S 2.11 Meeting, event, and training rooms

Logo Besprechungs-, Veranstaltungs- und Schulungsräume

Description

Meeting, event, and training rooms are predominantly characterised by the following:

These extremely different uses result in a threat scenario that is not really comparable to the threat scenarios of any other room. In this, the focus is on the threat caused by the "play instinct" of the people present, along with the usual threats for rooms of any kind.

Threat scenario

The following typical threats to IT-Grundschutz regarding meeting, event, and training rooms are assumed to exist:

Organisational Shortcomings

T 2.1 Lack of, or insufficient, rules
T 2.2 Insufficient knowledge of rules and procedures
T 2.14 Impairment of IT usage on account of adverse working conditions
T 2.104 Incompatibility between external and own IT systems

Human Error

T 3.6 Hazards posed by cleaning staff or outside staff
T 3.78 Exposed cables

Technical Failure

T 4.1 Disruption of power supply
T 4.2 Failure of internal supply networks

Deliberate Acts

T 5.4 Theft
T 5.71 Loss of confidentiality of classified information

Method recommendation

To secure the information system examined, other modules must be implemented in addition to this module, with these modules being selected based on the results of the IT-Grundschutz modelling process.

Planning and design

The uses of meeting, event, and training rooms vary strongly.

Since the required security safeguards also depend on the aforementioned, a use overview should be initially drawn up taking into consideration the planned application scenarios (see S 2.331 Planning rooms for meetings, events and training).

Based on the use concept, suitable premises should be selected and equipped (see S 2.332 Equipping meeting, event and training rooms).

If access to LANs or the internet is required, the network accesses in the meeting, event, and training rooms must be protected carefully (see S 5.124 Network connections in meeting, event and training rooms).

Implementation

Security regulations for meeting, event, and training rooms must be specified and implemented from a technical and organisational point of view. All employees must be informed of the use regulations to be observed (see S 2.333 Secure use of meeting, event and training rooms).

Operation

The equipment and the technology present in meeting, event, and training rooms must be handled with care as well. This includes following the regulations specified by the organisation regarding the working environment and the secure storage of working materials.

Disposal

Particularly for meeting, event, and training rooms with frequently changing users, it is important to carefully dispose of working materials such as data media and documents and to not to simply leave these about.

The bundle of security safeguards for the field of "meeting, event, and training rooms" is presented in the following:

Planning and design

S 2.331 (A) Planning rooms for meetings, events and training
S 2.332 (B) Equipping meeting, event and training rooms
S 3.9 (Z) Ergonomic workplace
S 5.77 (Z) Establishment of subnetworks
S 5.124 (C) Network connections in meeting, event and training rooms

Implementation

S 2.69 (B) Establishing standard workstations
S 2.204 (A) Prevention of insecure network access
S 2.333 (A) Secure use of meeting, event and training rooms
S 4.252 (C) Secure configuration of training computers

Operation

S 1.15 (A) Closed windows and doors
S 2.16 (B) Supervising or escorting outside staff/visitors
S 4.109 (Z) Software reinstallation on workstations
S 4.293 (Z) Secure operation of hotspots