19.12.2012 Views

IT Baseline Protection Manual - The Information Warfare Site

IT Baseline Protection Manual - The Information Warfare Site

IT Baseline Protection Manual - The Information Warfare Site

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

Safeguard Catalogue - Organisation Remarks<br />

____________________________________________________________________ .........................................<br />

3. Specification of utilisation profiles<br />

<strong>The</strong> question of how much use authorised users may make of the fax server<br />

should also be covered in the procedures. This is especially important to avoid<br />

overloading of the server with serial faxes.<br />

4. Times of use<br />

Consideration should be given as to whether use of fax servers should be<br />

permitted only at certain times. Thus it would be possible to prohibit the<br />

sending of faxes outside working hours.<br />

5. Configuring groups<br />

Where incoming faxes are to be automatically routed to recipients through the<br />

fax server, separate fax numbers should be configured for certain functions<br />

and tasks. All members of a group can then be granted access to the incoming<br />

fax transmissions associated with a given call number. This also simplifies<br />

procedures for covering absences.<br />

For example, supposing a fax server is operated in a company so that it<br />

automatically forwards incoming fax transmissions to their recipients. A fax<br />

call number is assigned for the Order Entry department. <strong>The</strong> fax server<br />

forwards all fax transmissions with orders which are transmitted to the<br />

company using this call number, not to one individual person but to all<br />

members of the Order Entry department. This requires that the company<br />

specifies the sequence in which employees process incoming fax<br />

transmissions in order to avoid executing orders twice.<br />

6. Arrangements for covering staff absences<br />

Where fax servers which deliver incoming faxes to individual users are used,<br />

it is essential that arrangements are in place to deal with absences, and<br />

provisions dealing with this point must be included in the security policy.<br />

Otherwise there is no way of ensuring that important incoming faxes cannot<br />

remain unread for prolonged periods. In this respect, the procedure for use of<br />

fax servers is significantly different from that which applies to the use of<br />

conventional fax machines. In the latter case incoming faxes are noticed by<br />

staff standing in, as the faxes are available as hard copy.<br />

7. Logging<br />

Procedures should be defined for dealing with any log data generated. <strong>The</strong>se<br />

should specify who is tasked with analysing what logged data and at what<br />

intervals (see S 2.64 Checking the log files).<br />

8. Address books<br />

Which address books are used and who is responsible for maintaining them.<br />

Many fax server applications provide facilities for creating address books both<br />

for individual users and also for use throughout the organisation. Moreover, it<br />

is often also possible to synchronise fax server address books with distribution<br />

lists and address books already available in e-mail systems. Whereas address<br />

books which are to be used throughout the organisation should be maintained<br />

centrally through the fax mail centre, users must perform the task of<br />

maintaining their own address books themselves. Users should also be<br />

____________________________________________________________________ .........................................<br />

<strong>IT</strong>-<strong>Baseline</strong> <strong>Protection</strong> <strong>Manual</strong>: Oktober 2000

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!