S 4.29 Use of an encryption product for portable IT systems

Initiation responsibility: IT Security Officer, Head of IT

Implementation responsibility: User

In order to prevent data requiring protection from being read out from a portable IT system stolen despite all precautionary measures, an encryption program should be used. With the help of the commercially available products, it is possible to encrypt individual files, certain areas, or the entire hard disk in such a way that only the person disposing of the secret key may read and use the data.

In this case, the level of security of the encryption mainly depends on three different items:

Encryption may be performed online or offline. Online means that all data of the hard disk (and/or of a partition) is encrypted without the user having to initiate this actively. Offline encryption is initiated expressly by the user. In this case, the user must also decide which files are to be encrypted. Module S 1.7 Crypto-concept should also be taken into consideration when selecting and using cryptographic procedures.

For stationary and portable PCs used in government administrations, BSI can provide, if certain prerequisites are met, an offline encryption program meeting the security requirements for data requiring a normal level of protection.

Review questions: