2 Layer model and modelling

2.1 Modelling according to IT-Grundschutz

When implementing IT-Grundschutz, the information system considered must be modelled with the help of the existing modules so that the relevant security safeguards can be compiled from the IT-Grundschutz Catalogues. For this, the structure analysis and a protection requirements determination must be available. Building upon these documents, an IT-Grundschutz model of the information system is developed that consists of the various IT-Grundschutz modules, possibly used several times, and a mapping between these modules and the security-relevant aspects of the information system.

Whether the information system consists of already used IT systems or whether it is an information system that is still in the planning stages does not matter for the developed IT-Grundschutz model. However, the model may be used in different ways:

The position of the modelling phase and the possible results are illustrated in the following figure:

Results of modelling according to IT-Grundschutz
Figure: Results of modelling according to IT-Grundschutz

Typically, an information system currently in use will include both implemented components and also components still in the planning stages. The resulting IT-Grundschutz model then contains both a test plan and some elements of a development concept.

In order to map a generally complex information system to the modules in the IT-Grundschutz Catalogues, it makes sense to consider the security aspects grouped according to certain topics:

Layers of the IT-Grundschutz modell
Figure: Layers of the IT-Grundschutz modell

The security aspects of an information system are assigned to the individual layers as follows:

The task for modelling according to IT-Grundschutz now consists of deciding for the modules of each layer whether and how they can be used to model the information system. Depending on the module considered, there may be different types of target objects in the map: individual business processes or components, groups of components, buildings, properties, organisational units, etc.

The approach used to model an information system is described in detail below. In this, particular importance is attached to the general conditions as to when it is appropriate to use an individual module and which target objects it should be applied to.

When modelling an information system according to IT-Grundschutz, the problem that there are target objects that cannot be mapped adequately using the existing IT-Grundschutz modules may arise. In this case, an additional security analysis should be performed as described in the IT-Grundschutz approach.

2.2 Assignment based on the layer model

When modelling an information system, it is recommended to assign the modules based on the layer model. The completeness check is then performed directly after modelling.

Layer 1: Comprehensive aspects of information security

In this layer, all aspects of the information system superordinate to the technical components are modelled. In doing so, the focus is on the concepts and the regulations derived from these concepts. These aspects should be controlled uniformly for the entire information system so that the corresponding modules must only be applied once for the entire information system in most cases. Information security management, the organisation of IT operations, as well as training and sensitisation programmes for the personnel are of particular importance in this. The implementation of the safeguards relating to this is of fundamental importance for the secure use of business-relevant information and information and communication technologies. For this reason, the corresponding modules must always be applied, regardless of which technical components are used.

Layer 2: Security of the infrastructure

The structural circumstances relevant to the present information system are modelled with the help of the modules in layer 2 "Security of the infrastructure". The corresponding module from the IT-Grundschutz Catalogues is assigned to each building, room, or protective cabinet (and/or groups of such components).

Layer 3: Security of the IT systems

Security aspects related to IT systems are addressed in this layer. This layer is divided into Servers, Clients, Network components, and Miscellaneous for reasons of clarity.

Similar to the "Security of the infrastructure" area, the modules of the "Security of the IT systems" area can be applied both to individual IT systems and to groups of such IT systems. This will not be emphasised separately in the following.

Servers

Note: Module S 3.101 General server must be applied to each server (and each mainframe) in addition to the operating system-specific module S 3.101, since this module summarises the platform-independent security aspects for servers.

Clients

Note: Either module S 3.201 General client or module S 3.202 General stand-alone IT system must always be applied to each client in addition to the operating system-specific module, since these modules summarise the platform-independent security aspects for clients.

Network components

Miscellaneous

Layer 4: Security in networks

This layer addresses security aspects in networks that cannot be associated with specific IT systems (e.g. servers). Instead, this layer addresses security aspects related to the network connections and the communication between the IT systems.

In order to reduce the level of complexity, it makes sense to consider each section individually instead of examining the network as a whole. The network as a whole must be divided into subnetworks based on the following two criteria:

If these two criteria do not result in a suitable division of the network into subnetworks (for example because some of the resulting subnetworks are too large or too small), the network can be divided into subnetworks at the organisational level as an alternative. In this case, the areas of responsibility of the individual administrators or teams of administrators are used to divide the network into subnetworks.

It is impossible to provide a generally applicable recommendation as to which division of a network into subnetworks should be preferred if the requirements specified above are basically incompatible with the present information system. Instead, the decision as to which division of a network in subnetworks is most practicable in terms of the modules if the IT-Grundschutz Catalogues to be applied must be made on a case-by-case basis.

Layer 5: Security in applications

The applications are modelled in the lowest layer of the information system to be modelled. State-of-the-art applications are seldom restricted to just a single IT system. In particular, core applications used throughout a government agency or company are generally implemented as client/server applications. In many cases, the servers themselves access other downstream servers, for example database systems. The security of the applications therefore needs to be examined separately from the IT systems and the networks.

Completeness check

Finally, a check must be performed to ensure the model of the overall system is complete and nothing has been left out. It is recommended to again use the network plan or a comparable overview of the information system to this end and to systematically go through each of the individual components. Each component must be assigned to a group or be modelled individually.

If the network was divided into subnetworks in layer 4, it must be checked whether:

It is not only important to model all hardware and software components technically, but also to ensure that all corresponding organisational, personnel, and infrastructural aspects have been completely taken into account.

If gaps are found when checking the model, the corresponding missing modules must be added. Otherwise, there is a risk that integral parts of the overall system or important security aspects are not taken into consideration while applying the IT-Grundschutz.