36
© 2014 Airbus Defence and Space All rights reserved. The reproduction, distribution and utilization of this document as well as the communication of its contents to others without express authorization is prohibited. Offenders will be held liable for the payment of damages. All rights reserved in the event of the grant of a patent, utility model or design. Geheimschutz, Grundschutz, ISMS ein integratives Modell für Information Security verinice.XP 2017 Alexander Koderman, CISA, PMP Chief Security Officer Cassidian Communications GmbH Secure Land Communications

Geheimschutz, Grundschutz, ISMS ein integratives … · Geheimschutz, Grundschutz, ISMS – ein integratives Modell für ... TETRA network • Designed for up ... (TETRAPOL-Technology)

Embed Size (px)

Citation preview

Page 1: Geheimschutz, Grundschutz, ISMS ein integratives … · Geheimschutz, Grundschutz, ISMS – ein integratives Modell für ... TETRA network • Designed for up ... (TETRAPOL-Technology)

© 2

014 A

irbus D

efe

nce a

nd S

pace –

All r

ights

reserv

ed. T

he r

epro

duction, dis

trib

ution a

nd u

tilization o

f th

is d

ocum

ent as w

ell a

s t

he c

om

munic

ation o

f its c

onte

nts

to o

thers

without expre

ss a

uth

ori

zation is

pro

hib

ited. O

ffenders

will be h

eld

lia

ble

for th

e p

aym

ent of dam

ages. A

ll r

ights

reserv

ed in

the e

vent of th

e g

rant of a p

ate

nt,

utility

model o

r desig

n.

Geheimschutz, Grundschutz, ISMS –

ein integratives Modell für

Information Security

verinice.XP 2017

Alexander Koderman, CISA, PMP Chief Security Officer

Cassidian Communications GmbH

Secure Land Communications

Page 2: Geheimschutz, Grundschutz, ISMS ein integratives … · Geheimschutz, Grundschutz, ISMS – ein integratives Modell für ... TETRA network • Designed for up ... (TETRAPOL-Technology)

Confidential

© 2

014 A

irbus D

efe

nce a

nd S

pace –

All r

ights

reserv

ed. T

he r

epro

duction, dis

trib

ution a

nd u

tilization o

f th

is d

ocum

ent as w

ell a

s t

he c

om

munic

ation o

f its c

onte

nts

to o

thers

without expre

ss a

uth

ori

zation is

pro

hib

ited. O

ffenders

will be h

eld

lia

ble

for th

e p

aym

ent of dam

ages. A

ll r

ights

reserv

ed in

the e

vent of th

e g

rant of a p

ate

nt,

utility

model o

r desig

n.

Prolog Geheimschutz? Grundschutz? Aller Anfang ist schwer.

01 February 2017 2

Page 3: Geheimschutz, Grundschutz, ISMS ein integratives … · Geheimschutz, Grundschutz, ISMS – ein integratives Modell für ... TETRA network • Designed for up ... (TETRAPOL-Technology)

Confidential

© 2

014 A

irbus D

efe

nce a

nd S

pace –

All r

ights

reserv

ed. T

he r

epro

duction, dis

trib

ution a

nd u

tilization o

f th

is d

ocum

ent as w

ell a

s t

he c

om

munic

ation o

f its c

onte

nts

to o

thers

without expre

ss a

uth

ori

zation is

pro

hib

ited. O

ffenders

will be h

eld

lia

ble

for th

e p

aym

ent of dam

ages. A

ll r

ights

reserv

ed in

the e

vent of th

e g

rant of a p

ate

nt,

utility

model o

r desig

n.

01 February 2017 3

Prolog BSI heute

• 600 Mitarbeiter

• Zertifizierung von Produkten, Managementsystemen

& Personen

• Technische Richtlinien

• De-Mail, Elektronische Ausweise, Smart Metering,

eHealth…

• Cyber-Sicherheit

• CERT-Bund

• Kryptotechnologie

• IT-Grundschutz

• Und nach wie vor: Materieller und IT-Geheimschutz

Page 4: Geheimschutz, Grundschutz, ISMS ein integratives … · Geheimschutz, Grundschutz, ISMS – ein integratives Modell für ... TETRA network • Designed for up ... (TETRAPOL-Technology)

Confidential

© 2

014 A

irbus D

efe

nce a

nd S

pace –

All r

ights

reserv

ed. T

he r

epro

duction, dis

trib

ution a

nd u

tilization o

f th

is d

ocum

ent as w

ell a

s t

he c

om

munic

ation o

f its c

onte

nts

to o

thers

without expre

ss a

uth

ori

zation is

pro

hib

ited. O

ffenders

will be h

eld

lia

ble

for th

e p

aym

ent of dam

ages. A

ll r

ights

reserv

ed in

the e

vent of th

e g

rant of a p

ate

nt,

utility

model o

r desig

n.

01 February 2017 4

Inhalt

• Vorstellung

• Secure Landline Communications

• Grundlagen: Geheimschutz

• Geheimschutz und IT

• Vergleich mit ISO 27001, BSI ITGS

• Konsolidiertes Maßnahmenmodell

Page 5: Geheimschutz, Grundschutz, ISMS ein integratives … · Geheimschutz, Grundschutz, ISMS – ein integratives Modell für ... TETRA network • Designed for up ... (TETRAPOL-Technology)

Confidential

© 2

014 A

irbus D

efe

nce a

nd S

pace –

All r

ights

reserv

ed. T

he r

epro

duction, dis

trib

ution a

nd u

tilization o

f th

is d

ocum

ent as w

ell a

s t

he c

om

munic

ation o

f its c

onte

nts

to o

thers

without expre

ss a

uth

ori

zation is

pro

hib

ited. O

ffenders

will be h

eld

lia

ble

for th

e p

aym

ent of dam

ages. A

ll r

ights

reserv

ed in

the e

vent of th

e g

rant of a p

ate

nt,

utility

model o

r desig

n.

Secure Land Communications

A worldwide leader in mission critical communications

Public Safety and Defense Emergency Response Critical Infrastructure

3,000,000

Users in Public Safety/Defence

in Europe, Middle East and Asia

29,000

Public Safety Answering

Points in USA

>100

Operators for CNI in Europe,

Middle East and Asia

>50%

60%

Cassidian Communications GmbH – Company Presentation

5 January 2017

>50% >60%

Page 6: Geheimschutz, Grundschutz, ISMS ein integratives … · Geheimschutz, Grundschutz, ISMS – ein integratives Modell für ... TETRA network • Designed for up ... (TETRAPOL-Technology)

Confidential

© 2

014 A

irbus D

efe

nce a

nd S

pace –

All r

ights

reserv

ed. T

he r

epro

duction, dis

trib

ution a

nd u

tilization o

f th

is d

ocum

ent as w

ell a

s t

he c

om

munic

ation o

f its c

onte

nts

to o

thers

without expre

ss a

uth

ori

zation is

pro

hib

ited. O

ffenders

will be h

eld

lia

ble

for th

e p

aym

ent of dam

ages. A

ll r

ights

reserv

ed in

the e

vent of th

e g

rant of a p

ate

nt,

utility

model o

r desig

n.

// Page 6

Secure Land Communications

We support our customers in 75 countries

countries in

Middle-East/Africa

2

9 18 countries in

Latin America

countries in

North America

31

15

countries in

Europe

countries in

Asia/Pacific

Page 7: Geheimschutz, Grundschutz, ISMS ein integratives … · Geheimschutz, Grundschutz, ISMS – ein integratives Modell für ... TETRA network • Designed for up ... (TETRAPOL-Technology)

Confidential

© 2

014 A

irbus D

efe

nce a

nd S

pace –

All r

ights

reserv

ed. T

he r

epro

duction, dis

trib

ution a

nd u

tilization o

f th

is d

ocum

ent as w

ell a

s t

he c

om

munic

ation o

f its c

onte

nts

to o

thers

without expre

ss a

uth

ori

zation is

pro

hib

ited. O

ffenders

will be h

eld

lia

ble

for th

e p

aym

ent of dam

ages. A

ll r

ights

reserv

ed in

the e

vent of th

e g

rant of a p

ate

nt,

utility

model o

r desig

n.

7

Cassidian Communications GmbH

Overview

• Cassidian Communications GmbH is the regional

entity of the Airbus Secure Land Communications

Communication Business Line (SLC)

• Responsible for business development, sales and

operations in the DACH countries (GE, AUT, SUI)

plus dedicated export markets

• Three sites with 191 employees overall

(31.08.2016)

• Ulm: HQ, PM, Engineering, Sales, Service

• Berlin: Sales, Service

• Sulzbach: Sales, Service, 24/7Service Center

• Annual turnover of 131 Million € in 2015 (HGB)

Ulm

Sulzbach

Berlin

Cassidian Communications GmbH – Company Presentation

January 2017

Page 8: Geheimschutz, Grundschutz, ISMS ein integratives … · Geheimschutz, Grundschutz, ISMS – ein integratives Modell für ... TETRA network • Designed for up ... (TETRAPOL-Technology)

Confidential

© 2

014 A

irbus D

efe

nce a

nd S

pace –

All r

ights

reserv

ed. T

he r

epro

duction, dis

trib

ution a

nd u

tilization o

f th

is d

ocum

ent as w

ell a

s t

he c

om

munic

ation o

f its c

onte

nts

to o

thers

without expre

ss a

uth

ori

zation is

pro

hib

ited. O

ffenders

will be h

eld

lia

ble

for th

e p

aym

ent of dam

ages. A

ll r

ights

reserv

ed in

the e

vent of th

e g

rant of a p

ate

nt,

utility

model o

r desig

n.

8

References (1) BOSNET

• Nationwide coverage (including maritime islands and

12-mile-zone) makes BOSNET worldwide the largest

TETRA network

• Designed for up to 500.000 users from police, fire

brigade, rescue, customs and intelligence services

• Strong customer focus on security, interoperability and

resilience in both design and operations

• Owned and operated by a federal agency (BDBOS) on

behalf of the federal republic of Germany and its 16

states

• Key data: BS installations: 4.570* (4.800 planned),

Switching Centes: 64*, two georedundant Network

Management Centers, users: 520.000 * (>700.000

users planned)

• Cassidian Communications GmbH is the prime

contractor for the installation, integration,

commissioning and maintenance of the network

* August 2015

Cassidian Communications GmbH – Company Presentation

January 2017

Page 9: Geheimschutz, Grundschutz, ISMS ein integratives … · Geheimschutz, Grundschutz, ISMS – ein integratives Modell für ... TETRA network • Designed for up ... (TETRAPOL-Technology)

Confidential

© 2

014 A

irbus D

efe

nce a

nd S

pace –

All r

ights

reserv

ed. T

he r

epro

duction, dis

trib

ution a

nd u

tilization o

f th

is d

ocum

ent as w

ell a

s t

he c

om

munic

ation o

f its c

onte

nts

to o

thers

without expre

ss a

uth

ori

zation is

pro

hib

ited. O

ffenders

will be h

eld

lia

ble

for th

e p

aym

ent of dam

ages. A

ll r

ights

reserv

ed in

the e

vent of th

e g

rant of a p

ate

nt,

utility

model o

r desig

n.

9

References (2)

POLYCOM

• POLYCOM:

Nationwide PMR network in CH (TETRAPOL-Technology)

• Roll-Out 1998 to 2014

• partnership with ATOS AG

• Delivery till today app. 190 Mio.€

• Next Campaigns

– IP Migration

– Extension with LTE Broadband

BS

User

Switch

installed

700

50.000

40

Cassidian Communications GmbH – Company Presentation

January 2017

Page 10: Geheimschutz, Grundschutz, ISMS ein integratives … · Geheimschutz, Grundschutz, ISMS – ein integratives Modell für ... TETRA network • Designed for up ... (TETRAPOL-Technology)

Confidential

© 2

014 A

irbus D

efe

nce a

nd S

pace –

All r

ights

reserv

ed. T

he r

epro

duction, dis

trib

ution a

nd u

tilization o

f th

is d

ocum

ent as w

ell a

s t

he c

om

munic

ation o

f its c

onte

nts

to o

thers

without expre

ss a

uth

ori

zation is

pro

hib

ited. O

ffenders

will be h

eld

lia

ble

for th

e p

aym

ent of dam

ages. A

ll r

ights

reserv

ed in

the e

vent of th

e g

rant of a p

ate

nt,

utility

model o

r desig

n.

10

References (3) Landesfunknetz Südtirol (LFN)

• Nationwide Tetra network for civil protection

(small copy of BOSNET)

• Contract won after 1 year defending appeals

form Motorola, project start 09.2013

• First 62 base stations build up in 6 month in

the mountains

• Second batch of 51 base stations awarded end

2014, acceptance planned in 2016

• Further extension in the pipeline

• Terminals shall be awarded in 2016/17

• Further network extensions planned for

Phase 3 (2016)

• Customer budget total 20 Mio for 5 years

• Strategic footprint for the renewal of public

safety networks in Northern Italy

Cassidian Communications GmbH – Company Presentation

January 2017

Page 11: Geheimschutz, Grundschutz, ISMS ein integratives … · Geheimschutz, Grundschutz, ISMS – ein integratives Modell für ... TETRA network • Designed for up ... (TETRAPOL-Technology)

Confidential

© 2

014 A

irbus D

efe

nce a

nd S

pace –

All r

ights

reserv

ed. T

he r

epro

duction, dis

trib

ution a

nd u

tilization o

f th

is d

ocum

ent as w

ell a

s t

he c

om

munic

ation o

f its c

onte

nts

to o

thers

without expre

ss a

uth

ori

zation is

pro

hib

ited. O

ffenders

will be h

eld

lia

ble

for th

e p

aym

ent of dam

ages. A

ll r

ights

reserv

ed in

the e

vent of th

e g

rant of a p

ate

nt,

utility

model o

r desig

n.

11

References (4) German Army

• Secure, cellular networks for the German Army

CRF: 30 deployable shelters delivered 2008-2008, backbone for tactical

communications for the German Army in out-of-area missions

TetrapolBw: PMR networks based on CRF for Bw installations in Germany

Support: in service support for all CRF system with stringent SLAs

• Highly Mobile Cell (HochZeN): 3 mobile networks with NB voice and BB data capability delivered in 2014 Field trials to prepare procurement and CRF refurbishment scheduled in 2015

Cassidian Communications GmbH – Company Presentation

January 2017

Page 12: Geheimschutz, Grundschutz, ISMS ein integratives … · Geheimschutz, Grundschutz, ISMS – ein integratives Modell für ... TETRA network • Designed for up ... (TETRAPOL-Technology)

Confidential

© 2

014 A

irbus D

efe

nce a

nd S

pace –

All r

ights

reserv

ed. T

he r

epro

duction, dis

trib

ution a

nd u

tilization o

f th

is d

ocum

ent as w

ell a

s t

he c

om

munic

ation o

f its c

onte

nts

to o

thers

without expre

ss a

uth

ori

zation is

pro

hib

ited. O

ffenders

will be h

eld

lia

ble

for th

e p

aym

ent of dam

ages. A

ll r

ights

reserv

ed in

the e

vent of th

e g

rant of a p

ate

nt,

utility

model o

r desig

n.

12

References (5) Transport and Utilities

• Networks for

• Utilities (Lechwerke, Evonik, Stadtwerke Munich, Vattenfall, …)

• Airports (Zürich, Berlin Tegel, … )

• Public Urban Transport (Hamburg Subway, Berlin Subway, …)

• Voice Network for maintenance staff

• Data network for command and control applications;

• Basic communication infrastructure for future “Smart Grid”

• Service contracts with stringent SLAs

Cassidian Communications GmbH – Company Presentation

January 2017

Page 13: Geheimschutz, Grundschutz, ISMS ein integratives … · Geheimschutz, Grundschutz, ISMS – ein integratives Modell für ... TETRA network • Designed for up ... (TETRAPOL-Technology)

Confidential

© 2

014 A

irbus D

efe

nce a

nd S

pace –

All r

ights

reserv

ed. T

he r

epro

duction, dis

trib

ution a

nd u

tilization o

f th

is d

ocum

ent as w

ell a

s t

he c

om

munic

ation o

f its c

onte

nts

to o

thers

without expre

ss a

uth

ori

zation is

pro

hib

ited. O

ffenders

will be h

eld

lia

ble

for th

e p

aym

ent of dam

ages. A

ll r

ights

reserv

ed in

the e

vent of th

e g

rant of a p

ate

nt,

utility

model o

r desig

n.

01 February 2017 13

Inhalt

• Vorstellung

• Secure Landline Communications

• Grundlagen: Geheimschutz

• Geheimschutz und IT

• Vergleich mit ISO 27001, BSI ITGS

• Konsolidiertes Maßnahmenmodell

Page 14: Geheimschutz, Grundschutz, ISMS ein integratives … · Geheimschutz, Grundschutz, ISMS – ein integratives Modell für ... TETRA network • Designed for up ... (TETRAPOL-Technology)

Confidential

© 2

014 A

irbus D

efe

nce a

nd S

pace –

All r

ights

reserv

ed. T

he r

epro

duction, dis

trib

ution a

nd u

tilization o

f th

is d

ocum

ent as w

ell a

s t

he c

om

munic

ation o

f its c

onte

nts

to o

thers

without expre

ss a

uth

ori

zation is

pro

hib

ited. O

ffenders

will be h

eld

lia

ble

for th

e p

aym

ent of dam

ages. A

ll r

ights

reserv

ed in

the e

vent of th

e g

rant of a p

ate

nt,

utility

model o

r desig

n.

01 February 2017 14

Grundlagen: Geheimschutz (in der Wirtschaft)

• Voraussetzung: VS-Auftrag

• Betreuung und Kontrolle durch BMWi

• §25 SÜG

• Geheimschutzhandbuch: 85 Seiten

• Anlagen: 226 Seiten

• Weitere technische Leitlinien

• Sind VS-NfD…

Page 15: Geheimschutz, Grundschutz, ISMS ein integratives … · Geheimschutz, Grundschutz, ISMS – ein integratives Modell für ... TETRA network • Designed for up ... (TETRAPOL-Technology)

Confidential

© 2

014 A

irbus D

efe

nce a

nd S

pace –

All r

ights

reserv

ed. T

he r

epro

duction, dis

trib

ution a

nd u

tilization o

f th

is d

ocum

ent as w

ell a

s t

he c

om

munic

ation o

f its c

onte

nts

to o

thers

without expre

ss a

uth

ori

zation is

pro

hib

ited. O

ffenders

will be h

eld

lia

ble

for th

e p

aym

ent of dam

ages. A

ll r

ights

reserv

ed in

the e

vent of th

e g

rant of a p

ate

nt,

utility

model o

r desig

n.

01 February 2017 15

Verschlusssachen

• Information von amtlicher Stelle (oder auf

deren Veranlassung) eingestuft

• Klassifikation:

• VS-Nur für Dienstgebrauch (NfD)

• VS-Vertraulich

• VS-Geheim

• VS-Streng Geheim

• Organisatorische, personelle, materielle,

technische Maßnahmen

Page 16: Geheimschutz, Grundschutz, ISMS ein integratives … · Geheimschutz, Grundschutz, ISMS – ein integratives Modell für ... TETRA network • Designed for up ... (TETRAPOL-Technology)

Confidential

© 2

014 A

irbus D

efe

nce a

nd S

pace –

All r

ights

reserv

ed. T

he r

epro

duction, dis

trib

ution a

nd u

tilization o

f th

is d

ocum

ent as w

ell a

s t

he c

om

munic

ation o

f its c

onte

nts

to o

thers

without expre

ss a

uth

ori

zation is

pro

hib

ited. O

ffenders

will be h

eld

lia

ble

for th

e p

aym

ent of dam

ages. A

ll r

ights

reserv

ed in

the e

vent of th

e g

rant of a p

ate

nt,

utility

model o

r desig

n.

Geheimschutz

Personell Materiell

Einstellung Aktualisierung Erlöschung Kontroll- /

Sperrzonen ITGA

(Vorbeugender Sabotageschutz)

Vervielfältigung VS Verwaltung

VS-IT Sicherheits-

maßnahmen VS BKO

Besuchs-

kontrolle

RfV Inland /

Ausland

Belehrungs-

durchführung

Kontakt zu

Behörden

Geheimschutz-Prozesse

Page 17: Geheimschutz, Grundschutz, ISMS ein integratives … · Geheimschutz, Grundschutz, ISMS – ein integratives Modell für ... TETRA network • Designed for up ... (TETRAPOL-Technology)

Confidential

© 2

014 A

irbus D

efe

nce a

nd S

pace –

All r

ights

reserv

ed. T

he r

epro

duction, dis

trib

ution a

nd u

tilization o

f th

is d

ocum

ent as w

ell a

s t

he c

om

munic

ation o

f its c

onte

nts

to o

thers

without expre

ss a

uth

ori

zation is

pro

hib

ited. O

ffenders

will be h

eld

lia

ble

for th

e p

aym

ent of dam

ages. A

ll r

ights

reserv

ed in

the e

vent of th

e g

rant of a p

ate

nt,

utility

model o

r desig

n.

Geheimschutzprozesse: Dokumente, Ressourcen

Page 18: Geheimschutz, Grundschutz, ISMS ein integratives … · Geheimschutz, Grundschutz, ISMS – ein integratives Modell für ... TETRA network • Designed for up ... (TETRAPOL-Technology)

Confidential

© 2

014 A

irbus D

efe

nce a

nd S

pace –

All r

ights

reserv

ed. T

he r

epro

duction, dis

trib

ution a

nd u

tilization o

f th

is d

ocum

ent as w

ell a

s t

he c

om

munic

ation o

f its c

onte

nts

to o

thers

without expre

ss a

uth

ori

zation is

pro

hib

ited. O

ffenders

will be h

eld

lia

ble

for th

e p

aym

ent of dam

ages. A

ll r

ights

reserv

ed in

the e

vent of th

e g

rant of a p

ate

nt,

utility

model o

r desig

n.

[Tool]

VS-Registratur

VS-Auftrag

Personal-

stammdaten

Sicherheits-

ermächtigungen

Tagebuch

Besuchsanträge Sperr- /

Kontrollzonen

ITGA

VPS

BKO

Page 19: Geheimschutz, Grundschutz, ISMS ein integratives … · Geheimschutz, Grundschutz, ISMS – ein integratives Modell für ... TETRA network • Designed for up ... (TETRAPOL-Technology)

Confidential

© 2

014 A

irbus D

efe

nce a

nd S

pace –

All r

ights

reserv

ed. T

he r

epro

duction, dis

trib

ution a

nd u

tilization o

f th

is d

ocum

ent as w

ell a

s t

he c

om

munic

ation o

f its c

onte

nts

to o

thers

without expre

ss a

uth

ori

zation is

pro

hib

ited. O

ffenders

will be h

eld

lia

ble

for th

e p

aym

ent of dam

ages. A

ll r

ights

reserv

ed in

the e

vent of th

e g

rant of a p

ate

nt,

utility

model o

r desig

n.

SeCon

VS-Registratur

VS-Auftrag

Personal-

stammdaten

Sicherheits-

ermächtigungen

Tagebuch

Besuchsanträge Sperr- /

Kontrollzonen

ITGA

VPS

BKO

Page 20: Geheimschutz, Grundschutz, ISMS ein integratives … · Geheimschutz, Grundschutz, ISMS – ein integratives Modell für ... TETRA network • Designed for up ... (TETRAPOL-Technology)

Confidential

© 2

014 A

irbus D

efe

nce a

nd S

pace –

All r

ights

reserv

ed. T

he r

epro

duction, dis

trib

ution a

nd u

tilization o

f th

is d

ocum

ent as w

ell a

s t

he c

om

munic

ation o

f its c

onte

nts

to o

thers

without expre

ss a

uth

ori

zation is

pro

hib

ited. O

ffenders

will be h

eld

lia

ble

for th

e p

aym

ent of dam

ages. A

ll r

ights

reserv

ed in

the e

vent of th

e g

rant of a p

ate

nt,

utility

model o

r desig

n.

01 February 2017 20

Page 21: Geheimschutz, Grundschutz, ISMS ein integratives … · Geheimschutz, Grundschutz, ISMS – ein integratives Modell für ... TETRA network • Designed for up ... (TETRAPOL-Technology)

Confidential

© 2

014 A

irbus D

efe

nce a

nd S

pace –

All r

ights

reserv

ed. T

he r

epro

duction, dis

trib

ution a

nd u

tilization o

f th

is d

ocum

ent as w

ell a

s t

he c

om

munic

ation o

f its c

onte

nts

to o

thers

without expre

ss a

uth

ori

zation is

pro

hib

ited. O

ffenders

will be h

eld

lia

ble

for th

e p

aym

ent of dam

ages. A

ll r

ights

reserv

ed in

the e

vent of th

e g

rant of a p

ate

nt,

utility

model o

r desig

n.

01 February 2017 21

Page 22: Geheimschutz, Grundschutz, ISMS ein integratives … · Geheimschutz, Grundschutz, ISMS – ein integratives Modell für ... TETRA network • Designed for up ... (TETRAPOL-Technology)

Confidential

© 2

014 A

irbus D

efe

nce a

nd S

pace –

All r

ights

reserv

ed. T

he r

epro

duction, dis

trib

ution a

nd u

tilization o

f th

is d

ocum

ent as w

ell a

s t

he c

om

munic

ation o

f its c

onte

nts

to o

thers

without expre

ss a

uth

ori

zation is

pro

hib

ited. O

ffenders

will be h

eld

lia

ble

for th

e p

aym

ent of dam

ages. A

ll r

ights

reserv

ed in

the e

vent of th

e g

rant of a p

ate

nt,

utility

model o

r desig

n.

01 February 2017 22

Inhalt

• Vorstellung

• Secure Landline Communications

• Grundlagen: Geheimschutz

• Geheimschutz und IT

• Vergleich mit ISO 27001, BSI ITGS

• Konsolidiertes Maßnahmenmodell

Page 23: Geheimschutz, Grundschutz, ISMS ein integratives … · Geheimschutz, Grundschutz, ISMS – ein integratives Modell für ... TETRA network • Designed for up ... (TETRAPOL-Technology)

Confidential

© 2

014 A

irbus D

efe

nce a

nd S

pace –

All r

ights

reserv

ed. T

he r

epro

duction, dis

trib

ution a

nd u

tilization o

f th

is d

ocum

ent as w

ell a

s t

he c

om

munic

ation o

f its c

onte

nts

to o

thers

without expre

ss a

uth

ori

zation is

pro

hib

ited. O

ffenders

will be h

eld

lia

ble

for th

e p

aym

ent of dam

ages. A

ll r

ights

reserv

ed in

the e

vent of th

e g

rant of a p

ate

nt,

utility

model o

r desig

n.

01 February 2017 23

Geheimschutz und IT

• Maßnahmen bereits ab VS-NfD

• Verschlüsselung

• Organisatorische Maßnahmen

• Ab VS-V:

• Sperrzone

• ITGA

• Spezialhardware

• BSI Technische Leitlinien

• VS-NfD

Page 24: Geheimschutz, Grundschutz, ISMS ein integratives … · Geheimschutz, Grundschutz, ISMS – ein integratives Modell für ... TETRA network • Designed for up ... (TETRAPOL-Technology)

Confidential

© 2

014 A

irbus D

efe

nce a

nd S

pace –

All r

ights

reserv

ed. T

he r

epro

duction, dis

trib

ution a

nd u

tilization o

f th

is d

ocum

ent as w

ell a

s t

he c

om

munic

ation o

f its c

onte

nts

to o

thers

without expre

ss a

uth

ori

zation is

pro

hib

ited. O

ffenders

will be h

eld

lia

ble

for th

e p

aym

ent of dam

ages. A

ll r

ights

reserv

ed in

the e

vent of th

e g

rant of a p

ate

nt,

utility

model o

r desig

n.

01 February 2017 24

Inhalt

• Vorstellung

• Secure Landline Communications

• Grundlagen: Geheimschutz

• Geheimschutz und IT

• Vergleich mit ISO 27001, BSI ITGS

• Konsolidiertes Maßnahmenmodell

Page 25: Geheimschutz, Grundschutz, ISMS ein integratives … · Geheimschutz, Grundschutz, ISMS – ein integratives Modell für ... TETRA network • Designed for up ... (TETRAPOL-Technology)

Confidential

© 2

014 A

irbus D

efe

nce a

nd S

pace –

All r

ights

reserv

ed. T

he r

epro

duction, dis

trib

ution a

nd u

tilization o

f th

is d

ocum

ent as w

ell a

s t

he c

om

munic

ation o

f its c

onte

nts

to o

thers

without expre

ss a

uth

ori

zation is

pro

hib

ited. O

ffenders

will be h

eld

lia

ble

for th

e p

aym

ent of dam

ages. A

ll r

ights

reserv

ed in

the e

vent of th

e g

rant of a p

ate

nt,

utility

model o

r desig

n.

01 February 2017 25

• GHB 6.11.1 – „Grundsatz“:

• Vertraulichkeit, Verfügbarkeit, Integrität

• VSITR/U Maßnahmen: • Zuständigkeiten

• IT-Planung & Beschaffung

• Zugangs-, Zugriffskontrolle

• Schutz von IT-Betriebsräumen

• Löschen und Vernichten von Datenträgern

• Systemwartung

• Abstrahlsicherheit

• Krypto-Richtlinien

• Kennzeichnung von Datenträgern

• Not- / Katastrophenfall

• […]

Page 26: Geheimschutz, Grundschutz, ISMS ein integratives … · Geheimschutz, Grundschutz, ISMS – ein integratives Modell für ... TETRA network • Designed for up ... (TETRAPOL-Technology)

Confidential

© 2

014 A

irbus D

efe

nce a

nd S

pace –

All r

ights

reserv

ed. T

he r

epro

duction, dis

trib

ution a

nd u

tilization o

f th

is d

ocum

ent as w

ell a

s t

he c

om

munic

ation o

f its c

onte

nts

to o

thers

without expre

ss a

uth

ori

zation is

pro

hib

ited. O

ffenders

will be h

eld

lia

ble

for th

e p

aym

ent of dam

ages. A

ll r

ights

reserv

ed in

the e

vent of th

e g

rant of a p

ate

nt,

utility

model o

r desig

n.

Information Security Management

Information Asset

Management

IS Management Framework (Ref. ISO/IEC 27001:2013)

ISM-System Establishment & Maintenance

Information Risk

Management IS HR Management

Organizational

Management

Internal Audit Measurement Management Review Improvement

IS Control Objectives (Ref. ISO/IEC 27001:2013 Annex A)

IS Policies Organization of IS Human Resources

Security Asset Management

Access Controls Cryptography Physical & Environmental

Security Operations Security

Communications Security Systems Acquisition,

Development & Maintenance Supplier Relationships IS Incident Management

IS-Aspects of BCM

Page 27: Geheimschutz, Grundschutz, ISMS ein integratives … · Geheimschutz, Grundschutz, ISMS – ein integratives Modell für ... TETRA network • Designed for up ... (TETRAPOL-Technology)

Confidential

© 2

014 A

irbus D

efe

nce a

nd S

pace –

All r

ights

reserv

ed. T

he r

epro

duction, dis

trib

ution a

nd u

tilization o

f th

is d

ocum

ent as w

ell a

s t

he c

om

munic

ation o

f its c

onte

nts

to o

thers

without expre

ss a

uth

ori

zation is

pro

hib

ited. O

ffenders

will be h

eld

lia

ble

for th

e p

aym

ent of dam

ages. A

ll r

ights

reserv

ed in

the e

vent of th

e g

rant of a p

ate

nt,

utility

model o

r desig

n.

01 February 2017 27

Inhalt

• Vorstellung

• Secure Landline Communications

• Grundlagen: Geheimschutz

• Geheimschutz und IT

• Vergleich mit ISO 27001, BSI ITGS

• Konsolidiertes Maßnahmenmodell

Page 28: Geheimschutz, Grundschutz, ISMS ein integratives … · Geheimschutz, Grundschutz, ISMS – ein integratives Modell für ... TETRA network • Designed for up ... (TETRAPOL-Technology)

Confidential

© 2

014 A

irbus D

efe

nce a

nd S

pace –

All r

ights

reserv

ed. T

he r

epro

duction, dis

trib

ution a

nd u

tilization o

f th

is d

ocum

ent as w

ell a

s t

he c

om

munic

ation o

f its c

onte

nts

to o

thers

without expre

ss a

uth

ori

zation is

pro

hib

ited. O

ffenders

will be h

eld

lia

ble

for th

e p

aym

ent of dam

ages. A

ll r

ights

reserv

ed in

the e

vent of th

e g

rant of a p

ate

nt,

utility

model o

r desig

n.

BKO

BCM

(ITGS-)

Controls

Policies

Roles/

People

Incidents Risks

Requirements

Assets

VS-Maßnahmen

Audits

Page 29: Geheimschutz, Grundschutz, ISMS ein integratives … · Geheimschutz, Grundschutz, ISMS – ein integratives Modell für ... TETRA network • Designed for up ... (TETRAPOL-Technology)

Confidential

© 2

014 A

irbus D

efe

nce a

nd S

pace –

All r

ights

reserv

ed. T

he r

epro

duction, dis

trib

ution a

nd u

tilization o

f th

is d

ocum

ent as w

ell a

s t

he c

om

munic

ation o

f its c

onte

nts

to o

thers

without expre

ss a

uth

ori

zation is

pro

hib

ited. O

ffenders

will be h

eld

lia

ble

for th

e p

aym

ent of dam

ages. A

ll r

ights

reserv

ed in

the e

vent of th

e g

rant of a p

ate

nt,

utility

model o

r desig

n.

verinice.

verinice.PRO

BKO

BCM

Policies

Roles/

People

Incidents Risks

Requirements

Assets

Audits

(ITGS-)

Controls VS-Maßnahmen

Page 30: Geheimschutz, Grundschutz, ISMS ein integratives … · Geheimschutz, Grundschutz, ISMS – ein integratives Modell für ... TETRA network • Designed for up ... (TETRAPOL-Technology)

Confidential

© 2

014 A

irbus D

efe

nce a

nd S

pace –

All r

ights

reserv

ed. T

he r

epro

duction, dis

trib

ution a

nd u

tilization o

f th

is d

ocum

ent as w

ell a

s t

he c

om

munic

ation o

f its c

onte

nts

to o

thers

without expre

ss a

uth

ori

zation is

pro

hib

ited. O

ffenders

will be h

eld

lia

ble

for th

e p

aym

ent of dam

ages. A

ll r

ights

reserv

ed in

the e

vent of th

e g

rant of a p

ate

nt,

utility

model o

r desig

n.

ITGS- Maßnahmen

VS-Maßnahmen

27001

Controls

?

Page 31: Geheimschutz, Grundschutz, ISMS ein integratives … · Geheimschutz, Grundschutz, ISMS – ein integratives Modell für ... TETRA network • Designed for up ... (TETRAPOL-Technology)

Confidential

© 2

014 A

irbus D

efe

nce a

nd S

pace –

All r

ights

reserv

ed. T

he r

epro

duction, dis

trib

ution a

nd u

tilization o

f th

is d

ocum

ent as w

ell a

s t

he c

om

munic

ation o

f its c

onte

nts

to o

thers

without expre

ss a

uth

ori

zation is

pro

hib

ited. O

ffenders

will be h

eld

lia

ble

for th

e p

aym

ent of dam

ages. A

ll r

ights

reserv

ed in

the e

vent of th

e g

rant of a p

ate

nt,

utility

model o

r desig

n.

ITGS- Maßnahmen

VS-Maßnahmen

27001

Controls

0…* 0…1

0…*

0…1

Page 32: Geheimschutz, Grundschutz, ISMS ein integratives … · Geheimschutz, Grundschutz, ISMS – ein integratives Modell für ... TETRA network • Designed for up ... (TETRAPOL-Technology)

Confidential

© 2

014 A

irbus D

efe

nce a

nd S

pace –

All r

ights

reserv

ed. T

he r

epro

duction, dis

trib

ution a

nd u

tilization o

f th

is d

ocum

ent as w

ell a

s t

he c

om

munic

ation o

f its c

onte

nts

to o

thers

without expre

ss a

uth

ori

zation is

pro

hib

ited. O

ffenders

will be h

eld

lia

ble

for th

e p

aym

ent of dam

ages. A

ll r

ights

reserv

ed in

the e

vent of th

e g

rant of a p

ate

nt,

utility

model o

r desig

n.

Custom Relation-Type

Page 33: Geheimschutz, Grundschutz, ISMS ein integratives … · Geheimschutz, Grundschutz, ISMS – ein integratives Modell für ... TETRA network • Designed for up ... (TETRAPOL-Technology)

Confidential

© 2

014 A

irbus D

efe

nce a

nd S

pace –

All r

ights

reserv

ed. T

he r

epro

duction, dis

trib

ution a

nd u

tilization o

f th

is d

ocum

ent as w

ell a

s t

he c

om

munic

ation o

f its c

onte

nts

to o

thers

without expre

ss a

uth

ori

zation is

pro

hib

ited. O

ffenders

will be h

eld

lia

ble

for th

e p

aym

ent of dam

ages. A

ll r

ights

reserv

ed in

the e

vent of th

e g

rant of a p

ate

nt,

utility

model o

r desig

n.

Abfrage über Relation zu Maßnahmen

Page 34: Geheimschutz, Grundschutz, ISMS ein integratives … · Geheimschutz, Grundschutz, ISMS – ein integratives Modell für ... TETRA network • Designed for up ... (TETRAPOL-Technology)

Confidential

© 2

014 A

irbus D

efe

nce a

nd S

pace –

All r

ights

reserv

ed. T

he r

epro

duction, dis

trib

ution a

nd u

tilization o

f th

is d

ocum

ent as w

ell a

s t

he c

om

munic

ation o

f its c

onte

nts

to o

thers

without expre

ss a

uth

ori

zation is

pro

hib

ited. O

ffenders

will be h

eld

lia

ble

for th

e p

aym

ent of dam

ages. A

ll r

ights

reserv

ed in

the e

vent of th

e g

rant of a p

ate

nt,

utility

model o

r desig

n.

Ausgabetabelle

Page 35: Geheimschutz, Grundschutz, ISMS ein integratives … · Geheimschutz, Grundschutz, ISMS – ein integratives Modell für ... TETRA network • Designed for up ... (TETRAPOL-Technology)

Confidential

© 2

014 A

irbus D

efe

nce a

nd S

pace –

All r

ights

reserv

ed. T

he r

epro

duction, dis

trib

ution a

nd u

tilization o

f th

is d

ocum

ent as w

ell a

s t

he c

om

munic

ation o

f its c

onte

nts

to o

thers

without expre

ss a

uth

ori

zation is

pro

hib

ited. O

ffenders

will be h

eld

lia

ble

for th

e p

aym

ent of dam

ages. A

ll r

ights

reserv

ed in

the e

vent of th

e g

rant of a p

ate

nt,

utility

model o

r desig

n.

• Darstellung: • Pivot-Tabelle

• Radar-Chart

Page 36: Geheimschutz, Grundschutz, ISMS ein integratives … · Geheimschutz, Grundschutz, ISMS – ein integratives Modell für ... TETRA network • Designed for up ... (TETRAPOL-Technology)

© 2

014 A

irbus D

efe

nce a

nd S

pace –

All r

ights

reserv

ed. T

he r

epro

duction, dis

trib

ution a

nd u

tilization o

f th

is d

ocum

ent as w

ell a

s t

he c

om

munic

ation o

f its c

onte

nts

to o

thers

without expre

ss a

uth

ori

zation is

pro

hib

ited. O

ffenders

will be h

eld

lia

ble

for th

e p

aym

ent of dam

ages. A

ll r

ights

reserv

ed in

the e

vent of th

e g

rant of a p

ate

nt,

utility

model o

r desig

n.

Thank you for listening!

Questions?