CON — Concepts and Procedures

CON.1

CON.1 Cryptographic Concept

Cryptography is a widely used means of ensuring information security with respect to the protection objectives of confidentiality, integrity and …

CON.2

CON.2 Data Protection

Unlike information security, which primarily serves to protect the data-processing institution itself, the task of data protection is to protect …

CON.3

CON.3 Data Backup Concept

Institutions store ever increasing amounts of data and are simultaneously ever more dependent on it. If data is lost, e.g. due to defective …

CON.6

CON.6 Deletion and Destruction

Deletion and destruction constitute an essential component of the lifecycle of information on storage media. The term storage media in this building …

CON.7

CON.7 Information Security during International Travel

Work-related travel has become part of everyday life in many institutions. In order to be able to work outside the regular working environment, it …

CON.8

CON.8 Software Development

Many institutions face challenges that can no longer be adequately addressed with a finished, unadapted software product. They require software …

CON.9

CON.9 Information Exchange

Information is transmitted between senders and recipients via different communication channels, such as personal conversations, telephone calls, …

CON.10

CON.10 Development of Web Applications

Web applications provide certain functions and dynamic (changing) content. For this purpose, web applications make documents and user interfaces …

CON.11.1

CON.11.1 Classified Information Protection VS-ONLY FOR OFFICIAL USE (VS-NfD)

State classified information protection encompasses all measures to maintain the secrecy of information that has been classified as classified …

CON — Concepts and Procedures

BSI IT-Grundschutz Building Blocks of the Concepts and Procedures Layer