Keine

OPS.1.1.1

OPS.1.1.1 General IT Operations

IT Operations represents an organizational unit and the associated business process within information technology. The process describes the tasks …

OPS.1.1.2

OPS.1.1.2 Proper IT Administration

IT administration refers primarily to activities within IT Operations that require administrative rights and that modify the configuration of IT …

OPS.1.1.7

OPS.1.1.7 System Management

Reliable system management is a fundamental prerequisite for the secure and efficient operation of modern networked systems. For this purpose, a …

SYS.1.2.2

SYS.1.2.2 Windows Server 2012

With Windows Server 2012, Microsoft brought to market in September 2012 a server operating system that includes various security improvements over …

SYS.1.2.3

SYS.1.2.3 Windows Server

With Windows Server, Microsoft offers a server operating system. The major versions 2016, 2019, and 2022 of Windows Server are so-called long-term …

OPS.1.2.6

OPS.1.2.6 NTP Time Synchronization

Networked IT systems often require synchronized states. The system time usually serves as a reference. However, the internal clock of IT systems can …

SYS.1.3

SYS.1.3 Servers Running Linux and Unix

Server systems frequently run the Linux or Unix operating systems. Examples of classic Unix systems include the BSD family (FreeBSD, OpenBSD, and …

SYS.1.6

SYS.1.6 Containerization

The term containerization refers to a concept in which the resources of an operating system are partitioned to create execution environments for …

APP.2.3

APP.2.3 OpenLDAP

OpenLDAP is a freely available directory service that makes information about any objects — such as accounts, IT systems, or configurations — …

DER.2.3

DER.2.3 Remediation of Extensive Security Incidents

Advanced Persistent Threats (APTs) are targeted cyber attacks on selected institutions and organizations. Attackers gain persistent access to a …

NET.3.1

NET.3.1 Routers and Switches

Routers and switches form the backbone of today's data networks. A failure of one or more of these devices can lead to the complete standstill of the …

NET.3.2

NET.3.2 Firewall

A firewall is a system of software and hardware components used to securely couple IP-based data networks. For this purpose, a firewall structure is …

SYS.3.2.2

SYS.3.2.2 Mobile Device Management (MDM)

Smartphones, tablets, and phablets are an indispensable part of many employees' work. IT Operations must provide more and more such devices in many …

SYS.3.2.3

SYS.3.2.3 iOS (for Enterprise)

Due to modern, simple operating concepts and their high performance, smartphones and tablets are widely used today. This includes mobile devices …

SYS.3.2.4

SYS.3.2.4 Android

A widely used operating system for smartphones and tablets is Android from Google. Since version 4, Android has been gradually expanded for enterprise …

NET.3.3

NET.3.3 VPN

Virtual Private Networks (VPNs) can be used to transmit sensitive data over untrusted networks such as the Internet. A VPN is a virtual network that …

APP.3.4

APP.3.4 Samba

Samba is a freely available and full-featured Active Directory Domain Controller (ADDC) that can provide authentication, file, and print services, …

APP.4.4

APP.4.4 Kubernetes

Kubernetes has established itself as the de facto standard for orchestrating containers in public and private clouds. Kubernetes is also used for IoT …

APP.4.6

APP.4.6 SAP ABAP Programming

Custom developments are frequently programmed in SAP systems. The reasons are varied — business processes or reporting requirements can be …

APP.5.2

APP.5.2 Microsoft Exchange and Outlook

Microsoft Exchange Server (hereinafter referred to as "Exchange") is a groupware solution for medium to large institutions. It can be used to transmit …

APP.5.4

APP.5.4 Unified Communications and Collaboration (UCC)

Unified Communications refers to a service that combines various communication services in one application and typically also one soft client. This …

INF.8

INF.8 Home Workplace

Teleworkers, freelancers, or self-employed persons typically work from home workplaces. In contrast to the workplace in the office, these employees …

CON.10

CON.10 Development of Web Applications

Web applications provide certain functions and dynamic (changing) content. For this purpose, web applications make documents and user interfaces …

CON.11.1

CON.11.1 Classified Information Protection VS-ONLY FOR OFFICIAL USE (VS-NfD)

State classified information protection encompasses all measures to maintain the secrecy of information that has been classified as classified …