S 5.87 Agreement regarding connection to third party networks

Initiation responsibility: IT Security Officer, Top Management

Implementation responsibility: Head of IT, IT Security Officer

More and more companies and government agencies are connecting their networks which were previously sealed off from the outside world to groups of networks, known as extranets. When connecting one's own internal network to a third party network, it is necessary to conclude a detailed data connection agreement (DCA) before becoming connected. This agreement must define specifically who will receive access to one's own network under the terms of the agreement, under what conditions and to which areas and services of one's own network external parties should be given access. It is equally important to reach agreement on communications in the other direction, i.e. the question of who in one's own organisation should have access to an external network, with what access rights and under what conditions.

Such an agreement should cover the following elements:

The agreement should be concluded by persons who will also bear the responsibility for adherence to it. For this purpose, it is usually necessary to clarify who should be responsible for the network connection, as normally different parts of a company or government agency will be involved. It is a good idea here to form a team whose members will include as a minimum the IT Security Officer, the Head of IT, the Specialists Responsible and the Data Privacy Officer. Whenever any critical decisions have to be made, e.g. whether the connection should be temporarily suspended due to problems, all the above-named persons should be involved, as experience suggests that their individual interests can be quite different.

Before a network connection is activated, all security deficiencies on both sides should be resolved. A way should also be found here of satisfying oneself as to the IT security level of one's partner, for example by means of basic security checks or spot checks on site. Under no circumstances should the elimination of security gaps be pushed back into real-time operation, as experience indicates that these are given lower priority than simple availability problems.

Only those services which have been contractually agreed upon and are also absolutely necessary should be made available to third parties. Which areas third parties should be able to access in one's own network must be made dependent on the type of relationship that already exists between the communication partners and on one's trust in one's communication partners. Where the partners are abroad, it is imperative to consider the national legislation to which those partners are bound, e.g. in the areas of cryptography and copyright.

Should any security incidents occur through the network connection, it must be clearly defined who is allowed to suspend the connection, when, who must be informed of this and what escalation steps are envisaged.

Review questions: