S 4.41 Use of a appropriate security products for IT systems

Initiation responsibility: Head of IT, Data Protection Officer, IT Security Officer, Persons responsible for individual applications

Implementation responsibility: Administrator, Purchasing Department

Depending on the security requirements of an IT system, it is possible that additional security products are needed because existing security functions are not adequate. Typical examples are access control, access rights administration and monitoring, logging or encryption.

For example, it must be ensured for IT systems that:

If the IT system's logging functions are not sufficient to guarantee adequate evidence retention, they must be upgraded. There are also various laws that require this. For example, according to BDSG, when data is input, "it must be ensured that it is possible to monitor and identify whether and by whom personal data was entered, changed or removed in data processing systems at a later time".

If it is not possible to keep the administrator from accessing specific data or, at a minimum, to log and monitor this access with the IT system, data encryption, for example, can be used to prevent the administrator from reading this data as plain text if he/she does not have the respective key.

Recommended minimum functionality:

IT systems should have the following security features at a minimum. If they are not included in the standard scope, they should be augmented using additional security products.

If one or more of these security features is not supported by the operating system, other appropriate security products must be introduced.

Additional security product requirements:

Desirable additional functionality of security products:

Implementation of this functionality may be effected in both hardware and software. Safeguard S 2.66 The importance of certification for procurement should be taken into consideration when procuring a new product.

Temporary Solution:

If it is not possible to procure an appropriate security product in the short term, other suitable security safeguards must be undertaken. These are typically of an organisational nature and have to be consistently complied with by users. If an IT system, for example, does not have a screen lock, it has to be locked up in the short periods when not in use.

Review questions: