S 2.161 Development of a cryptographic concept

Initiation responsibility: IT Security Officer

Implementation responsibility: IT Security Officer

Today, companies and government agencies depend more and more on their information infrastructure. For this reason, security services which go beyond mere encryption are required and must be integrated into an overall system.

Due to the diversity of cryptographic problems and different influencing factors, there are also manifold approaches to solutions and implementation options. One must not assume that there is one solution that can be used to eliminate all security problems in computer networks and/or communication systems. Rather, coordinated interaction of suitably selected components is important in order to reach the required level of security. Therefore, it is necessary to develop a cryptographic concept that is integrated into the security policy of the government agency and/or company.

In so doing, the selection of suitable cryptographic components must be based on this policy. Key management is a critical element in the entire encryption concept. Concepts and approaches to solutions can only be drawn up successfully and implemented in a targeted manner if it is made clear which specific security functions and/or security services are needed. Furthermore, there is a host of system-relevant questions and aspects not specifically covered by the field of security technology. For example, these include performance requirements, system connection or interoperability requirements, and default conformity requirements.

Perspectives and aspects
Figure: Perspectives and aspects

In networked IT infrastructures, it is no longer sufficient to guarantee the security of a single domain. Rather, the security of all involved end devices and transmission systems must be coordinated. This coordination is particularly difficult in such cases where these do not only include networked devices within a single organisational unit (e.g. LAN environment), but a network of IT installations with different spheres of responsibility and fields of application.

The use - but also the functionality and technological design - of an IT security system depends on numerous influencing factors, e.g. localisation, level of security, frequency and extent of application, constituting important basic and decision-making conditions for security management. Furthermore, the technical options for implementing and designing a security system are manifold, e.g. integrated into an application on the workstation computer, into a firewall, or as a special component for network components such as switches and routers. An affordable price level for an encryption product can only be achieved by a cross-sectional availability. For example, a standardised system connection, uniform application conditions, etc. play an important role in this regard. A final point refers to the interaction of the security services at different logging layers. The security services of the higher logging layers (according to OSI reference model) normally only provide sufficient protection if the lower layers also provide for protection (see S 4.90 Use of cryptographic procedures on the various layers of the ISO/OSI reference model).

Furthermore, it is important to define a encryption policy specific to the organisation. In doing so, the following must be clarified from a management point of view:

Furthermore, the technical and/or organisational use of the cryptographic products must be described in the cryptographic concept, e.g.:

Depending on the system-related basic conditions regarding

suitable implementation options can be analysed based on the aforementioned and specific fields of application such as a PC workplace, in the LAN area, or in connection with a PBX system can be planned and designed technically. Such a holistic perspective is the only way to compile decision-making bases and conditions for cryptographic products, the use of which is both appropriate from a security point of view and reasonable from an economic point of view. However, it should be pointed out that the classification made is by no means mandatory or of fundamental importance, but helpful at best. The only important thing is that the scope of questions consistently reflects the idea regarding a clarification of the initial situation that is as comprehensive as possible. Naturally, in practice, interactions and dependencies between some questions and/or answers result which generally provide a contribution to completing the overall picture, however.

The diverse influencing variables regarding the use of cryptographic procedures must be defined and documented in a comprehensible manner (see S 2.163 Determining the factors influencing cryptographic methods and products). Then, a suitable approach for their use must be developed and documented. Ultimately, the Top Management must issue an implementation order.

The results should be collected in a cryptographic concept in such a way that they can be updated and extended. One possible structure of a cryptographic concept is outlined in the following table of contents, for example:

Table of Contents cryptographic concept

Individual aspects of this concept are described in more detail in the safeguards S 2.162 Determining the need to use cryptographic procedures and products, S 2.163 Determining the factors influencing cryptographic methods and products, S 2.166 Provisions governing the use of crypto modules, etc.

The process of drawing up a cryptographic concept is not a once-off task, but a dynamic process. Therefore, a cryptographic concept must be adapted regularly to the current circumstances.

Review questions: