19.12.2012 Views

IT Baseline Protection Manual - The Information Warfare Site

IT Baseline Protection Manual - The Information Warfare Site

IT Baseline Protection Manual - The Information Warfare Site

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

Safeguard Catalogue - Organisation Remarks<br />

____________________________________________________________________ .........................................<br />

<strong>The</strong> RAS security concept should address the following points:<br />

- A set of security guidelines covering RAS usage should be drawn up.<br />

<strong>The</strong>se RAS security guidelines must be oriented to the existing<br />

organisation-wide security guidelines. As a general rule, permissions<br />

granted for access over the RAS system should be less far-reaching and<br />

checks should be tougher than with local access.<br />

- <strong>The</strong> type and manner of user authentication and the mechanisms to be used<br />

for this purpose should be specified.<br />

- All components involved in authentication should be recorded and their<br />

functions and interactions should be described.<br />

- All components involved in access control should be recorded and their<br />

functions and interactions should be described. In this way it is possible to<br />

determine whether, for example, existing access control mechanisms can<br />

be configured in such a way that more restrictive settings automatically<br />

apply during remote access.<br />

- As part of the security design, all points of RAS access to the local network<br />

must be recorded and the manner in which these access points are<br />

connected to the LAN must be specified (see also module 7.3 Firewalls).<br />

- Proceeding on the basis of the current network structure, the security<br />

concept must analyse which subnets can be remotely accessed. For busbased<br />

networks (e.g. ethernet) typically all the computers in the subnet in<br />

which the RAS access resides can be accessed. In this connection<br />

consideration should be given to the possibility of creating dedicated<br />

access networks from which only controlled access to the operational<br />

network is possible (e.g. with the aid of routers, packet filters or an internal<br />

firewall). <strong>The</strong> creation of access networks requires the purchase and<br />

maintenance of additional hardware and software (see also S 5.77 Creation<br />

of subnets).<br />

- Organisational reporting channels must be planned so that in the event of a<br />

security incident a targeted and rapid response is possible. <strong>The</strong> technical<br />

concept should lay down appropriate mechanisms which enable the<br />

detection of security incidents and calling in of the responsible<br />

administrator who constitutes the initial point in the organisational<br />

reporting channel.<br />

- Since remote access to a LAN poses special security risks because of the<br />

generally insecure environment in which RAS clients are used, every user<br />

who is to be allowed RAS access must be given special training. This<br />

training should ensure that users are made aware of the dangers and also<br />

instruct them in how to handle the technical devices and software.<br />

- If any authentication tokens are to be used, users must be informed of the<br />

proper manner in which they should be handled.<br />

- Again, the administrators must be given thorough training on the products<br />

used and they must also be made aware of all the potential security risks.<br />

____________________________________________________________________ .........................................<br />

<strong>IT</strong>-<strong>Baseline</strong> <strong>Protection</strong> <strong>Manual</strong>: Oktober 2000<br />

RAS security guidelines<br />

Authentication<br />

Access control<br />

Recording of all RAS<br />

access points<br />

Restrictions on external<br />

access<br />

Reporting system for<br />

security problems<br />

Training and security<br />

awareness

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!