S 5.14 Mobile data media

Description

This module examines the basic security features of mobile data media. Mobile data media can be used to

There is a wide variety of types of mobile data media including, among others, diskettes, removable disks (magnetic, magneto-optical), CD-ROMs, DVDs, magnetic tapes, cassettes, USB hard drives, and even flash storage devices such as USB sticks. Due to the wide variety of types and areas of application, not all security aspects requiring examination are always actually examined.

Data media can be classified according to whether they are read-only, write-once, or rewritable. They can also be further classified using additional criteria, for example:

Removable data media, which are sometimes also referred to as portable data media, are inserted into a drive. Examples of this type of data media include diskettes, CD-ROMs, DVDs, magnetic tapes, and cartridges. External data storage media such as USB sticks and external hard drives, on the other hand, can be connected directly to an IT system. Examples of data media integrated into other devices include the memory components in mobile telephones, MP3 players, and digital cameras.

Information on paper, microfilm, or other analogue data media must also be taken into account in the security policy in addition to the digital data media. This applies in particular to the printing, copying, and scanning of documents and the use of fax services. Additional information on this subject can be found in the modules S 3.6 Printers, copiers, and all-in-one devices and M 3.2 Fax machine.

On the one hand, this module shows how the information stored on mobile data media can be used securely, and on the other hand, how to prevent the unauthorised transfer of information via mobile data media.

Threat scenario

The following typical threats to the IT-Grundschutz are assumed to exist when using mobile data media:

Force Majeure

T 1.9 Loss of data due to intensive magnetic fields
T 1.15 Degradation due to changing application environment

Organisational Shortcomings

T 2.2 Insufficient knowledge of rules and procedures
T 2.10 Data media are not available when required

Human Error

T 3.1 Loss of data confidentiality or integrity as a result of user error
T 3.3 Non-compliance with IT security measures
T 3.44 Carelessness in handling information

Technical Failure

T 4.7 Defective data media
T 4.52 Loss of data when using a portable device

Deliberate Acts

T 5.1 Manipulation or destruction of equipment or accessories
T 5.2 Manipulation of information or software
T 5.4 Theft
T 5.9 Unauthorised use of IT systems
T 5.23 Malicious software
T 5.141 Data theft via mobile data media
T 5.142 Spreading malicious software via mobile data media

Method recommendation

To secure the information system examined, other modules will need to be implemented in addition to this module. These modules are selected based on the results of the IT-Grundschutz modelling process.

A series of safeguards must be implemented to ensure the secure handling of mobile data media starting in the planning and design phase, through the purchasing phase, and up to the contingency planning phase. The steps to take to accomplish this as well as the safeguards to implement in each phase are listed in the following.

Planning and design

A concept for the secure handling of mobile data media should be created in which the risks and safeguards are pointed out for each of the various types of mobile data (see S 2.401 Handling of mobile data media and devices).

Purchasing

The selection of suitable data media is to be coordinated. S 4.169 Use of appropriate archiving media should be considered when deciding on what types of data media to use.

Operation

Based on the applicable security requirements, security notes should be created for all employees using application scenarios as examples (see S 3.60 Sensitising staff to secure handling of mobile data media and devices).

The drives and interfaces of the IT systems should be secured according to the security policies (see S 4.4 Correct handling of drives for removable media and external data storage).

Disposal

When data media are transferred, the data on these media should be physically deleted before reusing or disposing of the data media to prevent residual information from being transferred to the wrong recipient (see S 4.32 Physical deletion of data media before and after usage).

Contingency Planning

Important information stored on mobile data media should be copied to another location to prevent the loss of this information.

The bundle of security safeguards for mobile data media are presented in the following.

Planning and design

S 2.3 (B) Data media control
S 2.218 (C) Procedures regarding the personal transportation of data media and IT components
S 2.401 (C) Handling of mobile data media and devices
S 4.34 (Z) Using encryption, checksums, or digital signatures

Implementation

S 4.32 (B) Physical deletion of data media before and after usage

Operation

S 3.60 (C) Sensitising staff to secure handling of mobile data media and devices
S 4.4 (C) Correct handling of drives for removable media and external data storage
S 4.200 (Z) Handling of USB storage media
S 4.232 (Z) Secure use of extended memory cards

Disposal

S 2.306 (A) Reporting losses

Contingency Planning

S 6.38 (A) Backup copies of transferred data