 x Do you want to use the information of the selected target object o cma Click Yes and all the data for the target object you have selected will then be entered in the new window that now appears If you choose No the new window will open without any default entries You can now proceed as described in section 3 2 Creating a new target object page 78ff 108 GSTOOL 3 1 User Manual Structure of target objects view 4 4 Deleting a target object In Structure of target objects a target object can only be deleted when it has been selected in the lower part of the tree To delete the target object e press DEL e or Ctrl D e Alternatively click Delete in the toolbar or right click and then choose the lt Delete target object gt option At the prompt click OK and the target object will be deleted 109 GSTOOL 3 1 User Manual Modeling view 5 Modeling view Building on the work carried out in Structure of target objects both the Modeling section 13 3 3 Modeling page 253 and the Basic Security Check section 13 3 4 Basic Security Check page 254 are carried out in this view On the basis of the data entered in Master data and Structure of target objects GSTOOL 3 1 makes suggestions as to how to link target objects
61. evaluate and print data etc The term user defined for modules safeguards etc has a different meaning It is assumed that user defined elements are not created and named on the basis of personal decisions made by a user but result from the requirements pertaining to the actual IT assets that exist in the organisation in which GSTOOL is used IT asset set IT asset set refers to all the infrastructural organisational personnel related and technical components which assist with the performance of tasks in a particular area in which information processing is performed An IT asset set can refer to all the IT assets in an organisation or to individual areas defined in terms of organisational structures e g departmental network or shared IT applications e g HR information system Further information on the subject can be found in section 1 3 of the IT BPM Optional field Optional fields are input fields for which the user can decide whether or not to enter any data Optional fields are colour coded according to the colour chosen for the Window picture element The default Windows setting for this is White Tool Administrator As used in this manual the term Tool Administrator refers to the person or group of persons who log on as user sa in the Configure database utility know s the associated password and has have the associated rights in GSTOOL 3 1 Despite having the same username s
62. from layers or target objects to further up in the hierarchy 244 vi GSTOOL 3 1 User Manual Table of contents 13 14 12 3 Inheritance of qualification level achieved cseeeeeseeeseeeeeeeseeeeeees 245 The IT Baseline Protection methodology cccceeeeeeeeeeeeeeees 247 13 1 Rationale for adopting this approach seeeeeeesseeeeeeeeeeeseeeseeeeeeeeees 247 13 2 Structure of the IT Baseline Protection Manual cccccccsssssseeeeeeeeeeeeeeeeees 249 Sez RS AlCAtalOG USS maaa leslie e a eaaa EATE A rasa cee AE aatni tt 250 13 2 2 Safeguard Cataloques 6 2 5 lec he aevasiacasteteee as natin Ae ec etdudca th Ada dendnacddasaaealiachplcee 250 13 3 How to use the IT BPM in brrief cecceeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeseeeeeeeeeeenenees 250 13 3 TT Struct re Analysis renan a adhe Merdentant nical alienate 250 13 3 2 Assessment of protection requirements ccccccccecccecceceeeceeeceeeeeeeeeeeeeeeseeeeeess 251 13 3 3 Modeling 2 sites cates cacde 22d arenei doosre wkis riddaran iaaa EnA AANRAAK ESTEE oiak iak 253 13 64 Basic SECunity CHECK areant e auaa EEE NEERA AE A AEA A AEE ATEA 254 13 3 5 Supplementary security analysis ccccccceeesseeceeeceeeeeeeeeesseneeeeeeeeeeeseseeseeees 255 13 3 6 Implementation of IT security SafeQguards cee ceceeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeaaaees 256 13 3 7 IT Baseline Protection Cert
63. here If a given safeguard is 98 See section Tab card Survey page 129ff 141 GSTOOL 3 1 User Manual Modeling view contained in more than one module then the module stated is the one you are currently working on PRIORITY The priority of a safeguard according to the definitions contained in the BPM section 1 2 Structure and interpretation of the manual is shown here as 1 2 or 3 The PRIORITY field is empty if the safeguard was added to the module during Modeling via the automatically generated suggestion REQUIRED AS FROM This field shows the qualification level s for which this safeguard has to be implemented in the form of text that corresponds to the icons in the tree ABC BC C In the next three fields the user enters data relating to the implementation of the safeguard IMPLEMENTATION This field will by default contain the entry untreated It can also be reset to this status afterwards at any time The implementation status of a safeguard must be documented by choosing between yes partially no or dispensable 99 The answer chosen results in the following implementation status identifiers in the tree untreated l n coluk 99 Foran explanation of what each of these terms means see section 13 3 4 Basic Security Check page 254ff 142 GSTOOL 3 1 User Manual Modeling view
64. is a user defined one or has been adapted The NAME column gives the names of the modules The TYPE column specifies whether this is an original BSI standard module or a user defined adapted module The data here correlates with the prefixes u and a in the No column LAYER column specifies the layer to which the module belongs according to the layer model of the IT BPM or as defined by the user119 The OBSOLETE column displays the date since which this module has been superseded in the IT BPM ENTRIES The number of entries contained in the displayed list is indicated at the bottom left of the tab card 119 See section 7 3 5 Define a new module page 175ff 168 GSTOOL 3 1 User Manual BPM user defined view Right click and then choose lt View gt from the pop up menu or click E View in the toolbar and a browser window containing the printed version of the module description from the IT BPM will open The activities described below can be carried out from the list of modules 7 3 3 Open a module Depending on the type of module various actions are possible after opening a module e Opening a module of type BSI standard Double click on the module or right click the module and then choose lt Open gt from the pop up menu or click the Open button or click amp Open in the toolbar The window in which you can view the entries for the selected module over s
65. linked by an OR In the example shown above this means e On the basis of the entries in the first block only safeguards Seerch Gaki Sesing y Eihar F er y g safeguard secunty se z z A Entry level pal that are necessary from qualification level A and whose Enny And fixed non personnel costs are also over 1 000 are included weet E a in the tree safeguard material cc z eT And aT And meee Ul J z 218 GSTOOL 3 1 User Manual On the basis of the entries in the second block only safeguards which are necessary from qualification level B and which do not belong to the catalogue infrastructure are included in the tree e On the basis of the entries in the third block only safeguards that are just recommended as an optional extra and whose fixed personnel costs are below 500 are included in the tree 219 salequard secunty se Y z z saleguard catalog z z Search field Sorting Filter Or And z Or oo a 3 satequard securty PEJ z z salequard matenal cc z J z cee zi GSTOOL 3 1 User Manual Administration of rights 11 Administration of rights GSTOOL 3 1 incorporates extensive facilities for the administration of rights These are used to control all the rights relating to a database and also the working rights within a database The rights structure in GSTOOL 3 1 is based on the
66. objects tab card can users find out about the existence of target objects in respect of which they have no permissions Write all target objects READ The user has only read permission for this target object As far as the individual views are concerned this means Master data Data relating to the target object concerned can only be read Delete and write functions are deactivated Structure of target objects Data relating to the target object concerned can only be read Delete and write functions are deactivated Modeling In Modeling all the dependent modules for the target object in question are write protected right down to the properties of safeguards All the other target objects can be edited as per normal WRITE The user can access the target object with both read and write permissions 229 GSTOOL 3 1 User Manual Administration of rights The last three selection options apply to all the target objects currently contained in the list after filtering in accordance with di any filters that have been selected in the FILTERS field in write exactly the same way as for the individual assignment of permissions Delete all rights Read all target objects Write all target objects 11 2 Users Users are natural persons groups of persons or fictitious persons who work with GSTOOL 3 1 The entire login procedure used in GSTOOL 3 1 is user oriented Users obtain their permissions in GSTOOL 3 1 thr
67. of target objects to which a module that serves as reference source is attached all the referencing is retained i If Direct edit safeguards of referenced modules has been chosen under lt Tools gt lt Options gt Common Edit page 45 then the reference targets affected can continue to be edited If this function has not been chosen then in order to continue to be able to edit the module and its safeguards either it must be chosen now or else the referencing must be deleted If a target object is deleted in Modeling or in the lower part of the tree in the first level in Structure of target objects or under Master data9 to which a module that serves as reference source is attached all the referencing to that target object is deleted The status attained up to then in the reference targets is retained If a target object is deleted in the way just described the editing statuses of the referenced targets prior to the creation of the referencing is irretrievably lost If you want to retain the old editing status the referencing must be deleted from the reference targets before the target object is deleted as described above 5 5 Basic Security Check After all the required modules and safeguards have been assigned in the Modeling and all those that are not required have been removed the Basic Security Check is carried out see page 254ff In the course of the Basic Security Check all the
68. or BPM user defined are displayed Layerl Only safeguards from the selected layer are displayed Tab card Basic filter The same three Basic filter are offered here as those in BPM user defined tab card Modules section 7 3 1 tab card Basic filter page 167ff Module selection To assign one or more safeguards to a given module check them in column 1 and then click OK If you click Revert the selection is reversed i e the checkmark is deleted from all the safeguards currently checked and inserted for all the other safeguards If you click A and then confirm with OK all the safeguards in the list are marked as to be added and then assigned to the module If you click None all the checkmarks currently shown are deleted Any modules that are added e are inserted in the tree at the end of the list of modules for that target object the sorting functions are described in section Sorting page 112ff e are set to Not processed in the IMPLEMENTATION field e modules of type BSI standard or Adapted may be relevant to the attainment of qualification levels depending on the safeguard identifier e modules of type User defined are never relevant to the attainment of a qualification level 126 GSTOOL 3 1 User Manual 5 2 5 Editing a module In the editing window fede elstat elmanexelelemelCexerstitelam there are four tab cards on which you can en
69. or a user defined type114 The OBSOLETE column If there is a yes in this column then this target object type no longer exists in the IT BPM on which GSTOOL 3 1 is currently based Obsolete target object types can be deleted even though they are of TYPE BSI standard ENTRIES The number of entries contained in the displayed list is indicated at the bottom left of the tab card To edit a target object type create an additional target object type or delete an existing one either double click or else choose Open and the window will open The options offered there are explained in section 2 3 4 lt Tools gt lt Target object types gt page 37ff 113 For further information see also the table in section 4 1 3 Structure rules Link rules on page 95 114 The IT Baseline Protection methodology does not take into account any adapted target object types 164 GSTOOL 3 1 User Manual BPM user defined view 7 2 Tab card Target object subtypes This tab card contains all the target object subtypes after the FILTER settings have been applied Target object type Target object subtypes Modules Safeguards Threats Protection reguirement category mte Bj fen x general application BSI standard ronan exchange of data media BSI standard application email BSI standard application WWW services BSI standard application Lotus Notes BSI standard application fax server BSI standard appli
70. order to be able to save the screen content There are two types of mandatory fields e permanently mandatory fields conditionally mandatory fields In permanently mandatory fields the user always has to either select or enter something With conditionally mandatory fields whether or not the field is mandatory depends on the content of other fields When these fields are mandatory they have to be completed as well If a conditionally mandatory field reverts to being an optional field due to changes in the entries that trigger their mandatory status the entry is retained but can be deleted Comments Many of the editing screens contain an COMMENTS field in which you can enter additional context specific information IS These fields are not linked in any way within the tool Text contained in them is ignored during report generation 27 Additional explanations on the screen formats mentioned here and the fields contained in them will be provided in the manual only as required 28 The colour used for these fields is determined by the colour settings chosen for text windows in Windows Normally this is white 29 The default colour used for mandatory fields is yellow This field can be changed with menu selection lt Tools gt lt Options gt Display 33 GSTOOL 3 1 User Manual General information on working with GSTOOL 3 1 Notepad Many of the editing screens contain a Notepad tab card Here informati
71. organisation and to the outside world the BSI has defined a qualification and certification scheme for IT Baseline Protection This is recommended for example for companies who want to document their efforts in the area of IT security to their customers or business partners This procedure can also be beneficial in government agencies as a means of raising the confidence of the public in the security of e government services 257 GSTOOL 3 1 User Manual The IT Baseline Protection methodology The qualification and certification scheme envisages three levels e the IT Baseline Protection Certificate e the self declared IT Baseline Protection higher level the self declared IT Baseline Protection entry level The IT Baseline Protection Certificate is issued by an accredited certification authority and requires that an audit is carried out on the subject of the investigation by an external IT Baseline Protection auditor licensed by the BSI On the other hand the two kinds of self declaration can be accepted without any external audit of the company or agency They serve as milestones on the path towards gaining the actual IT Baseline Protection Certificate With a self declaration an organisation is documenting the fact that it is currently in the IT Baseline Protection process Further information on the IT Baseline Protection Certificate can be found in section 2 7 of the IT Baseline Protection Manual and al
72. part of the tree in the order in which they were created below target object type 444 employee In column 3 in the upper part of the tree user defined target object types are once again presented in the order in which they were created but above target object type es building 91 Structure of target objects view BSI ge set of IT assets ge BSI A building gt Head office a toom a Data media archive IT system R employee s s g A employee ff room fl Data media archive IT system amp employee 2 IT system network GSTOOL 3 1 User Manual Structure of target objects view Target objects Target objects are always sorted in ascending alphabetical order If the name of a target object is changed in CERETTA then the new name appears in the tree immediately To obtain the correct alphabetical order click Update In the FRR KI EARS When a target object type is selected the target objects can be sorted in the column concerned in either ascending or descending order by clicking the column title 4 1 2 Filter A full description of the filter function can be found in chapter 10 Filter page 216ff Predefined filters As well as All and New the following additional predefined filters are offered IT asset set asset set This line appears separately for each set of IT asset that exists In the upper part of the tree only the chosen IT asset set is
73. previous user accounts can only continue to be used on the same database server In the course of uninstalling and the reinstalling GSTOOL 3 1 a new database server alien to all existing databases will be created If a database is attached to an alien database server it will not be possible to use user accounts created in the database any further nor to recreate them with the same name When data is imported from GSTOOL 3 0 see section 2 4 2 page 55ff all the user accounts are retained 20 GSTOOL 3 1 User Manual Installation first time use deinstallation 1 5 1 Database server MSDE 2000 MSDE Microsoft Data Engine 2000 is a component of Microsoft SQL Server 2000 The functionality of MSDE is essentially the same as that of the related SQL Server 2000 However MSDE is limited to databases of a maximum of 2GB 6 and can only handle a maximum of five connections users In this way up to five people on a network can work simultaneously on a database no larger than 2GB Every installed GSTOOL 3 1 can provide server functionality to others over and above MSDE If several copies of GSTOOL have been installed these can share their local databases for access purposes Within the framework of the access rights to be defined in each instance of GSTOOL 3 1 all the installed tools can log on to the relevant server tool and access its database i This must be taken into account in the data backup concept
74. reference target where it can be further edited as required 5 4 3 Editing in the reference target Whether editing is possible in the reference target or not will depend on the tool settings e f DIRECT EDIT SAFEGUARDS OF REFERENCED MODULES has not been activated a reference target cannot be edited directly but only via the reference source I amp S Changes in a reference source affect all the associated reference targets equally e f DIRECT EDIT SAFEGUARDS OF REFERENCED MODULES has been activated then the module and its safeguards can be directly edited in the reference target IS Changes in a reference target are implemented in the reference source and in all the other dependent reference targets Changes in the Modeling of reference modules affect all the associated modules If a safeguard is deleted or added in the reference source then this is repeated in all the associated reference targets 5 4 4 Deletion of referencing To delete a reference set the IN TARGET OBJECT field in the Common tab card of the LKJ AILE O CEULI area to Not referenced 95 See section 2 3 5 lt Tools gt lt Options gt Common Edit page 45 138 GSTOOL 3 1 User Manual Modeling view IS Referencing can only be deleted from the reference target If more than one reference targets refer to the same reference source then each reference must be deleted separately When deleting referencing
75. rights roles thus transformed 11 3 Dynamic assignment of permissions During the definition of a role rights can only be granted for target objects that exist at this point in time To enable one or more users of a database to work effectively with GSTOOL 3 1 rights that regulate access to target objects are dynamically extended at three levels Rights relating to a user s own target objects Rights relating to directly linked target objects e Rights relating to a user role IS It is not possible for users to pass on rights to target objects through the inheritance mechanism IS It is not possible to grant a user indiscriminate rights to a particular target object type Thus for example it is not possible to create a role which has rights for all the target objects of the type IT system irrespective of by whom and when an IT system is created 11 3 1 Rights relating to a user s own target objects A user who creates a new object in GSTOOL 3 1 is automatically granted Read write right for that object All target 236 GSTOOL 3 1 User Manual Administration of rights objects thus created and the associated rights are incorporated into the user role Right to access target objects that one has created oneself is a basic function of GSTOOL 3 1 and is not linked to any role definition This right cannot be altered 11 3 2 Rights relating to directly linked target objects These rights supplement
76. separating line is just here solely for the purposes of clarification It does not actually appear in GSTOOL 3 1 61 The coloured shading is used here solely for the purposes of clarification It does not actually appear in GSTOOL 3 1 88 GSTOOL 3 1 User Manual the target object can be read and amended The presentation of the tree follows the standard Windows format No further elements exist below this tree element This tree element contains further elements at a lower level The level directly below this tree element is displayed By right clicking and then selecting lt Minimize gt from the pop up menu you can close all the levels below a selected tree element at once By right clicking and then selecting lt Maximize gt from the pop up menu you can open all the levels below a selected tree element at once Target objects in the tree Every target object that is created in this view or in gt Master data is automatically inserted in the tree in two places by the tool For example supposed two target objects have been created This is presented in the upper part of the tree as follows The IT asset set a Location 1 The building Head office The newly created IT asset set Sa Location 1 appears in the same vertical column as the automatically created IT asset set 5 BSI Once again the target object types that could potentially be linked to an set of I
77. the following overviews will have been prepared e Protection requirement of the IT applications e Protection requirement of the IT systems 252 GSTOOL 3 1 User Manual The IT Baseline Protection methodology e Protection requirement of rooms in which IT equipment is used e List of the critical communication links For components with a low to moderate protection requirement the standard security safeguards contained in the IT Baseline Protection Manual will generally be reasonable and adequate Where the protection requirements are higher more extensive security mechanisms may be necessary 13 3 3 Modeling Modeling is central to the methodology set forth in the IT Baseline Protection Manual During Modeling the modules in the IT Baseline Protection Manual are assigned to the actual processes and components target objects that exist This assignment is definitely not one to one A given module can be assigned to several different target objects it is applied several times and several modules can be assigned to one particular component which is modelled through several modules The IT Baseline Protection model for IT assets already in service identifies the standard security safeguards that are relevant through the modules used It can be used in the form of a test plan for carrying out a target versus actual comparison By contrast the IT Baseline Protection model for a planned set of IT assets co
78. the most important IT applications including dependencies on IT systems A detailed description of the IT Structure Analysis is contained in section 2 1 of the IT Baseline Security Manual 13 3 2 Assessment of protection requirements The aim of the assessment of protection requirements is to ascertain how much effort needs to go into protecting IT applications IT systems communication links and rooms against impairment of confidentiality integrity and availability For this purpose the IT Baseline Protection Manual uses three categories low to moderate high and very high First of all it is necessary to define what exactly is understood by each of these three categories in the organisation concerned This assessment concentrates on the potential damage that is to be expected in the event of damage 251 GSTOOL 3 1 User Manual The IT Baseline Protection methodology malfunction or a successful attack The IT Baseline Protection Manual contains suggestions for the definition of the three categories but in most cases these will need to be tailored to the organisation concerned The protection requirement of the IT applications that have been noted down during the IT Structure Analysis can then be assessed with reference to damage scenarios For each IT application this assessment is carried out separately against each of the three basic parameters of confidentiality integrity and availability To assist with this the IT B
79. the significantly more far reaching privileges of the System Administrator who often also has the same user name sa 13 On this point see IT BPM S 2 11 Provisions governing the use of passwords 14 See section 2 4 14 Configuring the database Password tab card page 73ff 16 GSTOOL 3 1 User Manual Installation first time use deinstallation terms of GSTOOL 3 1 can be found on the internet at http www bsi bund de gstool vertrieb htm 1 3 1 Licensed operation The first time you start the GSTOOL 3 1 program the window opens On this window you should enter the 24 character license key in six blocks of four characters x Without entering license key you can use GSTOOL 3 1 for a test period of 30 days After expiry of that period you will not be able to save any further data The license key can be entered after expiry of the test period days remaining 14 Enter license code fz34 Jasco 567s fEFGH f GSTOOL on the Web Order form License later IS To ensure that entry of the license key produces the desired permanent effect you must have the same Administrator rights as those required to install GSTOOL 3 1 If the license key is entered by a user account which has only normal user rights the license key will only be valid for the present user session and will have to be re entered every time the program is started up If you would prefer to enter the key later on click
80. to open the feigee GHEES Tle MUE Cor Liste Lee Lae window ax Filter Fee All x L ve ane ____ tye___ Csog___ obsolete Oo 1 29 Adequate siting of an IT system BSI standard Infrastructure LI 1 30 Safeguarding of data media containing data on BSI standard Infrastructure Oo 1 31 Remote indication of malfunctions BSI standard Infrastructure Oo 1 32 Adequate siting of the consoles devices with e BS standard Infrastructure 1 33 Safe keeping of laptop PCs during mobile use BSI standard Infrastructure 1 34 Safe keeping of laptop PCs during stationary use BSI standard Infrastructure 1 35 Pooled storage of a number of laptop PCs BSI standard Infrastructure oO 1 36 Safekeeping of data media before and after dis BSI standard Infrastructure o 1 37 Adequate siting of a fax machine BSI standard Infrastructure oO 1 38 Suitable siting of a modem BSI standard Infrastructure Oo 1 39 Prevention of transient currents on shielding BSI standard Infrastructure x All Reverse Cancel This list contains all the safeguards i e both BSl standard and user defined safeguards e FILTER selection field By selecting a single layer or setting filters it is possible to limit the number of modules displayed in the list in a selective manner For further information on setting filters see section 10 Filter page 216ff e Column 1 The window opens with all the safeguards that are already linked to the module checke
81. up the tree as far as the level of modules IS The addition of a safeguard to a module in Modeling applies to the target object to which the selected module is linked Everywhere else in the security concept the module is kept in its normal complete condition If an extra safeguard is to be inserted wherever a given module occurs within the security concept then this must be done to the module in BPM user defined as part of the process of adapting the module In the object model the module below the target object underneath which the safeguard is to be added to the module is highlighted La Object model BSI Gy G BSI H generic aspects of IT security BSI E Data media archive H o 4 03 03 Data Media Archives Heado IT asset set Networ Qe ve Manage links gt E a ocation ae Delete link Link dependent Link modules Link safeguards View gt Update To add the safeguard In the layer model the target object below the module to which a safeguard is to be added for the selected target object is highlighted La Layer model BSI Gy G BSI a generic aspects of IT security wt Security of the infrastructure amp M 4 01 Buildings amp M 4 02 Cabling amp M 4 03 03 Data Media Archives HQ PECTS E e yee Securit IT asset set hg Securit ASSEL SEL i 2 L Securit Manage links Eia G Location 1 BE D
82. view and the Head office has a tick in column 1 and is colour coded for emphasis l Maintain links to f z oj x __ Abbreviation Name Type Head office building ceria building oO Op1 Outpost 1 building general building oO Op2 Outpost 2 building general building oO Op3 Outpost 3 building general building il No Reverse Update OK Cancel To delete the indirect link from Data media archive to A Head office without user confirmation delete the tick in column 1 and then click OK to close the window The direct link to IT asset set a BSI will be unchanged Method C can only be used in the upper part of the tree BSI Under this method the link is deleted from the level of the target EE E object type to which the target object in question belongs Thus a A Sio in this example the link is deleted from the level of il Room i e om This level must be selected i at archive IT system e Select the _ Room level then a a either click a New in the toolbar 7 a dl Date naaca or press Ctrl N or right click the target object and then choose lt Update links gt lt Room gt from the pop up menu or select menu option sequence lt Edit gt lt Structure of target objects gt lt Update links gt lt Room gt In every case the window now opens l Maintain links to la x E Abbreviatio
83. view or amend the defined properties of a role You can also create a new role from this point by clicking New 47 IS A user role can only be opened in display only mode and cannot be altered If no role has been selected then details for the System role will be displayed148 11 2 2 User roles GSTOOL 3 1 automatically creates a user role for every user who has the right DEFINE IT ASSET SETS or DEFINE TARGET OBJECTS through a role that has been assigned to him The user role contains Read write permission entries for all target objects created by the user concerned 147 Further information and information specific to the permissions necessary for this can be found in section 11 1 1 Creating and editing roles page 221ff 148 For further information see section 11 1 1 Creating and editing roles Open page 222 ff 235 GSTOOL 3 1 User Manual Administration of rights IS User roles are subject to the following rules e User roles are automatically created and updated They cannot be amended manually e A user role always bears the same name as the user to whom the role with the rights defined above has been assigned e fa user loses both of the above rights through cancellation of the role or of the rights incorporated into the role or if the user is deleted the user role is transformed into a permissions role All previous assignments of this user role to other users will be retained for the
84. you can choose whether the content created in the reference target as a result of referencing should be retained or whether the reference target should be restored to its original condition prior to the creation of the reference in question GSTOOL 3 1 x You want to revoke the referencing of this module Do you want to retain the current content of the module Click lt Yes gt to revoke the referencing Current content will be retained Click lt No gt to revoke the referencing Module content before referen Nein Abbrechen Once the referencing has been deleted you can resume direct editing of the reference target 5 4 5 Deletion of a reference source A distinction is made between deletion of the module and deletion of the target object to which the module is attached Deletion of the module If in Modeling a module that serves as reference source is deleted then all the existing references are deleted The reference target is restored to its condition prior to creation of the referencing When the source module is deleted all the information transferred to the reference target up to that point as a result of the referencing is lost If you want to retain this information the reference must be deleted from the reference target first 139 GSTOOL 3 1 User Manual Modeling view Deletion of target objects If a target object is deleted in Modeling or in the upper part of the tree in Structure
85. you should contact the GSTOOL 3 1 System Administrator 2 1 Starting the program There are several ways of starting GSTOOL 3 1 e via Start Programs BSI GSTOOL 3 1 e via the desktop icon for GSTOOL 3 1 by directly invoking the tool C Program files BSI GSTOOL3 GSTOOL EXE IS If the first screen that appears after you have started the program is the screen please refer to section 1 3 Licensing on page 16 The first screen to normally appear after the program has been launched is KAET PAREA Here you specify which database on which server you wish to work on There may also be additional login information to be entered here 2 1 1 Selecting the server All the servers available on the network are listed in the SERVER NAME field on the Connection tab card It is possible that login rights have not been granted for all the servers shown In this case the server concerned may be included in the list but you will not be able to select it 22 See section 11 Administration of page 220ff 25 GSTOOL 3 1 User Manual General information on working with GSTOOL 3 1 4 GSTOOL 3 1 logon to database x Account Connection Select database server Server name Database Server status IS A network broadcast is used to generate this server list This may be reported by a firewall system installed on the computer 2 1 2 Selecting the database After you have selected the required server by
86. 1 Tab card Target object typel its sc ote seis cee a ease el ats at od eaedad eee ced edetetdteks 78 3 2 2 Tab card Specific task seccnsiscaguiabesinngiatiadiiledaficualesuctagiarcuaal rrdenuauinuat dene ierea inesse 81 3 2 3 Tab card Protection requirement 2 eeceeeseescteee eter eeedeneeceeeeteeeedeeeceeeneneeeee 81 3 2 4 Tab card Audit information s ccicsetacc Aces teats edt ncdetatenitade te Aitaeedeatleiea tte As 83 GSTOOL 3 1 User Manual Table of contents 3 2 9 Maar VEMNKS patiaa Secas dessa tattndea a aie a segue geet arabes aaiae 84 3 2 6 Creating a target object sic cate scsencd ois we sete ecceideaadpueudeieedtveedaveassusatbacedapeeensseceeceled anna 84 3 3 Editing a tar Get ODS CU vesircticeccecictit vette neinean anname ddeietatantanextametanerennareainndedty 85 3 4 Deleting a target ODISCE siiicinsssandeeseisevs sfaavaceasteenschannsaerdnsuncuteed vateacuseantiudwdtesevenntueh 86 3 4 1 Deleting individual target objects 2 6ccceseeeeecseeceeeeneeeeseseeeneeeeneeeeteeescenenenneeeese 86 3 4 2 Deleting several target objects at the same tiMe eee eeeeeneee eee eeeeeeeteeeeeeeeeeees 86 4 Structure of target objects View ccccceceeeeeeeeeeeeneeeeeeseeeeeeeeeeeees 87 4 1 Presentation and Structure rules c ceeeeeeeeeeeeeeeeeeeeeeeeeeeeeaeeeeeneeeeeeeeeeeeeeeeeenes 87 Biel PPESE MAGI E EE EEE ects tea cutie netcnaaasoatt aanteana lence dui ag chdabet ita smataatinatatanla
87. 13 Anordnung schitzenswener Geb udetele BSI Standaid Infrastruktur M 1 14 Selbstt tige Entw sserung BSI Standaid Infrasteuktur M115 Geschlossene Fenster und T ren BSI Standard Infrastruktur M 1 16 Geeignete Standortauswahl BSI Standard Infrastuktur M1 17 Ploatnerdienst BSI Standard Infrastuktur M1418 Gefahrenmeldeantage BSI Standard Infrastuktur M 1 19 Einbruchsschutz BSI Standaid Infrasteuktur M 1 20 Auswahl geeigneter Kabatypen unter physikalisch mechanischer Si BSI Standard Infrastruktur M 1 21 Austeichende Trassendimensionierung BSI Standard Infrasteuktur M 1 22 Matetielle Sicherung von Leitungen und Verteilein BSI Standard Infrastuktur M 1 23 Abgeschlossene T ren BSI Stardard Infrastruktur M 1 24 Vermeidung von wassertubvenden Leitungen BSI Standard Infrasteuktur M 1 25 Ubersparinungsschadz BSI Standard Infrastruktur M172A Nati Schaller RSI Standard Infasteuktur 8 retsieren Offnen Loschen The Safeguards tab card contains all the safeguards after filtering in accordance with any filters that have been selected Target object type Target object subtypes Modules Safeguards Threats l Protection reguirement category Filter Bar _ fan 1 1 Compliance with relevant DIN standar re andad ETT 1 2 Regulations governing access to distri BSI standard Infrastructure 51 3 Adapted segmentation of circuits BSI standard Infrastructure 51 4 Lightning protection devices BSI standard Infrastructure 5
88. 15 Galvanic separation of extemal lines BSI standard Infrastructure 1 6 Compliance with fire protection regulati BSI standard Infrastructure 1 7 Hand held fire extinguishers BSI standard Infrastructure 18 Room allocation with due regard to fir BSI standard Infrastructure 193 fire sealing of trays BSI standard Infrastructure 1 10 Use of safety doors BSI standard Infrastructure 1 11 Plans detailing the location of supply i BSI standard Infrastructure 1 12 Avoidance of references to the locatio BSI standard Infrastructure 1 13 Layout of building parts requiring prote BSI standard Infrastructure 1 14 Automatic drainage BSI standard Infrastructure 7 4 1 Filter A full description of the filter function can be found in chapter 10 Filter page 216ff e Predefined filters The six safeguard catalogues defined in the IT BPM are offered as additional predefined filters 179 GSTOOL 3 1 User Manual BPM user defined view Tab card Basic filter The following six Basic filter are offered SAFEGUARDS CATALOGUE Only safeguards from the selected catalogue are displayed USED BY MODULE All the existing modules are offered for you to choose from The safeguards displayed are the ones that are currently assigned to the selected module i e taking into account changes made by the user irrespective of the assignment laid down in the IT BPM SAFEGUARD FOR MODULE All the existing modules are offered for you to
89. 164 Optional field ccceeeeeeesecceceeeeeeeeeeestcteeeeees 278 Optional fieldS eeeeeeeecceeeeeeeeeeeeeeeeeeeeeeeeees 33 280 Appendix P passwords APPlIGAtOM x siesti ianen aaa 50 changing the sa password 16 73 changing USSR presita eenaa 37 for database link eceeeeeceeeeeeeeeeeeeteees 50 person related data ccccseeseeceeeeeteeeeeees 80 project Planning c cceeeceeeeeteeeeeesteeeeeeaes 147 protection requirement assignment Of oe ee eeeeeeeeeteeeteeeeeeeteeteaeees 81 inheritance Of ccceceeeeeeeeeeeseeeeeeeees 244 protection requirement categories 197 Q qualification level e eccececeeeeeeeeeeeeeeneees 280 display of the achieved 115 249 inheritance Of ccceceeeeeeeesecseeeeeeeeees 249 safeguard necessary fOr 116 R readme ie eeen eaan e Eea AE see 15 reference sources deleting zener eaa rS 140 references ChEAUNG ra E E 137 refere Neig ea EEEa EEEE 136 eE E PEE E ENE ESE T A E E 139 to unlinked target objects 137 removing the software ce eeeeeeeeteeeeeeeeees 19 report header changing 1OGO irssi innii 163 COMMENTS eani iaai aa ati adit 163 report templates ccceeeceeeeeeteeeeeeeees 155 reports empty on the modelling of modules and SALE QUANS e an ARA 277 external processing Of eseese 153 SAVING EP A vinta vidas iedei
90. 5 4 3 Editing in the reference target ccccceceeeeecnecceeeeeeedeseebaceeneceeneeeeneessaseneeeeees 138 5 4 4 Deletion of POTERENCING 1 224 xi scccsaecienteancnttataatasaniniddopadeseaddesa i spenctavnehccteesetentati tats 138 5 4 5 Deletion of a reference SOUICE ccccceceeeeceieececeeceeneeceeeesesneceeneceetedeseneceuieceeeeetes 139 5 5 Basic SOCUrity CHECK ou itinsitenstantctacistininnmidenddeainrdientiiesindiantinneniniiiadties 140 5 5 1 Tab card Implementation r k ain A aaa ee Ce aaa ae 141 5 5 2 Pab Card Costs sccascaya tists nscacttivhsn dest elecsasatiadatiedadnesiauiadetenneeiunl i ek Si 144 50 3 Tab card REVISION seiere ae aa wai eaten e 145 5 5 4 Tab Card Responsible isre Sonedinaet cs wecei techs aada aaa iiaa iaai iei iaaah 146 6 Reports ViICW iiiiiiisssrsssecusunssbsknar opii ii py panadera spa idirin bi iiin yadan din 150 6 1 Tree presentations noa r aeaa aara aaaea aa aaae aaae raa aae aaaea aae aa aaaeaii 150 6 2 a E E E E T sevansevneears 150 6 3 FREPORU SCOP E A TA E A NT 150 6 4 Choosing a report template ceccceeeceeeeeee tenet ener sees eeeeeneeeneeeseeeeeeeeneeeeeeeneeens 151 6 5 Creating a POPOrb vccwiccsussindecaicensicus videnstaniuedsaceesiduidsidde citi eveneuneadevedateddasvicusienedutrigt nies 151 6 6 Saving TSP OM ic ea aie tarsal eh aSa E Ea aaaea a tases nu oad vnduaueiwoaneweunctinn 152 6 7 External processing of a report sssssssssnnrnnnnrnnnrnnnrnnnrn
91. 6 Deleting a module In Modeling the link between module and target object can be deleted separately for each target object 89 Mark the module to be deleted in the same way as for the addition of new safeguards in modules It does not make any difference whether the model on view is the object model or the layer model To delete the module e click Delete in the toolbar 89 This should not be confused with the statement regarding the implementation of a module contained in section 5 2 5 Editing a module page 127ff 90 See 5 2 2 Adding a safeguard page 121ff 131 GSTOOL 3 1 User Manual Modeling view or press DEL e or Ctrl D e or select menu option sequence lt Edit gt lt Modeling gt lt Delete link gt or right click and then choose the lt Delete link gt option All of these options open the following prompt window GSTOOL 3 1 xj Do you want to deleted the link of the modul All safeguard of the module will be deleted also Click Yes to detach the module from the target object and have it immediately deleted from the module in the tree Click No to cancel the delete operation without any action If the link to a safeguard that contains safeguards necessary for the attainment of a particular qualification level is deleted in Modeling then according to the inheritance rules section 12 3 Inheritance of qualification level achieved page 24 5ff it will not be possib
92. 60 GSTOOL 3 1 User Manual General information on working with GSTOOL 3 1 2 4 6 lt Edit gt lt Reports gt This menu option is only available in Reports The functionality available is described in section 6 Reports view page 150ff 2 4 7 lt Edit gt lt Modeling gt This menu option is only available in Modeling The functionality available is described in section 5 Modeling view page 110ff 2 4 8 lt View gt lt Notepad gt See section 2 2 5 Editing window Notepad page 34ff 2 4 9 lt Tools gt lt Encryption gt GSTOOL 3 1 contains a file encryption facility based on the BSI s Chiasmus algorithm allowing export files to be protected during transmission over potentially insecure transmission media The FE RES Satetayeiilelag Window offers the functions encrypt decrypt and key management on three different tab cards You can leave the window at any time by clicking Close Encrypt file NON ENCRYPTED FILE In this field you need to specify the path and name of the file to be encrypted ENCRYPTED FILE In this field you need to specify the path and name of the file generated during encryption Encrypted files created with GSTOOL 3 1 have the file suffix mdx CHIASMUS KEY From the list of available keys choose the key you want to be used for the encryption If the list is empty you will first have to generate a key See Magnage keys page 62ff When you have specif
93. 7ff 176 GSTOOL 3 1 User Manual BPM user defined view e TYPE The module type is automatically set as user defined adapted and cannot be altered e AUDIT RELEVANT For user defined modules this field is always set to No and cannot be altered by the user e No The number entered for the new module cannot be the same as any other existing module Otherwise GSTOOL 3 1 does not place any restrictions on the module numbers that can be chosen IS We recommend that you stick to the conventions established in the IT BPM See section 14 2 Conventions for the numbering of modules page 263 Only the module number is shown in this field without the uM prefix In all the other lists screen formats etc however a module newly created by the user always has the identifying u for user defined in front of the module number e NAME Enter the title of the new module here e VERSION Version numbers are not maintained for user defined modules MODULE TEXT This field is used to enter a free text description of the module All the other tab cards should be completed in accordance with the instructions in section 7 3 4 Adapt a module page 169ff IS In the present case tab cards Target object type and Target object subtype are empty No means are provided in GSTOOL 3 1 for linking user defined modules with target object types and subtypes for the Modeling 177 GSTOOL 3 1
94. DATABASE field and then to start the tool by clicking OK Password tab card On this tab card the sa password can be altered Once you have successfully logged on on the Login tab card as sa you will be able to change your sa password here at any time Script tab card Login Databases Password Script Directory a Database BSIDB_V310 v Update Progress In certain cases 9 it is necessary to make changes to GSTOOL 3 1 databases outside of GSTOOL 3 1 itself e Create a directory in which to save all the files relating to the script e Enter its complete path in the DIRECTORY field or else select it using the Browse button e Inthe DATABASE field select the Database to which the script should be loaded To start the load process click Update e The progress and results of the operation are displayed in the PROGRESS window 49 Deletion of users in a database 1 5 Database server databases on page 20 or changes to the database in the course of software maintenance by the BSI 73 GSTOOL 3 1 User Manual General information on working with GSTOOL 3 1 74 GSTOOL 3 1 User Manual Master data view 3 Master data view Master data management is the central application area for e the capture of information on all target objects and target object groups together with their customised details and e the amendment of master data The overview
95. DE xsl ke G531_ERHEBUNG_DE xsl k2 G531_KOSTEN_DE xsl ke G531_MODELL_DE xsl ke G531_REVISION_DE xsl k2 G531_5CHUTZ_DE xsl keJ G531_S5TRUKTUR_DE xsl be G531_UST_DE xsl ke G531_ZIELOBJEKT_DE xsl GSTOOL 3 1 User Manual Reports view Common Reports Report header Additional options Display Password Path settings m Path details Basic report sheets QSL E Report templates Name Basic report sheet Type a Breakdown of costs module layers IT asset set GS31_KOSTEN_EN xs bsi Breakdown of costs module layers Modules GS31_KOSTEN_EN xsl bsi Breakdown of costs modules IT asset set GS31_KOSTEN_EN xsl bsi Breakdown of costs modules Modules GS31_KOSTEN_EN xsl bsi Breakdown of costs safeguard layers IT asset set GS31_KOSTEN_EN xs bsi Breakdown of costs safeguard layers Modules and s GS31_KOSTEN_EN xsl bsi Breakdown of costs safequards IT asset set GS31_KOSTEN_EN xsl bsi Breakdown of costs safeguards Modules and safegu GS31_KOSTEN_EN xsl bsi Breakdown of costs target objects IT asset set GS31_KOSTEN_EN xsl bsi Breakdown of costs target objects Modules GS31_KOSTEN_EN xs bsi Internal audit sorted by date IT asset set GS31_REVISION_EN xsl bsi Internal audit sorted by date Modules and safeguards GS31_REVISION_EN xs bsi Internal audit IT asset set GS31_REVISION_EN xsl bsi Internal audit Modules and safeguards GS31_REVISION_EN xs bsi xl I Only displ
96. FROM field in the ak EERIE LELNE Window these safeguards have the entry additional and can be identified in the tree by the icon SAFEGUARD IMPLEMENTATION Only safeguards whose entries in the IMPLEMENTATION field of the LAKI URET Leelee window match the selection in this field are displayed 5 2 Modeling The Modeling performed within GSTOOL 3 1 should expressly be viewed as only a suggestion This will become particularly clear from the fact that some target objects or target object subtypes will not have any modules assigned to them in the Modeling suggestions It will therefore be imperative to selectively edit the Modeling results Again it is essential that the links between target objects modules and safeguards are tailored to the actual requirements For this purpose it is possible to freely amend e the links between modules and safeguards and e the links between layers and target objects and modules IS When safeguards are added to modules or modules to target objects new empty safeguards and modules are always used If you want to add any safeguards or modules that have already been adapted this can be achieved via Modeling by drag and drop section 5 3 page 132ff 5 2 1 Tree presentation The tree shown in Modeling contains all the target objects directly linked to an IT asset set The appearance of the tree differs according to which model you have chosen to see IS Target ob
97. Federal Office for Information Security Version 3 1 The GSTOOL Manual Bundesamt f r Sicherheit in der Informationstechnik i Godesberger Allee 185 189 53175 Bonn Postfach 200363 53133 Bonn Tel 49 0 1888 9582 0 Fax 49 0 1888 9582 400 Internet www bsi bund de This document and all of its component parts are protected by the law of copyright Use of the document outside of the narrowly defined boundaries of copyright legislation without the approval of the Federal Office for Information Security BSI is illegal and is a punishable offence This applies in particular to reproduction translation microfilming and saving and editing in electronic systems 2004 by Bundesamt fur Sicherheit in der Informationstechnik Godesberger Allee 183 53175 Bonn GSTOOL 3 1 User Manual Table of contents Table of contents 0 Introduction a aae aaa a a aaa E tiene 1 0 1 The IT Baseline Protection Manual sssssssssssssnunnnnnnnnnnnnnnnnnnnnnnnnnnnnnnnnnnnnnnnnnnnn nna 1 0 2 OSS FO OL ATT avastdecsasiees covestausbiavenmedeneeacuke 1 O 271 Development ernen a e e enone ees sede eds seeee sated Se eed tae bore da ees 2 O 2 22 Features sir tina ee Mea ara hs ear ee ehein nitin teeters 2 0 2 3 Modeling of the IT Baseline Protection Manual in GSTOOL 3 1 2 0 0 0 3 0 2 4 Further development ccceccceccceccceeceeeeeeeeeeeeeeeeeeeeeeeeeeseeeseeeeseeeseeeseeeseeeeeesseeeseeees 6 0 3 System FEQUITEIMEMING
98. GSTOOL 3 1 User Manual Structure of target objects view Employee User defined target object You can establish which target object types a given target object can be linked to as follows e Place the mouse pointer on the target object and right click to obtain the lt Maintain links gt window which lists the possible link targets together with their status of active not allowed or inactive In the tree display for Structure Target objects the target object types to which each existing target object can be linked are shown Target objects of all types can be subordinated to a target object of type Sa set of IT assets through linking building 1 room E IT system amp network BAN application employee By user defined target objects Only target objects of the following types can be subordinated to a target object of type KA building 1 room 2 employee Only target objects of the following types can be subordinated to a target object of type ll room 5 IT system SA employee Network Application Employee Application Employee El set of IT assets E 5 BSI building a room IT system Fg network rA application 254 employee 2 user def TO 5 building Outpost 1 a room A employee E a roo E dl o ata media archive IT system py employee 96
99. IT BPM The prefix u or a indicates whether the threat in question is a user defined one or has been adapted e The NAME column gives the name of the threat e The TYPE column specifies whether this is an original BSI standard threat or a user defined or adapted threat The data here correlates with the prefixes u and a in the No column e The CATALOGUE column Specifies the catalogue to which the threat in question belongs either according to the IT BPM or as defined by the user 29 e The OBSOLETE column displays the date since which this threat has been superseded in the IT BPM e ENTRIES The number of entries contained in the displayed list is indicated at the bottom left of the tab card Right click a selected threat and then choose lt View gt from the pop up menu or click E View in the toolbar and a browser window containing the printed version of the threat description from the IT BPM will open The activities described below can be carried out from the list 7 5 3 Open a threat Depending on the type of threat various actions are possible after opening a threat Opening a threat of type BSI standard Double click on the threat or right click the threat and then choose lt Open gt from the pop up menu 125 See section 7 5 5 Define a new threat page 193ff 190 GSTOOL 3 1 User Manual BPM user defined view or click the Open button or
100. IT asset sets The target objects exported are the ones that are directly linked to the IT asset sets selected Also exported is all the other 205 GSTOOL 3 1 User Manual Export Import view information that is directly associated with these IT asset sets132 and target objects Indirectly linked target objects are not included in the export if this option is selected Tab card Target objects The selected target objects and all their related information are exported regardless of their links The list can be limited to target objects of one particular type in the selection field TARGET OBJECT TYPE 9 3 3 Carrying out the export Once the nature and scope of the export have been specified the new export will appear in the list on the Export tab card ready for execution Export Import __ Name Explanation Created by date export set of IT assets 01 Seer ee aren 07 12 2004 15 54 40 Standard export o export set of IT assets 02 07 12 2004 15 55 30 Standard export Delete Edit To actually implement the export place a checkmark next to the export in column 1 and click Run IS Every export that has been created can only be executed once If you try to run an export that has already been run the Run button will not work Export Import a a ooo a eS export set of IT assets 01 07 12 2004 15 54 40 Standard export oO export set of IT assets 02 07 12 2004 15 55 30 Sta
101. OL 3 1 password entered is correct then the following message will be displayed GSTOOL 3 1 OE Pa D Registration with database instance DOMAENE B BSI Success Otherwise this message will appear GSTOOL 3 1 x AN Registration with database instance DOMAENE B BS5I Failure Databases tab card Login Databases Password Script r Detach database Name GSTOOL 3 1 BSIDB_V310 Yes 2 70 Concept 01 Yes 3 1 2 70 Concept 02 Yes 3 1 2 70 master No model No msdb No tempdb No Detach Refresh m Attach database Database C Concepts DB 02 MDF T Name Concept 02 Attach e Detaching a database In the DETACH DATABASE table all the databases currently attached to GSTOOL 3 1 are displayed48 Databases from this list can be locally detached from GSTOOL 3 1 48 The databases master model msdb and tempdb are help databases and cannot be detached The Detach button is not available for these four databases 71 GSTOOL 3 1 User Manual General information on working with GSTOOL 3 1 Detach database Name GSTOOL BSIDB_ 310 Yes 3 1 2 70 Concept 01 Yes 3 1 2 70 Concept Yes 3 1 2 70 Concept 03 Oe Fee FP eee master No model No msdb No tempdb No Detach Refresh Select the database you wish to detach and then click Detach The message Database lt Name gt detached will now appear and you should con
102. OL 3 1 All print jobs can be initiated via the browser For this reason the default setting is that this button is suppressed in the toolbar 30 GSTOOL 3 1 User Manual Q BPM local section 8 1 E BPM online section 8 2 S Export import section 9 The Navigator can be either displayed or hidden by clicking the Navigator button in the toolbar or via menu selection lt View gt lt Display Navigator gt lf the Navigator is hidden there will be more space on the screen IS If you reduce the width of the Navigator your PC system settings will determine how many lines the icon caption takes up To alter the number of lines that the icon caption takes up select Start lt Settings gt lt Control Panel gt lt Display gt Appearance ITEM ICON SPACING HORIZONTAL and then adjust the value in the SIZE field until you achieve the desired effect This change will also apply to your PC desktop and possibly to other programs on the PC 2 2 4 Tree The screens that go with Structure of target objects Modeling and Reports present the structure of all the target objects in a tree tailored to the current view Switching between object and layer models In Modeling the default setting is for the tree to be presented in the object model structure Within Modeling it is possible to switch the tree structure between object model and layer model as follow
103. Please enter your information User Name ioe Doe Organization Jacme Inc Install this application for Anyone who uses this computer all users C Only for me Name InstallShield lt Back Cancel Enter here the user name and the name of your organisation You can also choose whether the program should be available to all the users who log on to your system or only to yourself 12 GSTOOL 3 1 User Manual Installation first time use deinstallation The standard setting all users normally does not need to be changed e Complete installation i GSTOOL 3 1 InstallShield Wizard Setup Type Choose the setup type that best suits your needs Please select a setup type Choose which program features you want installed and where they will be installed Recommended for advanced users InstallShield You can choose between the standard installation COMPLETE and a user defined CUSTOM installation and then continue with Next gt e Custom installation i GSTOOL 3 1 InstallShield Wizard Custom Setup Select the program features you want installed Click on an icon in the list below to change how a feature is installed Mi r Feature Description GSTOOL Application GSTOOL Database 3 v GSHB HTML Pages The GSTOOL application itself This feature requires 54MB on your hard drive Install to D Program Files BSI G
104. S 2 Bundesamt t herhett in der mationstechnik InstallShield Wizard Completed The InstallShield Wizard has successfully installed GSTOOL 3 1 Click Finish to exit the wizard I Launch GSTOOL Set new sa password Launch the Database configuration Once the software has been successfully installed you can specify by checking the appropriate checkboxes whether you want to start GSTOOL 3 1 right away view readme txt and or change the sa password Then click Finish See also section 1 2 Configuring the sa password page 16ff e Deleting the BSI GSTOOL 3 0 desktop icon If you are installing GSTOOL 3 1 over an existing version 3 0 the icon for the old version will still be on the desktop This can be deleted Like the new GSTOOL 3 1 icon this icon is a shortcut to version 3 1 of GSTOOL gt Rebooting To ensure that GSTOOL 3 1 works properly it is recommended that the PC is rebooted following installation Failure to do this can occasionally result in permanent malfunctioning of GSTOOL 11 f you want to read readme txt at a later time this file can be found in the GSTOOL 3 1 installation path BSI GSTOOL3 readme txt 15 GSTOOL 3 1 User Manual Installation first time use deinstallation 1 2 Configuring the sa password During the installation a user with ID sa and password bsi is automatically configured This is the Tool Administra
105. SI standard or user defined adapted VERSION This indicates the version of the IT BPM from which the target object originates To find out which version of the IT BPM GSTOOL 3 1 is using press Ctrl I or select lt Help gt lt About gt METADATA VERSION No version numbers are maintained for user defined target object types PROIR NEW CHANGED See section 2 4 11 New Prior Changed display page 67ff o Subtypes This tab card contains all the subtypes of the target object type highlighted in the tree e Update This option refreshes the entire content of the window to reflect the latest values in the database This is helpful if several users are simultaneously working on the same database on a network and you want to view any changes other people may have made If you are the only person using the database the Update function has the same effect as Save 38 GSTOOL 3 1 User Manual General information on working with GSTOOL 3 1 Creating user defined target object types New is used to release the NAME and FATHER fields on the Common tab card for the creation of a user defined target object type You can choose any name you like Only existing target object types can be designated as fathers The new target object type is hierarchically subordinate to the chosen father After the type has been saved by clicking Save this assignment becomes visible in the tree IS When you create
106. SSWOrd gt niies iarna oiea sesinin A AANRAKEN eae ane een eae 37 2 3 4 lt Tools gt lt Target object types gt ssseieeeeeeeeeeerirttrteeeeiritttresssritrinnrnssssrrereenns 37 2 3 5 lt Tools gt lt Options gt COMMON icc ce sadtc act Mendecye stk cece cadehdedaesedendnacctasadasMedsentndede 43 2 3 6 lt Tools gt lt Options gt Reports winciviesassiecshseciateniainccedodiaeeesteaesds teh eedaadetv Menhoeenie 47 2 3 7 lt Tools gt lt Options gt Report header ccccccceeeceeeeneseeeeeceeeeeeeeeeeesedeeneeeeeees 47 2 3 8 lt Tools gt lt Options gt Additional Options cccceeccceeeeeeeeeeeeeeeeeeeeeeeeeeneeeeeeeeees 47 2 3 9 lt Tools gt lt Options gt Display scevectisicdeciedeiiaians ches tcdencenvtresectieortianewseiccend aa steayel 48 2 3 10 lt Tools gt lt Options gt Password 2ess chslacestetencaeeie ie aheaetchaideeeensleteneene st 50 2 3 11 lt Tools gt lt Options gt Path settings cccccceeeeecneeeeeeeseeseseeeeeeeeeeeeeneeeenseeeeee 50 2 3 12 lt Tools gt lt Translate CUIMONGY gt scien ceg saci iieditbe vig aca ehacseded meee eel aadh deta ek eee 51 2 4 BASIC functi ONS enpo ane aaao arae a T aaar aa a eE aaa aaea aana San Aa daa Eaton da daoa bien 52 2 4 1 lt File gt lt Data migration from GSTOOL 2 0 gt cceceeeeeeee eee e ee eenneeeeeeeeeeeeteneneeeeeeeees 52 2 4 2 lt File gt lt Data migration from GSTOOL 3 0 gt
107. STOOL3 Emons InstallShield Help Space lt Back Next gt Cancel If you have chosen CUSTOM you can change the scope of the installation and also specify a non standard installation path for the GSTOOL program files via Change 13 GSTOOL 3 1 User Manual Installation first time use deinstallation IS GSTOOL 3 1 may only be installed on a local drive Although it is theoretically possible to install it on a network drive this would mean that the database could not be started later on IS Only the installation path for the pure GSTOOL files can be changed The storage location for the system files especially the SQL components cannot be changed IS The other selection possibilities for a custom installation relate to expert settings which the normal user should not change e Installation is GSTOOL 3 1 InstallShield Wizard xj Ready to Install the Program E Bundesamt orhoit in dor The wizard is ready to begin installation rmationstechnik Click Install to begin the installation If you want to review or change any of your installation settings click Back Click Cancel to exit the wizard InstallShield Cancel After you have completed all the settings click nstall to start the installation 14 GSTOOL 3 1 User Manual Installation first time use deinstallation e Completion of installation ie GSTOOL 3 1 InstallShield Wizard gt x
108. T OBJECT ASSIGNED TO NETWORK In the selection field all existing target objects of type S employee are offered Only target objects that are linked to the selected network are displayed IS A S network can only be linked to an 5 set of IT asset or an IT system This means that when you select this field only the two aforementioned target object types can be displayed in the tree S network which is used as a filter cannot therefore be displayed as well 4 1 3 Structure rules The actual IT structure is modeled in GSTOOL 3 1 based on the linking of target objects amongst each other and with IT asset sets To obtain an accurate representation of the status 69 The overall protection requirement is the protection requirement calculated from the individual data entries for the three basic parameters see PROTECTION REQUIREMENT ASCERTAINED field in PROPERTIES OF TARGET OBJECT OF TYPE target object type on the Protection requirement tab card 93 GSTOOL 3 1 User Manual Structure of target objects view quo it is essential to carry out a structure analysis outside of the tool Linking by drag and drop Linking of target objects by dragging and dropping in the tree window is particularly easy IS It is not possible to delete links by drag and drop To link one target object with another select the target object in the tree hold down the left mouse button and drag it over the t
109. T ON In this field you should select the date of the most recent audit103 103 For further information on how to select the date see IMPLEMENT BY field on tab card Implementation on page 143 145 GSTOOL 3 1 User Manual Modeling view REMARKS Remarks on the last or next audit NEXT AUDIT BY In this field you should select from the list of staff the person who is supposed to carry out the next audit This field corresponds to the field LAST AUDIT BY NEXT AUDIT AT In this field you should select the date of the next audit PROJECT PLANNING If the audit planning is to be administered using a project planning tool outside of GSTOOL you can specify the path and file name of the project planning file in the relevant input field or alternatively you can locate it using the Browse button to the right of the input field Project planning launches the application assigned to the file type and opens the project planning file entered i The path and file name must be specified separately for each safeguard 5 5 4 Tab card Responsible On this tab card you can enter individual persons or groups of persons who are responsible for initiating and implementing the safeguard Implementation Cost Revision Responsible Notepad Initiation responsibility zi Implementation responsibility Abbreviation Name All None Reverse Add Delete 146 GSTOOL 3 1 U
110. T asset sets and from IT asset sets to the company agency in turn IS The process by which qualification level achieved is passed on takes into consideration all the safeguards which according to the IT BPM belong to a module or all the modules that belong to a layer or target object If a safeguard or a module is removed in Modeling the qualification layer whose achievement depends on implementation of the safeguard or safeguards in the module cannot be achieved 245 GSTOOL 3 1 User Manual The inheritance mechanism IS For further information on the independence between the inheritance of implementation status from safeguards and the inheritance of qualification level achieved see section 12 2 Inheritance of implementation status page 241 246 GSTOOL 3 1 User Manual The IT Baseline Protection methodology 13 The IT Baseline Protection methodology The BSI s IT Baseline Protection Manual describes an approach for creating updating and analysing IT security concepts for information technology assets with average protection requirements It also contains standard security safeguards covering organisational personnel related technical and infrastructural aspects of IT security These standard safeguards can also be used to achieve a basic level of security for IT components that have high protection requirements The methodology for using the IT Baseline Protection Manual is summarised briefly below A more deta
111. T assets are listed below In the BSI set of IT assets the newly created target object A Head office has been inserted below target See sections 3 2 and 3 3 page 78ff See also section Maximizing and minimizing the tree on page 32 Structure of target objects view Ge set of IT assets BSI building Head office room amp employee Al room B IT system network A application A employee Location 1 building A room IT system a network A application J employee building A Head office room A employee E room IT system aS network fa application A employee The sequence in which target objects are created is irrelevant to the results in the tool 89 GSTOOL 3 1 User Manual Structure of target objects view object type KA building The only item listed below this target object is the still empty level for target object type _ room 65 e Inthe lower part of the tree the newly created target object Head office is listed below target object type LA building Once again the still empty level for target object type f_ room has been inserted Multiple presentation of target objects If when selecting the LINK TARGET OBJECTS AFTER CREATION option a direct link with a selected IT asset set was chosen or a target object has been linked to an IT asset set through selection of query this during its creation then this targ
112. User Manual BPM user defined view 7 3 6 Delete a module Only adapted or user defined modules can be deleted However the effects of right clicking and then choosing lt Delete gt from the pop up menu clicking Delete in the toolbar and clicking the Delete button are different for each of the two types When a module is deleted in BPM user defined the results affect the entire database The information associated with that module cannot be restored once deleted Deleting an adapted module Adapted modules can be restored to their original state type BSl standard by clicking OK at the prompt which appears during the deletion operation For the data gathered during the Basic Security Check page 140ff this means Data relating to the module itself and to the safeguards which were also included in the module in its original state is retained Data relating to safeguards over and above the original scope of the module which were added to the module during the adaptation process is lost Safeguards which were deleted from the original scope of the module during adaptation and were restored during the deletion operation are returned with the status not processed Deleting a user defined module If the user clicks OK at the prompt which appears during the deletion operation user defined modules are deleted in their entirety with the following consequences The dat
113. a the Tool Administrator does not have the same rights as a System Administrator 274 GSTOOL 3 1 User Manual Appendix Metadata The metadata is all the IT Baseline Protection Manual information that is used within GSTOOL to enable a security concept to be prepared Mandatory field Many editing windows and screen formats contain highlighted fields159 These are mandatory fields in which entries have to be made in order to be able to save the screen content There are two types of mandatory fields permanently mandatory fields conditionally mandatory fields In permanently mandatory fields the user always has to either select or enter something With conditionally mandatory fields whether or not the field is mandatory depends on the content of other fields When these fields are mandatory they have to be completed as well If a conditionally mandatory field reverts to being an optional field due to changes in the entries that trigger their mandatory status the entry is retained but can be deleted Referencing To reduce the amount of work necessary to prepare a security concept it is possible to reference modules and their constituent safeguards with each other in the Basic Security Check This means that information relating to more than one module can be edited simultaneously Reference source The reference source is a module that is referenced by another module and whose information content is thus
114. a gathered for the safeguards in a user defined module during the Basic Security Check page 140ff is lost e If the user defined module was a reference source all references emanating from that module are cancelled For 178 GSTOOL 3 1 User Manual BPM user defined view further information see also Deletion of a reference source on page 139 7 4 Tab card Safeguards Zielobjekt Typen Zielobjekt Subtypen Bausteine Ma nahmen Gef hrdungen Schutzbedatisdefinitionen ite BJE fa kM 1 1 Einhaltung einschl gige DIN Normen VDE Vorschiilten konktetisiert Infrastruktur bM 2 1 Regelungen zum Schichtwechsel des RZ Personals beruizerdefir est Organisation M12 Regelungen fiir Zutritt zu Verteilen BSI Stardard Infrastruktur M13 Angepatte Auiteiking der Stromkreise BSI Standard Infrasteuktur M14 BRzschulzeinrichtungen BSI Standard Infrastruktur M15 Galvanische Trennung von Aufienlelungen BSI Standard Infrastruktur M 1 6 Einhaltung von Brandschutavorschiten und Auflagen BSI Standaid Infrasteuktur M17 Handfeuerloscher BSI Standard Infrasteuktur M18 Raumbelegung unter Beriicksichtigung von Brandlasten BSI Standard Infrastruktur M 1 3 Brandabschottung von Trassen BSI Standard Infrastuktur M 1 10 Verwendung von Sicherheitstiren BSI Standard Infrasteuktur M14 Lagepl ne der Versorgungsleitungen BSI Standard Infrastruktur M 1 12 Vermeidung von Lagehinweisen auf schiilzenswerte Geb udeteile BSI Standard Infrasteuktur M 1
115. a user defined target object type GSTOOL 3 1 automatically creates a target object subtype of the same name in square brackets IS Only in the case of the father set of IT assets is it possible to assign more than one target object type to the same father In the example on the top right first new target object type 01 and then 02 have been assigned to the father set of IT assets With all the other target object types the most recently created target object type is inserted between the selected father and the target object type that immediately follows it In the example on the top right first new target object type 01 and then 02 have been assigned to the father Buildings Dummy target object If a user defined target object type is inserted into the structure of the target object types in such a way that it is made the father of existing target objects the tool automatically creates a target object of this type which will serve as the new father for the existing linked target objects Only if the user defined target object type has to serve as the new father for existing target objects is the dummy target object now created 39 iset of IT assets S building room IT system network application employee new type 01 new type 02 set of IT assets 5 new type 02 B new type 01 room IT system network application employee GSTOOL 3 1 User Manual
116. ack up the attempt to back up this database will be refused with an error message To open the Bae etek te Cok lale Mexia window select menu options lt Database gt lt Data backup and recovery gt 40 See section 11 1 1 Creating and editing roles Tab card Data page 224ff User sa always has this permission 63 GSTOOL 3 1 User Manual General information on working with GSTOOL 3 1 Data backup andrecovery__ o Name of database Concept 02 i Backup file Jc Concept 02 bak ne Progress a bai Aecom a l Standard a DOMAENE BBSI Concept 01 e Inthe NAME OF DATABASE field choose the database that you wish to back up This does not have to be the database that is currently open In the example above the database currently open is Concept 01 whereas the database to be backed up is Concept 02 e After the database to be backed up has been selected GSTOOL 3 1 automatically suggests a path and name of a backup file In the example above this is c Concept 02 bak You can alter the file and path as you wish To select the file you can also use the Browse button on the right hand side next to the input field IS A data backup cannot be written directly to a network drive but must be performed on a local drive You can then copy or move the backup file manually to a network drive e To start the backup process click Backup If you have already sel
117. al General information on working with GSTOOL 3 1 If no set of IT assets is entered the selection will have to be made manually in the QUEM EMT ee ORE Cem window Edit IV Save without query I Direct edit safeguards of referenced modules Location 1 set of IT assets general IT asset set All No Revert Update OK Cancel Ve If noset of IT assets is selected and either OK or Cancel is directly clicked the target object just created will not be linked with any IT asset set IS With this option the change takes immediate effect 2 3 6 lt Tools gt lt Options gt Reports The functions available in this tab card are explained in section 6 9 User defined templates page 153ff 2 3 7 lt Tools gt lt Options gt Report header The functions available in this tab card are explained in section 6 9 5 Report header page 162ff 2 3 8 lt Tools gt lt Options gt Additional options IS You can only change the settings on this tab card if you have been assigned the rights of Application Administrator 32 32 See section 2 3 1 lt Tools gt lt Roles gt page 37ff 47 GSTOOL 3 1 User Manual General information on working with GSTOOL 3 1 History Using the slide bar you can adjust the number of changes from the default of O up to 20 that are tracked If you choose 0 tracking of changes will be disabled Further information on the tracking o
118. alat Eiaa 42 user defined cccccecceeeseceeeeeeeeseteees 35 Target object sub types ec eeeeeeeeeeees 166 Target object types aenescens 164 Target objects aesir 231 TPArGats i aa raa a eaa a a 191 target object subtype s assigni aeieea riirii 79 120 automatically created 39 creating eeel aep ireen ae 40 deleting 5 ve sco aie a T a n 42 FON AMIN ease cece ee eeeeeeeee cece eeeeeeeeetaeeeeeeeeeteees 41 target object type s 281 GSTOOL 3 1 User Manual Changing father cc eceeeeeeeeeeeeeeeteeeeeenees 41 Creating fii den aa ra ETETE 39 deleting maie mite eid et 41 determining father 39 renamNG ea lee a aa 40 several assigned to a single father 39 SON a a AAA eee a 92 target object s a is not included in the modelling 274 automatic linking Of NEW 46 ChEAUING Sitiens EE 109 Celeting mihina eee eet 86 110 displaying higher 0 ccceeeeeeeeeeteeeeeeeee 91 GUMMY ii eect estar cere tiied i aA 39 OXPOMIN Gs ean TARO 201 IMP ONIN 5 2 tees E E 203 not offered as reference SOUICE 0 275 post processing of imported 05 269 SOMING citer tire RAM a ee 93 sub types CHANQUAG e eie N 85 text fields fOFMAUING a a a A REE 35 loading Content unennrenn n 35 SAVING Coment ao a E OE 35 threat numbers automatic generation e 194 196 threats assignment to modules a se 195 JEIEN aeit eran 197 Tool A
119. ame explanation date of creation and type of import This list is solely there for information purposes None of the imports contained in the list can be repeated The procedure involved in deleting the list contents is similar to that for deleting exports see 9 9 and can be carried out without any impact on your work with GSTOOL 3 1 215 GSTOOL 3 1 User Manual Filter 10 Filter In many places GSTOOL 3 1 offers the possibility of using filtering selectively to reduce the amount of information shown in lists and the number of elements included in the tree This chapter explains all the functions of the filters as used across the system Where special functions are available for individual filters these are explained elsewhere in the relevant context Filter selection can be activated or deactivated in the three views Structure of target objects Modeling and Reports that is the ones in which a tree is displayed by selecting menu option sequence lt View gt lt Show filters gt or by clicking g Filter in the toolbar or by pressing the key combination Ctrl F In the other screen formats and windows the Filter menu is integrated permanently Where a filter is displayed for the first time after the program Bl zan has started up the option All is offered in the Filter main menu In the selection window you can choose a filter from the list of Ble z additional filter 02 7 options offered The opti
120. and select lt Delete link gt or click i Delete in the toolbar You will now be asked to confirm whether you really wish to delete the selected link Click OK and the deletion will go ahead The target object now disappears from the position marked in the upper part of the tree Method B can be used in both the upper and the lower parts of the tree Under this method once again the link is deleted from the target object that is to be detached This has to be selected e Either select menu option sequence lt Edit gt lt Structure of target objects gt lt Update links gt or right click the target object and then select the lt Update links gt option from the pop up menu Since this time you want to delete the link to a building you should choose lt Buildings gt All the existing buildings are now listed in the Maintain links fl window The present link between the data media archive 106 Structure of target objects view BSI By set of IT assets BSI building Head office troom a gt employee A employee room fl Data media archive 2 IT system a network Al application A employee Location 1 ka building Head office H O Outpost 1 f Outpost 2 y Outpost 3 E room 2 IT system network WwW application R employee IT asset set Building Room IT system Metwort pplication Employee GSTOOL 3 1 User Manual Structure of target objects
121. annot be restored once they have been deleted 3 4 1 Deleting individual target objects To delete an individual target object place the mouse pointer somewhere in the line for that target object and click with the left mouse button Click Delete and a user prompt window will open Click OK to make the deletion final 3 4 2 Deleting several target objects at the same time To delete several target objects at once select them one after another by checking the appropriate checkboxes in column 1 Click Delete and a user prompt window will open Click OK to make the deletion of all the selected target objects final i Colour coded target objects that are not selected in column 1 will be ignored during this delete operation 59 See section Deleting a module page 131ff 86 GSTOOL 3 1 User Manual Structure of target objects view 4 Structure of target objects view In this view GSTOOL 3 1 presents the structure of a set of IT assets through the selective linking of target objects It is possible to create new links and also to move or delete existing links In addition it is also possible to create new target objects or to delete existing ones in this view in a fashion that is similar to the functions in Master data 4 1 Presentation and structure rules In Structure of Target objects it is possible to present even complex IT structures in GSTOOL 3 1 Nevertheless the provision of target object icons an
122. any data previously entered is saved without user being prompted If this option has not been chosen then the following user confirmation window is displayed GSTOOL 3 1 xj 2 You have changed data Do you want to save these data Click lt Yes gt to save data Click lt No gt if you do not want to save the data Click lt Cancel gt to continue editing w J cma If you click Yes a target object with the information you have just specified will be created The editing window will remain open along with all the data as in the case of save without user confirmation thus enabling you to create additional target objects If you click No once again the new target object will be created and the editing window will stay open However all the content previously entered in the window will be deleted You can now make new entries If you click Cancel no new target object will be created The editing window will remain open along with all its content enabling you to continue editing With this option the change takes immediate effect e DIRECT EDIT SAFEGUARDS OF REFERENCED MODULES This option disables the block on editing referenced modules Even safeguards contained in a module that is 45 GSTOOL 3 1 User Manual General information on working with GSTOOL 3 1 referenced can then be directly edited Changes made in one of the modules linked through referencing are implemented in all of them The cha
123. appears below a directly linked target object but is not itself contained in the list of target object types 98 GSTOOL 3 1 User Manual The example on the right shows the following two links ll Data media archive is only indirectly lt linked to KA Head office Registration PC is only directly lt linked to the IT asset set a BSI S In house network is directly lt linked to IT asset set i BSI while at the same time it is also indirectly lt linked to T Registration PC I Only directly linked target objects are considered in Modeling It is important for correct Modeling that in addition to any indirect links by which a target object is hierarchically assigned to another target object it is always linked directly to a set of IT asset Example ll Data media archive is indirectly lt linked to KA Head office in the set of IT asset A Location 1 because itis a room in that building In addition however _ Data media archive has to also be directly lt linked to set of IT asset Sa Location 1 in order to be correctly included as part of that IT asset set in Modeling 99 Structure of target objects view BSI H set of IT assets ge BSI f A building A Head office 1 room a Data media archive A employee a room IT system Registraton PC s network E Ay In house network Al appli
124. archy of links gt held in the tool and the selection made under option LINK TARGET OBJECTS AFTER CREATION 56 Each of the four routes described in section 3 1 lead to the same window AOAC GRIJA ARA PROPERTIES OF TARGET OBJECT OF TYPE target object type in which the tab cards offered depend on the target object type 3 2 1 Tab card Target object typel The first tab card is offered for all target object types and always bears the name of the target object type in question For every target object type there are certain mandatory fields that 55 For further information on this point see section 4 1 3 Structure rules Link hierarchy on page 97 56 See also section 2 3 5 lt Tools gt lt Options gt Common page 46ff 78 GSTOOL 3 1 User Manual have to be completed NAME ABBREVIATION SUBTYPE and NUMBER The user is free to enter any text in the NAME and ABBREVIATION fields Changes can be made in all the fields at a later time IS If a target object is created with a name that has already been used for another target object irrespective of type a tilda plus a sequential number are automatically added to the name of the newly created target object In the example to the right the target objects North _ room North 2 Gs building and North 3 also room have been created e Inthe SUBTYPE fields you should select one subtype from the list of subtypes Only subtypes th
125. ards for a given module and ascertain the relevant implementation status In GSTOOL 3 1 the results are entered in the Modeling component which is described in this manual in section 5 5 Basic Security Check page 140ff Amongst other things the names of the persons interviewed the implementation status of each safeguard and any comments or reasons should be documented The outcome of the Basic Security Check is a detailed summary of which standard security safeguards from the IT Baseline Protection Manual have already been implemented and in which areas further work is required 13 3 5 Supplementary security analysis During the assessment of protection requirements for each of the three basic parameters of confidentiality integrity and availability the IT applications IT systems communication links and rooms in which IT equipment is used were separately assigned one of the protection requirement categories of low to moderate high and very high The standard security safeguards contained in the IT Baseline Protection Manual should be used for all these targets objects They provide a basic level of security that is reasonable and adequate for normal security requirements The IT Baseline Protection Manual also contains recommendations that are relevant to higher protection requirements although in some cases it may be necessary to supplement them with additional more extensive IT security safeguards Supplementary security mechan
126. arget object subtype sesssesessssserreestettrrrittttteetttttnttrtsssstttnntnnnasssttetnnnnnat 166 7 2 4 Create a new target object Subtype cccccecccieeneeeeeeeeesceceeneeeeeeeeeteesneceeeeeeeens 166 7 2 5 Delete a target object subtype cccceceecceeeseseneeeeeeeeeeseescecceneeeeeeneeseeceeneceneeeess 167 7 2 6 View explanations for a target object subtype oo eect eee eee eeeeeeeeeeeeeeeeeees 167 iv GSTOOL 3 1 User Manual Table of contents 7 3 Tab card Modules tiiaisccesscteininesseceanvetveatearaavestetanetuaiahandnaincutact wedzennniensaedeniens 167 TB WPAN ic pcaidscsscapsnstustiwecsienevinde sales valoscelanstieegots wat ax diets daeenne ete kaneenaeoeeeee eee 167 PO Listor MNOCMUIES 225 iis dicta t OUR awed dei ia E A era each anes 168 7 3 3 Open amp MOUIC a aE a a aa aa aaa a aaa rair a aa iia ieai 169 T 3 4 Adapta mod le preie earna ea A Te aaa aa a a aE Te aa 169 F232 Definea new mod ler Seesaw chet ta iei Sarasa ca ated anew eee 175 7 3 0 Deletea Mod le 20 2 su 2stadata aa e a a aaa Taa ar A ARE alec cabea atcutetigtans 178 7 4 Tab card Safeguards cic icicsccavsicassisescscavvecenssnnsvivuitds doatsvenessaeavacsasencavestansdcdedss 179 TA i e E E E A pe er er 179 PAD istot safeguard S tale dis 208 oe ah od naaa aee ne tiga edness deditmecchntdviseentd E ie etedeccuccatenedie 180 7 4 3 Openinga safeguard s since seated ss Haass cee dae tydedabsaveeicn niece ed eanaduascbaerth eed i
127. arget object types i e KA building _ room etc are not shown separately In the example on the right target objects a Head office and i Outpost 1 both of them KA building plus Data media archive a _ room have been assigned to IT asset set ty BSI According to the IT BPM the two modules M 4 01 Buildings and sii M 4 02 Cabling are always assigned in the Ww Security of the Infrastructure layer Hence both target objects a Head office and a Outpost 1 appear below modules si M 4 01 Buildings and si M 4 02 Cabling Only at this point are the safeguards listed below as the implementation of safeguards of the same module may not be the same for a Head office as for a Outpost 1 Hence module si B 4 03 03 Data media archives is assigned to target object Data media archive according to the assignment of subtype Data Media Archive see section Tab card Target object type page 78ff In this way this module is contained in P Security of the Infrastructure as well IS It is not possible in the layer model to view the properties of a selected module If there are several target objects below the module to which this module is assigned these could have different properties Nevertheless to enable the user to view the properties of the module assignment and also the target object properties he has a c
