19.12.2012 Views

IT Baseline Protection Manual - The Information Warfare Site

IT Baseline Protection Manual - The Information Warfare Site

IT Baseline Protection Manual - The Information Warfare Site

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

Safeguard Catalogue - Organisation Remarks<br />

____________________________________________________________________ .........................................<br />

manager. Whether and how permissions for remote access should be<br />

restricted must in each case be decided within the organisation. Often<br />

equivalent rules will already exist, e.g. regarding permission for Internet<br />

access, which can then be adapted.<br />

<strong>The</strong> access authorisations granted must be recorded as part of the RAS<br />

system documentation and must be updated in the event of changes.<br />

- For fixed remote locations (e.g. telecommuting workstations) requirements<br />

which specify what conditions (e.g. in relation to security and technical<br />

equipment) the remote working place must satisfy in order to be allowed<br />

RAS connections from there to the local network. <strong>The</strong> concept can also<br />

provide for an initial review of the premises and subsequently for repeat<br />

reviews at periodic intervals, and specify how and by whom these reviews<br />

should be performed.<br />

- Normally the locations of RAS clients are not under the control of the LAN<br />

operator and therefore also possess a particular threat potential. It is<br />

possible to limit the potential exposure to threats of stationary clients (for<br />

example as used in teleworking) through appropriate provisions, but it<br />

must be assumed that the degree of risk to which RAS clients are exposed<br />

is very high. Not every location which satisfies the technical preconditions<br />

for remote access connection is also suitable for this. <strong>The</strong>refore rules must<br />

be drawn up which specify from which remote locations RAS connections<br />

may be established to the destination LAN. Depending on the planned<br />

operational scenario, however, it may be easier to draw up a negative list of<br />

locations which are particularly unsuitable. This could include, for<br />

example, hotel foyers, hotel business centres or train carriages.<br />

- Procedures for RAS administration should be specified which determine<br />

how changes to the RAS configuration must be implemented. Since<br />

breaches of security relating to RAS access could potentially result in the<br />

entire LAN being compromised, changes to the RAS configuration must<br />

always follow a predefined procedure (for example: request, review of the<br />

planned configuration, implementation, review of the change<br />

implemented).<br />

<strong>The</strong> technical concept should address the following points:<br />

- <strong>The</strong> technical concept should specify the hardware and software<br />

components with which the RAS system is to be technically implemented.<br />

<strong>The</strong> components are only defined in terms of their functionality. Through a<br />

subsequent analysis of existing system components and of the new<br />

components available on the market, the elements in the concept can then<br />

be assigned to actual equipment and software components (see S 2.186<br />

Selection of a suitable RAS product).<br />

- All the possible points of access and the access protocols to be used over<br />

them must be specified.<br />

- All the services and protocols which are permitted over the RAS link must<br />

be listed together with the resources which can be accessed over them.<br />

- A decision must be made as to which subnets should or must be accessible<br />

over the RAS link (see also RAS security concept).<br />

____________________________________________________________________ .........................................<br />

<strong>IT</strong>-<strong>Baseline</strong> <strong>Protection</strong> <strong>Manual</strong>: Oktober 2000<br />

Requirements relating to<br />

business locations<br />

Change management<br />

Technical equipment

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!