Users

CON.1

CON.1 Cryptographic Concept

Cryptography is a widely used means of ensuring information security with respect to the protection objectives of confidentiality, integrity and …

DER.1

DER.1 Detection of Security-Relevant Events

To protect IT systems, security-relevant events must be detected and handled in a timely manner. To achieve this, institutions must plan, implement, …

ORP.1

ORP.1 Organisation

Every institution requires a responsible department to manage and regulate general operations and to plan, organise, and carry out administrative …

APP.1.1

APP.1.1 Office Products

The group of office products primarily comprises applications used to create, edit, or view documents. These include the free application LibreOffice …

OPS.1.1.4

OPS.1.1.4 Protection Against Malware

Malware consists of programs that typically execute harmful functions on an IT system without the knowledge and consent of the users. These harmful …

APP.1.2

APP.1.2 Web Browsers

Web browsers are application programs that can retrieve, process, display, output, and store (hypertext) documents, images, video, audio, and other …

OPS.1.2.2

OPS.1.2.2 Archiving

Archiving plays a special role in the document management process. On the one hand, it is expected that digital documents will be available until the …

OPS.1.2.5

OPS.1.2.5 Remote Maintenance

The term remote maintenance refers to time-limited access to IT systems and the applications running on them, carried out from another IT system. The …

SYS.2.1

SYS.2.1 General Client

A "General Client" refers to an IT system with any operating system that allows the separation of users and is not intended to provide server …

NET.2.2

NET.2.2 WLAN Use

Wireless LANs (WLANs) can be used to build wireless local area networks or to extend existing wired networks. To this day, almost all WLAN components …

SYS.2.2.3

SYS.2.2.3 Clients Running Windows

With Windows 10, Microsoft adapted its Windows client operating system to a new corporate strategy. In particular, the fundamental philosophy changed …

SYS.2.3

SYS.2.3 Clients Running Linux and Unix

In addition to Windows, Linux or less commonly Unix-based operating systems are being installed on an increasing number of clients. Examples of …

SYS.2.4

SYS.2.4 Clients Running macOS

macOS is a client operating system from Apple. macOS is based on Darwin, Apple's freely available Unix operating system, which in turn is built on the …

SYS.3.1

SYS.3.1 Laptops

A laptop (also called a notebook) is a PC that can be used mobile. It has a compact form factor, integrates peripheral devices such as a keyboard and …

SYS.3.2.1

SYS.3.2.1 General Smartphones and Tablets

Smartphones are IT systems designed for mobile use with an adapted interface that can be operated with a large, typically touch-sensitive screen …

APP.3.3

APP.3.3 File Servers

A file server is a server in a network that centrally provides files from (internal) hard drives or network drives for all persons and clients with …

SYS.3.3

SYS.3.3 Mobile Phone

The mobile phones considered in this building block, also called 'feature phones' or 'dumbphones', have fewer features than a smartphone but offer …

ORP.4

ORP.4 Identity and Access Management

Access to an institution's protected resources must be restricted to authorised users and authorised IT components. Users and IT components must be...

NET.4.2

NET.4.2 VoIP

Voice over IP (VoIP) refers to telephony over data networks, in particular over the Internet. Special signaling protocols are used to transmit …

NET.4.3

NET.4.3 Fax Machines and Fax Servers

This building block examines the security aspects of transmitting information via standard fax machines and fax servers. The transmitted information …

SYS.4.5

SYS.4.5 Removable Storage Media

Removable storage media are often used to transport data, store it, or access it while mobile. Removable storage media include external hard drives, …

APP.5.3

APP.5.3 General Email Client and Server

Email is one of the most widely used and oldest internet applications. Emails are used to send text and attached files. An email address is required …

CON.7

CON.7 Information Security during International Travel

Work-related travel has become part of everyday life in many institutions. In order to be able to work outside the regular working environment, it …

CON.9

CON.9 Information Exchange

Information is transmitted between senders and recipients via different communication channels, such as personal conversations, telephone calls, …

INF.11

INF.11 General Vehicle

Institutions use a wide variety of vehicles for short and long distances in many situations. In the context of this building block, vehicles are …