S 2.316 Defining a security policy for a general server

Initiation responsibility: IT Security Officer, Head of IT

Implementation responsibility: Administrator, Head of IT, IT Security Officer

The security provisions for each server result from the organisation-wide security policy. Based on the general policy, the requirements must be put into concrete terms for the present context and summarised in a security policy for the server or a group of servers. In this context, it must be examined whether there are any other overriding specifications, for example IT guidelines, password rules, and specifications for internet usage, that must be taken into account in addition to the organisation-wide security policy.

All persons and groups participating in the purchasing and operation of the servers must be familiar with the security policy and follow it while working. Like all guidelines, its contents and its implementation should be examined regularly within the framework of a general audit.

The security policy should specify the overall security level to be attained and provide basic information on the operation of the server. In order to improve the clarity, it may make sense to draw up separate security policies for different fields of application.

First of all, the general configuration and administration strategy ("liberal" or "restrictive") should be specified, as the other decisions will mainly depend on this specification.

For servers which only store and process data with normal protection requirements, a relatively liberal strategy may be selected making the configuration and administration much easier in many cases. However, it is generally also recommendable in these cases to design the strategy only "as liberal as required".

For servers storing or processing data with high protection requirements, a restrictive strategy is recommended as a matter of principle. For servers with special protection requirements regarding one of the three basic values, a restrictive configuration and administration strategy should be implemented.

The following sections contain some items to be taken into consideration:

Based on the items mentioned above, a checklist that may be helpful during audits can be drawn up.

The security management team is responsible for the security policy; changes to and deviations from which must only be performed upon consultation with the security management team.

When drawing up a security policy, it is recommended to proceed in such a way that the maximum requirements and specifications for the security of the systems are stated initially. These may then be adapted to the actual circumstances. Ideally, it will be possible to take into account all aspects necessary. For every specification rejected or relaxed in the second step, the reasons for the specification not being taken into consideration should be documented.

Review questions: