S 5.121 Secure communication when travelling

Initiation responsibility: Head of IT, IT Security Officer

Implementation responsibility: User, Administrator

Portable terminal devices such as laptops or PDAs are often designed to access data using the internet or the internal network of an organisation when travelling. For this, public communication networks are normally used. Since neither the organisation nor the mobile employees have any significant influence on whether or not the confidentiality, integrity, and availability are protected in a public communication network, additional safeguards must be implemented in order to protect the information.

In general, the data transmission between a portable terminal device and the LAN of an organisation must meet the following security requirements:

The strength of the mechanisms required for this purpose depends on the protection requirements of the data transmitted. Module S 1.7 Crypto-concept contains a description as to how adequate cryptographic procedures and systems can be selected and used.

If portable terminal devices are to access internal recourses across public networks, the use of a Virtual Private Network (VPN) is strongly recommended. The corresponding products are available from diverse manufacturers and for practically all commonly used platforms. Access to data or systems with high protection requirements must only be possible with the corresponding security safeguards.

For access to internet applications where sensitive data such as personal data, internal information, or account information must be exchanged, at least SSL must be used for the purpose of encryption (see also S 5.66 Use of TLS/SSL).

Connection to other IT systems

When using portable terminal devices such as laptops or PDAs, data is often to be exchanged with other IT systems, for example with business partners. Connection to other IT systems is often also required in order to access the internet. This may be performed in different ways, depending on which technologies are supported by the devices involved, e.g. using infrared, Bluetooth, WLAN, or GMS interfaces. At this point, the transmission technologies must be used securely on the one hand (more information about this can be found in the corresponding IT-Grundschutz modules and other BSI publications) and the organisation's own IT systems must be configured securely on the other hand. For mobile clients, this includes security safeguards such as access control, user authentication, anti-virus protection, personal firewall, restrictive file and resource sharing on an operating system level, local encryption, etc.

If a portable terminal device is to be connected to third party networks or the internet, the system must be protected by a personal firewall (see also S 5.91 Use of personal firewalls for clients).

Use of third party IT systems

When using third party IT systems, e.g. in internet cafés, or when connecting one's own devices to third party IT devices, e.g. in order to exchange files, all users should be aware of the fact that these systems must be classified as insecure systems. It must not be assumed that these are free of any malware (e.g. computer viruses or Trojan horses). Furthermore, it must always be considered whether and where sensitive information may have been stored by use, e.g. in temporary files, in the cache of a web proxy, or in the browser cache. Access to data or IT systems with high protection requirements must not be possible from such insecure systems.

All organisations should dispose of unambiguous rules as to which data may be accessed when travelling and which may not. First and foremost, all IT users must be aware of the general conditions governing the exchange of data using external networks or directly with third party IT systems (see also S 2.217 Careful classification and handling of information, applications and systems and S 2.218 Procedures regarding the personal transportation of data media and IT components).

Review questions: