19.12.2012 Views

IT Baseline Protection Manual - The Information Warfare Site

IT Baseline Protection Manual - The Information Warfare Site

IT Baseline Protection Manual - The Information Warfare Site

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

Safeguard Catalogue - Organisation Remarks<br />

____________________________________________________________________ .........................................<br />

S 2.178 Stipulating a set of security guidelines for the<br />

use of faxes<br />

Initiation responsibility: Head of <strong>IT</strong> Section, <strong>IT</strong> Security Management<br />

Implementation responsibility: Administrator<br />

Before any fax servers are installed, configured and cleared for use, a set of<br />

security guidelines should be specified for use of faxes. <strong>The</strong> points outlined<br />

below normally fall within the scope of such guidelines.<br />

1. Concept of use<br />

Before a fax server is cleared for use, the manner in which the system will be<br />

operated must be specified. For example, it might be desirable to have one fax<br />

server used solely to receive faxes over the LAN and then to send them<br />

outside. But a fax server can also receive incoming fax transmissions from<br />

outside. In this case how the incoming fax transmissions are forwarded to<br />

recipients must be specified. Under the first option, these transmissions are<br />

routed by the fax server itself, possibly using a connection to an existing E<br />

mail or workflow system. Another option is manual forwarding of incoming<br />

fax transmissions via the fax mail centre. Once again forwarding could be<br />

performed using E mail. However, another possibility is that the fax mail<br />

centre prints out incoming faxes and sends these printouts on to recipients (see<br />

S 2.181 Selection of a suitable fax server).<br />

2. Integration with business operations<br />

<strong>The</strong> mode of operation of the fax server also determines how faxes which<br />

have been sent or received are integrated within business operations. A<br />

procedure whereby the fax mail centre prints out all incoming faxes and sends<br />

the printouts to the relevant recipients corresponds to the way in which fax<br />

machines are customarily used. However, procedures whereby faxes are sent<br />

directly from an application on the user's workstation or incoming faxes are<br />

sent directly to the recipient from the fax server are significantly different<br />

from those which apply to the use of conventional fax machines. Hence in this<br />

case the guidelines for the use of faxes need to specify which incoming and<br />

outgoing faxes have to be printed out for the files.<br />

3. Procedures controlling the use of fax servers<br />

To ensure that a fax server is operated and used securely, a number of rules<br />

must be drawn up (see S 2.179 Procedures controlling the use of fax servers).<br />

4. Restrictions as to material which may be faxed<br />

<strong>The</strong> fax security guidelines must specify what information is allowed to be<br />

transmitted by fax. <strong>The</strong> fax security guidelines can also specify which<br />

communication partners may receive what information. This ensures that<br />

recipients are actually authorised to handle the information. For example, the<br />

guidelines could specify that price lists may only be sent to buyers or that<br />

project documents can only be sent to project team members by fax.<br />

____________________________________________________________________ .........................................<br />

<strong>IT</strong>-<strong>Baseline</strong> <strong>Protection</strong> <strong>Manual</strong>: Oktober 2000

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!