S 2.454 Planning the secure use of groupware systems

Initiation responsibility: Head of IT, IT Security Officer

Implementation responsibility: IT Security Officer, Administrator

Before a groupware system is introduced, it is necessary to decide for which application scenarios the system should be used and what type of information it is intended for. Which hardware and software components need to be purchased also depends on the type of use determining the type and scope of the planning required. In particular, the security policies to be defined also depend heavily on the intended application scenario.

In general, a rough differentiation is made between the following groupware system application scenarios:

Within these individual scenarios, further distinctions can be made as to which functions are to be used by the groupware applied. As a rule, separate planning is required for the use of each individual function, also taking into account security aspects.

Depending on the purpose for which groupware systems are to be used, the requirements regarding the confidentiality, availability, integrity and binding nature of the data to be transmitted differ.

As a matter of principle, the following aspects must be taken into consideration when planning the use of groupware:

During the planning phase, it should also be defined how proper file transfer can be ensured through organisational regulations or technical implementation. This includes the following aspects, for example:

In general, messages sent to internal addresses should not be forwarded using external channels or to external addresses. If exceptions to this regulation are made, all employees must be informed. For example, it is possible to forward e-mails to external access points for field service employees or other employees who are often on business trips. Using groupware applications and the transmission of e-mails between different premises of an organisation, in particular, should take place using secure channels such as a VPN or the organisation's own dedicated lines.

In addition, the following aspects must be taken into consideration when designing the secure use of groupware:

If external service providers are to be used for the application of groupware, for example mail providers, the security recommendations described in module S 1.11 Outsourcing must be implemented for this purpose. Above all, it must be clarified which security safeguards are taken by the service provider (see also S 2.123 Selection of a groupware or mail provider).

Again and again, it is discussed if and to what extent official groupware applications, e-mail in particular, may be used for private purposes. As long as private use is kept within limits, this is even supported by many organisations, since this has a positive effect on the motivation of the employees. In general, however, it is recommended to agree in the groupware policy upon which rules must be complied with when using groupware in general and also regarding private use of e-mail and other groupware services.

When using groupware systems in organisations, it should also be defined which groupware applications may be used by the users. In addition to different services offered by the groupware systems used in-house, it is also possible to access other groupware applications that can be used via the workstation computers, such as webmail or Internet terminal calendars. It must be clearly specified which internal or external groupware applications bay be used by the employees. How this might look is described below using the example of webmail. As a matter of principle, employees may only use programs and external services released and approved by their organisation.

Webmail refers to offers in which web-based e-mail services are accessed via a browser. Different mail providers offer corresponding extensions that are either integrated directly into their products or provided as additional modules. Webmail has the advantage that the mailboxes of the e-mail accounts can be accessed from any computer with an Internet connection all over the world without having to invest in a complex infrastructure for this purpose. However, it is more difficult to implement the security policies applicable throughout the organisation than it is for the transport using internal e-mail servers, for example with respect to virus protection or encryption. Moreover, the risk that confidential e-mails are read or passwords are listened in on is significantly higher in the event of external access to webmail logins.

When using webmail from a government agency and/or company network, it is absolutely mandatory to ensure protection against malicious software (malware). Following current virus warnings, it can take some time to install the new virus protection updates on all clients. In such a situation, it can make sense to at least block access to webmail until the persons responsible are sure that adequate protection has been provided.

Handling webmail in the government agency and/or company should be regulated. In this respect, there are several variants:

If webmail is used, the recommendations in S 5.96 The secure use of webmail should be taken into account.

Review questions: