<s>
The	O
IT	B-Application
baseline	I-Application
protection	I-Application
(	O
)	O
approach	O
from	O
the	O
German	O
Federal	O
Office	O
for	O
Information	O
Security	O
(	O
BSI	O
)	O
is	O
a	O
methodology	O
to	O
identify	O
and	O
implement	O
computer	O
security	O
measures	O
in	O
an	O
organization	O
.	O
</s>
<s>
The	O
aim	O
is	O
the	O
achievement	O
of	O
an	O
adequate	O
and	O
appropriate	O
level	O
of	O
security	O
for	O
IT	B-General_Concept
systems	I-General_Concept
.	O
</s>
<s>
Organizations	O
and	O
federal	O
agencies	O
show	O
their	O
systematic	O
approach	O
to	O
secure	O
their	O
IT	B-General_Concept
systems	I-General_Concept
(	O
e.g.	O
</s>
<s>
Information	B-Application
Security	I-Application
Management	I-Application
System	I-Application
)	O
by	O
obtaining	O
an	O
ISO/IEC	O
27001	O
Certificate	O
on	O
the	O
basis	O
of	O
IT-Grundschutz	O
.	O
</s>
<s>
The	O
term	O
baseline	O
security	O
signifies	O
standard	O
security	O
measures	O
for	O
typical	O
IT	B-General_Concept
systems	I-General_Concept
.	O
</s>
<s>
The	O
foundation	O
of	O
an	O
IT	B-Application
baseline	I-Application
protection	I-Application
concept	O
is	O
initially	O
not	O
a	O
detailed	O
risk	O
analysis	O
.	O
</s>
<s>
Based	O
on	O
these	O
,	O
appropriate	O
personnel	O
,	O
technical	O
,	O
organizational	O
and	O
infrastructural	O
security	O
measures	O
are	O
selected	O
from	O
the	O
IT	B-Application
Baseline	I-Application
Protection	I-Application
Catalogs	O
.	O
</s>
<s>
The	O
Federal	O
Office	O
for	O
Security	O
in	O
Information	B-General_Concept
Technology	I-General_Concept
's	O
IT	B-Application
Baseline	I-Application
Protection	I-Application
Catalogs	O
offer	O
a	O
"	O
cookbook	O
recipe	O
"	O
for	O
a	O
normal	O
level	O
of	O
protection	O
.	O
</s>
<s>
ISO/IEC	O
27001	O
certification	O
can	O
occur	O
simultaneously	O
with	O
IT	B-Application
baseline	I-Application
protection	I-Application
certification	O
.	O
</s>
<s>
To	O
make	O
it	O
more	O
comfortable	O
,	O
most	O
deviate	O
from	O
the	O
protection	O
needs	O
analysis	O
pursuant	O
to	O
the	O
IT	B-Application
Baseline	I-Application
Protection	I-Application
Catalogs	O
.	O
</s>
<s>
One	O
data	O
protection	O
component	O
is	O
available	O
,	O
which	O
was	O
produced	O
in	O
cooperation	O
with	O
the	O
German	O
Federal	O
Commissioner	O
for	O
Data	O
Protection	O
and	O
Freedom	O
of	O
Information	O
and	O
the	O
state	O
data	O
protection	O
authorities	O
and	O
integrated	O
into	O
the	O
IT	B-Application
Baseline	I-Application
Protection	I-Application
Catalog	O
.	O
</s>
<s>
IT	B-Application
baseline	I-Application
protection	I-Application
measures	O
are	O
implemented	O
.	O
</s>
<s>
An	O
IT	O
network	O
includes	O
the	O
totality	O
of	O
infrastructural	O
,	O
organizational	O
,	O
personnel	O
,	O
and	O
technical	O
components	O
serving	O
the	O
fulfillment	O
of	O
a	O
task	O
in	O
a	O
particular	O
information	B-Application
processing	I-Application
application	O
area	O
.	O
</s>
<s>
An	O
IT	O
network	O
can	O
thereby	O
encompass	O
the	O
entire	O
IT	O
character	O
of	O
an	O
institution	O
or	O
individual	O
division	O
,	O
which	O
is	O
partitioned	O
by	O
organizational	O
structures	O
as	O
,	O
for	O
example	O
,	O
a	O
departmental	O
network	O
,	O
or	O
as	O
shared	O
IT	B-Application
applications	I-Application
,	O
for	O
example	O
,	O
a	O
personnel	O
information	O
system	O
.	O
</s>
<s>
It	O
is	O
necessary	O
to	O
analyze	O
and	O
document	O
the	O
information	O
technological	O
structure	O
in	O
question	O
to	O
generate	O
an	O
IT	O
security	O
concept	O
and	O
especially	O
to	O
apply	O
the	O
IT	B-Application
Baseline	I-Application
Protection	I-Application
Catalogs	O
.	O
</s>
<s>
Due	O
to	O
today	O
's	O
usually	O
heavily	O
networked	O
IT	B-General_Concept
systems	I-General_Concept
,	O
a	O
network	O
topology	O
plan	O
offers	O
a	O
starting	O
point	O
for	O
the	O
analysis	O
.	O
</s>
<s>
Networked	O
and	O
non-networked	O
IT	B-General_Concept
systems	I-General_Concept
employed	O
in	O
the	O
IT	O
network	O
.	O
</s>
<s>
The	O
communications	O
connections	O
between	O
IT	B-General_Concept
systems	I-General_Concept
and	O
externally	O
,	O
</s>
<s>
IT	B-Application
applications	I-Application
run	O
within	O
the	O
IT	O
network	O
.	O
</s>
<s>
The	O
purpose	O
of	O
the	O
protection	O
needs	O
determination	O
is	O
to	O
investigate	O
what	O
protection	O
is	O
sufficient	O
and	O
appropriate	O
for	O
the	O
information	O
and	O
information	B-General_Concept
technology	I-General_Concept
in	O
use	O
.	O
</s>
<s>
Heavily	O
networked	O
IT	B-General_Concept
systems	I-General_Concept
typically	O
characterize	O
information	B-General_Concept
technology	I-General_Concept
in	O
government	O
and	O
business	O
these	O
days	O
.	O
</s>
<s>
As	O
a	O
rule	O
,	O
therefore	O
,	O
it	O
is	O
advantageous	O
to	O
consider	O
the	O
entire	O
IT	B-General_Concept
system	I-General_Concept
and	O
not	O
just	O
individual	O
systems	O
within	O
the	O
scope	O
of	O
an	O
IT	O
security	O
analysis	O
and	O
concept	O
.	O
</s>
<s>
To	O
be	O
able	O
to	O
manage	O
this	O
task	O
,	O
it	O
makes	O
sense	O
to	O
logically	O
partition	O
the	O
entire	O
IT	B-General_Concept
system	I-General_Concept
into	O
parts	O
and	O
to	O
separately	O
consider	O
each	O
part	O
or	O
even	O
an	O
IT	O
network	O
.	O
</s>
<s>
Detailed	O
documentation	O
about	O
its	O
structure	O
is	O
prerequisite	O
for	O
the	O
use	O
of	O
the	O
IT	B-Application
Baseline	I-Application
Protection	I-Application
Catalogs	O
on	O
an	O
IT	O
network	O
.	O
</s>
<s>
The	O
IT	B-Application
Baseline	I-Application
Protection	I-Application
Catalogs	O
 '	O
components	O
must	O
ultimately	O
be	O
mapped	O
onto	O
the	O
components	O
of	O
the	O
IT	O
network	O
in	O
question	O
in	O
a	O
modelling	O
step	O
.	O
</s>
<s>
With	O
the	O
help	O
of	O
interviews	O
,	O
the	O
status	O
quo	O
of	O
an	O
existing	O
IT	O
network	O
(	O
as	O
modelled	O
by	O
IT	B-Application
baseline	I-Application
protection	I-Application
)	O
relative	O
to	O
the	O
number	O
of	O
security	O
measures	O
implemented	O
from	O
the	O
IT	B-Application
Baseline	I-Application
Protection	I-Application
Catalogs	O
are	O
investigated	O
.	O
</s>
<s>
By	O
identifying	O
not	O
yet	O
,	O
or	O
only	O
partially	O
,	O
implemented	O
measures	O
,	O
improvement	O
options	O
for	O
the	O
security	O
of	O
the	O
information	B-General_Concept
technology	I-General_Concept
in	O
question	O
are	O
highlighted	O
.	O
</s>
<s>
Several	O
IT	B-Application
applications	I-Application
can	O
run	O
on	O
an	O
IT	B-General_Concept
system	I-General_Concept
.	O
</s>
<s>
Conversely	O
,	O
it	O
is	O
conceivable	O
that	O
an	O
IT	O
application	O
with	O
great	O
protection	O
needs	O
does	O
not	O
automatically	O
transfer	O
this	O
to	O
the	O
IT	B-General_Concept
system	I-General_Concept
.	O
</s>
<s>
This	O
may	O
happen	O
because	O
the	O
IT	B-General_Concept
system	I-General_Concept
is	O
configured	O
redundantly	O
,	O
or	O
because	O
only	O
an	O
inconsequential	O
part	O
is	O
running	O
on	O
it	O
.	O
</s>
<s>
This	O
comprises	O
about	O
80%	O
of	O
all	O
IT	B-General_Concept
systems	I-General_Concept
according	O
to	O
BSI	O
estimates	O
.	O
</s>
<s>
During	O
its	O
2005	O
restructuring	O
and	O
expansion	O
of	O
the	O
IT	B-Application
Baseline	I-Application
Protection	I-Application
Catalogs	O
,	O
the	O
BSI	O
separated	O
methodology	O
from	O
the	O
IT	B-Application
Baseline	I-Application
Protection	I-Application
Catalog	O
.	O
</s>
<s>
The	O
BSI	O
100-1	O
,	O
BSI	O
100-2	O
,	O
and	O
BSI	O
100-3	O
standards	O
contain	O
information	O
about	O
construction	O
of	O
an	O
information	B-Application
security	I-Application
management	I-Application
system	I-Application
(	O
ISMS	O
)	O
,	O
the	O
methodology	O
or	O
basic	O
protection	O
approach	O
,	O
and	O
the	O
creation	O
of	O
a	O
security	O
analysis	O
for	O
elevated	O
and	O
very	O
elevated	O
protection	O
needs	O
building	O
on	O
a	O
completed	O
baseline	O
protection	O
investigation	O
.	O
</s>
<s>
It	O
contains	O
elements	O
from	O
BS	O
25999	O
,	O
ITIL	O
Service	O
Continuity	O
Management	O
combined	O
with	O
the	O
relevant	O
IT	B-Application
Baseline	I-Application
Protection	I-Application
Catalog	O
components	O
,	O
and	O
essential	O
aspects	O
for	O
appropriate	O
Business	O
Continuity	O
Management	O
(	O
BCM	O
)	O
.	O
</s>