128. arget object with which you want it to be linked While the mouse pointer is being dragged the window indicates whether linking with the target object over which the pointer currently positioned is possible or not e The icon Q indicates that linking is not possible e The icon N indicates that linking is possible Linking via drag and drop is possible from any point of the tree at which the target object to be linked is listed If the rules governing links permit such a link then releasing the left mouse button produces a context sensitive user prompt window e If the target object is to be linked from the lower section of aeaa the tree with another target object after releasing the mouse Create link button over the selected target object only lt Create link gt is offered It is not possible to move a target object out of the lower part of the tree e If one target object is to be moved from an existing link i e Move link from the upper part of the tree and then linked to another Create link target object as soon as the mouse button is released over the selected target object two options are offered Select lt Move link gt to create the new link desired and delete the existing one Select lt Create link gt to create the new link parallel to the existing one 70 See section 13 3 1 IT Structure Analysis page 250ff 94 GSTOOL 3 1 User Manual Structure of target objects view IS If you attempt to recre
129. aseline Protection Manual contains numerous damage scenarios and appropriate questions that need to be answered for each IT application under consideration The rationale behind the decisions made for each of the protection requirement categories must be given so that this can be traced back later on The protection requirements for IT systems are derived from the protection requirements of the IT applications The information about the interrelationships between IT systems and IT applications that is needed here will have already been generated during the IT Structure Analysis Dependencies between individual IT applications also flow into this analysis Normally the protection requirement of a given IT system is derived from the Maximum Principle but sometimes the cumulative effect or the distribution effect must also be considered The protection requirements of the rooms in which IT equipment is used and of the communication links are ascertained in a similar fashion To reduce the complexity of the analysis in the case of communication links the classification into the three categories of low to moderate high and very high is omitted Instead the only distinction made is between critical and non critical links Critical communication links would include for example communication links to the outside world The critical links can be graphically highlighted in a network diagram By the end of the assessment of protection requirements
130. assignment of roles to users Roles Rights roles 4 are basically independent of any particular individuals and merely group together certain rights Users are natural persons groups of persons or fictitious persons who work with GSTOOL 3 1 When a role is assigned to a user that person acquires the rights defined for this role Roles and users are administered separately in GSTOOL 3 1 This means that rights can be handled both flexibly and effectively e When a role is changed the rights of all the users who have been assigned this role are immediately changed as well It is not possible to cancel any rights for a user who is currently logged on to a database Any reduction of rights does not take effect until the next time that this user logs on to a database This means that it is possible for a user who is logged on to exercise rights e g for the deletion of target objects which have actually already been withdrawn during the present session e When a new user is created or when the rights of a user need to be altered it is possible to simply select from the roles already created without having to think about individual rights every time 141 These permissions roles should not be confused with the roles that are assigned to a safeguard for a particular phase See section 7 4 4 Adapting a safeguard Tab card Roles page 184ff 220 GSTOOL 3 1 User Manual Administration of rights IS The
131. at are assigned to a given target object type are offered IS The choice of SUBTYPE has a decisive effect on the suggestions offered in Modeling For example if you were to assign the subtype Server room to a room that is actually a data media archive the wrong modules and hence the wrong safeguards would be assigned in Modeling e The NUMBER field is used to specify the size of a group of identical target objects wile Grouping of items AE We highly recommend grouping items together both because this is recommended in the Baseline Protection methodology and also to reduce the number of target objects If every IT system every application etc were to be entered it would be tl difficult to see one s way around GSTOOL 3 1 and the results obtained would be difficult to follow It would thus actually obstruct rather than promote IT security Master data view BSI g amp set of IT assets ge BSI E building amp North2 E a room a North H E North 3 IT system network Al application A employee 57 For further information on the creation of groups see section 13 3 1 IT Structure Analysis page 250ff in this manual and Section 2 1 IT Structure Analysis in the IT BPM 79 GSTOOL 3 1 User Manual Master data view With the following target object types it is either mandatory or optional to enter additional information e IT SYSTEM Status can be indica
132. atabase 4 can only be used by the GSTOOL 3 1 Tool Administrator sa With this function sa can configure the settings for the GSTOOL 3 1 login type e attach and detach databases e change the sa password and e import scripts Login tab card If the user logged on to the PC is also the GSTOOL 3 1 sa then WINDOWS INTEGRATED SECURITY will be sufficient for login If this is not the case the Tool Administrator will have to log on with DATABASE SECURITY and input a USER NAME and PASSWORD s GSTOOL configure database Select database instance DOMAENE B BSI v Status Running Start Stop Refresh Login Databases Password Script C Windows integrated security Database security User name sa PaA mannana m Allowed login types Only Windows integrated security Database security and Windows integrated security Using the Test function you can check whether the sa password is still bsi and has not been changed since the installation or whether it has already been changed and or whether the password currently used is correct Enter sa in the USER NAME field and bsi or the current password in the PASSWORD field then click Test If the 47 This function is accessed via menu selection lt Start gt lt Programs gt lt BSI gt lt Tools gt 70 GSTOOL 3 1 User Manual General information on working with GSTO
133. ate a link that already exists this action will be declined with an appropriate error message GSTOOL 3 1 x gt Target objects BSI And Head Office Are already linked with each other Link rules GSTOOL 3 1 contains a set of rules which determine which links are possible and which are not possible and the manner in which linked target objects are hierarchically arranged These rules take into account which assignments could be technically and organisationally sensible and also how the protection requirement of one target object can be passed on to another target object The link rules are anchored in the tool and cannot be changed e A given target object can only be subordinate to another target object if it can inherit the protection requirement of that target object or itis supported supplied or used by that target object e With the exception of Application target objects cannot be linked to other target objects of the same type Applications can be linked to other applications since in a normal IT processing chain applications can be dependent on each other so that one application can pass its own protection requirement onto another one or can inherit it from another one IS It is possible to link an application with itself Such a link is not logical however and should therefore not be attempted The table below summarises once again the possible assignments of target objects through links 95
134. ators are set to PRIOR you can tell from the change of status to NEW or CHANGED that occurs after the metadata important if something has changed 2 4 12 History For a number of fields whose content can be completed or amended by the user GSTOOL 3 1 keeps track of the changes that have been made over time In this way past changes to data records can be inspected Number of changes tracked The number of changes tracked is configured via lt Tools gt lt Options gt Additional options History page 48 If the number of changes carried out for a given field exceeds the upper limit on change tracking the oldest entries are overwritten If the number of changes to be tracked is reduced all entries that exist over and above the new value will be deleted It will not be possible to restore the lost changes 45 See section 2 4 2 lt File gt lt Data migration from GSTOOL 3 0 gt page 55ff 46 See section 2 4 3 lt File gt lt Import gt lt Update BPM metadata gt Effects on existing adaptations page 59ff 68 GSTOOL 3 1 User Manual General information on working with GSTOOL 3 1 History display The history display is invoked by positioning the cursor in a field and then pressing F2 Previous changes to the field content are then listed in the window with the most recent change at the top of the list e The DATE OF CHANGE column contains the date and time of the last
135. ay user defined Delete Edit New e BASIC REPORT SHEETS XSL Properties Scope Jgaked with Fiter Here you need to enter the complete directory path that will be accessed when the Browse button next to the DEFAULT TEMPLATE field in KJW GAG lii is Clicked 11 REPORT TEMPLATES list This list contains all the existing report templates For the 46 report templates of the type BSI all you have to do to specify the basic templates is to enter name xsi without any further path details as these templates can only occur in the installation path For user defined report templates the complete path is shown as their default templates could be stored in a different location The TYPE column shows whether the template is an original one BSI or a user defined one If you check the ONLY DISPLAY USER DEFINED option you can reduce the list accordingly Edit opens the window which contains the latest definitions of the selected report template In the case of templates of type BSI the settings are display only and cannot be altered User defined templates can be edited in a similar fashion to the editing process during the creation of a new user defined report template 110 See section TEMPLATE on page 156 155 GSTOOL 3 1 User Manual New opens the KIW AG eas Window with a completely empty form in which you can enter the definitions for the new user
136. base To avoid future problems the original cloned database should be deleted at some point 269 GSTOOL 3 1 User Manual 14 4 4 General problems Presentation Problem Cause Appendix Solution Although the display of rights has been enabled section 2 3 9 lt Tools gt lt Options gt Display the Rights column is not shown in many any of the lists The existing columns are so wide that the additional Rights column at the far right exceeds the area that it is possible to display on the screen Reduce the size of the existing columns The Rights column will then become visible on the right Although the display of ID has been enabled section 2 3 9 lt Tools gt lt Options gt Display the ID column is not shown in many any of the lists The existing columns are so wide that the additional ID column at the far right exceeds the area that it is possible to display on the screen Reduce the size of the existing columns The ID column will then become visible on the right There is apfatherly no way of changing the background colour of the Navigator The background colour of the Navigator is taken from the Windows colour settings for Application Background The background colour can be altered as required via the normal Windows settings in lt Control Panel lt Display gt The labelling of shortcuts is not displayed Under Windows 2000 it is possible to t
137. bers to be toggled on and off in the tree presentation The default option is that they are shown 48 GSTOOL 3 1 User Manual General information on working with GSTOOL 3 1 IS Changes made under this option take effect after clicking E Update or pressing F5 Display outdated number of safeguards This function is only of interest to users who have imported data from GSTOOL 2 0 If user defined safeguards have been imported from GSTOOL 2 0 to GSTOOL 3 1 these safeguards will have been assigned new numbers When this function is selected the old safeguard numbers are also displayed in a separate field The default option is that they are shown IS With this option the change takes immediate effect Display rights column If this option is selected the Rights column will be displayed in lists The default option is that this column is not shown IE This change will only take effect when the tool is next started Display ID field in lists of target objects Lists of target objects contain an additional column that shows the tool internal IDs of the target objects The default option is that this column is not shown IS This change will only take effect when the tool is next started The IDs are not necessary in order to work with the tool but they can be used as an additional differentiating feature The IDs are generated by the tool and cannot be altered Display lines to show rows and columns in listvi
138. bject types after the FILTER settings have been applied Target object type Target object subtypes Modules Safeguards Threats Protection reguirement category Fite B a z I All x set of IT assets BSI standard building BSI standard room BSI standard IT system BSI standard network BSI standard application BSI standard employee BSI standard Entries 7 Open 7 1 1 Filter A full description of the filter function can be found in chapter 10 Filter page 216ff e Predefined filters No additional predefined filters are offered 163 GSTOOL 3 1 User Manual BPM user defined view Tab card Basic filter The following two Basic filter are offered METADATA TYPE Through the appropriate selection you can restrict the list to user defined adapted or BSI standard target object types LINKS ALLOWED You can choose here amongst all the existing target object types including user defined target object types In the filtered list only those target object types which can be hierarchically subordinated through linking to the type chosen are displayed 3 Example If you choose target object type bilding in the filter then the filtered list will only contain the target object types room and employee 7 1 2 List of target object types The NAME column contains the names of the target object types The TYPE column specifies whether this is an original BS standard type
139. building E A Head office E a room El Rcord store A employee i a room H E Reord store m IT system a network ii application A employee BSI E ga set of IT assets B E building A Head office pea employee Ej P storey Ei B gt gt storey lt lt Ej a room a Ficord store Ej a room E a Rcord store 2 IT system network a application b employee E P storey GSTOOL 3 1 User Manual General information on working with GSTOOL 3 1 the target object type in the NAME field then save this change Save The new name will immediately appear in the tree on the editing window Renaming a target object subtype Select the target object type whose subtype you wish to rename in the tree and then choose tab card Subtypes In the list select the target object subtype that you want to rename Choose Open to access the window You will then be able to alter the name of the subtype on the Common tab card Click Save to confirm the change and then OK to close the window The new name will appear immediately in the list of target object subtypes i Only user defined target object subtypes can be renamed Assigning a target object type to another father IS Only user defined target object types can be assigned to another father Select the target object type that you wish to assign to another father in the tree In the FATHER field of the Common tab card now select the new father from the target object ty
140. cation database BSI standard application Novell eDirectory BSI standard application Internet Information Server BS standard application Apache Web Server BSI standard application Exchange Outlook 2000 BSI standard application general building BSI standard building general employee BSI standard employee general client pc BSI standard IT system x 7 2 1 Filter A full description of the filter function can be found in chapter 10 Filter page 216ff e Predefined filters On the Target object subtypes tab card in BPM user defined all the existing target object types are offered as predefined filters too Tab card Basic filter The following two Basic filter are offered in Modeling TARGET OBJECT TYPE You can choose here amongst all the existing target object types including user defined target object types Only the target object subtypes that belong to the selected type are displayed in the filtered list METADATA TYPE The list content can be confined to one of the two types offered BSI standard or user defined adapted 7 2 2 List of target object subtypes e The NAME column contains the names of the target object subtypes 165 GSTOOL 3 1 User Manual BPM user defined view e The TYPE column specifies whether this is an original BSI standard subtype or a user defined subtype115 The SUPERIOR TYPE column names in each case the target object type to whi
141. cation A employee network be S In house network Ai application A employee g Location 1 A building a room 2 IT system S network Al application A employee BSI Z set of IT assets ge BSI a Location 1 A building 4 Head office room F a Data media archive BR employee M room E a Data media archive 2 IT system S network Al application building M room 1 Data media archive a File storeroom 2 IT system Ha network GSTOOL 3 1 User Manual 4 2 2 Creating a new link Example LA Head office is to be linked to set of IT assets e Location 1 There are several ways of creating this link as follows Method A By drag and drop A Head office is moved over A Location 1 or alternatively Ja Location 1 is moved over KA Head office In both cases after the left mouse button is released a sub menu appears in which the desired link is created by clicking the lt Create link gt option Method B First of all right click and then choose lt Link target object gt from the pop up menu Now select the target object for a link Next select the target object with which the first target object you selected is to be linked then right click and select lt Create link gt The desired link will now be created Method C Select menu option sequence lt Edit gt lt Structure of target objects gt lt Update links gt or alternatively r
142. ch the subtype belongs e The OBSOLETE column displays the date since which this target object subtype has been superseded in the IT BPM e ENTRIES The number of entries contained in the displayed list is indicated at the bottom left of the tab card The following functions are available from the list 7 2 3 Edit target object subtype To edit a target object subtype double click the target object subtype or right click and then choose lt Open gt from the pop up menu or click the Open button or click Open in the toolbar If the target object subtype is of the BSI standard type the window will now open Here the only data that can be edited is the content of the Notepad tab card If the target object subtype is a user defined one then you will be taken to the ZIET window Here you can edit all the entries apart from father target object type116 7 2 4 Create a new target object subtype To create a new target object subtype press the key combination Ctrl N or right click and then choose lt New gt from the pop up menu or click the New button or click amp New in the toolbar117 115 The IT Baseline Protection methodology does not take into account any adapted target object subtypes 116 See section 2 3 4 lt Tools gt lt Target object types gt page 37ff 117 See Creating user defined target object subtypes on page 40 166 GSTOOL 3 1 User Manual 7
143. choose from The safeguards displayed are the ones assigned to the chosen module according to the IT BPM irrespective of any changes that the user has selectively made to this assignment SAFEGUARD RESPONSIBILITY FOR INITIALIZING The employees offered for the user to choose from are those who have been specified in Modeling as being responsible for the initiation of at least one safeguard IMPLEMENTATION BY The employees offered for the user to choose from are those who have been specified in Modeling as being responsible for the implementation of at least one safeguard METADATA TYPE Through the appropriate selection you can restrict the list to user defined or BSI standard safeguards 7 4 2 List of safeguards The No column contains the numbers of the safeguards as per the IT BPM The prefix u or a indicates whether the safeguard in question is a user defined one or has been adapted The NAME column gives the names of the safeguards The TYPE column specifies whether this is an original BSI standard safeguard 180 GSTOOL 3 1 User Manual BPM user defined view or a user defined or adapted safeguard The data here correlates with the prefixes u and a in the No column e The CATALOGUE column Specifies the catalogue to which the safeguard in question belongs either according to the IT BPM or as defined by the user122 e The OBSOLETE column displays the da
144. click amp Open in the toolbar The Show threat window in which you can view the entries for the selected threat over several tab cards now opens The entries on the Notepad tab card can be altered e Opening a threat of type User defined adapted Double click the relevant threat or right click and then choose lt Open gt from the pop up menu or click the Open button or click amp amp Open in the toolbar The E fare window in which data relating to the threat can be altered in a fashion similar to that described in section 7 5 4 Adapting a threat now opens 7 5 4 Adapting a threat As is the case with modules and safeguards it may also be necessary to modify individual threats in line with your particular requirements Here you should bear in mind that when you adapt a threat it is not basically altered but only adapted If a threat in its present form is so unsuitable that extensive changes are required this should be implemented by creating a user defined threat see section 7 5 5 Define a new threat page 193ff IS A threat that is adapted in BPM user defined will replace the original threat at every point in GSTOOL 3 1 and the associated threat number will consistently be preceded by the identifier a IS Only BSl standard threats can be adapted User defined threats can be further edited via Open page 190ff IS When a threat is adapted this does not alter the ident
145. cords and to edit and delete existing ones These options will be described in the appropriate contexts 51 See section 2 3 9 lt Tools gt lt Options gt Display 75 gt l GSTOOL 3 1 User Manual Master data view directly linked to any IT asset set up to now and hence are not contained in any asset set in the relevant lists of target object types are displayed Type target object typel Only target objects of the selected type are displayed IT asset set asset set With this filter only those target objects that have been directly linked to the IT asset set selected and hence are contained in that asset set in the lists of target object types are displayed Tab card Basic filter Four Basic filter are offered in Master data ASSET SET NAME SELECTION Only target objects that belong to the IT asset set selected52 are displayed TARGET OBJECT CALCULATED PROTECTION REQUIREMENT Only target objects whose overall protection requirement matches the selection in this field are displayed TARGET OBJECT TYPE Only target objects of the selected type are displayed This selection corresponds to the predefined filter Type target object type __ The restriction to one target object type is helpful in two cases ATTA e f you want to enter a sequence of target objects of the same type e in order to obtain a clearer overview of individual target object types where the master da
146. create such a f file yourself following the instructions contained in Text file export of target object section 9 1 page 199 ff uf _ The easiest way to learn how to structure a text file 14 3 2 Processing of import files In GSTOOL 3 1 import files are processed according to the following rules e A new data record is created for each line e Empty values are imported as null values A value is deemed to be empty if there are no characters between two semi colons e f the character string length for a value exceeds the length defined in the database for the corresponding field the content is truncated without warning e The imported target objects have the effect of supplementing the existing list of target objects Existing target objects with the same name are not overwritten but are retained unchanged 14 3 3 Post processing of imported target objects As the imported data is not checked either for completeness or validity the following steps have to be performed after the import has been carried out Detection of duplicate names If a target object is imported with a name that has already been used for another target object irrespective of type a tilda plus a sequential number are automatically added to the name of the imported target object Names thus supplemented can be freely altered 265 GSTOOL 3 1 User Manual Appendix Missing information It is possible that information relating to
147. cted in the list without the user being prompted to confirm this action Any deleted supplementary attributes for target objects of the type currently being edited that exist at the time of deletion are retained They can then be edited and deleted there like supplementary attributes that have been defined on an individual basis 2 3 5 lt Tools gt lt Options gt Common Languages There are two ways of configuring the language within GSTOOL 3 1 e f you disable the checkbox LOCALIZE APPLICATION then GSTOOL 3 1 will run with a German interface It will then only be possible to change the language for the metadata syle By disabling the checkbox the amount of memory 20E used by GSTOOL 3 1 is reduced 4 e If you enable the LOCALISE APPLICATION checkbox GSTOOL 3 1 will access separate language files wh The name and location of these language files can be Z changed via lt Tools gt lt Options gt Path settings 2 3 11 page 50ff You are currently able to select the language for five areas 43 GSTOOL 3 1 User Manual General information on working with GSTOOL 3 1 e APPLICATION Here you can choose the language in which the user interface is presented This will affect the menu options the toolbar the Navigator the buttons field captions and table headings e Help You can select the language in which the online help is displayed e BPM LOCAL You can choose the language of the
148. cts are not included in the export if this option is selected Tab card Target objects The selected target objects are exported regardless of their links The list can be limited to target objects of one particular type in the selection field TARGET OBJECT TYPE 200 GSTOOL 3 1 User Manual Export Import view 9 1 3 Carrying out the export When you have finished defining the export and the target objects to be exported click OK to close the window The newly created export is now included in the list of possible exports Export Import export 01 07 12 2004 12 10 00 Text file export of target objects 07 12 2004 12 10 15 Text file export of target objects export 02 07 12 2004 12 10 39 Text file export of target objects Delete Edit New Run Now select the export that you wish to carry out by checking column 1 Click Run to open the 3AIL AEAII window Here you need to specify the directory and FILE NAME to which the export should be sent The possible file types are e Text files txt and CSV files csv Depending on the chosen option the export will create either a TXT ora CSV file e XML files xml The export of target objects in XML format is intended for further processing of the data using other software tools e All files With this option an XML file is created IS XML files cannot be re imported into GSTOOL 3 1 To start the export operation click Save
149. d I amp S You can only specify a program in the OPEN WITH field or select one using the Browse button if you have checked the OPEN REPORT checkbox If no entry has been made here the tool will open the report using Internet Explorer if possible PARAMETER In this field you can enter control parameters to be passed to the program specified in OPEN WITH I amp S You can only specify such parameters if you have entered a program in the OPEN WITH field REPORT PROPERTIES Here you can enter attributes that will determine various options for the selected default template As long as you have sufficient knowledge of XSL files you can tell which attributes of the default template can be interpreted from the default template in question xs file 112 See section 6 6 Saving a report page 152ff 157 GSTOOL 3 1 User Manual Reports view Every attribute consists of aname and a value Both fields are alphanumeric SORTING Sorting of the modules and safeguards in a report will normally be determined by the sorting used in tree in the Reports view If you complete the two fields you can specify a different sorting method for the user defined report template Further information on this is available in the online help 6 9 4 Determining the scope of the report On the Scope and Linke with tab cards you can determine what database content is to be output in the report using this report template I am
150. d also to GSTOOL 3 1 can be processed using GSTOOL 3 1 Renaming a database Should it be necessary to rename a database attached to the tool it must first be detached from the tool and then re attached after it has been renamed This can be done in two different ways e Variant A Rename the detached database file as if it were normal file taking care to retain the MDF suffix When the renamed database file is re attached at a later date if the Browse button is used the new file name will automatically be passed across as the new database name e Variant B The detached database file is not renamed but the desired change is made to the NAME field only during attaching of the unchanged file The next time the tool is started up the database will be offered in the login window DATABASE field with its altered name along with all the other databases 17 Microsoft SQL Server 2000 must be purchased and licensed separately It is not possible to obtain it from the BSI 18 See section 2 4 14 Configuring the database Databases tab card page 7 1ff 22 GSTOOL 3 1 User Manual Installation first time use deinstallation Creating an additional database In addition to the original database it is possible as an alternative to work with any other databases This means that security concepts for different customers can be worked on independently of each other with GSTOOL 3 1 If you are going to work
151. d default structures ensures that the tree is manageable and easy to assimilate This section provides a brief description of this support Further explanations will be found elsewhere in the appropriate context 4 1 1 Presentation Target object icons All the target objects that are contained in the database currently selected are included in the tree The target objects are preceded by icons which indicate their type e Sia Set of IT asset e u 2 5 co o Ags Employee JA User defined target object It is not possible in GSTOOL 3 1 to define different icons for different user defined target object types 87 GSTOOL 3 1 User Manual The tree The structure on view in Structure Target objects is automatically generated by GSTOOL 3 1 Horizontally a distinction is made content wise between two areas 0 e The upper part tts set of IT asset contains all the IT asset sets that currently exist Below each asset set initially only the Ja BSI set of IT asset the target object types that can be linked to an IT asset set are listed All the target objects linked to the IT asset set are included in these lists The lower part of the tree i e Ss building through to Ah employee and any ZB user defined target objects contains all the target objects that have been created sorted by target object type that are eligible for linking This part also contains target objects that a
152. d in the leftmost column Additional safeguards can be selected and safeguards already selected can be deselected e Columns No NAME TYPE CATALOGUE These columns show respectively the number title and type of safeguard and the catalogue to which each safeguard belongs e The OBSOLETE column displays the date since which this safeguard has been superseded in the IT BPM e Al All the safeguards contained in the list are selected 173 GSTOOL 3 1 User Manual BPM user defined view e None All the safeguards contained in the list are deselected Reverse reverses the selection indicated in column 1 all the safeguards not currently selected will be selected and all the safeguards currently selected will be deselected OK has the effect of adding the selected safeguards to the module Any links that existed originally but which have been deselected in column 1 will be deleted from the module when you click OK Cancel closes the window without changing the list of safeguards that belong to the module The None option also deletes all the checkmarks that were in place when the window was opened If you click OK immediately after None all the safeguards originally contained in the module will be immediately deleted Deleting safeguards from the module As long as at least one safeguard is checked in column 1 the Delete button will be offered in the Safeguards tab card Common
153. defined report template over four tab cards 6 9 3 Tab card Properties Properties Scope Linked with Filter r Basic properties Name Template Extended properties Extension IV Open report Open with De E Parameter aO O BASIC PROPERTIES e NAME Every new report template has to be given a name TEMPLATE Here you should enter the default template that is to be used by the report template always specify the complete path or else you can select it via the Browse button SF The Browse button opens the directory that was specified in lt Tools gt lt Options gt Reports BASIC REPORT SHEETS XSL 111 111 See BASIC REPORT SHEETS XSL on page 155 156 Report properties Name Value Delete Edit New r Sorting Sorted safeguards Sort modules Reports view GSTOOL 3 1 User Manual Reports view EXTENDED PROPERTIES EXTENSION This field is used to specify the file extension with which a report is to be stored If no entry is made here the report will automatically be saved as an HTML file OPEN REPORT If this checkbox is checked the new report will be opened either with Internet Explorer or with the program specified in the OPEN WITH field If this checkbox is left blank the report will be saved directly112 OPEN WITH This field is used to specify the program with which the report should be opened and displaye
154. dministrator cccccccseeeceeeeeee aeons 16 278 Appendix toolbar isin een adehns 29 tree MAXIMISING eeen chests sed cde darecchien detest ideas abans 32 MINIMISING 2 c stere lets aed ate eee es 32 reduced display in layer model 205 120 the is not visible ooo ce eeeeenteeeeenees 274 TEXTS 3 ccs Miatineth atone 203 U UR Ecscstsedcctestaeectiate E sdeeutienteeviad 34 USCFIQIOUDS Yrs hecusiaciecis tied creer AE 242 USEM NOIGS aake rE EE EAA AEE 238 VICWING eniri Bled Mi ata 224 users blocking ACCOUNTS srik 237 creatinina ea a 233 deleting aoei aea yat cette 234 alL e PRE A E eerie aes 234 updating secie arii 234 VIGWING RE AEE E E E E 234 WwW window width CHANGING anaa a EE 36 X XML files cannot be re imported ceceeeeeeees 203 282
155. ds in a text file export of target object Should it be necessary to supply information on modules and safeguards for external processing you should choose the standard export procedure section 9 3 page 204ff or a one way export section 9 7 page 213ff IS For the purposes of the export line breaks and semi colons in the text fields are replaced by spaces In the editing window Export tab card click New to open the LAGEL li Window You can then define the nature and extent of the export on the three tab cards Properties 199 GSTOOL 3 1 User Manual Export Import view IT asset sets and Target objects The progress of the export operation is indicated on the Progress tab card 9 1 1 Tab card Properties Properties IT asset sets Target objects Progress Export type Name Return by 07 12 2004 Comments EXPORT TYPE From the options available choose Text file export of target object NAME Every new export has to be given a name This can be any name you like including hyphenated names RETURN BY This field is not applicable for the text file export of target object 9 1 2 Export scope The scope of the text file export of target objects is specified on the IT asset sets and Target objects tab cards Tab card IT asset sets Target objects that are linked to the selected asset sets are exported Indirectly linked target obje
156. ds which offer a reasonable and adequate degree of protection against these threats under normal security requirements can be derived It is thus not always necessary to develop tailored safeguards for every application With the applications that are standard today it is not possible to achieve a reasonable level of security by technical mechanisms and functions alone On the contrary technical security functions must be accompanied by safeguards covering organisational staff related and building related aspects Examples of such accompanying safeguards are the appointment of responsible persons staff training and fireproofing If this approach is to be cost effective it is important that these standard security safeguards can largely be implemented using functions components or organisational features that already exist so that they are not unduly expensive Compared with traditional risk and security analyses under which security safeguards are identified for each element of an existing IT landscape this approach offers the following advantages amongst others e As the standard security safeguards involved are used again and again they can be described explicitly and in detail in a catalogue e IT security analyses based on standard security safeguards save work as they are essentially limited to a target versus actual comparison The resulting IT security concepts are scalable can be updated and are compact as they re
157. dule to module 5 4 Referencing Modules are assigned to all target objects during the Modeling on the basis of the Structure of target objects It is quite possible here that during the Modeling of an institution target objects of the same type should occur more than once This means that the safeguards that belong to those target objects also occur more than once in the tree e Inthe example on the right modules M 4 01 Buildings and M 4 02 Cabling occur three times in IT asset set Sa BSI under target objects Outpost 01 y Outpost 02 and A Outpost 03 La Object model BSI B a Lal BSI H generic aspects of IT security BSI Q Dutpost 1 Fg M 4 07 Buildings elle A M 4 02 Cabling EQ Outpost 2 i elev M 4 01 Buildings ele M 4 02 Cabling T A Outpost 3 ele M 4 01 Buildings E M 4 02 Cabling The information relating to modules and their safeguards was collected during the Basic Security Check 5 5 page 140ff separately for each of the four target objects You can tell this from the different identifiers of the modules as regards the implementation status of their safeguards and the qualification level attained If the data relating to modules that occur more than once in the tree is the same regardless of the fact that they belong to different target objects the facilities for referencing modules offer the possibility of significantly reducing t
158. dules and safeguards have a display field at the top right which can accept the values NEW PRIOR and CHANGED This field alerts the user to new metadata records For every new database see section 1 5 2 Databases Creating an additional database page 23ff this field is automatically set to NEW The user can expressly indicate to the system that he has taken note of the content of the screen format by removing the checkmark The next time an item is retrieved the indicator will then be set to PRIOR 44 See section New page 231ff 67 GSTOOL 3 1 User Manual General information on working with GSTOOL 3 1 If you set this display to Prior then should you subsequently perform a data import from GSTOOL 3 045 this will have the following effect on the modules and safeguards concerned Compared with the normal behaviour of GSTOOL 3 146 in GSTOOL 3 0 adapted modules and safeguards are not converted to user defined modules and safeguards but continue to be treated as if they have already been adapted Moreover the latest modules and safeguards are not integrated into the metadata in parallel When the BPM metadata is updated the display is set to NEW for all new objects that have been added Only objects that have been changed are marked CHANGED If you have already taken note of all the objects prior to updating of the BPM metadata i e all the associated indic
159. e layer or target object e f at least one module carries the identifier po colour 1 implementation untreated as a result of inheritance from the associated safeguards or because it has been adopted as a result of referencing then the layer or target object to which the module belongs will bear the identifier no colour 1 indicating implementation untreated irrespective of the implementation status of the other modules that belong to that layer or target object e lf at least one module carries the identifier Wye as a result of inheritance from the associated safeguards because it has been adopted as a result of referencing or because no has been entered in the EDITED field and there is no module in the layer with the identifier jo colour i e untreated then the layer or target object to which the module belongs will also bear the identifier Wrea i e indicating implementation no irrespective of the implementation status of the other modules that belong to that layer or target object e lf at least one module carries the identifier yeiow i e partially implemented as a result of inheritance from the associated safeguards or because it has been adopted as a result of referencing and there is no module in the layer or target object that carries the identifier no colour OF Wreg then the layer or target object to which the module belongs 243 GSTOOL 3 1 User Manual The in
160. e altered by the user GSTOOL uses these rules to generate suggestions at points where information could be passed on However the user can always change such suggestions 12 1 Inheritance of the protection requirement The protection requirement of IT equipment is basically determined by the information handled in an application Accordingly applications protection requirements are passed on to target objects higher up in the hierarchy GSTOOL 3 1 implements this inheritance mechanism in the form of suggestions Only the express assessment of protection requirements 152 contained in the fields for CONFIDENTIALITY INTEGRITY and AVAILABILITY is ever passed on and offered in the next higher target object as a suggestion Suggestions are not passed on gt gt Here suggestions follow the Maximum Principle153 If more than one application is linked to the same IT system then the entry that appears in the SUGGESTION field will always be the highest protection requirement for the relevant basic parameter out of all the linked applications 152 See Tab card Specific task on page 81 in section 3 2 Creating a new target object 153 See also the information on page 252 section 13 3 2 Assessment of protection requirements 240 GSTOOL 3 1 User Manual The inheritance mechanism 12 2 Inheritance of implementation status Inheritance of safeguard implementation status is based on the entries that are made in the editi
161. e can be configured within the browser options 6 9 User defined templates IS To create a user defined report template it is essential that you have adequate knowledge of XML Therefore in this manual the description of how to create user defined report templates is confined to the GSTOOL 3 1 aspects 153 GSTOOL 3 1 User Manual 6 9 1 Template structure The templates required to create a report have a multi level structure Basic report sheets The eleven basic templates xs files and the stylesheet file GS31 css are contained in the GSTOOL 3 1 installation directory sub directory GSTOOL3 Reports i If any of these files are deleted GSTOOL 3 1 will automatically try to recreate them To do this it needs the original installation CD It is not possible in GSTOOL 3 1 to change any of the default templates or to create additional ones To do this a suitable editor must be used Report templates GSTOOL 3 1 includes 46 predefined report templates These contain information on which default template and which database content should be used to create a report as an htm file This information cannot be changed for predefined report templates 6 9 2 Overview of report templates All the existing report templates are accessed via menu selection sequence lt Tools gt lt Options gt Reports 154 Reports view GS31 css keJ G531_AUDIT_DE xsl 2916531 _BASIS xsl ke 6531 _CSV_
162. e different for each of the two types Deleting an adapted threat Adapted threats can be restored to their original state type BSl standard by clicking OK at the prompt which appears during the deletion operation All the data collected during the Basic Security Check page 140ff is retained Deleting a user defined threat An entire user defined threat is deleted from the database currently edited by clicking OK at the prompt which appears during the deletion operation The data gathered for this threat during the Basic Security Check page 140ff is lost 7 6 Tab card Protection requirement categories Target object types Target object subtypes Modules Safeguards Threats Protection reguirement categories basic to moderate high very high Entries 3 Open On the Protection requirement categories tab card the protection requirement definitions for the three categories contained in the EXPLANATION field can be viewed and modified These explanations apply to the entire security concept First select a protection requirement category and then either right click and then choose lt View gt from the pop up menu or click E3 View in the toolbar 195 GSTOOL 3 1 User Manual BPM user defined view A browser window containing the explanatory text 2 will now open For a selected protection requirement category double click the relevant category or right click and then choose
163. e evaluation of costs e report generation e audits e the IT Baseline Protection Certificate Support functions e the administration of multiple security concepts in a single tool ability to handle multiple customers networking capability GSTOOL 3 1 User Manual Introduction two languages offered German English e encryption of user specific data for exports e tracking of changes e simple updating of the database by e mail or over the internet e import function for databases created using versions 2 0 1998 2000 e etc New functions in GSTOOL 3 1 Following the successful market launch of GSTOOL 3 0 in January 2003 GSTOOL 3 1 is the latest release of the product A number of small improvements have been implemented on the following new or enhanced functions e Drag amp Drop in Modeling see section 5 3 page 132ff e Direct linking of new target objects is preselectable see section Link target objects after creation page 46ff e Threats can be adapted and user defined see section 7 5 4 and 7 5 5 page 191ff e The report facilities have been completely revised see section 6 page 150ff e The export and import functions have been completely revised and simplified see section 9 page 198ff e The number of multiple choice selections in lists has been expanded e The filter functions have been extensively enhanced e An import function has been introduced for databases created with Version 3 0
164. e full functionality of the tool will be available once more All the information previously stored will be retained 15 The 30 day test period commences first time that GSTOOL 3 1 is started up rather than at the time of installation 18 GSTOOL 3 1 User Manual Installation first time use deinstallation 1 4 Deinstallation You can have the software automatically removed from within Control Panel IS When GSTOOL 3 1 is uninstalled all the databases are automatically detached from the tool If you want to load a tool free disk image on the PC partition on which GSTOOL 3 1 is installed you should previously detach all databases from GSTOOL 3 1 and move them to a different partition If the databases are not detached problems could occur downstream when attempts are made to use these databases Deinstallation under Windows ME NT 1 Open the KZJ EUGI window by selecting Start lt Settings gt lt Control Panel gt 2 Double click the Add Remove Programs option 3 In the QANefeI aya eT Lec ee skis Window which now opens select the Install Uninstall tab card 4 In the list of installed programs select GSTOOL 3 1 then click Add Remove 5 Follow the instructions on the screen then click Yes to start the deinstallation 6 Once the software has been uninstalled you will need to reboot your system for all the changes to take effect Deinstallation under Windo
165. e general permission settings of a user in relation to the database e USER NAME When a new user is created it must be assigned a name This is the user name and not necessarily the same as the person s natural name The name assigned here cannot be changed afterwards If this should be necessary you will have to first delete the user and then recreate it under another name e REGISTRATION This field is used to choose between integrated security and database security If Integrated security is chosen access to the database will then be effected under the access mechanisms with which the user logged on 232 GSTOOL 3 1 User Manual Administration of rights IS If possible Integrated security should be chosen as the login type A user who has successfully logged on to a Windows domain will then be authorised to start GSTOOL and use it within the framework of the role assigned to him In Windows networks GSTOOL or the integrated SQL server checks users permissions in the Windows domain and then decides on the basis of this whether they should be granted access to the database or not and if so how If Database security is used access to the database is independent of any possible existing normal user login to the PC or in a Windows network e ACCOUNT If Integrated security has been chosen in the LOGIN field then the ACCOUNT field is a mandatory field Here it is necessary to ent
166. e safeguard has been untreated then irrespective of the implementation status of all the other safeguards in the module the module will bear the identifier no colour indicating implementation untreated e If the implementation of at least one safeguard is stated as no and there are no unprocessed safeguards in the module then irrespective of the implementation status of all the other safeguards in the module the module will bear the identifier Wied i e indicating implementation no e If the implementation of at least one safeguard is stated as partially and there are no unprocessed safeguards or safeguards which have not been implemented in the module then irrespective of the implementation status of all the other safeguards in the module the module will bear the identifier yellow l e indicating implementation partially e Only if the implementation of all the safeguards in the module is stated as yes or dispensable will the module bear the identifier Y green i e indicating implementation yes This is presented in tabular form as follows on Implementation status of the Implementation of safeguards module to W green Wolue yellow Wrea is colour W green Whbue U yellow Wrea a colour ee ee S O lt P N a A lt lt a Q Be Hef S lt 2 Cc oO oO X A X A _lis passed
167. ea and click Activate IS In the work area of a standard import it is not possible to adapt modules safeguards or threats to create user defined modules safeguards or threats or to edit or delete them 208 GSTOOL 3 1 User Manual Export Import view 9 4 4 Standard import without IT asset set In the Modeling and Reports views only target objects that are directly linked to an IT asset set are shown If a standard import does not contain any IT asset sets the trees for the two views will necessarily be empty Only the uppermost node will be displayed In order notwithstanding to be able to edit the import and generate reports on it you should proceed as follows e A dummy asset set is created133 e All the target objects in the import are directly linked to the dummy asset set134 Object model BSI Eia Lal Dummy IT asset set H generic aspects of IT security D E Office lee M 4 03 01 Office EQ North Fell aM 4 01 Buildings FF gly M 4 02 Cabling EQ South lg aM 4 01 Buildings Fg M 4 02 Cabling You can now edit the data contained in the import in the work area in the Modeling view and also create Reports To prevent the dummy asset set being passed to the source database during the re export or re import operation either it should be deleted when the person editing it has finished or else it should be excluded by the re export operation135 9 5 Re export
168. eaeecaeeeeeeeeeeeeseeeseeeees 117 5 2 2 Adding a safeguard siias veleccasode tinny stave Mine ceceeevanes dace niaceeeeadayeascusuedecteaeeetueceennsaee cess 121 5 2 9 D leting a sateguard herr ha canitsatmtaneek tree a a aaae lene 123 924 Addig AsIMOGUI Sc a a aa ea a aa aa teed Ea E aA GA EAE E ait 124 5 2 5 Editing a Modules e iienaa neiere eresse dorain ek iau CEARN KUN huey oedee eden seiak seot 127 5 2 0 D leting a mod le siecaseneserncartecadaureeatshenecearenctuch ev eebmerweeetultaed tnaenddensetan yee tase 131 5 3 Modeling by drag and drop cccccccceceeeeeeeeeneeeeeeeeeeeeeeeneeeeeeeeeeeeeeeseeeeeeeeeeenennnes 132 5 3 1 Dragging safeguard to safeguard cee ee eneneeeeeeeeeeeeeeeaaeeeeeeeeeeeeeeeneeeeeeeeeees 133 5 3 2 Dragging safeguard to module x 2icen sade se cecttentadasuctcunenel fe Gate tate wacanep aetteatldatmaty ites 133 5 3 3 Dragging module to Modules civccc sasccceedes declan tentniactden cate Andee cdiniecdesaecle acl atedes 133 5 3 4 Dragging module to target object cccccceeeceececceeeeeeeseeeseeeceeeeeeeeeeeeeeeteeeeeeeenee 134 5 4 FRETQT OTIC IGS cei Fics A ce ese A E taser ea cuk tuna cuban oaantaniinire 135 GSTOOL 3 1 User Manual Table of contents 5 4 1 Preconditions and possibilities cece cece cece cece cece cece eeeeeeeeeeeeeeeeeeeeeeeneeeneeeeeeees 135 5 4 2 Creating a reference ies isces code decade haaed ce pe eecepeedae saves tieeeveaane NaN ENEE idiin aknee ietaise 136
169. ect type Click OK and the DIEMER window will open with the default values for the target object type you have just chosen lt mport data gt This option opens the window and passes over all the information relating to the target object currently selected in the list A clone is created 54 For further information on how to create additional target object types see section 2 3 4 lt Tools gt lt Target object types gt page 37 77 GSTOOL 3 1 User Manual Master data view whs This procedure will be helpful when a series of target SS CA E objects of the same type which differ from each other 4 s s only in minor respects are to be entered lt Blank target object gt Also opens the MAAE GRISIAL kel ede rad os window however only the target object type which matches the current selection in the list is set whe This procedure is recommended when a series of We target objects of the same type but which are very s different from each other in other respects are to be entered lt Current type gt This option is only offered when the list is limited to one particular type as a result of the use of a filter The results are then the same as for menu option lt Blank target object gt lt Select type gt Has the same effect as a New in the toolbar see above 3 2 Creating a new target object Every newly created target object is linked to an IT asset set in accordance with a hier
170. ected an existing file in the BACKUP FILE field you will asked to confirm whether the existing file should be overwritten If you do not have BACK UP DATABASE right for the selected database an appropriate error message will be displayed e The progress of the backup is displayed in the PROGRESS field The bottom line of the window informs you when the backup has been completed successfully 64 GSTOOL 3 1 User Manual General information on working with GSTOOL 3 1 Restoring data Before a database can be restored the following conditions must be satisfied e Databases have to be restored by the Tool Administrator sa e The backup file must be located on a local drive e A database can only be restored to a database currently attached to the tool target database The contents of the target database will be entirely overwritten by the contents of the backup file If you want or need to avoid this loss of data you will have to restore the data to an empty database 41 IS While a backup is being restored no other user may access the target database To ensure that no other users attempt to access the target database you should block all the user accounts42 or else restore the backup to a database for which no users have yet been created 41 Section 1 5 2 Databases Creating an additional database page 23ff explains how to obtain an empty database 42 See section 11 2 Users Tab card Comm
171. ed to the network until the sa password has been changed When you insert the original installation CD setup will automatically execute If the autostart function for the CD drive has been disabled setup can also be initiated manually by double clicking file setup exe 10 GSTOOL 3 1 User Manual Installation first time use deinstallation IS With some system configurations especially on NT systems it may be necessary to update the MDAC Microsoft Data Access Components before going any further If this is necessary on your system the installation program will tell you so and will update the appropriate components Once these components have been updated the computer will need to be rebooted The installation will then resume e You can choose between German and English versions of the tool Choose Setup Language x 193 Select the language for this installation from the choices below English United States The language chosen here is automatically passed to the language selection dialogue section 2 3 5 lt Tools gt lt Options gt Common Languages page 43ff This language will also be used for all further installation and deinstallation screens and also to determine the choice between liesmich txt and readme txt The language settings can also be changed after installation by selecting menu option sequence lt Tools gt lt Options gt Common geandert werden
172. eeeeeeeeeeeeeeenteeeeeeeee 48 documents storing long in the tool a e 36 dr g and drop einni EEEE 95 dummy IT asset set 2 211 dummy target object cceceeeeeeeeeeteeeeeeeees 39 E encryption ecececceceeeeeceeeeneeceeeeeeeeseeeenaneeeeeees 61 errors during import from text file 205 exchange rate mocno iaaiiai aana 52 55 GSTOOL 3 1 User Manual explanations ake mien 33 exports determining scope of 202 207 212 of target ODjECtS a racco a 201 ONE WAY EXPOFE a eee eter eeeeeerteaeeeeees 215 fO OXDOM ata eina eiii annals 211 Standard CXxport cccceceeeeeceeeeeeeeeeeees 206 TONE Tiles et a ee aes 201 F fathers assigning a to a target object 39 fields Changed New prior e ce ceeeeeceeeeeteeeeeeeees 67 Database E E T EENE 26 mandatory ccceeeeeeeeeeeeeeteeeeeeeeeeees 33 279 new prior changed 67 Optional Sirainens aa 33 278 prior new changed iecerei 67 Server NAME e e aae EEE eaei 25 server statUS Mieri inen nioa enoa 27 text length im anai aneii iae 36 filters BASIC Hs Paeete aa ieaie 219 defining eriein eiat 218 deleting iesen e a 218 SANG a A a A A 218 extended na aa ea aara 219 G grouping of items esseecesrrssrneere 79 254 groups Of USETS in t e a aaeain 242 GSTOOL 2 0 database account for c eseeeeeeeeeeeees 53 database password for ceeeeeeeeeee 53 importing data from sesers 53 ODBC
173. ees 153 user defined templates cee 154 rights column not displayed cecceeeeeeees 274 GSTOOL 3 1 User Manual deleting taat Need 224 225 toggling column on and Off ee 49 roles as per IT BPM assignment to safeguards 0 185 189 roles in GSTOOL Creating saoi peiiini ai ii ees 224 deleting anere hee dele Aa 225 COILING vier Steric eG rie 224 Import3 O role 2 0 0 2 eee ee ceeseeceeeeeeeeeeeseeeeeeeees 224 NIMS TOES si 2F niente 223 role Syste nso aiei arain 224 updating senate AA TRAR 225 serros a i ate eet cla 238 VIG WING aree aa iad aaar debe dh aiee a 224 S safeguard numbers automatic generation 0 184 188 display Of 2c e ccocecinceeed ded eelneeetnleevieeenes 48 show outdated from GSTOOL 2 0 49 safeguards adding cicada tel 121 assignment to modules 187 189 196 cannot be edited cceceeeeeeeceeeeeeeteees 275 deleting ccccceceeeeeeeeeetceeeeeeeeeeeeees 124 189 non personnel Costs ccceceeeeeeeeeeees 145 personnel costs ccccceeseeeeceeeeeeeeeeeneees 145 save without QUETY ceeeceeeeeeeeeeeeeeteeeeteeaeees 45 scripts ading ara aa A EAT 73 server SEISCHING i neniani ieai 25 LAr eE C A TET A A ET 27 shortcuts labels not displayed eee 274 sorting INTHE troein a ee 113 of target object types 0 0 eeeeeeeeteeeeenees 92
174. eguards In the mandatory field COMMENTS enter the reasons why you have chosen no IS You can only choose dispensible or no if the IN TARGET OBJECT field contains the entry not referenced IN TARGET OBJECT If you choose one of the target objects offered in this field instead of not referenced a reference will be established with the module you have just edited becoming the reference target IS If you create a reference from one module to another all the entries already made for the referenced module and its safeguards will be overwritten by the data from the module that belongs to the target object selected in the IN TRGET OBJECT field and its safeguards without the user being asked to confirm this action Should you subsequently delete any referencing you can choose whether you wish to retain the implementation status that existed prior to the referencing or the implementation status created through the referencing A detailed explanation of Referencing can be found in section 5 4 page 135ff COMMENTS This field will either be optional or mandatory depending on your entry in the PROCESSED field Any entries made while this field is mandatory will be retained should it subsequently 87 For further information on the colour coding of modules that have not been implemented see 12 2 Inheritance of implementation status page 241ff 128 GSTOOL 3 1 User Manual Modeling view
175. eld will be overwritten by the file loaded and will be lost unless it has already been saved E The content of the text field is saved to a user defined file txt or rtf This function is only available in Notepad 2 An additional Notepad window is opened Tab card Supplement At many places in the tool facilities are provided in tab card Supplement for adding any number of pairs of names or values to a target object in a list on a user defined basis These supplementary attributes can be used to expand the description of a given target object to suit your requirements If you want to define individual supplementary attributes that apply to all target objects of a particular type this can be done via 2 3 4 lt Tools gt lt Target object types gt Creating common supplementary attributes page 42ff These supplementary attributes are not linked in any way within the tool However in Reportscreating and Modeling it is also possible to filter by name and value of the supplementary attributes e New This opens the RINJ etateiclaalieeics window in which a new pair of values can be entered for the target object you are currently editing EL Supplementary attribute 0 x Name airconditioning Value yes 35 GSTOOL 3 1 User Manual General information on working with GSTOOL 3 1 IS A supplementary attribute created with New is only added to the list if entries are made in b
176. elete link Link dependent Link modules Link safeguards e click a New in the toolbar only in the object model or press key combination Ctrl N 79 See section 7 3 4 Adapt a module Tab card Safeguards page 172ff 80 Inthe ws generic aspects of IT security layer this is only possible when the entire layer is on view see page 120 121 GSTOOL 3 1 User Manual Modeling view e Alternatively select menu option sequence lt Edit gt lt Modeling gt lt Link safeguards gt e or right click with the mouse and then choose lt Link safequards gt All of these actions have the effect of opening the window idx ay fq Obsolete 1 1 A yp with relevant DIN standards YDE specifications 1 2 Regulations governing access to distributors 13 Adapted segmentation of circuits 1 4 Lightning protection devices S15 Galvanic separation of external lines fire sealing of trays 1 11 Plans detailing the location of supply lines 1 12 Avoidance of references to the location of building parts requir 1 13 Layout of building parts requiring protection 1 14 Automatic drainage gt All None Revert OK Cancel A The list contains all the safeguards which have not yet been linked to the module currently being edited Hence in the above list for example safeguards S 1 6 S 1 7 S 1 8 S 1 10 and so on are not included loo00000000 FILTER A full description of the filter f
177. er Domain name User name 146 If Database security has been chosen in the LOGIN field then the ACCOUNT field will be inactive By analogy to the USER NAME field the ACCOUNT field is also blocked during editing e PASSWORD If Integrated security was chosen in the REGISTRATION field then the PASSWORD and REPITATION fields will be deactivated If Database security was chosen in the REGISTRATION field during the creation of a new user then the PASSWORD field will be a mandatory field into which the user password must be entered 146 In the case of integrated security the name of the user is the name with which the user logged on to the Windows domain The domain and user names can be found by selecting menu option sequence Start button lt Settings gt lt Contro Panel gt lt System gt User Profiles NAME column 233 GSTOOL 3 1 User Manual Administration of rights IS This password is not subject to any GSTOOL imposed restrictions but it should satisfy the rules presented in safeguard S 2 11 Provisions governing the use of passwords in the IT BPM e REPITATION Here the password entered has to be repeated e Change password Where data relating to an existing user is to be changed this field allows the password to be amended e ACCOUNT ACTIVATED If the account created is also to be used it must be activated here If a user who has been created but whose account ha
178. es out the one way import IS It is not possible to perform a one way import directly into the source database on a file created through a one way export Any attempt to do this will be refused with an appropriate error message 9 8 1 Data modification during a one way import As the one way import is integrated into the work area that is currently active in some cases automatic changes are made to 213 Export Import view GSTOOL 3 1 User Manual Export Import view the imported data so as to protect the data integrity in this area and avoid integrity conflicts The following rules are applied 198 e An adapted object in the import file is integrated into the target database as a user defined object e f any object with the same name exists in the target database to avoid duplication of names the name of the imported object is extended by a tilda and a serial number 39 9 9 Deleting an export All the exports created to date are listed on the Export tab card of the window with their name explanation date of creation and type of export This list serves to provide information on the exports that have been carried out and the organisation of editing blocks on objects imposed internally within GSTOOL No exports in the list can be repeated Both standard and one way exports block further editing of the exported target objects in the source database In individual cases it could be necessary to carry o
179. escription can be edited 192 BPM user defined view GSTOOL 3 1 User Manual BPM user defined view Tab card Modules Common Modules Notepad o aM 4 01 Buildings o M 4 03 02 Server Room o M 4 03 03 Data Media Arc oO M 4 03 04 Technical Infra o M 4 04 Schutzschrank o M 4 04 Schutzschr nk o M 4 04 Protective cabi o M 4 05 Working place o M 4 06 Computer Centres x m om me cn mme Reverse This tab card lists all the modules to which this threat belongs If no changes in the links to modules have yet been made for this threat126 then the links will be those specified in the IT BPM Otherwise the list will contain the results of earlier adaptation work For further information on the consequences of clicking the Reverse Delete and New buttons see Deleting safeguards from the module page 174ff Tab card Notepad See Notepad on page 34 7 5 5 Define a new threat If the changes that need to be made to a threat are too major for simple adaptation you can create additional threats that meet your particular requirements yourself To do this right click and then choose lt New gt from the pop up menu or click amp New in the toolbar or click the New button and the window will open This has the same three tab cards that were described above in connection with the adaptation of a threat 126 See sections 7 3 4 Adapt a module page 169ff and 7 3 5 Defi
180. et To enable the user to create a new filter quickly the most important properties of the objects within the present view or window are offered here Further information on these filter options and the effect that they have is provided elsewhere in the relevant context 10 2 Tab card Extended filters Basic titer Extended fiter m Search tield S orting Either Or Or asset set name 7 l l x l asset set distribution list a And And asset se And And asset set name selection object under investigation z l l z t planning And And 217 GSTOOL 3 1 User Manual Filter e The SEARCH FIELD SORTING field contains all the fields available in the database for you to select from for the purposes of filtering e Under EITHER and OR logical functions are available for combining individual filters In the next field content which goes with the entry in SEARCH FIELD SORTING is offered in each case This has to be entered in accordance with the logical function of the filtering Logical combination of filter criteria Basic filter Extended filter r Search field Sorting Either Or Or Saw And And And Ts And And And setequadmateide If SIP EP 500 Z And And And satequardcatdog H Ao Jo Z rras SIT A R And And And a e SSE S SSE Sa es zi An extended filter works within a block of items as if linked by an AND and between blocks as if
181. et object will appear in two places in the tree e Firstly it is inserted in the lower part of the tree in the relevant target object type list e Secondly every new target object is automatically linked to the IT asset set 44 BSI according to its type In actual fact each target object exists only once but due to the automatic link with IT asset set Sa BSI it immediately appears a second time If a target object is also linked to other IT asset sets then it appears the appropriate number of times in the tree A target object also remains in the lower part of the tree after all its links have been deleted so that it no longer appears in any asset set any more Displaying higher target objects Normally all the linked target objects are presented in the tree according to their position in the hierarchy You can also tell when one target object has been assigned to another one from the fact that one follows the open branch upwards from any point at which the target object occurs in the tree Since this approach becomes more and more complicated as the 65 The reasons why this is so are explained in section 4 1 2 Filter Link rules page 95ff 66 See section 2 3 5 lt Tools gt lt Options gt Common page 46ff 87 See section 3 2 Creating a new target object page 78 90 GSTOOL 3 1 User Manual complexity of an asset set grows GSTOOL 3 1 provides facilities enabling you to directly view t
182. et addresses are presented in italics and in a different font Example Gstool3 1 program files BSI GSTOOL3 0 6 Problem reports Despite extensive testing the possibility that individual functions are not available in the form intended cannot be excluded 9 Path details and file names are based on the standard installation of GSTOOL 3 1 8 GSTOOL 3 1 User Manual Introduction Before you report such problems to the BSI as bugs please follow the instructions contained in the Appendix section 14 4 page 267ff If this does not solve the problem Word and PDF versions of a problem report form are provided on the CD under Gstool3 1 Extras Fehlermeldung Please enter a description of the fault in as much detail as possible on the form and send it by e mail to gstool test bsi bund de 0 7 E mail newsletter on GSTOOL 3 1 The BSI offers you an information service for GSTOOL You can obtain occasional or ad hoc e mail newsletters on new features updates etc relating to GSTOOL 3 1 If you would like to receive regular e mail information on GSTOOL 3 1 please send an e mail with subscribe in the Subject line to this e mail address gstool bsi bund de You can unsubscribe from the mailing list at any time To do this send an e mail with unsubscribe in the Subject line to gstool bsi bund de i Handling of these e mails is automated Any message text contained in the e mail will be ignored GSTOOL 3 1
183. et object of the subtype to be deleted does exist its deletion will be refused with an appropriate message If you still want to delete the selected subtype you will have to assign a different subtype to the target objects that have this subtype or else delete them In this way you can delete all the target object subtypes of a given target object type Once you have deleted the target object type no new target objects of that type can be created as the specification of subtype is always a mandatory field and only existing subtypes can be selected in that field Creating common supplementary attributes From the Supplement tab card it is possible to assign a common set of supplementary attributes to all the target objects of the type that you are currently editing IS User defined supplementary attributes for individual target objects page 35 are not displayed here This tab card shows all the supplementary attributes defined as applying generically to the target object type selected in the tree 42 GSTOOL 3 1 User Manual General information on working with GSTOOL 3 1 New Opens the KINJ JALGU EWELE Window in which the name of the supplementary attribute is specified l Supplementary attribute xj Name date of procurement Coel _ Open Opens a window for the supplementary attribute selected in the list so that you can edit its name Delete Deletes the supplementary attribute sele
184. et object subtyp client pe under Windows 2000 laptop under Windows 2000 If the list is empty for a given module this means that that module is not automatically used in gt Modeling Tab card Safeguards Common Target object type Target object subtype Safeguards Threats Notepad Catalog All z oO S 1 33 Safe keeping of laptop PCs durin Infrastructure 1 oO S 1 34 Safe keeping of laptop PCs durin Infrastructure 2 o S 1 35 Pooled storage of a number of lap Infrastructure 3 oO 23 Data media control Organisation 2 oO 24 Maintenance repair regulations Organisation 2 oO 29 Ban on using non approved softw Organisation 2 oO 5 2 10 Survey of the software held Organisation 3 o 213 Correct disposal of resources req Organisation 2 oO S 2 22 Escrow of passwords Organisation 3 x Reverse Delete New This tab card contains all the safeguards that belong to the module If the module shown on this tab card has not yet been adapted then the safeguards it contains will be the ones which belong to the module according to the IT BPM Otherwise the list will contain the results of earlier adaptation work If necessary e g with relatively long lists you can restrict the list to the safeguards in a single catalogue via the CATALOGUE selection field 172 BPM user defined view GSTOOL 3 1 User Manual BPM user defined view Adding new safeguards to the module Click New
185. ets chains of references are not allowed e target objects that are not linked to a module of the same type as the reference target module IS A target object cannot reference itself In the tree referencing is indicated by a change in the reference AA a eal targe s icon to S M 4 01 Buildings reference arrow The F a T security BSI original identifiers regarding the implementation status of i Wien safeguards in the module and the qualification level attained a 2o an Pa nocolour are replaced by those of the reference source i e a R A pa ime The fact that the identifier of target object Building 1 has changed to Wreqafv is due to the inheritance rules see section 12 page 240ff As a result of the referencing all the information from the reference source including any changes in the assignment of safeguards that have been carried out in Modeling is passed across to the reference target in APY Hence the safeguards in the reference target carry the same implementation status identifiers as their reference source 137 GSTOOL 3 1 User Manual Modeling view Mhz Through referencing it is possible to copy the entire content of one module to the same module in another target object with little effort TO E 7 The creation of a reference the storage and direct deletion of referencing all have the result that the content of the reference source is transferred to the
186. eturn to the original source database e Re import This option re imports back into the source database data that was originally made available for further processing in another database using a standard export During this process newly created and amended data is written to the database 198 GSTOOL 3 1 User Manual Export Import view IS The four export and import operations just mentioned together constitute a closed workflow It is not possible to re import data immediately after a standard export Before this can be done the data must be imported into another database via the standard import and then re exported via the re export procedure e One way export This option enables data to be made available for other databases on a one off basis The one way export covers target objects and IT asset sets together with the modules and safeguards that have been assigned to them e One way import This option loads the data that has been provided through a one way export into the target database As they are not a functional part of Export import the following imports are explained elsewhere in the manual e Old data import See 2 4 1 lt File gt lt Data migration from GSTOOL 2 0 gt page 52ff e Metadata import See 2 4 3 lt File gt lt Import gt lt Update BPM metadata gt page 58ff 9 1 Text file export of target object IS It is not possible to export modules and safeguar
187. everal tab cards now opens The entries on the Notepad tab card can be altered e Opening a module of type user defined adapted Double click the relevant safeguard or right click and then choose lt Open gt from the pop up menu or click the Open button or click amp Open in the toolbar The window in which data relating to module can be altered in a fashion similar to that described in section 7 3 4 Adapt a module now opens 7 3 4 Adapt a module It is in the nature of things that the description and composition of the safeguards in a given module cannot be an exact match for all IT asset sets that exist in the real world It may therefore be sensible or even necessary to modify the description or composition of a module in line with actual circumstances on the ground You should take care here that such modifications do not basically alter the module and hence affect security but 169 GSTOOL 3 1 User Manual BPM user defined view they only modify the module If a module is so unsuitable that it could only be adopted with substantial changes then this should be implemented in GSTOOL 3 1 by creating a user defined module IS A module that is adapted in BPM user defined will replace the original module at every point in GSTOOL 3 1 and the associated module number will consistently be preceded by the identifier a On the other hand changes made to a module in the course of Modeling only a
188. ews When this option is selected the fields in all the tables of the editing window are shown clearly by means of row and column lines The default option is that these lines are not shown 49 GSTOOL 3 1 User Manual General information on working with GSTOOL 3 1 IS This change will only take effect when the tool is next started Display BSI logo on workspace In the displays that go with Master data Structure of target objects and Modeling the BSI logo appears at the bottom right in workspace 3 The default option is that the logo is shown IE This change will only take effect when the tool is next started 2 3 10 lt Tools gt lt Options gt Password To ensure that no other applications can access the GSTOOL 3 1 databases communications between GSTOOL 3 1 and the relevant databases are protected by a password the application password Users who have been assigned system rights can change the application password e PRIOR PASSWORD Enter the old password here The BSI can notify you of the password with which the application was delivered e NEW PASSWORD REPEAT The new password has to be entered twice You can choose any password you like as long as it is different from the old one Once all the fields have been completed click Apply to activate the new password 2 3 11 lt Tools gt lt Options gt Path settings This function contains information on where cer
189. exists in the source database If this has been deleted the only way to get the objects back is via a one way export one way import This will mean that the exported objects remain unchanged in the source database The objects returned via the one way export one way import will be created as additional objects 136 The same restrictions regarding repeating an export that apply to the standard export also apply to a re export 211 GSTOOL 3 1 User Manual Export Import view 9 6 1 Tab card Common Common Progress Import file E GSTOOL 3 1 exports Retum mdb z Import type Name IMPORT FILE Use the Browse button to specify the file that is to be imported IMPORT TYPE The type is automatically determined from the import file chosen NAME The import is automatically given the same name as the underlying export and cannot be changed 9 6 2 Carrying out the import To start the import operation click Run The window automatically switches to the Progress tab card on which the progress of the import is shown in list form and also as a progress bar An appropriate message is displayed once the import has successfully completed Now close the window by clicking Cancel The import is added to the list shown on the Import tab card is A re import is fully integrated back into the standard work area of the source database It is separately listed in the list of imports but it
190. explained for Master data and Structure of target objects 110 GSTOOL 3 1 User Manual Modeling view 5 1 1 Links between target objects and IT asset sets In Modeling you can modify existing links between IT asset sets and target objects Maintenance of links IS This action is only possible from the IT asset set Select the IT asset set you wish to modify and then e Click as New in the toolbar and make the appropriate selection in the KAK IEAEL ARIIRAA Window or press key combination Ctrl N and then make your selection in the KAKRA Sele cla maeles Window e or select menu option sequence lt Edit gt lt Modeling gt lt Maintain links gt lt Target object type gt or right click and then choose lt Maintain links gt lt Target object type gt All of these methods will take you to the editing window ETE eM emcee The options offered here are explained in section 4 2 Linking of target objects page 98ff Deleting a link i This action is only possible from the target object Select the relevant target object and then click Delete in the toolbar or press key combination Ctrl D e or select menu option sequence lt Edit gt lt Modeling gt lt Delete link gt or right click and then choose the lt Delete link gt option You will now be prompted to confirm that you wish to delete the selected link If you click OK the link will be deleted and the selected
191. f binders for 148 The ISBN number is 3 88784 915 9 The BSI CD ROM contains both German and English language versions of the IT Baseline Protection Manual This CD ROM can be obtained from the BSI by sending in a reply paid envelope http www bsi bund de produkte cdrom The complete IT Baseline Protection Manual in both German and English is available on the BSI s website at http www bsi bund de gshb Further information on IT Baseline Protection and the IT Basement Protection Certificate is also provided there 259 GSTOOL 3 1 User Manual Appendix 14 14 1 Appendix Keyboard commands In addition to the menu bar toolbar Navigator and buttons contained on the various GSTOOL 3 1 screens many functions can also be controlled directly via the keyboard e Some keyboard commands can only be used when they are relevant to the screen on which the user is currently working e Some keyboard commands serve a different function depending on the screen on which the user is currently working e Itis not possible to define new keyboard commands F1 F2 F5 Del Invokes the online help Invokes a display of the history of the previous content of the field on which the cursor is currently positioned provided that a history has been maintained of this field To view the history of field content it is necessary to have the appropriate right Updates the display 7 Has the same effect as f
192. f changes can be found on page 68 Name of organisation a aD of IT assets building a room 2 IT system gS network y application H A employee Here you can amend the name of the agency company or customer The default setting is BSI Ag set of IT assets building H A room b IT system Hg network Ad application A employee This name appears in the tree display headings and in the report headers Protocoll This function is used to help the developers of GSTOOL to isolate any errors relating to program crashes or other software bugs The logging function should not be activated by the user without an express requirement on the part of Technical Support 2 3 9 lt Tools gt lt Options gt Display Colour settings To help the users to find their way around the tree individual processing states or selection areas are colour coded As the overall layout of the tool interface is taken from the existing Windows settings it may be necessary in the interests of improving legibility to change the colour codes used in the tool This can be done in the first five selection boxes IS If you change the colour settings under Windows while GSTOOL is running occasionally this can cause unwanted colour effects However normally these will disappear when you restart GSTOOL 3 1 DISPLAY SAFEGUARD AND MODULE NUMBERS This checkbox enables the display of module and safeguard num
193. f target objects you can copy target objects i This copying is only possible between objects of the same type i e only between target objects of the same type To copy a highlighted object target object module safeguard or threat to the application clipboard select lt Edit gt lt Copy object gt or press Ctrl K IEJ Only the characteristics of the highlighted object itself are copied This means that in the case of a module only the content of the screen is copied The safeguards that belong to a given module are not copied Similarly links to target objects are not copied either I amp S During the copying process only a reference to the object and not the object itself is copied to the application clipboard When the contents of the clipboard are pasted the object is inserted in the version current at the time of being pasted If the object has changed between being added to the application clipboard and being pasted this means that the version inserted will be the changed one IS The target object subtype cannot be copied Menu selection lt Edit gt lt Insert object gt or key combination Ctrl E will write the contents of the application clipboard to another highlighted object of the same kind Menu selection lt Edit gt lt nsert object gt and key combination Ctrl E have the effect of overwriting the previous content of the highlighted object which cannot be restored thereafter
194. f the data import will be indicated on the Progress tab card To confirm the success message click OK click Cancel to close the window Your data import is now complete The BS DB_V305_Data mdb database will not be changed by the data import process It now can now be detached from GSTOOL 3 1 and if appropriate backed up to CD for archiving purposes Importing users and roles The following restrictions apply to the import of users and roles from BSIDB_V305_Data mdb to GSTOOL 3 1 e All defined roles will be imported e If the import is carried out on the same system on which the users were originally created then all the users will now be imported too e Where the import is carried out on another system users with database security will be imported in full Users with integrated security will be transformed to users with database security 57 GSTOOL 3 1 User Manual General information on working with GSTOOL 3 1 To avoid loss of data it is imperative that you ensure that neither the database to be imported nor the target database is in use by another user during the data import operation 2 4 3 lt File gt lt Import gt lt Update BPM metadata gt In order to be able to continue to modify GSTOOL in line with developments in the IT BPM this menu option allows you to update the metadata As soon as any revised metadata is available this will be made available on the BSI s website f
195. f the standard security safeguards that have been identified as necessary during Modeling have already been implemented and where shortcomings still exist This entails carrying out interviews and random checks This stage is known as the Basic Security Check and is described in section 2 4 of the IT Baseline Protection Manual Before one can start some preliminary work is necessary for example it is necessary to set up a suitable project team inspect any existing documentation and decide on suitable people to interview and contact persons for each individual module Since normally several organisational units will be involved an interview schedule must be agreed During the actual data collection process the implementation status is ascertained for every safeguard within the module under consideration There are four possibilities Dispensable Itis not necessary to implement the safeguard in the manner suggested Yes All the recommendations in the safeguard have been implemented effectively and in their entirety Partially Some of the recommendations have been implemented while others have not yet been implemented or only partially implemented No Most of the recommendations contained in the safeguard have not yet been implemented 254 GSTOOL 3 1 User Manual The IT Baseline Protection methodology During the interviews in each case it is necessary to systematically work through all the safegu
196. fer to an existing reference source e The security safeguards to be implemented have been proven in the field and therefore offer good protection against the relevant threats in typical operational scenarios The concept of IT Baseline Protection is aimed at establishing a level of security for IT solutions which is reasonable and adequate for normal security requirements through the implementation of building related organisational personnel related and technical standard security safeguards Moreover the security level achieved by this means can also serve as the 248 GSTOOL 3 1 User Manual The IT Baseline Protection methodology basis for IT applications that have a high protection requirement 13 2 Structure of the IT Baseline Protection Manual The BSI s IT Baseline Protection Manual describes an approach for creating and testing IT security concepts on the basis of standard security safeguards Moreover it contains packages modules of standard security safeguards that are suitable for typical IT processes applications and components These modules are split over five layers in accordance with their particular focus e Layer 1 covers all the top level IT security aspects Examples here are the Personnel IT Security Management and Data Backup Policy modules e Layer 2 is concerned with building related aspects Examples here are the Buildings Server Rooms and Working
197. fered EMPLOYEE ORGANISATIONAL UNIT Here the entries made under amp employee in the ORG UNIT field are offered Only staff for whom the selected entry would be appropriate are displayed ROLE The same roles specified in the IT BPM are offered as during the creation or editing of target objects of type 2 employee Only employees in the selected role are displayed IT SYSTEM NAME All the IT systems created are offered for selection The employees then displayed are the ones who are linked to the IT system selected 130 GSTOOL 3 1 User Manual Modeling view APPLICATION NAME All the applications created are offered for selection The employees then displayed are the ones who are linked to the application selected Tab card Threats Common Survey Threats l Notepad Lack of or insufficient rules Insufficient knowledge of rules and procedures lack of compatible or unsuitable resources Lack of or inadequate maintenance Unauthorised admission to rooms requiring protection Unauthorised use of rights Uncontrolled use of resources This tab card shows a list of all the threats assigned by the IT BPM to the selected module This list cannot be altered First select a threat then click E View in the toolbar or else double click on the threat A browser window in which the associated text can be read will now open Tab card Notepad See section Notepad on page 34 5 2
198. ffect the place in the tool where the change is made Everywhere else a module thus changed will always be available in the BSI standard or in the adapted version IS For further information on how adapted modules are treated when the metadata is updated see Effects on existing adaptations on page 59 Only BSl standard modules can be adapted User defined adapted modules can be further edited via Open page 169ff To adapt a module right click and then choose lt Adapt gt from the pop up menu or click the Adapt button The window in which you can change any existing data as required over six tab cards will now open Tab card Common Common Target object type Target object subtype Safeguards Threats Notepad Layer gen Prior Type user defined adapted Audit relevant Yes No Jam 3o1 Name Ogas Version Module text 3 1 Organisation Description This Chapter lists general and generic measures in the organisational field which as standard organisational measures are required to achieve a minimum protection standard Specific measures of an organisational nature which relate directly to other measures e g LAN administration are listed in the relevant chapters Standard security measures that are oriented towards the proper management of IT components hardware or zl 170 GSTOOL 3 1 User Manual BPM user defined view LAYER The layer to which a modu
199. firm by clicking OK The list may still contain content from a previous access by a user with different rights To view the list currently valid click Refresh e Attaching a database In ATTACH DATABASE you can attach a database to GSTOOL 3 1 Databases must always be attached locally i e they must always be attached on the PC on which GSTOOL 3 1 has been installed and via which the database concerned is to be accessed In the DATABASE field enter the database file to be attached along with the complete path or else select it using the Browse button In the NAME field enter the name of your choice under which the attached database is to be offered when GSTOOL 3 1 is started up in the window If you choose a name that is already in use for another database locally attached to GSTOOL 3 1 attachment of the newly selected database will be terminated with an appropriate error message If you choose the database file using the Browse button this name will automatically be created from the file name Attach database Database E Concepts Conce t 03 MDF Name Concept 03 lt a Attach 72 GSTOOL 3 1 User Manual General information on working with GSTOOL 3 1 Click Attach and the message Database lt Name gt appended will be displayed The next time that GSTOOL 3 1 is started up in the login window you will be able to choose between all the databases thus linked to the tool in the
200. get objects Rights are only shown on the Target objects tab card and then only for the target objects that you yourself have created 142 142 See also section 11 2 2 User roles page 235 ff 222 GSTOOL 3 1 User Manual Administration of rights Delete If you have been assigned the role System or your role contains the right ENTER DELETE USERS AND ROLES then you can delete roles When a role is deleted users who have been assigned that role lose all the rights regarding assigned databases associated with the deleted role and cannot access those databases any more Update Thanks to the networking capability of GSTOOL 3 1 itis possible in principle for a single role to be edited by more than one person at once To avoid conflicts it is sensible to update all the roles to the latest status via the Update button prior to editing them Both the New and Open buttons take you to this window F Pole f x Polen fo Data IT asset sets Target objects Description m Data Database Manage metadata Enter delete users and roles Define IT asset sets Back up database 7 Define target objects Other Application administrator T View history m Exports amp Imports J Execute one way export J Execute one way import J Execute standard export J Execute standard import J Execute re export Execute re import Save OK
201. government and the Lander for the implementation of secure IT facilities The latest information on the IT Baseline Protection Manual and its development can always be found at the following URL http www bsi bund de gshb deutsch index htm 0 2 GSTOOL GSTOOL was developed in 1998 to support the preparation of security concepts based on the IT BPM GSTOOL 3 1 User Manual Introduction 0 2 1 Development Changes in the procedure set out in the IT BPM and a number of additional necessary modifications resulted in the need for a complete redesign of the GSTOOL in 2001 Compared with earlier versions GSTOOL 3 0 and GSTOOL 3 1 incorporate the following new features e Modeling based on the layer model e certification status can be checked e networking capability multi lingual capability e multiple security concepts can be managed e encryption of user specific data for exports e simple updating of the database by e mail or over the internet 0 2 2 Features Support for security concepts GSTOOL supports the following activities relating to the creation and implementation of IT security concepts in accordance with the IT BPM e IT Baseline Protection compliant Modeling and layer model e the capture of information about IT systems IT structure analysis e the capture of information regarding applications e the assessment of protection requirements e the implementation of safeguards e the basic security check e th
202. green light the server is up and running database access is possible An active server can be stopped with Stop Start A stopped not active server will be started Stop The server will be brought to a complete stop and the server application will be shut down No database access will be possible Pause The server will be paused without the server application closing down completely No database access will be possible A paused server can be started up a lot faster after Continue than if first Stop and then Start are used Continue A server currently paused will be reactivated 24 See section 2 4 14 Configuring the database Databases tab card page 71ff 27 GSTOOL 3 1 User Manual General information on working with GSTOOL 3 1 2 1 3 Registration type The Registration type is selected on the Account tab card e If you choose Apply integrated security the login information already input for general PC access will be used for the tool as well No other data inputs are necessary l GSTOOL 3 1 logon to database x pavarenaseasenassonseneny Nastesserenscnnsnnd Registration type Apply integrated security C Apply database security _ SOL Server security User name l Password l e f you choose Apply database security you will have to log in with USER NAME and PASSWORD under SQL Server security independently of any e
203. he sa password 268 GSTOOL 3 1 User Manual Problem Cause Appendix Solution After restoring the data with lt Database gt lt Data backup and recovery gt users that previously existed have disappeared Due to the internal rights structure not all users can be restored See section lt Database gt lt Data backup and recovery gt Checking user rights page 67ff You need to reconfigure the users See section lt Database gt lt Data backup and recovery gt Checking user rights page 67ff 14 4 3 Export import Problem Cause Solution Data exported from one database cannot be imported into another database The following message appears GSTOOL 3 1 7 Q x Import cannot be executed Standard export created with current database The database into which data is to be imported was created by cloning from the database from which the present export originates See section 1 5 2 Databases Duplication of a database page 23ff To convert the cloned database to a genuine new database you should proceed as follows 1 Create a new database See section 1 5 2 Databases Creating an additional database page 23ff 2 Transfer the content of the cloned database to the newly created database using the one way export and one way import procedures 3 Now carry out the planned import into the newly created data
204. he data entry effort 5 4 1 Preconditions and possibilities The use of referencing is subject to certain conditions as follows e A reference can only ever be created from the reference target e Several reference targets can refer to the same reference source e Any existing target object irrespective of type to which the same module is assigned can be chosen as reference source 135 GSTOOL 3 1 User Manual Modeling view Both directly and indirectly linked and unlinked target objects can be chosen as the reference source e A target object cannot be both reference source and reference target at the same time In this way chains of reference are not allowed e Any number of references can be created 5 4 2 Creating a reference In the IN TARGET OBJECT field on tab card Common all the target objects that are linked to a module of the same type as the one currently being edited which is to be made the reference target are offered IS When a reference is created all the entries in the reference target are overwritten by the entries from the reference source Should you subsequently delete any referencing you can choose whether you wish to retain the implementation status that existed prior to the referencing or the editing status created through the referencing Selection of a target object results in the immediate creation of a reference The user is not asked to confirm this action The en
205. he details as described in section 0 6 Problem reports 14 4 1 Installation Problem Cause Solution During the installation the following error messages appear Error 429 Object creation using Active X component not possible Error 91 Object variable or With block variable not set These errors typically occur when the registry entry for file scrrun dil is missing or corrupt This file is installed by Internet Explorer Internet Explorer must be installed in order to use GSTOOL The fact that Internet Explorer is working despite this registry entry problem is irrelevant to the problem On a command line enter the following command regsvr32 exe C winnt system32 scrrun dll A message advising that the operation has been successful will appear 267 GSTOOL 3 1 User Manual 14 4 2 Database integration Problem Cause Appendix Solution When GSTOOL starts up the database required is not included in the list of available databases in tab card Conection on the esp tole mE m Ra ole oyun ce window No database has been attached to GSTOOL or the database has been installed on a network drive Attach the desired database locally to GSTOOL following the instructions in Configuring the database section 2 4 14 page 7Off The database must not be on a network drive It is mandatory that the database to be connected is located on a local drive on your PC or on the l
206. he elements above a given target object in the hierarchy This function is activated and deactivated for a given selected object by right clicking with the mouse and then selecting the option lt Display generics gt This function has to be activated deactivated separately for every point in the tree v Display generics The tick next to the option indicates that the function has been activated for this target object If the only items higher in the hierarchy that are shown in this tree are target object types with no target objects this means that the relevant target object is not linked to any other target object If lt Display generics gt is activated then in the tree below the selected target object in question the target objects with which the selected target object is either directly or indirectly linked are shown in grey In the example on the right there is a direct link between the data media archive and the lt BSI asset set and an indirect link to the building s Head office Sorting in the tree In Structure Target objects sorting is automatically carried out in the tree This cannot be directly altered by the user e Target object types This sequence of target object types is predefined Ja set of IT asset i building L room IT system network BA application AA employee ZB user defined target object User defined target object types are inserted in column 1 in the lower
207. he existing safeguards will be overwritten by the safeguards in the module just dragged here and any safeguards that do not yet exist will be inserted e f you choose No the existing safeguards will stay as they are and only the ones that were not already present there will be inserted e f you choose Cancel the drag and drop action will be terminated 5 3 4 Dragging module to target object When the module is released over the target object a menu Relocate appears as follows Saja e f you choose lt Relocate gt and confirm your action at the prompt the module will be linked to the target object Any prior module linking will be deleted e f you choose lt Copy gt and confirm your action at the prompt the module will be linked to the target object Any prior module linking will be retained If the selected module is not yet linked to the target object it will also be linked to it e f you click lt Copy gt any prior module linking will be retained e f you click lt Relocate gt any prior module linking will be retained If no module of the type dragged is yet linked to the target object selected this will terminate the drag and drop action 134 GSTOOL 3 1 User Manual Modeling view If on the other hand such a module has already been linked to the selected target object the safeguards in the module that has been dragged here will be passed across as described in section 5 3 3 Dragging mo
208. heritance mechanism will bear the identifier yellow irrespective of the implementation status of the other modules that belong to that layer or target object e If all the modules in a layer or target object carry the identifier W green aS a result of inheritance from the associated safeguards or because it has been adopted as a result of referencing or if they carry the identifier Woe 156 because Dispensable was entered in the PROCESSED field then the layer or target object will bear the identifier Y green This inheritance process is presented in tabular form as follows n Implementation status of Implementation status of the modules layer or target object to W green Wolue yellow Wrea ie colour alle lt l lt W green W yellow WY red i colour lt lt lt A A lt A A A P A F A _l s passed Key Implementation status stated Implementation status not stated Implementation status not relevant to inheritance process 12 2 3 Inheritance from layers or target objects to further up in the hierarchy Inheritance from layers or target objects to an asset set and from there to the company or agency in turn follows the same rules except that there is no identifier Woiue for layers target objects and asset sets 156 Unnecessary modules are treated for the purposes of inheritance
209. hese paths do not exist on the target computer then it will not be possible to show the logo and bitmaps within reports and these may be included simply as placeholders 109 See chapter 6 9 3 Tab card Properties section EXTENDED PROPERTIES OPEN REPORT page 157ff 152 GSTOOL 3 1 User Manual Reports view To ensure that they are displayed you will have to create the directory paths specified above and store the relevant files that are in the source computer in those locations IS If you have made any entries in file gs3 css in the course of creating a user defined report template you will also have to make this file available together with the actual report file for external processing of the report Once again the path contained in the source text of the report will have to be modified if required to C Program files BSI GSTOOL3 Reports gs3 1 css X Internet Explorer includes an option Save As that Bo enables you to save all the files that go with a given HTML page including any graphics This is a convenient way of ensuring that the entire report is passed on to the next person TO ly 6 8 Printing a report A report once created is displayed in a browser window It can be printed from this window in the standard browser way eS When printing from the browser you may find that some of the default page setup settings headers footers margins etc are not what you want Thes
210. hive out of the f_ Room list in IT asset set BSI and over IT asset set Location 1 When you release the left mouse button a pop up menu appears in which you should choose the lt Create link gt option 3 This has the effect of establishing peg lu Create link 73 In Method B it is not possible for an existing link to be deleted at the same time Hence lt Move link gt is not offered here 105 GSTOOL 3 1 User Manual a link between f_ Data media archive and IT asset set LA Location 1 The existing link to IT asset set fa BSI remains unchanged If you want this to be deleted then you must do it separately 4 2 5 Deleting a link Example Suppose that _ Data media archive is indirectly linked to building Head office in IT asset set a BSI and directly linked to IT asset set BSI You want to move the data media archive to one of the other buildings but it is not yet clear whether that building needs to remain in IT asset set Ja BSI Hence you only want to delete the indirect link There are three ways of doing this Method A can only be used in the top part of the tree Under this method the link is deleted from the target object that is to be detached this must be selected e Press DEL or select menu option sequence lt Edit gt lt Structure of target objects gt lt Delete link gt or right click the target object
211. hoice of two different areas which can be accessed by selecting a target object and then right clicking or selecting lt View gt followed by either lt Properties of modules gt or lt Properties of target object gt 119 Modeling view La Layer modet BSI B a G BSI wi generic aspects of IT security Security of the infrastructure M401 Buildings Head office 2 Q Outpost 1 Hm M 4 02 Cabling Q Head office sF nec S 1 9 fire sealing o net S 1 20 Selection o J net S 1 21 sufficient di S 1 22 Physical pre S 1 39 Prevention Bt S 219 Neutral doc 5 2 20 Monitoring Bt 5 5 1 Removal or net S 5 2 Selection of fet S 5 3 Selection of net S 5 4 Dokumentati fet S 5 5 Damage min S 6 18 Provision ol SQ Outpost 1 M 4 03 03 Data Media Archives 4 Data media archive wh Security of IT systems HA Security in the network we Security in applications g SASASI SASSA SS GSTOOL 3 1 User Manual Modeling view Reduced display of the a generic aspects of IT security layer The WS generic aspects of IT security layer is a special case seca oni fant B A f IT securi as far as presentation is concerned Normally the associated 1 a e MADI Secuiy Management A 2 191 Etablishment of tr safeguards are shown immediately below modules without the Eal alr ih z npc S 2 193 Establishment of additional layer of the target object
212. i Update in the toolbar Deletes the selected object Has the same effect as r Delete in the toolbar This command is available in the following views Modeling Structure of target objects If Del is applied to a selected target object in the upper part of the tree its link is deleted If it is applied to a target object in the lower part of the tree the target object is deleted Master data BPM user defined with the exception of tab card Target object types If you use Del on an adapted object this object will 260 GSTOOL 3 1 User Manual Appendix Ctrl A Ctrl B Ctrl D revert to its original state A user defined object will be deleted The objects that are subordinate to and belong to the object highlighted in the tree in the Reports view will be included in the scope of a report Has the same effect as right clicking with the mouse and then choosing lt Select dependent objects gt from the pop up menu This command which has the same effect as clicking amp Open in the toolbar or double clicking is available in the following views the result being slightly different in each case Master data BPM user defined For user defined and adapted objects Ctrl B opens the editing window for objects of type BSI Standard the viewing window is opened This command which has the same effect as clicking Delete in the toolbar is available in
213. ibed above in connection with the adaptation of a safeguard 14 Tab card Common Common Roles Modules Notepad Version Safeguard text Content x e CATALOGUE The default setting for this field is the catalogue to which the safeguard most recently selected on the Safeguards tab card belongs However any other catalogue can be chosen PRIOR NEW CHANGED See section 2 4 11 New Prior Changed display page 2 4 11 ff e TYPE The safeguard type is automatically set as User defined and cannot be altered e No The safeguard number is automatically preceded by the letter u for user defined and cannot be altered 124 See section 7 4 4 Adapting a safeguard page 182ff 187 GSTOOL 3 1 User Manual BPM user defined view e NAME The title of the safeguard has to be entered here SAFEGUARD TEXT A description of the safeguard has to be entered here Tab card Roles This tab card is initially always empty for user defined safeguards As described in connection with the adaptation of safeguards roles are assigned to and de assigned from a user defined safeguard here Tab card Modules This tab card is initially always empty for user defined safeguards User defined safeguards are either assigned to modules or de assigned from them in similar fashion to the adaptation of a safeguard that was described above Tab card Notepad See Notepad on page 34
214. idual role and their own automatically created and assigned user role Thus the three group members are assigned the following roles User X the roles Xi Xy plus Yy and Zy User X the roles Yi Yu plus Xy and Zy User Z the roles Zi Zu plus Xy and Yu This role assignment has the following effect In the user role of each group member Read write right is noted for each target object created by that member Every other user to whom this user role has been assigned thus has the same Read write right for each of these targets objects as the user who created the target object Naturally it is also possible for several users to log on to a database using the same username and the same password As the history display shows the name of the user who was logged on when the field content was altered in this case it will not be possible to trace back changes to the individuals who made them 239 GSTOOL 3 1 User Manual The inheritance mechanism 12 The inheritance mechanism One major advantage in creating an IT BPM based security concept using GSTOOL 3 1 is the extensive automatic passing on of important information and conditions The following areas are supported by the inheritance mechanism e inheritance of protection requirements inheritance of the implementation status of safeguards e inheritance of the qualification level achieved All the inheritance rules are predefined in GSTOOL 3 1 and cannot b
215. ied the file name and chosen the key you can now Initiate the encryption process by clicking Run 61 GSTOOL 3 1 User Manual General information on working with GSTOOL 3 1 Decrypt file Files that have been encrypted using GSTOOL 3 1 can be decrypted here They carry the file suffix mdx ENCRYPTED FILE In this field you should enter the path and name of the file to be decrypted or else select it using the Browse button UNENCRYPTED FILE In this field you need to specify the path and name of the file generated during decryption CHIASMUS KEY From the list of available keys choose the key you want to be used to decrypt the file To decrypt a file you need to use the same key that was also used to encrypt it If the required key is not contained in the list it will first have to be imported into the local key store See Magnage keys page 62ff When you have specified the file name and chosen the key you can now initiate the decryption process by clicking Run Magnage keys On this tab card you can create administer and delete keys Every key is contained in a separate key file that ends with the suffix ckf KEY STORE In this field enter the directory to which the keys should be saved It is recommended that all directories created during installation of the tool are retained CHIASMUS KEY IN LOCAL KEY STORE This field lists the key files contained in the above direct
216. ientente 87 o D EAE a E EE AE aaataceiseuelcees Me cnienteinas aeterennaae 92 41 37 SOUP UIP TUNES iesene ea aE ai E E e AA ANEA E ATAT N aa 93 4 2 Linking of target objects ssssseneeneennennnunnnrennnnnnnnnnnnnnnnnnnnnnnnnnnnnnnnannnnnnnnn nenna 98 4 2 1 Direct indirect linking cscs testes ce nemcsceehsteveieceelecdbdeite deel eta aceeaneenthvaeaniadavientetonyeetens 98 4 2 2 Creating AOI andi tes ate tees date cat nite han en eadntesh els poetic ool A Gatr cig are adel Mont ee 100 4 2 3 Linking dependent target Objects ccccccecceceseseeeeeeceeeeeeeseesseeeeeeeeeeneeeneeeneeeees 101 4 2 4 Changing eh likey eerren Wetatul tant e nda aA E AEA sat EEE ESEE aaa 103 4 25 Deleting alnk rssi i aa a aa aerae AAE EA alate once tage AE ASE k 106 4 3 Creating a target ODJOCE sissies ccccuds jcaceteineads ices ccrsancraacectdewed sannadunnaanmusdenvnmenntaae vices 108 4 4 Deleting a target Object cseecceeesssssseeeeeeeeeeeseseeseseneneeeeeeseseseeseeneeeeeeeeeenees 109 5 Modeli g VIG Wi niini aaa i die ieaiai ea 110 5 1 General osseo sites eeieicenwnntlninied sinuda aeure ean raa Ea a Eee EMN SEEEN Enan U eden PuMa Easa Nien 110 5 1 1 Links between target objects and IT asset sets eneee 111 5 1 2 Tree presel OT A a e a ae eaaa ara aAa Ea r e aa A a Ena darain iadh 112 O18 Filters e a a a a r a 116 5 2 aeaa E E A A E T 117 5 2 1 Tree presentation ccccccccceccceceeceee cece cece ceeecedecegeeceeeeeeeeeeeesee
217. ificates uicccssessedeetieanetsladhet ccoceeuncenstens viens tecntaeeniveirtee ts 257 13 3 8 Maintenance of IT security 2 0 0 0 ceeeeseeeeeeeeeeeeeneeeeeceeneeeeeenensnesenseceeeeeeenenseenecees 258 13 4 Sources OF SUPPLY coc cevescesiverencsteccsscevecucvs dveisseesasssesesnedawendsosewestcwseisenseniescrsedis 259 Appendix sina a a aa A Ein 260 14 1 Keyboard Command c sssseeeeccceeeeeeeeeeeceneeeeeeeeseneseeeneeeeseeeeeseesseeneeeeeeeeeensenes 260 14 2 Conventions for the numbering Of moduleS s sssssnnsssssnnnnnnnnnnnnnnnnnnnnnnnnnnna 263 14 3 Information regarding imports from text files cceeeeeeeeeeeeeeeeeeeeeeeeeeeeeneeee 263 14 3 1 Format requirements cccccccccececececeeecceeeceeeeeeeeeceeeeceeeceeeceaecenecesecsaeesaeseeaeeaas 263 14 3 2 Processing of IMport TSS iiye sete isch caida a ead EARE AA DEE nea 265 14 3 3 Post processing of imported target objects eee eeeeeeeeeeeeeeeeeeeeteeeeeeeeeeteeenaaaees 265 14 4 Troubleshooting sisscecncseccciscncstansacenstwaccananvaanetawtedeeteasetancuanecasvcaeeneunananeseticuetenectonn 267 AAA installati n aiaa a a E ER E ARE E EANET 267 144 2 Database int gration siiri siipeni ini aina ia aia a aaa aiena 268 14 4 3 EXPO p OTE r a a aae Ea ra a ae aE L TE EE TE EEEE 269 1444 General proble M S a aa E A a a EE 270 TALS GIOSSALY ue cies dicatdureaheGutbanendiacwecasnchunnieutiransinaimauttemetsarensiabethauiir ieundiwmediedenddacnnsuak 274 WAG a
218. ifier of the modules to which that threat belongs The modules are not transformed into aM i e adapted modules 191 GSTOOL 3 1 User Manual To adapt a threat right click and then choose lt Adapf gt from the pop up menu or click the Adapt button The EXEC KIA talc aeMmiciicm Window in which you can change any existing data as required over three tab cards will now open Tab card Common Common Modules N otepad Catalog Focemaewe y Prior Type user defined adapted No fat 1 4 C Version T 1 4 Fire Apart from the direct damage caused by fire to a building or its equipment there may be consequential damage the impact of which can attain disastrous dimensions especially for IT systems For example damage from water for fire fighting does not occur only at the direct site of the fire x Threats text CATALOGUE The catalogue to which a threat belongs cannot be changed during adaptation e PRIOR NEW CHANGED See section 2 4 11 New Prior Changed display page 67ff e TYPE The threat type is automatically changed from BSl standard to User defined e No The threat number is automatically preceded by a a for adapted The threat number cannot be changed during adaptation e NAME The title of the threat can be altered e VERSION Version numbers are not maintained for adapted threats THREAT TEXT Here the text of the threat d
219. ight click and then select the option lt Update links gt from the pop up menu Both methods cause a new window to open in which you can choose IT asset set and Room as link targets If you pick 71 100 Structure of target objects view BSI ge set of IT assets H BSI Location 1 building room IT system aS network pa application PEN employee room A employee h Outpost 1 room IT system E Move link Create link IT asset set Building Room IT system hetyort Application Employee Every target object can be linked to a set of IT assets and a building can always be linked to a room GSTOOL 3 1 User Manual Structure of target objects view IT asset set another window opens in which all the existing asset sets are listed l Maintain links to E z oj xi o BSI BSI set of IT assets general IT asset set L1 Location 1 set of IT assets general IT asset set All No Reverse Update OK Cancel Click the desired asset set Location 1 in column 1 then click OK to create the desired link After a short time the target object A Head office will appear in the upper section of the tree now linked to IT asset set 5 Location 1 Method D In IT asset set AE Location 1 select target object type A building Click New in the toolbar or press Ctrl N to open the window in which all the available b
220. iled description of the structure and approach can be found in chapters 1 and 2 of the IT Baseline Protection Manual The latest version of the IT Baseline Protection Manual can also be found on the BSI s website at Attp vww bsi bund de gshb 13 1 Rationale for adopting this approach Both the hardware and software components and also the architectures and communications structures found in information technology are subject to rapid evolution Keywords for different generations of architectures and concepts that one could mention include host based processing client server architecture thin clients and web interfaces Nevertheless is noticeable that most installations and solutions are essentially composed out of only a few types of components Examples of such components are servers routers data media and communication lines Through the use of these typical components the same kind of threats to IT operations are found on a recurring basis If there are no special security requirements these threats are largely independent of the specific application scenario This leads to two possible approaches e The threats to IT operations and the probability of damage resulting from these threats can be roughly calculated if certain assumptions are made It is thus not always necessary to carry out a full risk analysis 247 GSTOOL 3 1 User Manual The IT Baseline Protection methodology e Packages of standard security safeguar
221. ill find these empty original databases in directory programm files BSI GSTOOL3 on the CD 23 GSTOOL 3 1 User Manual Installation first time use deinstallation e Perform a complete one way export2 from the database to be duplicated e Create a new database e Import the one way export into the new database as a one way import21 Multi customer capability Because GSTOOL 3 1 allows you to work with multiple databases and to choose the names for these databases it is possible to work on security concepts for different customers independently of each other The database of the relevant customer can be selected at the start of the program in the DATABASE field wile For the sake of better transparency it is gt _ recommended saving all the customer databases to a 5 separate directory e g Customers 20 See section 9 7 One way export page 213ff 21 See section 9 8 One way import page 213ff 24 GSTOOL 3 1 User Manual General information on working with GSTOOL 3 1 2 General information on working with GSTOOL 3 1 GSTOOL 3 1 has comprehensive facilities for the administration of rights22 In this way it is possible to tailor your work on and with the tool precisely to your requirements Depending on how rights for individual users are defined certain functions explained below are either not available at all or only on a restricted basis If nevertheless you require such functions for your work
222. in this location within the tree their implementation is not necessary for the attainment of any qualification level Exception If a missing safeguard see above has been added it will bear its original qualification status identifier and its implementation will be necessary for the attainment of the relevant qualification level 5 2 3 Deleting a safeguard If a safeguard from a given module is to be deleted specifically for one target object this safeguard must be selected in the relevant module To delete the safeguard 81 Basic Security Check see section 5 5 Basic Security Check page 140ff 123 Modeling view This decision should not be confused with the decision to implement safeguards that is made as part of the GSTOOL 3 1 User Manual Modeling view click Delete in the toolbar or press key combination Ctrl D e or select menu option sequence lt Edit gt lt Modeling gt lt Delete link gt or right click and then choose the lt Delete link gt option All of these options open the following prompt window GSTOOL 3 1 x Do you want to deleted the link of the safeguard If you click Yes the safeguard will be deleted from the module currently being edited and will be immediately removed from that module in the tree82 Click No to cancel the delete operation If a safeguard that is necessary to attain a particular qualification level is removed in M
223. inks lower down in the hierarchy can be edited as per normal i e they can also be deleted Example The user only has read right for IT asset set fy North Linking of the target objects A Building 1 and Record store to IT asset set n North highlighted in green is protected by the rights assignment On the other hand the link between target object f _ Record store and KA Building 1 highlighted in red is not protected and can be edited IE If a target object that is linked to an IT asset set in respect of which the user has only read right is deleted in the lower part of the tree this also has the effect of deleting the link with that IT asset set The target object is no longer part of the IT asset set Modeling In Modeling the generic aspects of IT security for the IT asset set concerned are write protected along with all the dependent modules down to the properties of the safeguards All the other target objects can be edited as per normal WRITE The user can both read and write to the IT asset set AUDITOR The user can edit the Audit information tab card in the ak LALO Le AK G Window for the IT asset set concerned IS Auditor right can only be granted under licensed operation section 1 3 1 In test operation section 1 3 2 this line is inactive 227 Administration of rights BSI E set of IT assets Eg North building S Building 1
224. is necessary for this function 128 This is automatically created during the installation of GSTOOL 3 1 197 GSTOOL 3 1 User Manual Export Import view 9 Export Import view Thanks to its networking capability GSTOOL 3 1 offers the possibility of several networked PCs accessing a shared database Should it be necessary to edit parts of the database on a PC that is not networked Export Import offers the necessary functionality IS Only users whose role gives them the necessary rights can carry out exports or imports IS Users can only export target objects in respect of which they have write rights e Text file export of target object This export option prepares target objects in the form of a table suitable for processing outside GSTOOL 3 1 e Text file import of arget object This option imports target objects provided in the form of tables into the GSTOOL database from TXT and CSV files e Standard export This option prepares data for processing in another database The data is loaded into the other database via a standard import operation e Standard import This option loads data into a database for temporary editing The data must have previously been prepared using the standard export option For every standard import a separate import work area is created e Re export This option prepares data that has been edited following a standard import for r
225. is tab card will continue to exist in the long term 3 2 4 Tab card Audit information This tab card is only available for target objects of type set of IT asset IT asset set Audit information Link s Notepad Supplement Auditor Contractual basis a Object under investigation a Projection Distribution list Inspect reference a documents Authorized at r 1 El Velidthrough f 06 10 2004 You can only enter data relating to the Baseline Protection Audit if you have been assigned APPLICATION ADMINISTRATOR right 83 GSTOOL 3 1 User Manual 3 2 5 Tab card Links This tab card is available for all target object types Building Protection requirement Links Notepad Supplement Target object typl Alle y Data media archive subordinate BSI BSI superior LA Location 1 superior e The columns ABBREVIATION NAME and EXPLANATION contain the relevant details for all the target objects to which the target object selected on the Master data tab card has already been linked e The DIRECTION column provides information on the hierarchical relationship between the target objects shown in this table and the target object selected on the Master data tab card 3 2 6 Creating a target object After all the entries for a new target object have been made the four buttons offer the following options e Cancel Closes the window without creating the target objec
226. isms could also be necessary for example where special components that are not covered in the IT Baseline Protection Manual are used but which play an important role for the overall security of the IT assets Section 2 5 of the IT Baseline Protection Manual contains some examples of how to proceed that will help in carrying out a supplementary security analysis e One procedure is risk analysis Here the threats that are relevant to the IT asset set are determined separately An assessment is then carried out as to the probability that 255 GSTOOL 3 1 User Manual The IT Baseline Protection methodology damage could result from a particular threat This information forms the basis for selecting the IT security safeguards that are necessary e During penetration testing an attempt is made to simulate the aggressive behaviour of an insider or outsider carrying out a deliberate attack In many cases it will be clear from the results what countermeasures are necessary It is important during this procedure to avoid causing unintentional damage e The differential security analysis is aimed at identifying any IT security safeguards that are still missing or need to be added after the standard security safeguards contained in the IT Baseline Protection Manual have already been implemented Depending on the particular situation it may be useful to use a combination of the above procedures or to choose other procedures At the end
227. ith a very positive response Even so GSTOOL 3 1 is subject to a number of additional requests In order to be able to continue to develop GSTOOL in line with the users needs the BSI is very interested in requests and suggestions and also in criticism from users of the tool Suggestions requests and criticism can be sent to the BSI at gstool bsi bund de Every message is gratefully received and is checked to see how far it is possible to incorporate its content into a future version of GSTOOL 0 3 System requirements GSTOOL 3 1 can run under the e NT 4 0 service pack 6a e ME e 2000 e XP Microsoft Windows operating systems and requires the following resources e 180MB of free hard disk space GSTOOL 3 1 User Manual Introduction e 96MB RAM 128MB is recommended e Internet Explorer version 5 5 or above e the Wingdings font for the output of some reports 0 4 Warnings notes tips 0 4 1 Warnings In cases where the use of a regular function of GSTOOL 3 1 could potentially damage the database this is brought to the user s attention by an appropriate warning Warning 0 4 2 Notes Notes are used to explain exactly how GSTOOL 3 1 behaves in particular circumstances and any necessary conditions of use IS Note 0 4 3 Tips Where the use of certain functions within GSTOOL 3 1 could save you work or bring you additional benefit these are pointed out in the form of tips aly hiZ Fi T
228. ity M 3 06 Concept of computer virus BSI standard generic aspects of IT security M 3 07 Crypto concept BSI standard genetic aspects of IT security M 3 08 Handling of security incidents BSI standard generic aspects of IT security M 3 09 Hardware and Software M BSI standard generic aspects of IT security M 3 10 Outsourcing BSI standard generic aspects of IT security M 4 01 Buildings BSI standard Security of the infrastructure M402 Cabling BSI standard Security of the infrastructure ha Adapt Delete 7 3 1 Filter A full description of the filter function can be found in chapter 10 Filter page 216ff 118 See Deleting a target object subtype on page 42 167 BPM user defined view GSTOOL 3 1 User Manual BPM user defined view Predefined filters On the Modules tab card in BPM user defined the five layers defined in the IT BPM are additionally offered as predefined filters Tab card Basic filter The following three Basic filter are offered in Modeling MODULE LAYER The list will only contain modules which belong to the selected layer MODULE TARGET OBJECT Only modules that are linked to the selected target object will be included in the list METADATA TYPE Only modules of the selected type will be included in the list 7 3 2 List of modules The No column contains the numbers of the modules as per the IT BPM The prefix u or a indicates whether the module in question
229. ive room read write FX S Fax server application read H 0 Head office building in the city building read write LAN internal LAN network 0 Office room read Dutpost Outpost building in comercial area building read 50 Server 01 IT system xl To make this list easier to assimilate the FILTERS selection field can be used to restrict the content to target objects of one particular type By right clicking on one particular target object it is possible to separately specify the rights for that target object The right entered here for an IT asset set is automatically 145 For further information see section 11 3 2 Rights relating to directly linked target objects page 236ff 228 GSTOOL 3 1 User Manual Administration of rights transferred to the IT asset set in the IT asset sets tab card IS If a different right has been granted to all directly linked target objects on the IT asset sets tab card than for a directly linked target object on the Target objects tab card the wider right always applies The three selection options described above only apply to None the target object currently highlighted in the list The Read following rules apply here Write NONE Delete all rights The user has no permissions in relation to this target object Read all target objects Such a target object is not visible to the user in any of the views Only by looking down the list contained on the Target
230. jects that are exclusively indirectly linked are excluded from the Modeling For some target object types target object subtypes no modules are assigned in the Modeling suggestions These are 117 GSTOOL 3 1 User Manual Modeling view ZB user defined target object types and target object subtypes e A employee S network subtype Communications links BAI application subtype General application These target objects are not contained in the layer model On the other hand they are included in the object model and can be recognised by the icon which precedes the target object Object model In the object model all target objects directly below the IT asset set with which they are directly linked are displayed These are followed by the modules assigned as suggestions by the tool together with their safeguards Ql Object model BSI Ey G BSI EQ generic aspects of IT security BSI M3 001T Security Management M 3 01 Organisation amp M 3 02 Personnel amp amp M 3 03 Contingency Planning amp M 3 04 Data Backup Policy M 3 06 Concept of computer virus amp amp M 3 07 Crypto concept amp M 3 08 Handling of security incide amp M 3 09 Hardware and Software b le M 3 10 Outsourcing Fee M 9 01 Standard software In the example on the right in accordance with the IT BPM modules M 4 1 Buildings and Ge M 4 2 Cabling
231. l Editing Problem Cause Appendix Solution It is not possible to make entries or amendments in the FELS TEW PIO LES Window All the text is shown as inactive The module to which this safeguard belongs is referenced to another one You can tell that this is A the case from the little arrow on the module icon iii see section 5 4 Referencing page 135ff Delete the referencing following the procedure described in section 5 4 4 Deletion of referencing page 138 You will then be able to edit the modules that were previously reciprocally referenced independently of each other To activate direct editing of referenced modules select menu option sequence 2 3 5 lt Tools gt lt Options gt Common Edit page 45 The safeguards for reciprocally referenced modules can now be edited in all the affected modules with equal access The target object in which the safeguard has to be edited has been exported for external processing You can tell this from the blue colour coding of the safeguard title in the tree and also by the note This data record has been exported and cannot be edited towards the bottom of the tab card Re import the exported target objects section 9 5 Re export page 209ff Now delete the export containing the target objects to be processed section 9 9 Deleting an export page 214 ff In Modeling no employees are offered in the dk LOE Liye ELLES Window tab card
232. le CD e E 278 vii GSTOOL 3 1 User Manual Introduction 0 Introduction The statutory basis for the foundation of the BSI on 1 January 1991 was the Act for the Establishment of the BSI BSIG of 17 December 1990 The BSI is a superior federal authority under the control of the Federal Ministry of the Interior The goals which lay behind the establishment of the BSI include the promotion of IT security starting with the German federal administration but extending beyond this One of the functions of the BSI is to provide methods which assist with the conduct of security analyses and development of security concepts and security criteria thus supporting those responsible for IT in their work It is as part of this work that the BSI has developed the IT Baseline Protection Manual IT BPM and subsequent to this GSTOOL 0 1 The IT Baseline Protection Manual Since it was begun in 1994 the IT Baseline Protection Manual IT BPM has developed into a standard reference work for the development of IT security concepts Since 1995 federal government agencies have been under an obligation to apply the IT BPM when drawing up policies and safeguards aimed at protecting the IT assets they use The Federal Commissioner for Data Protection and virtually all the Regional Commissioners for Data Protection recommend the IT BPM as the basis for the data protection compliant use of IT assets as do also the Auditors General of both the federal
233. le belongs cannot be changed during adaptation PRIOR NEW CHANGED See section 2 4 11 New Prior Changed display page 67ff TYPE The module type is automatically changed from BSI standard to User defined adapted e AUDIT RELEVANT An adapted module retains its audit relevance IS For user defined modules audit relevance is always set to No in keeping with the BSI s auditing schema This cannot be changed by the GSTOOL 3 1 user e NO The module number is automatically preceded by a a for adapted This cannot be changed during adaptation e NAME The title of the module can be altered VERSION120 Version numbers are not maintained for adapted and user defined modules MODULE TEXT The text of the module description can be edited here Target object type tab card This tab card is empty In the Modeling modules are only assigned to target object subtypes Target object subtypes tab card This tab card show the target object subtype for which the relevant module is automatically used in gt Modeling 120 The VERSION field shows which version of the IT BPM the module comes from To find out which version of the IT BPM GSTOOL 3 1 is currently using press Ctrl I or select lt Help gt lt About gt STRUCTURE DATA VERSION 171 GSTOOL 3 1 User Manual Common Target object type Target object subtype Safeguards Threats Notepad Assigned to targ
234. le for the entire asset set to attain this qualification level IS The next time that the metadata is updated if a module thus deleted has been changed by the BSI then it will be added back to the target object with the status Not processed If you still to want a module to be linked to the target object you will have to delete it again 5 3 Modeling by drag and drop As well as the menu led version of Modeling described in section 5 2 it is also possible in GSTOOL 3 1 to perform Modeling by drag and drop 92 The main difference between Modeling by drag and drop and menu led Modeling is that in the case of drag and drop the 91 See 2 4 3 lt File gt lt Import gt lt Update BPM metadata gt page 58 92 See section 4 1 3 Structure rules Linking by drag and drop page 93ff 132 GSTOOL 3 1 User Manual Modeling view content of the safeguards and modules dragged can be taken with them to their new location By contrast where Modeling is menu led only blank safeguards and modules are inserted in the model All safeguards and modules that are visible in the tree in Modeling can be dragged and serve as targets with drag and drop 5 3 1 Dragging safeguard to safeguard After the safeguard being dragged has been released over the target safeguard and the user has clicked OK at the prompt all the tab card content of the target safeguard that can be changed is overwritten by the content of the
235. le to create users directly via SQL Server for example Open If you have been assigned the role System or your role contains the permission ENTER DELETE USERS AND ROLES when you click the Open button the REJJ window will open so that you can edit an existing user If you do not have the permission mentioned and the System role has not been assigned to you either you can only view the permissions and roles assigned to the user Delete If you have been assigned the role System or your role contains the permission ENTER DELETE USERS AND ROLES then you can delete users Any existing user role will be retained Update Thanks to the networking capability of GSTOOL 3 1 itis possible in principle for a single user to be edited by more than one person at once To avoid conflicts it is sensible to update the to the latest status via the Update button prior to editing it Both the New and Open buttons take you to this window 231 GSTOOL 3 1 User Manual Administration of rights Common Roles Notepad m User account User name ES I Account activated Registration fintegatedsecuity S iY Account fF Password _ Repeat m Supplementary information Telephone Function gt Department oo Description Charge password New Save Cancel Tab card Common The USER ACCOUNT area is used to specify th
236. lients which are very similar as regards configuration administration framework conditions and applications The outcome of this exercise is a 250 GSTOOL 3 1 User Manual The IT Baseline Protection methodology new streamlined network diagram in which groups rather than individual objects are shown at many points Finally lists of the installed and planned IT systems and IT applications are drawn up This can be done in the form of a table or with the aid of a suitable tool The IT systems to be included here are not confined to computers in the narrower sense but also include network components and private branch exchanges The list of IT systems should include a unique designation together with details of type function platform and installation location The list of IT applications does not have to include every application and every program that is installed or used It is sufficient to list for each IT system those IT applications which have the highest requirements in terms of confidentiality integrity or availability A table showing which IT systems are necessary to run the individual IT applications is prepared Here it is necessary to consider not only clients and servers but also for example network switching elements At the end of the IT Structure Analysis the following documents will have been created e a streamlined network diagram e alist of IT systems together with the associated information e alist of
237. lly arranged in relation to each other Thus for example the target object Server room can be part of the target object Buildings but the reverse is not possible Target object type target object subtype The assignment of modules in GSTOOL 3 1 is determined by target object type and in some parts of GSTOOL by target object subtype The results of this module assignment are presented to the user in Modeling as a working suggestion 276 GSTOOL 3 1 User Manual Target object types e T asset set e Buildings e Employee do not contain any other targets object subtypes Target object types e Room e IT system e Network e Application all contain several target object subtypes to facilitate the precise assignment of modules 277 Appendix GSTOOL 3 1 User Manual 14 6 Index A adding MOGUIES oiai isane aa Mewetadsnccers 125 safeguards oireeton ienni rniii 121 adding linked objects eee 103 113 B basic report sheets c ecceeeeeeeeeeeeeteees 155 BSIDB V305 Datta iaeiaiai a RREA 11 BSIDB_V310_ Data eceeeeeteeeeeeteeeeees 26 buttons activation Of eee eeceeeeeeeceeeeeeeeeeeteeeeeeeeeeettes 29 deactivated 22 0 ccceccececsecceceeeeeeeeeeesseteeeeees 276 Cc GIASMUS 25 aer aea a mabe te a tecoeetensatt 61 colour Settings 0 eee eeeeeeeeeeeeeeeeeteeeeeeeeeeeaees 48 complete installation ccccseeeeeeeeeeeees 13 COPYING ODjJOCHS si
238. lly can initiate or implement this safeguard are listed If the safeguard shown on this tab card has not yet been adapted then the roles will be the ones which belong to the safeguard according to the IT BPM Otherwise the list will contain the results of earlier adaptation work Adding a role to a safeguard Click New to open the Qxxe xl fererifelay Window ixi ae os oo O Administrator Planner Initiating process Application developer Archive keeper Building supervisor Implementation Project planner Initiating process Agency company management Users Procurer Procurer Fire Pratection Officer zi All None Reverse OK Cancel A The list contains all the roles defined in the IT BPM O m m O m O m n e Column 1 The window opens with all the roles that are already assigned to the safeguard checked in the leftmost column Additional roles can be selected and roles already selected can be deselected 184 GSTOOL 3 1 User Manual BPM user defined view e NAME column This column shows the role names as defined in the IT BPM PHASE column For roles that have already been assigned to the safeguard information is provided here on the phase initiation implementation or both for which this role is to be responsible If an extra checkbox in column 1 is checked so that an extra role is assigned to the safeguard the entry Implementation is automatically entered in the PHASE co
239. lt Open gt from the pop up menu or click the Open button or click amp Open in the toolbar The KALALA EE a Window in which you can edit the explanatory text will now open gt It is not possible to create additional protection requirement categories or to rename existing protection requirement categories 127 In the condition in which GSTOOL 3 1 is supplied the explanation fields contain the original text from the Baseline Protection Manual 196 GSTOOL 3 1 User Manual IT Baseline Protection Manual 8 IT Baseline Protection Manual GSTOOL 3 1 offers through BPM local and BPM online the possibility of viewing an HTML version of the entire IT Baseline Protection Manual 8 1 BPM local view In this view a normal browser window is opened This enables the local HTML version 28 of the IT BPM to be accessed in the familiar way During the installation of GSTOOL 3 1 this local version is automatically copied to the PC and the necessary path settings are registered accordingly Should it be necessary to store the local version of the BPM in a different place the path setting will have to be amended This is done by selecting menu option sequence lt Tools gt lt Options gt Path settings page 50ff 8 2 BPM online view In this view a normal browser window is opened This enables the latest HTML version of the IT BPM to be accessed in the familiar way on the BSI website Internet access
240. lumn Right clicking opens a window in which the phase can be changed If a phase is chosen by this means for a role that has not yet been assigned to the safeguard this role is automatically assigned to the safeguard checkmark in column 1 Al All the roles contained in the list are selected None All the roles contained in the list are deselected The None option also deletes all the checkmarks that were in place when the window was opened If you click OK immediately after None all the original role assignments will be immediately deleted e Reverse Reverses the selection indicated in column 1 all the roles not currently selected will be selected and all the roles currently selected will be deselected OK assigns the selected roles to the safeguard Any roles originally assigned to the safeguard but which have been deselected in column 1 will be deleted when you click OK Cancel closes the window without changing the list of roles that belong to the safeguard 185 GSTOOL 3 1 User Manual BPM user defined view De assigning a role from a safeguard Common Roles Modules Notepad Head of Procurement Section Initiating proce Planner Initiating process Building supervisor Implementation Project planner Initiating process construction mounting firm Implementation e Delete de assigns the selected roles from the safeguard IS The Delete button is only enabled when a
241. model gt e by selecting menu option sequence lt View gt lt Display gt lt Layer model gt or lt Object model gt Sorting The order in which tree elements are presented can be sorted in various ways in Modeling Select menu option sequence lt Edit gt lt Modeling gt or right click to access three different types of sorting 112 GSTOOL 3 1 User Manual Modeling view lt Sort alphanumerically gt The elements in the next level down in the tree from the selected object in the chosen display are alphanumerically sorted If your selection is at the level of safeguards no sorting is carried out If the numbers of the modules and safeguards are on display 4 then the numbers are alphanumerically sorted i e S 2 10 S 2 2 S 2 89 S 2 9 e lt Sort modules gt lt gt e lt Sort safeguards gt lt gt Sorting of modules and safeguards by these menu options is carried down in accordance with the selection in the following menu and always on the basis of the numbers and sequence laid down in the IT BPM i e S 2 2 S 2 9 S 2 10 S 2 89 IS This same sequence of modules and safeguards is also generated through sorting when the numbers are not on display IS Irrespective of which element of the tree is selected all sorting is carried out for the entire tree i e for all existing IT asset sets Maximize minimize See Maximizing and minimizing the tree on page 32 Icons
242. mport view The size of the Jog LDF file stays the same whether the import has finished successfully or has been aborted Similarly the MDF file remains larger after an import has been aborted than it was at the beginning of the import even though it does not contain any additional target objects whe The size of the Jog LDF file can be substantially gt _ reduced by detaching and then immediately attaching _ the associated MDF file If you reorganise the MDF file130 its size and also the size of the Jog LDF reduces 9 3 Standard export Unlike the text file export of target objects the standard export entails the provision of entire sections of the database including all the information on modules and safeguards links implementation etc for editing in another GSTOOL database This export is exclusively generated as an Access database file mdb The purpose of the standard export is to allow editing for a finite period to be carried out on parts of a Source database in another target database Until the updated data is returned via a re import editing of the exported target objects is blocked in the source database IS Blocking of the exported target objects is enforced as soon as an export is created see 9 3 1 and 9 3 2 even if the export has not yet been carried out 9 3 3 In the tree target objects that are blocked by an export are shown in blue131 130 The reorganisation of a
243. n possession of that role i e for the user himself I amp S If a user s assigned role confers the right CREATE DELETE USERS AND ROLES he cannot pass on this right e BACK UP DATABASE This right is needed to back up databases 4 This right can 143 See section 2 4 10 lt Database gt lt Data backup and recovery gt page 63ff 224 GSTOOL 3 1 User Manual Administration of rights only be granted to other roles by someone possessing the System role I amp S Only the Administrator sa can restore a database backup APPLICATION ADMINISTRATOR With this right you can make the following changes by selecting menu option sequence lt Tools gt lt Options gt General change the logo displayed when the program starts up Report header edit the entire tab card Additional options edit the entire tab card Path settings edit the entire tab card In the LA ALEAC A window you can edit the Audit information tab card for asset sets VIEW HISTORY This right is required in order to be able to view the History display of field contents See section 2 4 12 History page 69ff EXPORTS amp IMPORTS Rights for carrying out the various types of export and import are granted in this area Even without export import rights a user can still delete exports that have been created However such action could make it impossible to re import a standard export144 Tab card
244. n Ne e __ M 6 OM mm Data Media arc room data meds archiv o f str File storeroom room general room a ___Ne f Beves f Update OK Cancel 107 GSTOOL 3 1 User Manual Structure of target objects view This list contains all the existing target objects of the chosen type in this case all the rooms The existing link is identifiable from the fact that column 1 has been checked If you remove this checkmark with a single mouse click and then click OK the indirect link between Data media archive and Head office will be deleted without any further user confirmation i In all cases only the link specifically selected is deleted For example if a room is both indirectly linked to a building and directly linked to the associated IT asset set both these links have to be deleted separately 4 3 Creating a target object There are several ways of creating a new target object from within Structure of target objects e A new target object can be created at any point in the tree either by right clicking and then selecting lt New target object gt from the pop up menu or by selecting menu option sequence lt Edit gt lt Structure of target objects gt lt New target object gt After selecting the target object type you should proceed as described in section 3 2 Creating a new target object page 78ff e Once you have selected a target object in the tree you can also create a new target object
245. n during the linking process you can still link all the target objects that are indirectly linked to one particular target object directly with the IT asset set by a different route e Select the target object with which the other target objects Link target object are at present only indirectly linked Ersatz ln Moy Link dependent e Right click with the mouse button to open the pop up menu e Now choose the lt Linked dependent gt option anne z Delete link The next actions offered are the same as for the immediate y oe Display generics linking of dependent target objects see above New target object gt Target object types 102 GSTOOL 3 1 User Manual 4 2 4 Changing a link Example Suppose that _ Data media archive is indirectly linked to Head office in IT asset set a BSI and directly linked to IT asset set st BSI However as the data media archive is located in Outpost 1 and belongs to IT asset set Sa Location 1 both existing links need to be amended separately Step 1 First of all you need to change the indirect link between room and building There are two ways of doing this Method A _ Data media archive over KA Outpost 1 by drag and drop 2 When you release the left mouse button a pop up menu appears in which you should click the lt Move link gt option At the prompt click OK and the target object will be Move
246. n working with this data 140 Deleting an export lifts any editing blocks imposed by that export Once an export has been carried out it is no longer possible to re import the target objects concerned To delete an export place a checkmark next to it in column 1 of the list Now click Delete and confirm your action at the prompt by clicking OK The export will now be deleted from the list 138 The rules apply equally to modules safeguards and threats The term object is used to refer to all of these below 139 See also section 14 3 3 Post processing of imported target objects Detection of duplicate names page 265ff 140 1f for example the originally intended re import cannot be carried out or is not desirable or if further editing of the data in the source database is required after a one way export 214 GSTOOL 3 1 User Manual Export Import view gt gt Important Once a standard export is deleted the associated re import is no longer possible The only way to then fetch back the objects is to perform a one way export or one way import This will mean that the exported objects remain unchanged in the source database The objects returned via the one way export one way import will be created as additional objects A one way export can be deleted without further restrictions 9 10 Deleting an import All the imports created to date are listed on the Import tab card of the window with their n
247. name of the template to include linked MLZ 160 GSTOOL 3 1 User Manual Tab card Filter Properties Se ope Linked with Filter Direct target object type filter On this tab card you can define filters that will determine which target object types should be considered for the purposes of creating a report e DIRECT TARGET OBJECT TYPE FILTER This filter controls the way that directly linked target objects are handled Only target objects of the specified type are considered in the report IE If the box on the right is empty then all target object types will be considered INDIRECT TARGET OBJECT TYPE FILTER This filter controls the way that indirectly linked target objects are handled Only linked target objects of the specified type are considered in the report IS This filter is only considered if entries have been made on the Scope tab card The report includes all the target object types that are moved to the box on the right using the lt lt lt gt gt gt buttons If the box on the right is empty the filter is disabled and all target object types that occur are included in the report 161 Reports view GSTOOL 3 1 User Manual Reports view 6 9 5 Report header Report Protection requirement assessment Bundesamt fiir Sicherheit in der rmationstechnik Date 12 12 2004 ACME comments consistent in all reports If you want
248. ndard export Delete Edit If you want to re run an export that has already been executed you will first have to delete it see 9 9 recreate it and then re execute it see 9 3 1 to 9 3 3 132 e g the entire section of Top level aspects that relates to the chosen IT assets 206 GSTOOL 3 1 User Manual While the export operation is executing the progress of each individual table in the database will be listed on the Progress tab card and graphically presented by a progress bar Once the export has successfully completed an appropriate message will be displayed in another window 9 4 Standard import During a standard import standard export files are imported into a database so that they can be worked on temporarily In the editing window Import tab card click New to open the AMA eas Window which has the two tab cards Common and Progress 9 4 1 Tab card Common Common Progress Import file E GSTOOL 3 1 exports BS export 01 mdb Import type Name Comments a IMPORT FILE Use the Browse button to specify the file that is to be imported IMPORT TYPE The type is automatically recognised from the import file chosen NAME The import is automatically given the same name as the underlying export and cannot be changed 9 4 2 Carrying out the import To start the import operation click Run The AMAMA eA window automatically
249. ne a new module page 175ff 193 GSTOOL 3 1 User Manual BPM user defined view Tab card Common Common Modules Notepad x Type user defined adapted No Ti peme Version Threats text Content e CATALOGUE The default setting for this field is the catalogue to which the threat most recently selected on the Threats tab card belongs However any other catalogue can be chosen e PRIOR NEW CHANGED See section 2 4 11 New Prior Changed display page 67ff e TYPE The threat type is automatically set as User defined and cannot be altered e No The threat number is automatically preceded by the letter u for user defined and cannot be altered e NAME The title of the threat has to be entered here THREAT TEXT A description of the threat has to be entered here Tab card Modules This tab card is initially always empty for user defined threats User defined threats are either assigned to modules or de assigned from them in similar fashion to the adaptation of a threat that was described above Tab card Notes See Notepad on page 34 194 GSTOOL 3 1 User Manual BPM user defined view 7 5 6 Deleting a threat Only Adapted or User defined threats can be deleted However the effects of right clicking and then choosing lt Delete gt from the pop up menu clicking Delete in the toolbar and clicking the Delete button ar
250. ng windows o LAOUER IECES in the IMPLEMENTATION field o AER TCE in the EDITED field It is also applied in similar fashion to all the user defined elements Inheritance is always effected one step at a time from below to above i e from safeguards to module from module to layer or to target object etc IS The implementation status of safeguards and qualification level achieved are inherited independently of each other Thus it is possible for a module to simultaneously be assigned the implementation status Wied Of the safeguards and the qualification level achieved of Bv For example this would be the case if all the safeguards necessary to attain qualification level B had been implemented but other safeguards in the same module had not 12 2 1 Inheritance from safeguards to module The selection made in the IMPLEMENTATION field in the eA LAL ROLM Ee Lick IEICE Window has the effect of colour coding the implementation identifiers for the safeguards as follows Implementation identifier WV ogreen Weed W yellow Wolue untreated L 154 no colour The implementation status that is passed upwards is always the least favourable one as far as IT security is concerned 154 On some PCs untreated implementation status could be presented as a light grey bar The functioning of inheritance is not affected by this 241 GSTOOL 3 1 User Manual The inheritance mechanism If at least on
251. nges made by this option take immediate effect without restarting the tool LINK TARGET OBJECTS AFTER CREATION This option allows you to choose whether newly created target objects should be automatically linked and if so how Yes The target object will be automatically linked to the set of IT assets selected on the right This change will be implemented both in the relevant target object type list for this IT asset set and in the relevant target object type list in the lower section of the tree in Structure of target objects No No direct linking to an IT asset set will be carried out The target object will only be implemented in the relevant target object type list in the lower section of the tree in Structure of target objects Query this Every newly created target object once confirmed with OK will be directly linked to an IT asset set i e it will be implemented in the relevant target object type list for this IT asset set as described in section 4 2 4 Changing a link Step 1 Method B page 103 If an IT asset set is selected in the window WITH this will be preselected in the MERAN window and the link can then be directly established by clicking OK Edit IV Save without query I Direct edit safeguards of referenced modules Location 1 set of IT assets general IT asset set All No Revert Update OK Cancel fa 46 GSTOOL 3 1 User Manu
252. nkaen a asset 181 TAA Ad pting a safeguard neesan Ae gees Meee eee eae NSA eases ees hand Beales 182 7 4 5 Define a new Salequard i2 csacenkssaealth aes An es Garces edad cede 187 7 46 Deleting a safeguard ii iscccscccidisiseta seincieiaceesacdenetltdeenadens ehuandgceneh nad uansheceoeeenen ids 188 TO TabcCard THe ats ices intents eedccneutcindae cannneeeuneeociviauvemiin aaan uaaa raa EEUE aeaaaee 189 PO MEIN ocecena stance A A AE AEE AA AAS 189 PBZ Listof threats iscir ie naranai oi ee nck vuiste serak E EKUK ATEENAN KUESU PANKEK ete k ieat 190 725 3 Operathreatinteane a eas el ee e a a a E E a a 190 TE PROADUNG KeA E EE AETA E ETT 191 7 5 5 Define a new threat isrsissrirrnriiniisdeririretsiseseedoraiarkk iunt teks cote hens ede cee 193 T2920 Deleting UAC AG 2 sciatic erate eases ees Den A KRERET aes 195 7 6 Tab card Protection requirement categories cesseeseeeeeeeeeeeeeeeeeeneeeeeeeeees 195 8 IT Baseline Protection Manual ccccccccceeeeeeeeeeeeeeeeeeeeseeeeeeeeneees 197 8 1 BPM LOG Al VOW ice cets a ae aae aaran aa aae a av aaa aerae E aaan a a Er aaa aaciaee aasa 197 8 2 BPM online VIEW wcevcainstececiscectesneas stecnaucensnvansennndducnnsseetannnanecseecudensanenteceedenestenieieen 197 9 Export Import vieW ssssssssnnnnssnnnnnnnnnnnnnnnnnnnnnnnnnnnnnnnnnnnnnnnn nenne 198 9 1 Text file export of target ODjeCt ee ccecccceeeeeesseeneeeeeeeeeeeeeseeeeeeeeeeeeaeeeeeeeenneeeeees 199 9 1 1 Tab Card
253. nnrnnnnnnnnrnnnnnnnnnnnnnn nenne 152 6 8 Printing a FOPOM ecccse sense suctsscsdsancineeacnatcavancereanendeacetiueeteanstaacuutiesdsancivevennenseatacnerane 153 6 9 User defined templates aicsisccsecssiedsesesssussvecveseeuessavsdisvecsseevsenusdevsssieserssreesssreessdeiis 153 6 9 1 Template Structure cccccccecc cece cece cece cece ceeeeeeeeeeeeeneeeseeeseeeseeeeseeeseeeseeeeeeeseeeneeeess 154 6 9 2 Overview of report templates cece cece cece cee e cece cette eee e tees eee eeeeeeteeeeeeeeeeeeeeeeeeeees 154 6 9 3 Fab Card Pr perties ie nenna eaa a aaa carl alsa de 156 6 9 4 Determining the scope of the report ssssssrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrent 158 6 9 5 Report headet ere a a aae e i PA na aa ra a E dues 162 7 BPM user defined View ccccssceeececceeeeeeeeeeeeeeeeeesseeeeeeeeeeeeeeeneees 163 7 1 Tab card Target object types ccccccesssssseeeeeeeeeeeesesesseneeeeeeeeesnseneeeeeeeeeeeees 163 PUM Filteren a a a e us Ee Gide Giateudunatst a e Chaat dy 163 7 1 2 Listof target object TY OGS 5 tase cnt aces Ant eee ade ee a cates Ales ace aS ac 164 7 2 Tab card Target object subtypes cceseeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeneeeeeeneeeeeeees 165 TAPA PMG E E EE E E EA ented but OEA eave bantapadee tratiteay nda Tah atime E 165 7 2 2 List of target object SUBIY DGS sacxiaccetcnielenisceccekesdanatcetagctsaehsagedceseacnhaasBokcaatantnteadans 165 7 2 3 Edit t
254. nstitutes a design concept It specifies via the selected modules which standard security safeguards must be implemented on entry into service of the IT assets To contain the application fields of the individual modules the Modeling is broken down into the five layers used in the IT Baseline Protection Manual Section 2 3 of the IT Baseline Protection Manual explains to which target objects and under what preconditions each module should be applied within these five layers Here is an example from Layer 4 Module 7 3 Firewalls must be applied to every external connection to third party IT systems or networks where IT systems in the internal network which have a high protection requirement can be accessed over this external connection This applies even if no firewall system is in use there yet 253 GSTOOL 3 1 User Manual The IT Baseline Protection methodology Examples here are internet connections remote access facilities and links to networks owned by business partners These descriptions must be gone through systematically For each module it is necessary to check the target objects in the IT asset set under consideration to which it needs to be applied The Modeling thus generated constitutes the IT Baseline Protection security concept for the IT asset set under consideration 13 3 4 Basic Security Check If the IT Baseline Protection Manual is applied to an existing set of IT assets the next step is to check which o
255. ny employee the list will remain empty when you choose this filter Tab card Basic filter The following four Basic filter are offered EMPLOYEE ORGANISATIONAL UNIT The content of the ORG UNIT field in the area106 is offered to choose from If the list is empty then no entry has been made for any employee in this field The list will only contain employees who belong to the selected organisational unit ROLE The list will only contain employees to whom the selected role has been assigned IT SYSTEM NAME The list will contain only employees who are linked to the selected IT system APPLICATION NAME The list will contain only employees who are linked to the selected application 106 See 3 2 Creating a new target object page 78ff 148 GSTOOL 3 1 User Manual Modeling view More than one employee can be selected from the list Further details of how to specify your selection in column 1 and the pushbuttons offered are provided in section 4 2 4 page 104ff 149 GSTOOL 3 1 User Manual Reports view 6 Reports view In the Reports view GSTOOL 3 1 offers facilities for creating and printing out a wide range of reports and also for passing data to other programs outside of GSTOOL 3 1 for further processing Using the filter function you can restrict the information that is included in the predefined reports as you please If the predefined reports combined with the filtering facility still
256. ocal drive of another PC on which GSTOOL is installed and running The only exception is where the database is held on a machine that is running SQL Server 2000 When GSTOOL starts up the list of available databases in tab card Conection on the etsy e lo Me Fy mes CURO ELELEL Window is empty The system administrator installed GSTOOL for you logged off and then the system was started up with the standard user rights i e your user rights Following an attempt to attach an additional database to GSTOOL 3 1 using the Configure database utility this error message is displayed Create database authorisation denied in master database Your system rights do not allow you to attach the database You do not have the necessary system rights Ask your System Administrator to create a new user in GSTOOL for your database with your user name including the necessary user rights See section 11 2 1 Creating and editing users page 230ff Alternatively you can also log on as sa in the Configure database utility and attach a database yourself You then need to log on to GSTOOL again as sa with database security and configure yourself as a GSTOOL user See section 11 2 1 Creating and editing users page 230ff Once you have completed these actions you will be able to start up and work on the database as a normal user The alternative procedure is only possible if you know t
257. odeling then according to the inheritance rules section 12 3 Inheritance of qualification level achieved page 245ff it will not be possible for the entire asset set to attain this qualification level IS The next time that the metadata is updated S if a safeguard deleted from the module in this way has been changed by the BSI 4 then it will be added back to that module with the status Not processed If you still do not want this safeguard in that module you will have to delete it again as described 5 2 4 Adding a module Missing modules can be added one at a time to a target object in two possible ways Within the Modeling view the deletion of one safeguard in a module only affects the module in which it was actually deleted Everywhere else in the security concept the module will be kept in its normal complete condition 83 See section 2 4 3 lt File gt lt Import gt lt Update BPM metadata gt page 58ff No distinction is made here between meaningful changes and changes correcting spelling mistakes 124 GSTOOL 3 1 User Manual Modeling view e via the menu options e or by drag and drop Linking via the menu options Under this method select the target option in the tree to which a module is to be added 5 To add a module either click New in the toolbar or press key combination Ctrl N e Alternatively select menu option sequence lt Edit gt lt Modeling gt lt
258. odule kBx y will be transformed into a user defined module called bBx y In addition to this transformed module bBx y the original module Bx y will be supplemented at all the relevant places in accordance with the link specified in the IT BPM If prior to a data import from GSTOOL 3 0 the NEW OLD Changed display is changed to Old GSTOOL 3 1 will behave in the following non standard manner for the modules and safeguards concerned Modules and safeguards adapted in GSTOOL 3 0 are not converted to user defined modules and safeguards as described above but continue to be treated as adapted modules and safeguards Moreover the latest modules and safeguards are not integrated into the metadata in parallel In cases of modules safeguards and target object types the tool will inform you through an information field at the top right of the screen whether the associated metadata has been changed by the most recent metadata update or whether it has been added for the first time 9 2 4 4 lt File gt lt Exit gt This option closes GSTOOL 3 1 39 See section 2 4 11 New Prior Changed display page 67ff 59 GSTOOL 3 1 User Manual General information on working with GSTOOL 3 1 2 4 5 Copying objects GSTOOL 3 1 has its own application clipboard that is independent from the Windows clipboard This means that in Modeling you can copy modules and safeguards and in Structure o
259. oes iecvecetnnssasenteneetsiacracnsadeentecedivcstuncmnnenenadceenttentaenciaueticeatieenta 6 0 4 Warnings Notes tips mostcisssissisacetaccdurs canterendantiesintinactteabadseieencdaamarandoncedinragaandas 7 0AT WAPI GS siea e aeea abe te ca tees ueue ane oneal veal DE EA A tulad AE econo a aan 7 O 4 2 NOLES EEE EEEE eine clad ees ete on ian bo ok seg eo ae eee ES 7 OAS TDS ee ie Bea uss TO dtc cus nest seas dbs cae tceestceusecunte N 7 0 5 Naming and format CONVENTIONS c ceeeeeeeeeeeeeeeeeeeneeeeeeeeeeeeeeeeneneeeeeeeeeeeeseeneees 8 0 6 Problem FOP OMt aar a a aaa ashes lt bincedencasscunstansdadvs saves a r Ee a aaea aa r ae rahaaa aaa aahei 8 0 7 E mail newsletter on GSTOOL 3 1 n ssnnnnnnnnnnnnnnnnnrnnnnnnnnrnnnrnnnrnnnrnnnrnnnnnnnnnnnnnnnnnne 9 Installation first time use deinstallation cccceeeeseeeeeeeees 10 1 1 risstall Athos sis ci ois deseciacda sce causieivacaieesavccnvaseiva ideas E E E 10 1 2 Configuring the Sa password cccceeeeeeeeeeeeneeeeeeeeeeeneeeseeneeeeeeeeeeeeeeeeeeneeeeeeeees 16 1 3 E1GOM SING as cense E E T 16 1 3 1 Licensed operation ccecccccccccccccecceeeceeeceeeeeeeeeeeeeeeeeeeeceeeeceeseneeeneceneeeeeeseneeeneetness 17 13 27 Test operatioN rennan eiawtlevieoss wr an a Roan eeeenicetens a 18 1 4 Dein tall ation isis csi icec sista ineisiesaieasned sacs suavssadvesacvesncsasadasveesises sided esdedediveisievadtsvadasvadess 19 1 5 Database server databases
260. of this stage information will be available on any additional IT security safeguards needed to protect the IT asset set which supplement or replace the IT Baseline Protection safeguards 13 3 6 Implementation of IT security safeguards The Basic Security Check will have determined which relevant standard security safeguards have already been implemented and the areas which have not yet been adequately addressed During the supplementary security analysis any necessary more extensive IT security safeguards will have been identified for the IT assets under consideration The next step is to implement the outstanding safeguards and thus eliminate existing shortcomings As described in section 2 6 of the IT Baseline Protection Manual it is necessary here to first of all to review the investigation results and then convert them to a form which is easy to understand The safeguards that have still not been implemented should now be consolidated This is especially important if during the supplementary security analysis any additional IT security safeguards have been identified which possibly render particular IT Baseline Protection safeguards redundant An estimate of the costs and effort required can now 256 GSTOOL 3 1 User Manual The IT Baseline Protection methodology be prepared A distinction should be made here between one off and recurring investment and labour costs On the basis of the estimate of costs and effort required a
261. oggle the display of shortcuts keyboard navigation indicators on and off To change the settings for the appearance of Windows 2000 right click on the desktop then select lt Properties gt tab card Effects uncheck the bottom most checkbox or alternatively enable the display of shortcut labels on directly by pressing the Alt key once Only the uppermost line of the tree is visible in Structure of target objects otherwise nothing Possible cause 1 The tree has been completely minimised by selecting Minimise while the topmost line was highlighted See Maximizing and minimizing the tree on page 32 The other tree elements can be restored to view by double clicking the topmost line visible Possible cause 2 The user is working in the import work area for a standard import that did not contain any IT asset sets instead of in the standard work area Follow the instructions contained in section 9 4 4 Standard import without IT asset set page 209ff In the tree in Modeling a target object that is included in the object model does not appear in the layer model A target object to which no module has been assigned cannot be shown in the layer model Change over to the object model and create a link between the target object concerned and a module See section 5 2 4 Adding a module page 124 or 5 3 4 Dragging module to target object page 134 270 GSTOOL 3 1 User Manua
262. ology S2 Organisation e g S 2 25 Documentation of the system configuration Sa Personnel eiar Aha e g S 3 22 Regulations concerning substitution of telecommuters S4 Hardware amp Software e g S 4 95 Minimal operating system S5 Communications e g S 5 69 Protection against active content S6 Contingency Planning 05 e g S 6 18 Provision of redundant lines Both the modules and also the threats and standard safeguards are updated and expanded at least once a year These updates are oriented towards the needs of users of the manual 13 3 How to use the IT BPM in brief Chapter 2 of the IT Baseline Protection Manual defines and describes a methodology for creating or checking IT security concepts on the basis of standard security safeguards for IT solutions This methodology is outlined below 13 3 1 IT Structure Analysis This entails gathering information about the IT equipment that supports the area under consideration IT asset set The starting point here should be a network diagram e g a network topology which shows the IT systems and their networking links Experience suggests that these diagrams are frequently not up to date so the first task is to update the network diagram s To reduce the complexity similar objects should then be grouped together to make the IT assets which are the subject of consideration more manageable This is important for example where a department has a number of c
263. on page 234 65 GSTOOL 3 1 User Manual General information on working with GSTOOL 3 1 To open the PELE Ber te ok laleiereeicaa window select menu options lt Database gt lt Data backup and recovery gt Data backup andrecovery__ o Name of database Concept 03 bA Backup file C Concept_02 bak CA Progress P Backup Recover Close 7 Standard a DOMAENE B BSI Concept 01 e Inthe NAME OF DATABASE field select the target database i e the database to which the contents of the backup file should be written This does not have to be the one that is currently open In the example above the database currently open is Concept 01 whereas the target database is Concept 03 e Inthe BACKUP FILE field regardless of the default automatically supplied enter the path and name of the backup file whose content is to be written to the target database which you have specified in the NAME OF DATABASE field In the example above the contents of C Concept 02 bak will be written to the database Concept 03 You can select any backup file located on a local drive To select the file you can also use the Browse button on the right hand side next to the input field IS If you want to restore an existing database to a prior backed up status through a restore operation select the existing database as the target database If you do not want any existing databases to
264. on similar to the information in the COMMENTS field can be entered the only difference being that here additional functions such as character formatting and saving are offered oo rl rc er O wlalalg IS Notes are only intended for direct working with the tool These fields are not linked in any way within the tool The content of the Notepad e cannot be output in reports and e cannot be used as a filter criterion i The content of the Notepad tab card is always context oriented This means for example that entries made in the Notepad tab card when adapting a module in BPM user defined and Modeling are independent of each other This function can be made available for the entire database which the user has just been editing i e the current security concept by selecting lt View gt lt Notepad gt The availability of the following functions depends on the context e URL Here it is possible to reference any HTML document on the internet or intranet and to access it directly via 34 GSTOOL 3 1 User Manual General information on working with GSTOOL 3 1 e Any text can be entered in a text field and the following formatting options are available Al Font font style and size points can be determined also colour Al e Text field content can be loaded from files and saved in files txt and rtf files can be loaded and displayed in text fields Any existing content of the text fi
265. one s own rights by the assigned rights in relation to external target objects that are directly linked with a particular IT asset set It is entirely irrelevant here who created the target object and who created the direct link to the IT asset set No further rights for other external target objects exist The decisive factor for this right is the assignment of rights defined for the role Select lt Too s gt lt Roles gt and then in the RIGHTS TARGET OBJECTS column of the IT asset sets tab card specify the required rights variant expressly for every IT asset set149 The right granted in the RIGHTS GENERIC ASPECTS OF IT SECURITY column affects the use of rights on directly linked target objects Example For three IT asset sets rights for the generic aspects of IT security and the directly linked target objects have been assigned in a role as follows Data IT asset sets Target objects Description IT asset sets Abbreviation Name Description Rights on generic aspects_ Rights on target objects IT asset set 01 read write IT asset set 02 read read write IT asset set 03 read write The user of this role now has the following possibilities e For IT asset set 01 the role does not provide any rights This IT asset set is not therefore shown in the tree 149 See section 11 1 1 Creating and editing roles Tab card IT asset sets page 225ff 237 GSTOOL 3 1 User Manual
266. ons All and New are always All offered In addition the list also includes other filters which eee depend on the particular view or window currently open Further information on these filter options and the effect that they have is provided elsewhere in the relevant context Click E or select the New option to open the PAIE feta window in which you can define new filters Every new filter must be given a name Click to open the window for the user created filter displayed in the selection menu The same options are available here as for the creation of a new filter This button is not available for predefined filters The button deletes filters listed in the selection box which you have created yourself This button is not available for predefined filters 216 GSTOOL 3 1 User Manual Filter IS Basic filter and extended filters when combined act as if an AND logic operator applied If both filters are filtering the same criterion but with different values nothing will be shown in the tree 10 1 Tab card Basic filter Basic filter Extended filter asset set name selection Poo target object calculated protection reqiremel S YS target object type target object subtype set of IT assets general IT asset set building general building room general room room computer centre room data media archiv room office room protective cabin
267. or downloading IS The metadata has to be updated separately for each database attached to GSTOOL 3 1 For security reasons maintenance of older database versions it is not possible to update all the attached databases automatically Procedure Select menu options lt File gt lt mport gt lt Update BPM metadata gt The following window will now open 4 Update BPM metadata xj Data source Progress Update Close e DATA SOURCE In this field you can enter the location of the new metadata directly or alternatively you can choose the location by clicking the Browse button To start the update process click Update and confirm your action when prompted PROGRESS The progress of the update is indicated in the Progress window and the progress bar 58 GSTOOL 3 1 User Manual General information on working with GSTOOL 3 1 Effects on existing adaptations If any safeguard or module assignments have been changed in Modeling or in BPM user defined the metadata import will have the following effects e f any safeguards or modules that were linked with a target object otherwise than as linked by the IT BPM were deleted in Modeling this will be picked up again in the Modeling proposal as not processed e For modules which have been adapted through the addition or removal of safeguards or in any other way in BPM user defined the BPM metadata update will work like this An adapted m
268. ory e Update Reads the list of key files in again e mport This option enables a key file to be copied from any accessible directory to the local key store in a similar fashion to the function of the normal Windows Explorer e Export This option enables a selected key file to be copied to any accessible directory in a similar fashion to the function of the 62 GSTOOL 3 1 User Manual General information on working with GSTOOL 3 1 normal Windows Explorer The key file will remain in the local key store New Creates a new key file and saves this to the local key store Delete Deletes the selected key file after the user has confirmed the action at the prompt A key file cannot be restored once it has been deleted Once a key file has been deleted the data encrypted with that key cannot be restored either 2 4 10 lt Database gt lt Data backup and recovery gt Backing up data Before a database can be backed up the following conditions must be satisfied e The database to be backed up must currently be attached to GSTOOL 3 1 The user must possess BACK UP DATABASE right for the database he has opened and which he wants to back up If the user does not have the required right for the database currently open the menu option lt Data backup and recovery gt will not be offered If the user does have backup right for the open database but not for the database that he wishes to b
269. oth fields e Open This opens the Byueyletalciclaaeielecs window for a selected pair of values in which the value can be changed The name cannot be changed at this point El Supplementary attribute S 0 x Name air conditioning Value nel OK Cancel The window used to edit the value can also be opened by double clicking the pair of values in the list e Delete Deletes a supplementary attribute This button is not available in the case of generic supplementary attributes that have been defined for all target objects of a given type Text length in fields The length of the text that can be entered into individual fields is finite but has been set sufficiently large to accommodate normal entries However the fields especially the fields allowed for notes and explanations are not intended to be used to input long documents or graphics Only a reference to such documents and graphics should be entered 2 2 6 Changing the window width The size of the three windows for Navigator tree and editing screen can be adjusted horizontally with the mouse The default settings for window width can be restored by clicking FE Window in the toolbar 2 3 Default settings The default settings for the tool can be changed to suit personal preferences in the lt Tools gt menu 36 GSTOOL 3 1 User Manual General information on working with GSTOOL 3 1 2 3 1 lt Tools gt lt Roles gt See chapte
270. other cost management tools you can specify the 101 When choosing the currency both lines are always set to the same currency It is not possible to maintain fixed and variable non personnel costs in different currencies 102 For further information on how to convert the currency of an entire database see section 2 3 12 lt Tools gt lt Translate currency gt page 51 144 GSTOOL 3 1 User Manual Modeling view path and file name for a cost management file in the relevant input field or alternatively you can locate it using the Browse button to the right of the input field Cost management launches the application assigned to the file type and opens the cost management file entered is The path and file name must be specified separately for each safeguard 5 5 3 Tab card Revision Implementation Cost Revision Responsible Notepad Last audit by Last audit on Remarks a Next audit by Next audit at ir 4 a Project planning This tab card can be used to support auditing LAST AUDIT BY In this field you should select from the list of staff the person who carried out the most recent audit The list contains all the employees who have been created i e including people who are not linked to the IT asset set that you are currently editing If the employee you are looking for is not included in the list the person can be created in Master data LAST AUDI
271. ough the assignment of one or more roles 11 2 1 Creating and editing users To create a new user or to delete or amend an existing user select menu option sequence lt Tools gt lt User gt to open the window where all the users created by an authorised user are listed FA users User Account Explanation Type dbo sa 02 07 2004 10 37 49 System User 11 DOMAENE B A 15 01 2005 09 54 46 Integrated security User 22 15 01 2005 09 44 20 Database security Update New Open Delete l For all users created by sa or users with the equivalent permission SYSTEM ACCOUNT User the USER NAME and ACCOUNT columns contain the content that was entered in the fields with the same names in the REZA window tab card Common see page Fehler Textmarke nicht definiert Since under the Database security login there is no entry in the ACCOUNT field for users with this type of login the ACCOUNT field is empty in the list The different presentation of users with SYSTEM ACCOUNT System is irrelevant to using the tool 230 GSTOOL 3 1 User Manual Administration of rights New If you have been assigned the role System or your role contains the permission ENTER DELETE USERS AND ROLES when you click the New button the REZA window will open so that you can enter the user specific data gt GSTOOL users can only be created from within GSTOOL It is not possib
272. ow the desired IT asset set as required by the link rules 97 GSTOOL 3 1 User Manual Structure of target objects view IS Exception Applications Where links are created between different applications GSTOOL 3 1 cannot guarantee that the assignment will produce the correct hierarchical structure Where one application is linked to another the user decides which application is the father and which the child If the application is moved using drag and drop it is always placed below the application to which it is dragged 4 2 Linking of target objects As explained in section 4 1 1 Presentation Multiple presentation of target objects page 90 every target object can occur more than once in the tree In every case however it is always the same target object that is being dealt with The point at which a target object is selected for linking and where the link target is situated in the tree therefore make no difference to the outcome of a link However from a practical point of view there are certain differences which will be explained below 4 2 1 Direct indirect linking Set of IT asset have both direct and indirect links e A target object is directly linked to an IT asset set if it appears directly below a set of IT asset in the list of the six target object types Es building to As employee plus any existing user defined target objects e A target object is indirectly linked to a set of IT asset if it
273. p S To keep the time it takes to prepare a report as low as possible you should not include any more information in the template than is absolutely necessary The checkboxes determine what information is included in the report template They are hierarchically arranged The second third or fourth levels are only active when the checkbox for the level immediately above a particular group is selected For further information on how the checkbox selections affect the report please consult the online help 158 GSTOOL 3 1 User Manual Tab card Scope see On the Scope tab card the objects and information that are directly selected in the tree presentation for the creation of the report are determined wy ___ If you are going to integrate information into the report gt E template using this tab card only you should extend the name of the template to include selection 159 Reports view GSTOOL 3 1 User Manual Reports view Tab card Linked with Ei a a a a a gal This tab card is used to specify the objects and information that are to be contained in the report if they are linked to a target object higher up in the hierarchy Unlike tab card Scope it is not possible here to influence the selection of modules and safeguards that are included in a report WY If you choose data for inclusion in the report template on this tab card you should extend the
274. passed to other modules 159 The default colour used for mandatory fields is yellow This field can be changed with menu selection lt Tools gt lt Options gt Display 2 3 9 page 48ff 275 GSTOOL 3 1 User Manual Appendix Reference target The reference target is a module that references another module and whose information content is thus adopted by the first module Link In this manual a link refers to the creation of any type of link with the exception of referencing between target objects and between safeguards modules and target objects Qualification level The IT Baseline Protection methodology defines three qualification levels e the self declared IT Baseline Protection entry level known in GSTOOL 3 1 as level A e the self declared IT Baseline Protection higher level known in GSTOOL 3 1 as level B e the IT Baseline Protection Certificate known in GSTOOL 3 1 as level C Further information on the IT Baseline Protection qualification scheme can be found in this manual in section 13 3 7 IT Baseline Protection Certificate page 257ff and in section 2 7 IT Baseline Protection Certificate of the IT BPM Target object Target objects are IT assets that really exist for which an IT security concept based on the IT BPM is being created with the aid of GSTOOL 3 1 Individual target objects can contain other target objects and here they can be hierarchica
275. pes offered and confirm your choice with Save In the tree on the editing screen the selected target object type will be displayed immediately below its new father IS Only target object types that are not themselves fathers can be assigned to another father It is thus not possible to move an entire family of target object types to a different father Deleting a target object type Select the target object type that is to be deleted in the tree Now click Delete and confirm this action at the prompt with OK and the selected target object time will be deleted If the target object type deleted was a father its children will move 41 GSTOOL 3 1 User Manual General information on working with GSTOOL 3 1 one level up in the tree This change will be reflected immediately in the tree on the editing window IS Only unused user defined target object types can be deleted If a target object of the user defined type exists the deletion of this type will be refused with an appropriate error message Deleting a target object subtype Select the target object type whose subtype you wish to delete in the tree and then choose tab card Subtypes In the list select the target object subtype that you want to delete If no target object of this subtype yet exists you will be asked to confirm your action The selected target object subtype will be deleted after you confirm the action with Yes If however a targ
276. r The following four Basic filter are offered in Modeling ASSET SET NAME SELECTION From the existing asset sets one can be selected as long as the user has at least read right TARGET OBJECT CALCULATED PROTECTION REQUIREMENT Only target objects whose overall protection requirement matches the selection in this field are displayed TARGET OBJECT USER DEFINED PROTECTION REQUIREMENT Only target objects whose user defined protection requirement matches the selection in this field are displayed SAFEGUARD SEAL LEVEL The selections A B and C mean that only safeguards that are required from that level are displayed i e safeguards which bear the identifying letters ABC BC or b If you select delete then only safeguards that bear the entry delete in the REQUIRED AS FROM field in the ake XU Oley Li lecclaekey Window will be displayed If you select additional this means that only safeguards that are not necessary for any of the qualification levels will 75 The overall protection requirement is the protection requirement calculated from the individual data entries for the three basic parameters see PROTECTION REQUIREMENT ASCERTAINED field in Properties of target object of type target object type on the Protection requirement tab card 116 GSTOOL 3 1 User Manual Modeling view be displayed In the REQUIRED AS
277. r 11 Administration of section 11 1 1 Creating and editing roles page 221ff 2 3 2 lt Tools gt lt User gt See chapter 11 Administration of section 11 2 1 Creating and editing users page 230ff 2 3 3 lt Tools gt lt Password gt If the user has logged on to GSTOOL 3 1 with Apply database security and PASSWORD entry30 this option allows him to change his password 2 3 4 lt Tools gt lt Target object types gt This menu allows the user to e expand the list of predefined target object types and subtypes with user defined target object types and subtypes e rename target object types and subtypes e delete target object types and subtypes e assign target object types to another father e assign generic supplementary attributes that apply to all target objects of a particular type The QUE Ls ime e Xe giaele Window shows all the existing target object types with their assignments to each other 30 See section Registration type on page 28 37 GSTOOL 3 1 User Manual General information on working with GSTOOL 3 1 5 building toom Name New V network application Type BSI standard employee Version 2004010002 Comments Update New Save OK Cancel Ye e Common On this tab card it is possible to edit the NAME and FATHER fields for user defined target object types TYPE This indicates whether the target object type is defined by the IT BPM B
278. rds have been successfully imported and how many have not been imported due to errors Click OK to acknowledge this window and the import just completed is now transferred to the list of imports on the Import tab card IS If any defective data records are detected during the import operation GSTOOL 3 1 automatically creates a corresponding error log file An Explorer window opens in which you can specify the name and storage location of this file The default file name is Error txt The error log file only contains the defective data records and at the end of each defective data record the error that occurred is named The Progress tab card shows the progress of the import line by line along with the date time and number of the target object just imported and also the total number of target objects to be imported A progress bar also shows the progress of the import The import can be aborted by clicking Cancel The content of the database will then revert to its state prior to the start of the import 9 2 1 Database size with target object import from text file If a very large number of target objects 3 digits or more are imported during a target object import from text file the MDF and log LDF files in the target database can grow dramatically129 This is necessary for the import function to work properly 129 File sizes of over 100MB are possible 203 GSTOOL 3 1 User Manual Export I
279. re T1 8 Dust soiling BSI standard Force majeure T19 Loss of data due to intensive magnetic fields BSI standard Force majeure T 1 10 Failure of a wide area network BSI standard Force majeure 71 11 The effects of catastrophes in the environ BSI standard Force majeure T 1 12 Problems caused by big public events BSI standard Force majeure T1 13 Storms BSI standard Force majeure T 1 14 Loss of data due to strong light BSI standard Force majeure x Entries 331 Adapt New Open Delete The Threats tab card contains all the threats after filtering in accordance with any filters that have been selected 7 5 1 Filter A full description of the filter function can be found in chapter 10 Filter page 216ff e Predefined filters On the Threats tab card in BPM user defined the five threat catalogues defined in the IT BPM are additionally offered as predefined filters Tab card Basic filter The following two Basic filter are offered in Modeling THREAT CATALOGUE The list will only contain threats which belong to the selected catalogue MODULE TARGET OBJECT Only threats that apply to the selected target object as a result of the linking of modules in Modeling will be listed METADATA TYPE Only threats of the selected type will be included in the list 189 GSTOOL 3 1 User Manual BPM user defined view 7 5 2 List of threats e The No column contains the numbers of the threats as per the
280. re not currently linked to any IT asset set Vertically the uneven columns in the tree contain the target object types while the even columns contain the existing target objects This same structure is used both for the upper and lower parts of the tree The content of the editing window will depend on which column an object selected in the tree belongs to e f a target object type in an uneven column is selected then in the editing window all the target objects linked at this point will be displayed The content of the list is identical to the next column for the selected target object type Double clicking a target object in this list has the same result as selecting a target object in the tree e If a target object in an even column is selected then the I ALEEA 21M 8 ROLY eee area will be displayed in the editing window In this window all the data relating to Structure of target objects view set of IT assets E BSI building El room IT system aS network ia application employee building a room IT system ae network A application amp employee target object type 1 2 3 4 5 6 7 8 target object set of IT assets ge BSI Eh building EQ Head office fA room E Data media archive IT system i i employee AA employee room IT system ng network WA application amp employee Location 1 building d room amp IT system af network UG ee 60 The red
281. relating to a user role As well as rights roles user roles can also be assigned to a user 150 151 A user to whom a user role has been assigned has the same rights as the user whose name the user role bears These rights extend the user s own rights to include the rights conferred for external target objects that have been created by a different user IS The rights conferred in the user role are not transferred to other roles assigned to the user 150 For further information on user roles see section 11 2 2 User roles page 235ff 151 See section 11 2 1 Creating and editing users Tab card Roles page 234 ff 238 GSTOOL 3 1 User Manual Administration of rights Example Sometimes it can be necessary for several different users to all work on a database with the same rights Within the rights structure used in GSTOOL 3 1 this situation can be enabled by creating a user group Here each user in the group is assigned the user roles belonging to all the other members of the group as well as their own role e The group has three members X Y and Z e For each group member an individual role is created Xi Y and Zi e Each group member s own role grants right to create IT asset sets or target objects In this way GSTOOL automatically creates a user role for each member Xu Yu and Zu e Each user in the group is assigned the user roles of the other two members of the group in addition to their own indiv
282. relevant information on modules and safeguards is gathered by questioning technical persons To facilitate any queries that 96 The target object is only deleted from the structure at this point but is retained as target object in the lower part of the tree 97 The target object is actually completely deleted 140 GSTOOL 3 1 User Manual Modeling view may arise later on you should note down the person carrying out this survey and the people questioned in the WEGE area on tab card Survey 98 When a safeguard has been selected in the editing window there is a LALJ SiC eRe LCE Tere area on the right hand side next to the tree This has the following tab cards e Implementation Cost Revision e Responsible Notepad 5 5 1 Tab card Implementation Implementation Cost Revision Responsible Notepad No Name Module M 4 01 Buin ss SSSSiCS Priority Required as fomfAEntylev aulatio noveming acce to distributor iang Implementation untreated X Comments a The top three lines of the tab card contain permanent information relating to the safeguard This data cannot be changed No NAME The data in the two fields in the top line follow the stipulations of the IT BPM or in the case of adapted and user defined safeguards the entries made by the user MODULE The number and title of the module to which the safeguard you have selected belongs are stated
283. requirements that results from the inheritance process section 12 1 page 240 is displayed for each basic parameter for information purposes If no links that have inherited a protection requirement yet exist for this target object or if no protection requirement has yet been determined for the bequeathing target objects then no entry appears here In the PROTECTION REQUIREMENT DETERMINED field the highest of the three protection requirement assessments made here is repeated according to the Maximum Principle The suggestions regarding protection requirement are ignored for this purpose In individual cases there may be reasons for altering the protection requirement ascertained This is done by selecting one of the options available in the USER DEFINED PROTECTION REQUIREMENT field As soon as one of the three protection requirement levels is selected the GROUNDS field becomes a mandatory field 82 GSTOOL 3 1 User Manual Master data view IS Further information on the Maximum Principle and on user defined changes of the protection requirement can be found in section 13 3 2 Assessment of protection requirements page 252 of this manual and also in section 2 2 of the IT BPM under Assessment of protection requirements for IT systems Tab card Protection requirement is available for target object type Network but under the Baseline Protection methodology it should not be used We cannot guarantee that th
284. ririn aitinn aa 60 cost Management seeeeiriereerrrrerirrreeererns 145 CV fAs aa ana eaaa RAE 203 currency conversion in GSTOOL 3 1 oo eee 51 adjustment of during import of GSTOOL 2 0 dala e Bea et eat eee 54 D database reducing SIZC is 65 ia EEEO 205 databases attaching eiris ananin iinei aa a CEA 72 DaCKING UP ee a AE A AERA 63 CIONN i ra AA 23 creating additional 23 detla hing peonnin a a a 71 GUPICALOMN isyeen ere evden iea ada aana 23 278 Appendix JOGGING ON tO arrasi a 25 Microsoft SQL Server 2000 0 22 MSDE 2000 inssin nea aes 21 re aminNg ae eee ee ai aa e A 22 YESO G Aa EE 65 selecting ea na ITA 26 Ceinstallation c ccccceeeeeeeeeeeceeeeeeeeseesenanees 19 deletion of dummy IT asset Set eee eeeeeeeeeeees 212 Of modules cececeeeeeeeeceeeceeeeeeeteestneeeeees 132 OMMIGUIIS 3 to Masel ct aa 224 225 ONNOIGS ei rani ested n aa E 225 Of Safeguards cccccceeceeeseceeeeeeees 124 189 of target objects 0 eeeeeeeeeeeees 86 110 OP treats i eono eana a ana 197 ONUSCRS Tn r E 234 detection of duplicate names 79 216 269 disk image loading A e a aap AAA gedit eta 19 display 1 EEE EE EEEE E TE EE 49 lines MISTS enAnnan aes 49 module NUMDETS cccceccceeeeeeeeeeeeeeeeeeeees 48 objects blocked in tree due to export 206 old outdated numbers from GSTOOL 2 0 49 FIGHTS COUM rece 49 safeguard NUMDETS ee
285. s e by clicking Model in the toolbar by selecting lt View gt lt Display gt by pressing the key combination Ctrl U by right clicking and then selecting lt View gt 31 General information on working with GSTOOL 3 1 Scheme Windows Classic 7 Save As ltem Size Icon Spacing Horizontal GSTOOL 3 1 User Manual General information on working with GSTOOL 3 1 Maximizing and minimizing the tree The tree behaves largely in the normal Windows manner Branches of the tree are opened and closed by clicking the and icons or alternately by double clicking a particular object in the tree The lt View gt option accessed by right clicking an object in the tree can be used to access both Modeling and Reports lt Maximize gt The result will be to show all the levels of the tree located below the highlighted object lt Maximize gt is not offered in Structure of target objects The possibility of linking applications with each other see section Link rules page 95 can in conjunction with maximising result in very long chains that significantly exceed the maximum number of branches that will fit into the tree display To open a particular branch click Minimize is offered in all three views Structure of target objects Modeling and Reports lt Minimize gt closes all currently open branches of the tree below the highlighted object Compared with clicking
286. s not yet been activated attempts to access the database an appropriate error message will be displayed In the SUPPLEMENTARY INFORMATION area background information relating to the user can be entered If you wish to temporarily block access to the database for an existing user then you should remove the checkmark in this checkbox This checkbox provides an easy way of implementing a holiday block while a given user is absent on holiday A 7 sl O als AITA You can temporarily deny a user access to a database by deactivating the relevant user account This avoids the need to delete a user and then recreate him later on Tab card Roles This tab card shows you all the existing roles Roles which are to be assigned to the user currently being created should have their checkboxes in column 1 checked 234 GSTOOL 3 1 User Manual Administration of rights Common Boles Notepad Role type Rights roles X o System This role has already been allocated and cannot be changed within the application o Import 3 0 This role enables to migrate data of GSTOOL 3 0 o tole a role b New Open In the ROLE TYPE selection window you can choose between All roles Rights roles and User roles Through appropriate selections in column 1 it is possible to assign roles to an individual user either individually or several at a time rights roles and user roles Click Open to
287. s 17 link 0 0 0 9 ee 25 links CHANGING eesriie eed avlaceeei nines 104 ChEAUNG 4 Sera ate aie hvala TE 101 GSTOOL 3 1 User Manual deleti Seeds aaa ee 107 112 MAINTENANCE cceceeeeeeeeeeeeceeeeeeeteeseaeees 112 logo changing program start eseese 44 changing report header eee eeeeeeeeeee 163 logon information cece eeeeeeeeeeteeeeetteeeeeees 28 M mandatory fields ceceeeteeeeeeeeteeeeees 33 279 changing COIOUL ccceeeeeeeeeeeeteeeeeenteeeeeeaes 48 conditionally cccececeeeseeeeeeeeees 33 279 permanently cccccceeeeseeeeeeeeeeees 33 279 memory rEQUIFEMENTS eeeeeeeeeeteeeeeetteeeeeenaes 6 MENU Dara ce ected ae ace ie ede 29 menu commands activation Of aiea e oaea 29 deactivated an a 276 metadata ntn ea 279 UIP CATING eioen enera cohatecan had 58 module numbers display O o iea 48 modules AG APLING iesea ER 170 adding anea ea er e 125 ChE ating NEW meet cdeeedisticeseolieagehe eehisteett 176 deleting icv ier eee het 132 PONAMING Ls ieiecees condos stenededieendevedteeneesdiieaeeeei es 172 multi customer Capability 00 0 2 eeeeeeeeeeeee 24 N Navigator ii seseeeviael oh veetsiecet aageeeviad A 30 altering background colour of 274 multi line display iN 31 Show hide 3 terete eee ae 31 Notepada oaea anitae aa aa eaea 34 O object Model ceeeeeeeeeeeeeeeees 31 113 119 Obsolete iin ste cce ide A ei ee
288. s for which these safeguards Ze S 2 194 Drawing up a sch Rec S 2 195 Drawing up an IT have to be implemented The reason for this is that the modules a 5 2195 Inelemertaten of l a rawing Up trait in this layer are normally assigned directly and exclusively to ge TE oe aie P suk P 2 200 Prepar f the asset set independently of individual target objects This An Spee emma means that the layer of target objects that is dropped in the me cede i M 3 010 i reduced presentation would contain nothing other than the M302Pecornel asset set FE bb i M 3 03 Contingency Planning M 3 04 Data Backup Policy M 3 06 Concept of computer virus M 3 07 Crypto concept M 3 08 Handling of security incide M 3 09 Hardware and Software b M 3 10 Outsourcing amp amp M901 Standard software M 9 05 Archiving ttit to 1 2 Se ee ee ee Ea b I Full display of the a generic aspects of IT security layer If a module in the Ww generic aspects of IT security layer is linked to a target object the attempt at reduced presentation is given up for the entire layer so that once again the level of target objects is shown for all the modules i e below each module at least the IT asset set is displayed as linked target object LJ Layer modet BS E a GJ BS In the example on the right module si M 3 03 Contingency Planning is also linked to target object a Net
289. s only takes into account safeguards contained in the adapted module 121 Tab card Threats On the Threats tab card it is possible to add threats to a module or to delete existing threats from a module in a fashion similar to that which applies on the Safeguards tab card page 172ff Tab card Notepad See Notepad on page 34 7 3 5 Define anew module As already explained in connection with the adaptation of a module the IT BPM modules cannot cover every conceivable IT asset set that might exist in the real world If the real life situation departs only slightly from the module description then the best approach is to adapt a module If that is not sufficient GSTOOL 3 1 users can create complete modules which are tailored to their particular requirements 121 The reason for this is the premise stated at the beginning of this section that adaptation does not affect the security 175 GSTOOL 3 1 User Manual BPM user defined view Target object type Target object subtypes Modules Safeguards Threats Protection reguirement category uM 3 89 V LAN Rules user defined adapted generic aspects of IT security uM 7 89 V LAN user defined adapted Security in the network M 3 00 IT Security Management BSI standard generic aspects of IT security M 3 01 Organisation BSI standard generic aspects of IT security M 3 02 Personnel BSI standard generic aspects of IT security M 3 03 Contingency Planning BSI s
290. safeguard now opens 7 4 4 Adapting a safeguard As for the modules and threats it may also be necessary to modify individual safeguards in line with your particular requirements Here you should bear in mind that when you adapt a safeguard it is not basically altered but only adapted If a safeguard in its present form is so unsuitable that extensive changes are required this should be implemented by creating a user defined safeguard see section 7 4 5 Define a new safeguard page 187ff i A safeguard that is adapted in BPM user defined will replace the original safeguard at every point in GSTOOL 3 1 and the associated safeguard number will consistently be preceded by the identifier a IS Only BSl standard safeguards can be adapted User defined safeguards can be further edited via Open page 181ff IS When a safeguard is adapted this does not alter the identifier of the modules to which that safeguard belongs The modules are not transformed into aM i e adapted modules To adapt a safeguard right click and then choose lt Adapt gt from the pop up menu or click the Adapt button The window in which you can change any existing data as required over four tab cards will now open 182 GSTOOL 3 1 User Manual BPM user defined view Tab card Common Common Roles Modules Notepad Catalog infiastuctwe lr Type user defined adapted No S Name Version Safeq
291. safeguard needs to be implemented ABC Implementation of this safeguard is necessary for all three qualification levels BC Implementation of this safeguard is necessary for levels B and C 115 Modeling view LJ Layer modet BSI F Be Gl BSI generc aspects of IT security de M3 00IT Security Management ale M 3 01 Organisation a M 3 02 Personnel d M 3 03 Contingency Planning d M304 Data Backup Policy amp M 3 06 Concept of computer viru d M307 Crypto concept d M 3 08 Handing of security incid amp M 3 09 Hardware and Software d M310 Outsourcing d M301 Standard software d M905 Archiving Security of the infrastructure Security of IT systems Security in the network Security in applications ocation 1 generc aspects of IT security 2 4 EePeAA F Fs 5h RE Swe G H Secunty of the infrastructure yy Security of IT systems ye Security in the network fe Security in applications GSTOOL 3 1 User Manual Modeling view C Implementation of this safeguard is only necessary for C This safeguard should be implemented but it is not essential for the attainment of any qualification level 5 1 3 Filter A full description of the filter function can be found in chapter 10 Filter page 216ff e Predefined filters No additional predefined filters are offered Tab card Basic filte
292. safeguard that has been dragged here The description of the target safeguard remains unaltered 5 3 2 Dragging safeguard to module When the safeguard is released over the target module a menu appears as follows Relocate Copy e If you choose lt Relocat gt after a user prompt the safeguard is inserted into the module and deleted from its original location e f you choose lt Copy gt after a user prompt the safeguard is inserted into the target module It will also remain in its original location If the safeguard you have dragged here is already contained in the target module the user will be asked to confirm whether the existing safeguard content is to be overwritten 5 3 3 Dragging module to module After the module being dragged is released over the target module the following prompt window appears 133 GSTOOL 3 1 User Manual Modeling view GSTOOL 3 1 x 9 Do you want to overwrite the existing safeguards of module 22 grooms in the 1 floor M 4 03 01 Office gt to those of the module lt rooms in the 1 floor M 4 03 01 Office gt Click lt Yes gt to overwrite the Following safeguards 5 1 15 Closed windows and doors 5 1 23 Locked doors 5 1 46 Use of anti theft devices 5 2 14 Key management 5 2 16 Supervising or escorting outside staff visitors 5 2 17 Entry regulations and controls 5 2 18 Inspection rounds 5 3 9 Ergonomic workplace Yes No Cancel e f you answer with Yes t
293. ser Manual Modeling view Initially this list is empty GSTOOL 3 1 does not automatically complete any of the fields IS The five pushbuttons only relate to the IMPLEMENTATION RESPONSIBILITY table INITIATION RESPONSIBILITY Implementation Cost Revision Responsible Notepad Initiation responsibility person 01 staff group person 02 single person person 03 technique group person 04 person 05 A list of all existing employees 4 is provided for you to choose from Only one employee can be selected IMPLEMENTATION RESPONSIBILITY To access the KAKIA eller Window choose Add Filter1 5 e Predefined filters As well as All and New the following additional predefined filters are offered In accordance with BPM role assignment The list contains only employees to whom a role has been assigned which according to the IT BPM can be responsible for implementing the safeguard that you are currently editing 104 See 3 Master data view page 75ff 105 A full description of the filter function can be found in chapter 10 Filter page 216ff 147 GSTOOL 3 1 User Manual Modeling view alo Filter ait i In accordance with BPM role allocation 7 __ Abbreviation Name person 01 staff group person 04 All None Reverse OK Cancel A If the role envisaged by the IT BPM for implementing the safeguard that you are currently editing has not yet been assigned to a
294. ser defined will be imported into the existing metadata and identified as such During future Modeling the system will then refer to these imported objects Currency adjustment In GSTOOL 3 1 cost data can only be maintained in euros EUR or US dollars USD It is no longer possible to introduce other currencies as it was in GSTOOL 2 0 To correctly convert costs from the two currencies that could be used in GSTOOL 2 0 to the currency chosen in GSTOOL 3 1 54 GSTOOL 3 1 User Manual General information on working with GSTOOL 3 1 the following settings are required when importing data from GSTOOL 2 0 IS This function should not be confused with the currency conversion function described in section 2 3 12 page 51 IMPORT CURRENCY In this field you should select the GSTOOL 3 1 currency into which the GSTOOL 2 0 cost data is to be converted i e EUR or USD EXCHANGE RATE 1 CURRENCY Enter the exchange rate between the two currencies The exchange rate results from dividing the GSTOOL 2 0 currency by the import currency as follows If one unit of the currency used in GSTOOL 2 0 e g 1 00 DM corresponds to 0 51129 units of the import currency e g 0 51129 then the exchange rate is 1 0 51129 1 95583 IS Up to five decimal places of the exchange rate are taken into consideration EXCHANGE RATE 2 CURRENCY Here you should proceed as is appropriate for the second currency used in GSTOOL 2 0 If no
295. should configure the login to the database to be imported in the same way as you did in GSTOOL 3 0 On the Import tab card select the database server SERVER NAME field and then the database DATABASE field that you wish to import into GSTOOL 3 1 To start the data import process click Run If you choose the option DATA MIGRATION FROM GSTOOL 3 0 the default setting all the data contained in the database currently open will be deleted prior to the data import The existing data will be permanently deleted 38 See section 2 4 14 Configuring the database Databases tab card page 71ff 56 GSTOOL 3 1 User Manual General information on working with GSTOOL 3 1 IS If you disable the option DATA IMPORT FROM GSTOOL 3 0 the existing data will be kept and the imported data will be added to it However we strongly recommend that you leave the default setting for this option as it is and do not disable it for the following reasons e lf the data import is carried out to its conclusion without cancelling the insertion of imported data items that are related to date on which already exists will produce results which although technically correct are nevertheless confusing e Termination of the data import before it has finished will cause the import to stop abruptly in the middle of the process This can result in inconsistencies the effects of which cannot be known for sure in advance The progress o
296. so on the BSI s website at http www bsi bund de gshb zert 13 3 8 Maintenance of IT security It is a characteristic of processes and components in the information technology world that nothing stands still but changes is constant and rapid It is therefore not sufficient to prepare and implement an IT security concept for the IT assets on a one off basis Instead the implications of every change must be considered promptly to ensure that secure operations can be maintained The steps described above in applying the IT Baseline Protection Manual should therefore be repeated at regular intervals and in each case it is necessary to check where any changes in the use of IT affect the security concept and the implementation of security safeguards There will always be cases where new IT security mechanisms become necessary even if the IT landscape employed has not changed One example here is changes to the protection requirement which result from the fact that a particular IT application has suddenly become a lot more important to the organisation and is hence in need of greater protection 258 GSTOOL 3 1 User Manual The IT Baseline Protection methodology 13 4 Sources of supply The IT Baseline Protection Manual can be obtained from three distribution channels The printed German language version is distributed by the Bundesanzeiger Verlag http www bundesanzeiger de The document is available as a set of three loose lea
297. stems e M7 x Data transfer e M8 x Telecommunications e M9 x Other modules which do not obviously belong to any of the other areas Further information on the numbering system can be found in the IT BPM 14 3 Information regarding imports from text files 14 3 1 Format requirements e Each data record is stored as a single line Each column entry is separated from the next by a semi colon e All the data for a target object must be contained in one line e The first line in the file header contains the column names The column names can be arranged in any order e The column names must comply with the requirements which are listed in the online help under key word Field list 263 GSTOOL 3 1 User Manual Appendix iox E e gt amp Ausblenden Suchen Zur ck Vorw rts Drucken Inhalt Index Suchen Favoriten Glossary Zu suchendes Schl sselwort Field list Export Import rights a Field list Database fields can be designated by their usual names or by the codes provided in brackets below Type ZOT_ID Filter define Filter show Defines target object type Subtype ZOS_ID The contents of this field are held In the following registers e Target object Application Either the term before the bracket or the term contained in brackets can be used It is important to adhere precisely to the required notation Example Type or ZOT_ID
298. switches to the Progress tab card on 207 Export Import view GSTOOL 3 1 User Manual Export Import view which the progress of the import is shown in list form and also as a progress bar An appropriate message is displayed once the import has successfully completed Now close the window by clicking Cancel The import is added to the list shown on the Import tab card Export Import Emen oo a a O Standard BSI 06 10 2004 11 45 03 Standard work area OURS ee 07 12 2004 16 25 42 Standard import elete Open Now Activate 9 4 3 Processing a standard import GSTOOL 3 1 can only be started with a database attached to it To prevent this database from becoming mixed up with the target objects imported via a standard import an additional separate work area is created for every standard import in addition to the work area for the database with which GSTOOL 3 1 was opened The user can tell which work area is which by their names which are also shown on the bottom line of the GSTOOL screen e Standard is the work area for the database with which GSTOOL 3 1 was opened Goa P IMAENE B Administrator DOMAENE B BSI Concept 01 e In this example export IT asset BSI is the work area that has been specially created for this import export IT asset set E DOMAENE B Administrator DOMAENE B BS Concept 01 To select a work area place the mouse pointer in the desired work ar
299. sysdba has been changed then the new user ID should be entered 36 If the default password of GSTOOL 2 0 masterkey has been changed then the new password should be entered It is not possible to restore a password other than the default password should this have been forgotten 53 GSTOOL 3 1 User Manual General information on working with GSTOOL 3 1 IS The data from GSTOOL 2 0 is imported into GSTOOL 3 1 as far as possible Further development of the Baseline Protection methodology means that information that was not entered in GSTOOL 2 0 is now necessary in GSTOOL 3 1 It is therefore imperative to supplement the old imported data if appropriate and to update the links Identification of old imported objects The three checkboxes allow you to specify whether the subtypes modules and safeguards imported from the GSTOOL 2 0 database should be created in GSTOOL 3 1 as user defined e Import with checkbox checked Irrespective of whether the objects contained in the old database also exist in GSTOOL 3 1 the objects will be imported into the existing metadata as user defined During future Modeling the system will then refer to these user defined objects e Import with checkbox not checked Objects of the type BSI standard will not be imported into the existing metadata During future Modeling the system will then refer to the objects of the same name in GSTOOL 3 1 Objects of the type u
300. t All data inputs are discarded e OK Closes the window creates the target object and passes this to the present view If this does not happen automatically then you should update the view 8 Update in the toolbar or F5 e Save Creates the new target object and saves the information entered so far but leaves the editing window open so that you can enter any further data you wish for this target object e New How GSTOOL responds after you have clicked New depends on the setting you chose under SAVE WITHOUT QUERY 8 58 See 2 3 5 lt Tools gt lt Options gt Common Edit page 43 84 Master data view GSTOOL 3 1 User Manual Master data view If SAVE WITHOUT QUERY is allowed the new target object is created immediately with the data entered up to this point The editing window will remain open along with all the data thus enabling you to create additional target objects 3 3 Editing a target object There are two possible ways of opening the window for editing a target object e Select the target object with the mouse somewhere in the line and click Open e Double click the target object IS Checking a box in column 1 will have no effect here The window that is now opened Properties of target object of type target object type is identical in all its functions and input possibilities with the window Properties of target object of type target object type See section 3 2
301. t least one role has been checked in column 1 e Reverse reverses the selection indicated in column 1 all the roles not currently selected will be selected and all the roles currently selected will be deselected Tab card Modules Common Roles Modules Notepad Buildings Protective cabinets room Schutzschranke Beschaffung und Einsatz Working place at home Computer Centres This tab card lists all the modules to which this safeguard belongs If no change has yet been made to the links to modules for these safeguards then the links will be those specified in the IT BPM Otherwise the list will contain the results of earlier adaptation work The buttons Reverse Delete and New operate in a similar way to the functioning described for tab card Role 123 See sections 7 3 4 Adapt a module page 169ff and 7 3 5 Define a new module page 175ff 186 GSTOOL 3 1 User Manual BPM user defined view 7 4 5 Define anew safeguard If the changes that need to be made to a safeguard are too major to be a case of adaptation GSTOOL 3 1 users can themselves create brand new safeguards that meet their particular requirements To enter all the information for a new safeguard right click and then choose lt New gt from the pop up menu or click New in the toolbar or click the New button The PEMA ete IEK Window will now open This window contains the same four tab cards that were descr
302. t sets en bloc By combining the Ctrl key with the left mouse button you can select several IT asset sets in succession The rights for the generic aspects of IT security of an IT asset set are determined by means of the four selection possibilities outlined above The right entered here is automatically transferred to the IT asset set in the Target objects tab card NONE The user has no rights in relation to this IT asset set Such an asset set is not visible to the user in any of the views Only by looking down the list contained on the IT asset sets tab card can users find out about the existence of asset sets in respect of which they have no rights READ The user has only read right for this IT asset set As far as the individual views are concerned this means 226 Administration of rights Generic aspects none Generic aspects read Generic aspects write Generic aspects auditor Target objects none Target objects read Target objects write Generic aspects none Generic aspects read Generic aspects write Generic aspects auditor Target objects none Target objects read Target objects write GSTOOL 3 1 User Manual Master data Data relating to the asset set concerned can only be read Delete and write functions are deactivated Structure of target objects All existing direct links to the asset set are protected against changes On the other hand l
303. table contains all the main details for each target object Immediately after GSTOOL 3 1 has been installed the first six columns are already completed with default values In addition the RIGHTS and ID columns can also be viewed Master data Notepad mte B fen z p a a a generic aspects of IT security general IT a Dara media archive room data media archiv Te File storeroom room general room 10024 Head office building general building 10015 Network 01 network heterogeneous network 10025 Office 01 room office 10026 Office 02 room office 10028 Outpost 1 building general building 10019 Outpost 2 building general building 10022 Outpost 3 building general building 10023 person 01 staff group employee general employee 10033 person 02 single person employee general employee 10034 person 03 technique group employee general employee 10035 person 04 employee general employee 10036 person 05 employee general employee 10037 O m O O O m O m O m O m O m O New FILTER A full description of the filter function can be found in chapter 10 Filter page 216ff e Predefined filters As well as All and New the following additional predefined filters are offered Not linked to an IT asset set With this filter only those target objects that have not been 50 Outside of the Master data there are opportunities at many other places in the tool to create new master data re
304. tain files required to run GSTOOL 3 1 are located Changes made to 33 If the screen resolution is only 800x600 and the BSI logo is shown some of the fields for the Modeling screen will not fit in the screen If this is the case this option should be disabled or the screen resolution should be increased 50 GSTOOL 3 1 User Manual General information on working with GSTOOL 3 1 these settings should only be undertaken with great care It is not possible to reset the file paths automatically to the default values with which the product was delivered e To specify the paths for the APPLICATION and HELP FILE you should proceed as follows Here the system always shows the paths for the language versions that were selected in tab card Common under LANGUAGES If more than one language file is available for the tool then before making any changes to the path you need to specify the language for which the path should be changed IS These changes will take effect for all the users IS The language used for navigating the Help screens is determined by the operating system and cannot be specified through GSTOOL 3 1 I amp S It is possible to store the files concerned to a different local directory and to change the file paths accordingly However it is imperative that the original paths are not deleted 2 3 12 lt Tools gt lt Translate currency gt The tool can maintain cost data in both euros EUR and US dollars
305. tandard generic aspects of IT security M304 Data Backup Policy BSI standard generic aspects of IT security M 3 06 Concept of computer virus BSI standard generic aspects of IT security M 3 07 Crypto concept BSI standard generic aspects of IT security M 3 08 Handling of security incidents BSI standard generic aspects of IT security M3 09 Hardware and Software M BSI standard generic aspects of IT security M 3 10 Outsourcing BSI standard generic aspects of IT security M 4 01 Buildings BSI standard Security of the infrastructure M 4 02 Cabling BSI standard Security of the infrastructure To enter all the information for a new module right click and then choose lt New gt from the pop up menu or click r New in the toolbar or click the New button The KAUAE AME window will now open This window contains the same six tab cards that were described above in connection with the adaptation of a module Tab card Common 5 Definenewmodle o Common Target object type Target abject subtype Safeguards Threats Notepad Layer Prior J Type Audit relevant No No Name Version Module text Content T e LAYER From the options offered select the layer to which the new module is to belong The default layer offered is the one to which the module belongs i e the one that was picked at the start of the creative process e PRIOR NEW CHANGED See section 2 4 11 New Prior Changed display page 6
306. target object will disappear from this position in the tree This function is largely identical to that described in section 4 2 5 Deleting a link page 106ff 111 GSTOOL 3 1 User Manual Modeling view Adding linked objects IS This action is only possible from the target object Select the relevant target object and then e either select menu option sequence lt Edit gt lt Modeling gt lt Link dependent gt e or else right click and then choose the lt Link dependent gt option This menu option enables you to link directly to the IT asset set target objects that are indirectly linked to the selected target object but not yet directly linked to the IT asset set For further information see section 4 2 3 Linking dependent target objects page 101ff 5 1 2 Tree presentation In GSTOOL 3 1 you can view both the layer model and also the object model Moreover sorting and filter functions are available to make the tree easier to follow Icons are provided to help you navigate your way around the tree Switching to the model view It is possible to switch between the layer model and the object model at any point in the tree This can be done in several ways e by clicking Model in the toolbar by right clicking and then selecting lt View gt lt Layer model gt or lt Object model gt e by selecting menu option sequence lt Edit gt lt Modeling gt lt View gt lt Layer model gt or lt Object
307. target objects which the GSTOOL 3 1 user is normally forced to provide through the use of mandatory fields could be missing e Example The import file contains the protection requirement for a target object but omits the necessary rationale Information like this which is missing has to be completed manually the first time any changes are made to the target object in question in the appropriate screen Dispensable information It is possible that the data imported could include some information that cannot be represented in GSTOOL 3 1 e Example In an import file which contains information on target object type Employees there is a column called Person related data However in GSTOOL 3 1 the only person related data that can be stored is for target object type Application Such information is ignored by GSTOOL 3 1 There is no need for the user to delete it 266 GSTOOL 3 1 User Manual 14 4 Troubleshooting Appendix Due to the high complexity and the large number of possible settings and ways of using GSTOOL 3 1 occasionally it produces unexpected responses Usually this is not due to a bug but to a problem that can be resolved or circumvented by adopting the appropriate procedure The problems identified so far are listed below together with details of how to remedy them Is this information does not help or if you are unable yourself to solve a problem that is not included here please send us t
308. taset is already very large 52 53 Only one set of IT assets can be selected and the user must have at least read permission for this set of IT assets The overall protection requirement is the protection requirement calculated from the individual data entries for the three basic parameters see PROTECTION REQUIREMENT ASCERTAINED field in Properties of target object of type target object type on the Protection requirement tab card 76 GSTOOL 3 1 User Manual Master data view TARGET OBJECT SUBTYPE Only target objects of the selected subtype are displayed 3 1 Determining the target object type To create a new target object it is necessary first of all to determine the target object type to which the new target object is to belong Accordingly all routes to creating a new target object entail selecting the target object type first This can be done in any of the following ways e by selecting menu option sequence lt Edit gt lt Master data gt lt New target object gt by clicking a New in the toolbar by right clicking with the mouse and then choosing the lt New target object gt option Each of these three methods result in display of the same Import data drop down window containing four menu options Blank target object Current type Select type Strg N e Clicking New in the toolbar This function takes you to the window From the options offered select the desired target obj
309. te since which this safeguard has been superseded in the IT BPM e ENTRIES The number of entries contained in the displayed list is indicated at the bottom left of the tab card Right click and then choose lt View gt from the pop up menu or click View in the toolbar and a browser window containing the printable version of the safeguard description from the IT BPM will open The activities described below can be carried out from the list 7 4 3 Opening a safeguard Depending on the type of safeguard various actions are possible after opening a safeguard e Opening a safeguard of type BSl standard Double click on the safeguard or right click the safeguard and then choose lt Open gt from the pop up menu or click the Open button or click amp amp Open in the toolbar The window in which you can view the entries for the selected safeguard over several tab cards now opens The entries on the Notepad tab card can be altered e Open a safeguard of type user defined adapted Double click the relevant safeguard or right click and then choose lt Open gt from the pop up menu 122 See section 7 4 5 Define a new safeguard page 187ff 181 GSTOOL 3 1 User Manual BPM user defined view or click the Open button or click amp Open in the toolbar The window in which data relating to the safeguard can be altered in a fashion similar to that described in section 7 4 4 Adapting a
310. ted also by checking a checkbox whether any person related data is handled on this IT system e NETWORK By checking the appropriate checkbox you should indicate which of the five reasons given is the one which makes the network under consideration critical It is possible to check more than one box Further information on these categories can be found in section 13 3 2 Assessment of protection requirements on page 252 of this manual and in section 2 2 of the IT BPM under Assessment of protection requirements for communications links e APPLICATION By checking the appropriate checkbox you can indicate whether this application handles person related data The data entered in the PROCESSED INFORMATION field will be output separately in the relevant reports e EMPLOYEE ROLE is a mandatory field The roles offered are the various responsible roles specified in the IT BPM for the implementation of safeguards If none of the roles offered applies then choose the dash The list of roles offered cannot be extended 80 GSTOOL 3 1 User Manual Master data view l New target object employee 7 lol x Properties of target object of type employee Personnel Links Notepad Supplement Name person 01 staff group Abbreviation Subtype iger Sa aps Number Telephone email Role S ice Org unit 7 Comments IS This role assignment in this example Site technical service
311. ter data relating to the selected module Tab card Common Common Survey Threats Notepad No Name M3m Organisation OO ss SSSCiS Edited bs o In target object not referenced X Comments Defined at No NAME The data in the two fields in the top line follow the stipulations of the IT BPM or in the case of adapted and user defined safeguards the entries made by the user EDITED In this field there are three options choose from yes no and dispensible e yes This module will be directly implemented at this point in the tree or via a reference from another place Its implementation identifier in the tree follows the implementation of the safeguards in the module in accordance with the inheritance rules page 241ff e dispensible Implementation of this module is regarded as dispensable The security offered by this module is achieved through other safeguards or else the threat to which the module relates is not relevant This should be noted in the mandatory field COMMENTS Modeling view 86 For further information on the colour coding of unnecessary modules see 12 2 Inheritance of implementation status page 241ff 127 GSTOOL 3 1 User Manual Modeling view e no This module should not be implemented The threats that the module and its safeguards are intended to counter will continue to exist Nor will they be covered by other saf
312. the following views the result being slightly different in each case Modeling Here Ctrl D deletes the existing link between the selected object and another one The selected object will retain its other links and if required it will be possible to recreate the link later on Structure of target objects For a selected target object in the upper part of the tree Ctrl D deletes the target object link at the highlighted point For a target object selected in the lower part of the tree Ctrl D has the effect of deleting the target object itself Master data Here Ctrl D has the effect of completely deleting the selected object All existing links are deleted and the object is then no longer available 261 GSTOOL 3 1 User Manual Appendix Ctrl E Ctrl F Ctrl G Ctrl Ctrl K Ctrl N Ctrl P BPM user defined Here Ctrl D has the effect of deleting objects on tab cards Target object subtype Modules Safeguards and Threats which have the entry User defined in the TYPE column User defined target object types can only be deleted via the lt Tools gt lt Target object types gt menu Inserts the content of the application clipboard into the currently selected object Toggles the filter selection field on and off has the same effect as Filter in the toolbar This command is only available in Structure of target objects Modeling and
313. the box You can cancel the deadline you have set by clicking the box again The selection button takes you to a calendar in which any date can be chosen as the deadline IS Because it is possible to specify date in the past you can also put deadlines that have already expired in the security concept 100 See 10 Filter page 216ff 143 GSTOOL 3 1 User Manual Modeling view 5 5 2 Tab card Costs Implementation Costs Revision Responsible Notepad Type of costs Value Units Time unit Personnel costs fixed 0 00 MD Personnel costs variable 0 00 MD per month Material costs fixed 0 00 EUR Material costs variable 0 00 EUR v per month s E S y S Cost management Most safeguards cost money to implement These costs can be entered in such a way that they are split between different categories of costs PERSONNEL COSTS These are stated in man days MD MATERIAL COSTS Non personnel costs can be stated in either euros EUR or US dollars USD The default value is EUR 101 The currency can be changed for each safeguard separately 102 TIME UNIT The period can be set to day week month Quarter or Year Other periods cannot be displayed The default value is Month Different periods can be set for personnel and material costs COST MANAGEMENT If the costs of safeguards are to be administered outside of GSTOOL in
314. the branches are actually The difference will become apfather the next time you maximize clicking lt Minimize modules gt is also offered for Reports As a result all the safeguards that are currently visible are hidden but the module level is retained Sorting in the tree In the Modeling and Reports views it is possible to sort selected parts of the tree as required by right clicking The sorting facilities and also all the other functions that can be accessed by right clicking with the mouse button are described in the appropriate context elsewhere in the manual Icons in the tree For the sake of improved clarity all the tree elements are preceded by icons The icons provide information about the target object type the implementation status of safeguards and the qualification level achieved The meaning of each of these icons will be explained at the appropriate point in the manual 32 GSTOOL 3 1 User Manual General information on working with GSTOOL 3 1 2 2 5 Editing window It is in screens which are adapted to the chosen view and the target object that the data is actually entered Optional fields All input fields that are not colour coded are optional fields28 Here it is left to the discretion of the user whether to enter any information Mandatory fields Many editing windows and screen formats contain highlighted fields29 These are mandatory fields in which entries have to be made in
315. the current context are offered Right orientation takes precedence over context sensitivity 2 2 1 Menu bar File Edit View Tools Database Window Help The menu bar contains seven elements Each menu option has one or more dropdown menus offering further options The functions of all the menu options are described in the appropriate context elsewhere in the manual 2 2 2 Toolbar The toolbar contains 11 buttons whose functionality will be described elsewhere at the appropriate context in the manual 29 GSTOOL 3 1 User Manual General information on working with GSTOOL 3 1 e Save Navigator Ez Window see section 2 2 6 on page 36 The size appearance and content of the toolbar can be modified via lt View gt lt Toolbar gt Here it is possible to specify directly the size of the buttons and to suppress or display the captions Menu selection lt View gt lt Toolbar gt lt Edit gt opens the OTE FEEL Window in which individual buttons can be enabled or disabled by checking various checkboxes 2 2 3 Navigator The Navigator can be used to rapidly access the most important tool functions All the elements contained in it can be accessed via lt View gt Eight buttons are provided as follows SS Master data section 3 gt Structure of target objects section 4 a Modeling section 5 Reports section 6 EJ BPM user defined section 7 26 The function SB Print is not needed in GSTO
316. tion Should this nevertheless be necessary you will have to carry out a one way export from the target database to the original source database Delete the dummy IT asset set If you created a dummy IT asset set in the work area of the underlying standard import and you do not want this to be 210 GSTOOL 3 1 User Manual Export Import view returned to the source database you must deselect it on both tab cards when you are defining the scope of the export 9 5 3 Carrying out the export Once the nature and scope of the export have been specified the new export will appear in the list on the Export tab card ready for execution as is the case under the standard export To now initiate the re export place a checkmark in column 1 of the list and click Execute 96 While the export operation is executing the progress of each individual table in the database will be listed on the Progress tab card and graphically presented by a progress bar Once the export has successfully completed an appropriate message will be displayed in another window 9 6 Re import The file created through the re export from the target database is re imported into the source database during the re import operation At the same time the block on editing in the source database indicated by the blue colour of the target objects is lifted IS Important A re import can only be carried out if the associated standard export still
317. to change the logo contained in every report or to specify a form of words that is to be included on all reports select menu option sequence lt Tools gt lt Options gt Report header LoGo In the LOGO field you can specify the path for any graphics file you want by clicking the Browse button The files can be in any of the formats bmp gif or jpg i The image size will not be modified to fit the size of the paper Graphics that extend into the margins will be clipped when printed out Comments In the COMMENTS field you can enter a text that will appear in the report header below the logo in every report 162 GSTOOL 3 1 User Manual BPM user defined view 7 BPM user defined view This view allows you to access the GSTOOL 3 1 metadata with various editing possibilities The metadata is sorted over six tab cards On the first five tab cards it is possible to reduce the list selectively by activating appropriate filter settings OBSOLETE column An OBSOLETE column appears on the first five tab cards If there is a Yes in this column this means that the object no longer exists in the IT BPM on which GSTOOL 3 1 is currently based Obsolete objects can be deleted even though they are of TYPE BSl standard IS Obsolete modules safeguards and threats can no longer be adapted nor can they be edited via Open 7 1 Tab card Target object types This tab card contains all the target o
318. tor who has full rights within GSTOOL 3 172 To protect the basic and security settings of the tool and the databases against unauthorised changes we urge you to replace the default password of bsi with a different password immediately following installation of GSTOOL 3 1 thus restricting the rights internal to the tool granted to user sa to one particular person or group of persons gt This password must be secure and must only be known to authorised persons IS We recommend that at least one other person besides the System Administrator knows the sa password and can thus act as Tool Administrator In this way any necessary maintenance work on the tool can be carried out without having to call in the System Administrator The sa password is configured on the Password tab card in the Configure database utility 14 whiz The System Administrator not the Tool Administrator sa can open the Configure database utility see section 2 4 14 page 7Off with integrated security and change the Tool Administrator s password sa on the Password tab card without having to know it 1 3 Licensing To make permanent use of GSTOOL 3 1 you need a license key This will be provided to you by the BSI as part of the GSTOOL 3 1 package delivered in accordance with the present delivery terms Further information on the delivery 12 This Tool Administrator naturally does not have
319. try in the EDITED field is automatically changed to yes La Object model BSI Properties of module allocation Ea G BSI Common Survey Threats Notepad generic aspects of IT security BSI E a pdt 1 No Name Ms 01 E ilding E M 4 01 Buildings Edited yes lle A M 4 02 Cabling E Outpost 2 In target object Outpost 2 Ele M 4 01 Buildings menis not referenced le M 4 02 Cabling Head office EQ Outpost 3 el M 4 01 Buildings Fe M 4 02 Cabling Example 93 If a non linked target object is referenced the safeguards can only be edited if DIRECT EDIT SAFEGUARDS OF REFERENCED MODULES has been activated See section 2 3 5 lt Tools gt lt Options gt Common Edit page 45 94 See 5 2 5 Editing a module Tab card Common page 127 ff 136 GSTOOL 3 1 User Manual Modeling view On the Common tab card on the LAI JALEA area for module i M 4 01 Buildings in target object Outpost 01 of the two target objects offered Th Outpost 02 and A Outpost 03 Outpost 02 is chosen This has the effect of making module M 4 01 Buildings in Outpost 01 the reference source for the same module for A Outpost 02 i In the TARGET OBJECT field only target objects that are eligible for selection as reference source are offered The following are not offered target objects which themselves are already reference targ
320. uard text S 1 1 Compliance with relevant DIN standards VDE specifications Initiation responsibility Head of Procurement Section planner Implementation responsibility Building supervisor construction mounting firm For nearly all fields of technology standards and or regulations are in force e g in Germany DIN YDE VDMA VdS guidelines These regulatory schemes help to ensure that technical installations offer sufficient protection for the user and security for operations CATALOGUE The catalogue to which a safeguard belongs cannot be changed during adaptation e Prior New Changed See section 2 4 11 New Prior Changed display page 67ff e TYPE The safeguard type is automatically changed from BSI standard to user defined adapted e No The safeguard number is automatically preceded by a a for adapted The safeguard number cannot be changed during adaptation e NAME The title of the safeguard can be altered e VERSION Version numbers are not maintained for adapted safeguards SAFEGUARD TEXT The text of the safeguard description can be edited here 183 GSTOOL 3 1 User Manual BPM user defined view Tab card Roles Common Roles Modules Notepad Head of Procurement Section Planner Initiating process Building supervisor Implementation Project planner Initiating process construction mounting firm Implementation On this tab card all the roles which potentia
321. uggestion as the conditions specified in section 2 3 1 of the IT BPM for the individual assignments are not known to the tool at this point These suggestions need to be checked by the user and if necessary adapted 1 See also section 13 3 1 IT Structure Analysis page 250ff 2 See also section 13 3 2 Assessment of protection requirements page 251ff 3 See also section 13 3 3 Modeling page 253ff GSTOOL 3 1 User Manual Introduction IT BPM 2 4 Basic Security Check The basic security check BSC is fully supported by GSTOOL 3 1 All the conclusions relating to the implementation of safeguards and the associated explanations are entered into the tool by the user and are colour coded IT BPM 2 5 Supplementary Security Analysis The supplementary security analysis effectively opens the IT BPM to high and very high protection requirements The associated need to customise threats and safeguards and to add additional ones according to the needs of one s own circumstances is fully supported by GSTOOL 3 1 in the gt BPM user defined module IT BPM 2 6 Implementation of IT Security Safeguards The following steps necessary to implement IT security safeguards 3 Prepare an estimate of the costs and effort required 4 Determine implementation sequence 5 Assign responsibilities and 6 Measures to accompany implementation are supported by GSTOOL 3 1 in two ways In the Modeling module you can customise
322. uildings are listed Select building LA Head office in column 1 and then click OK to link it to A Location 1 4 2 3 Linking dependent target objects Linking dependent objects immediately If a target object that is indirectly linked to other target objects is directly linked to an IT asset set GSTOOL 3 1 asks you whether you would like the dependent indirectly linked target objects to automatically be directly linked to the IT asset set GSTOOL 3 1 E xi 2 Do you want to link dependent target objects Ce e 101 GSTOOL 3 1 User Manual Structure of target objects view This link is established by clicking Yes If several other target objects in a hierarchical arrangement are linked to a target object it is necessary to determine for each of these target objects separately whether it should be directly linked to the asset set or not ox __ Abbreviation _ Name Type Subtype mo D M 4 Data media arc data media archiv oO DB 78 Database 78 application database oO pe Registraton PC IT system client pe unter Unix L All No Reverse Update OK Cancel A If you answer No in the prompt window only the original target object will be directly linked the dependent target objects will remain indirectly linked A direct link can be established later on at any time Linking dependent target objects later on If you answered No at the prompt or if GSTOOL did not ask you this questio
323. unction can be found in chapter 10 Filter page 216ff e Predefined filters As well as All and New the following additional predefined filters are offered e Missing Only safeguards that belong in the selected module according to the IT BPM but which have been deleted from Modeling or BPM user defined are displayed Safeguards catalogue Only safeguards from the selected catalogue are displayed e Tab card Basic filter 122 GSTOOL 3 1 User Manual The same six Basic filter are offered here as those in BPM user defined tab card Safeguards section 7 4 1 tab card Basic filter page 179ff Safeguard selection To assign one or more safeguards to a given module check the box in column 1 and then click OK If you click Revert the selection is reversed i e the checkmark is deleted from all the safeguards currently checked and inserted for all the other safeguards If you click A N and then confirm with OK all the safeguards in the list are marked as to be added and then assigned to the module If you click None all the checkmarks currently shown are deleted All newly added safeguards are inserted in the tree at the end of the list of safeguards for that module the sorting functions are described in section Sorting page 112ff e are set to Not processed in the IMPLEMENTATION field e carry the qualification status identifier of since
324. vv onc sv viens os dite sv ewes oslo dus aKa Seavey ves va cnvese sede 209 9 5 1 Tab card Properties cs xo ek ctces ie Asta yea eee rescence tote 210 9 5 2 EXPOM SCOPE ais eect AAA AGA Sean ae Oe SATE A E a Reais 210 9 5 3 Carrying out the OxPOM vicnccseitsscacicusiayiaeaeierestasiuelehecttladacsadesdedadeeetenueney aan 211 9 6 Rep OE r ara a arara a a aaa a e aE a a e cibetaduvbsdsvarsbsdied E raana nnie 211 9 6 1 Rabcard Common n a n aaa aaa a a eiae atao 212 9 6 2 Carrying out the IMpOr iis ececc tes caren bioiak eie cana needed eee 212 9 7 One Way GX DOM oir retenaasinctanuetien ir hranties tebaevedeeeuanile aieas Tate ban tinenibratonuveainn tes 213 9 8 One way IM POFE eisnincencretssucescecexsissiuiehuedssussdaavveranteemschanesansdusaedeeaedssdeanitnnasbanestaanns 213 9 8 1 Data modification during a One way import cece cece eeeettteeeeeeeeeeeeetteeeeeeeees 213 9 9 D leting ANT OX DOME jee oceceni vtineedentet tet uecuecsvanimn ctawneduviegeteddabenddsensinestanustndeweawdannnien 214 9 10 Deleting an MMPOM sieci cceivicssnatecwiucinndearaadandiuvnctscastchaveshcducenceanndarsednadecivnneattenenectete 215 T EE eE A EEE EEEE A E E EE E een teesexnntesssunsds 216 10 1 Tab card Basic filter wsirncscderiicey cence canateanenncesrecsetescennd setuid pravasedatansdeommeagannage 217 10 2 Tab card Extended filters cccccccessseseeseeeeeeeeeseseeeeneeeeeeeeeeeseeeseeceeeeeeeeesenens 217 Administration of rights
325. with multiple databases to avoid confusions or name conflicts you should give them distinct names at the time of creation e Make a copy of the blank original database BSIDB_V310_Data MDF 9 and give this a meaningful name The suffix MDF must be retained The write protection must be removed e Save the database to any directory on your PC e Attach the new database to GSTOOL 3 1 The next time the tool is started up the new database will be offered in the login window DATABASE field like all the other databases Duplication of a database It is theoretically possible to duplicate a detached database in Explorer File Manager through copying pasting and renaming However in this way a genuine clone of the original database is created A database that has already been attached to the MSDE 2000 that comes with GSTOOL 3 1 or to a Microsoft SQL Server has an unique ID that is also transferred to the clone Databases that have been cloned in this way are perceived as identical to GSTOOL 3 1 even if they have different names As exports and imports within identical databases are not permitted in GSTOOL 3 1 cloning of databases can result in problems during imports The option of cloning databases should therefore be avoided or only be used when you can be certain that you will not need to export or import between cloned databases If nevertheless a database is duplicated you should follow this procedure 19 You w
326. within GSTOOL 3 1 that are largely independent of which screen layout the user is currently working with 2 4 1 lt File gt lt Data migration from GSTOOL 2 0 gt If you have already used GSTOOL 2 0 prior to installing GSTOOL 3 1 facilities are provided that enable you to import any data contained in your old database into GSTOOL 3 1 All the data inputs required for this are made on the PRA ile Lelio aMicclismer Whee EPA screen 52 GSTOOL 3 1 User Manual General information on working with GSTOOL 3 1 IS In order to be able to import the old data GSTOOL 2 0 must be installed and able to run on the PC on which this import is to be carried out l Data migration from GSTOOL 2 0 x Import Progress ODBC data source Account Password I Create all subtypes as user defined J Create all modules as user defined Il Create all safeguards as user defined Import currency feuR x Exchange rate 1 euren oo Exchange rate 2 curen _ oee Access to the GSTOOL 2 0 database To enable access to the GSTOOL 2 0 database the following entries are required e ODBC DATA SOURCE The default entry of borstdb should be left e ACCOUNT Normally sysdba should be entered here e PASSWORD The normal entry here is masterkey With these details GSTOOL 3 1 can find the old database and import all the data contained in it 35 If the default user of GSTOOL 2 0
327. work 01 Mae Mawes aaa ib F MQ BSI Therefore this is contained in the target object level as well as SW M 3 01 Organisation e BSI aT BSI asset set M 3 02 Personnel Q BSI R M 3 03 Contingency Planning Again the reduced presentation is not applied if another a PS nas module is added to the default group of modules in the Generic Se ob si apo aspects of IT security layer Mc tidal et S 6 5 Definition of Bt S 6 6 Study of inte If all the links between modules in the generic aspects of IT t S 6 7 Responsibiit security layer and target objects are deleted or if extra modules 2 5 69 Coringeney inserted into Generic aspects of IT security are deleted E Sat Dona GSTOOL 3 1 automatically reverts to the reduced presentation mode t 6 12 Emergency fer S 6 13 Developme Bt S 6 14 Replaceme S 6 15 Agreements 6 16 Taking out 6 75 Redundant di M 3 04 Data Backup Polcy BSI Se MIN Canecent nf eomneter sank SASASI SASSA SASAS TT See section 5 2 4 Adding a module page 124ff 78 t may be necessary to update the display by clicking a Update or pressing F5 120 GSTOOL 3 1 User Manual 5 2 2 Adding a safeguard Modeling view Occasionally it is necessary to add extra safeguards to a module for particular target object which go beyond the safeguards defined in the IT BPM framework To do this it is sufficient to open
328. ws 2000 XP 1 Open the PXC cel Lelie Window by selecting Start lt Settings gt lt Control Panel gt lt Add Remove Programs gt 2 In the list of programs currently installed click GSTOOL 3 1 and then Remove 3 Follow the instructions on the screen then click Yes to start the deinstallation 4 Once the software has been uninstalled you will need to reboot your system for all the changes to take effect 19 GSTOOL 3 1 User Manual Installation first time use deinstallation Final stages of deinstallation Some of the files will not have been removed during the automatic deinstallation process as follows existing databases self created report templates files in the tool directory that do not belong to the original installation of the software information generated while using GSTOOL 3 1 If need be you will have to delete these files yourself 1 5 Database server databases The security concepts worked on with GSTOOL 3 1 are stored in the form of databases The database server that is necessary for this MSDE 2000 see page 21 is automatically installed during the installation of GSTOOL 3 1 Every GSTOOL 3 1 installation creates a separate database server As a result certain restrictions apply to the attaching and detaching of databases specifically in relation to the users created in the databases These are as follows When a database is detached and then re attached
329. xisting login procedure on the PC Click OK to open the database most recently selected If you want to open a different database you need to select this on the Connections tab amp GSTOOL 3 1 logon to database x Account Connection Registration type C Apply integrated security Apply database security iz SQL Server security User name Juser Password Peco cre 25 If you forget your password the Tool Administrator can overwrite the old password with a new one thus enabling you to continue working 28 GSTOOL 3 1 User Manual General information on working with GSTOOL 3 1 Users can initially only be configured by the Tool Administrator For further information on how to grant right to create additional users see section 11 1 Roles Tab card Data page 224ff Click Cancel to abort GSTOOL 3 1 start up Click OK to start GSTOOL 3 1 GSTOOL 3 1 always opens with the screen format and settings in use when you last exited it 2 2 User interface Activation of menu options and buttons To prevent user errors and functional conflicts within the tool many of the menu options and buttons in GSTOOL 3 1 are right or context sensitive e Right oriented means that only menu options and buttons for functions that the user currently logged on has right to use are offered e Context sensitive means that only menu options and buttons that are relevant to
330. xplained in section 12 2 Inheritance of implementation status page 241ff The third icon in this case Cv indicates the qualification level achieved for the layer as a whole A dash here means that this layer has not yet attained any qualification level Otherwise the qualification level is indicated by means of a letter Av By Cv The internal dependencies for this display are explained in section 12 3 Inheritance of qualification level achieved page 245ff In the object model all the target objects linked to the relevant IT asset set are shown aT Wasnb target object The icon stands for target object The colour bar indicates as above the implementation status of the modules associated with the target object 114 Modeling view La Layer modet BSI a G BSI Salc generic aspects of IT security we Security of the infrastructure fe Security of IT systems wf Security in the network fe Security in applications G Location 1 Ww generic aspects of IT security we Security of the infrastructure we Security of IT systems we Security in the network 9 Security in applications T Se gt 4 i i BSI ir ak genetic aspects of IT securty BSI File storeroom HA Head office Network 01 G Location 1 4 generic aspects of IT secunty Location 1 QQ Data media achive QQ Outpost

Download Pdf Manuals

image

Related Search

Related Contents

VX-VER522 WLAN VDSL2 Router User Manual  MacroSeries Operations Manual  Hewlett Packard Enterprise 361390-001  World Marketing of America ELCG240 fireplace  parte B  DeLOCK 0.7m SATA M/M  1 Stampante HP Deskjet 6800 series  SERVICE MANUAL  

Copyright © All rights reserved.
Failed to retrieve file