S 2.169 Developing a system management strategy

Initiation responsibility: IT Security Officer, Head of IT

Implementation responsibility: Head of IT, Administrator

Administrators have to carry out regular administration work on the components in a network The duties to be performed range from setting up new users to installing new software; the distributed nature of the software requires the installation of partial software on each individual computer (workflow system, document management system, etc.). In large organisations merely setting up a new user who is supposed to be able to log on on all computers to which he or she has access means a great deal of administrative work, because if the computers are run in stand-alone operation each one has to be configured accordingly. Today's network-capable operating systems (such as Unix, Windows NT or Novell) therefore include mechanisms that are intended to reduce the amount of administrative work (for example central user administration). However, if the administration of all hardware and software components in a local network is to be performed in a uniform manner at all levels (in both technical and organisational terms), technical aids in the form of management systems must be employed, but whether or not they are used successfully is also dependent on the management strategy that is to be drawn up. The specifications and rules imposed by the management strategy are then put into practice by system administration with the aid of the management software. Each management strategy must be adapted to the needs of the respective company or agency on a case-by-case basis. This entails working through the following steps:

Determining the objects to be administered by the management system

After the inventory has been taken (see S 2.168 IT system analysis before the introduction of a system management system) it must be established which areas of the IT system are to be administered by the management system that is to be procured:

Determining the security guidelines to be applied in the management system

In addition to these decisions, existing regulations and methods also have to be incorporated into the system. For example, the established security strategy at the agency or company, the data protection guidelines and the guidelines on the introduction of new software have to be brought into the management concept because the regulations currently in force also have to be observed and implemented when a management system is put in place. Rules also have to be adopted on the use of the management system itself, or the validity of existing rules has to be examined, and where necessary they must be adapted before being applied. This applies in the following fields, in particular:

The response to violations of security strategies in the field of system management should also be determined in advance. In much the same way as in other fields of IT, a security strategy must be defined for the field of system management or the company's or agency's existing security strategy must be applied to the field of system management. As a management system interacts with important network and system components and administers and monitors their operation, violations of the security strategies in this sphere are to be considered particularly serious. In particular, provisions and procedures must be defined which will be deployed in the event of any such security violation. These are on the one hand technical (for example assigning new passwords for all users after the management console is compromised), but also of an organisational nature.

Auditing, data protection officers and IT security management should become involved during the planning phase. After the management system is introduced, their duties in relation to the management system must be clear. Example: The data protection officer can pay attention to the observance of the data protection guidelines during the planning phase, for example monitoring which user information should or may be recorded as part of the system management process. After the system is introduced, the data protection officer must also be in a position to check the observance of the guidelines. Much the same applies to the areas of responsibility of the auditor and the IT security officer.

Determining the boundary conditions for selecting the management system product

The introduction of a system management system calls for extensive and careful planning. Parts of the system management strategy are also dependent on whether or not they can be implemented with a specific product. Consequently, the drafting of the management strategy and the selection (or preselection) of a product must be re-examined.

The following items should be taken into consideration when drawing up the system management strategy:

The management strategy drawn up in this way necessarily brings with it a series of demands on the management product that is to be purchased. Specific product selection can be made by weighting the requirements. The management strategy must then be examined to determine whether it can be implemented in full with the available range of functions. It may be necessary to reformulate the strategy in certain areas as a result.

Example: The product selection reveals that the system that supports strong encryption unfortunately does not allow the delegation of administration tasks to subadministrators. The management strategy has to be adapted as a result (assuming the weighting of the requirements is correct).

Review questions: