19.12.2012 Views

IT Baseline Protection Manual - The Information Warfare Site

IT Baseline Protection Manual - The Information Warfare Site

IT Baseline Protection Manual - The Information Warfare Site

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

Safeguard Catalogue - Organisation Remarks<br />

____________________________________________________________________ .........................................<br />

- On the LAN side, does the server software support all the<br />

network technologies that are used locally (e.g. ethernet,<br />

Token Ring, ATM)?<br />

- On the WAN side, do the client and server software support<br />

all the access technologies which will be used (e.g. ISDN,<br />

mobile phone, analogue telephone line, X.25)?<br />

- Does the RAS server allow several RAS clients to dial in at<br />

the same time?<br />

- Does the RAS product support different protocols for remote<br />

access over telecommunications networks (e.g. PPP, SLIP)?<br />

- Does the RAS product support different service protocols for<br />

remote access (e.g. TCP/IP, NetBEUI, XPC, DECnet)?<br />

- Are tunnel protocols (e.g. PPTP, L2F, IPSec) supported for<br />

Internet-based access?<br />

- Depending on the access technology used, does the RAS<br />

product allow the use of additional, technology-dependent<br />

mechanisms (e.g. channel bundling for ISDN, callback of the<br />

RAS client by the RAS server)?<br />

2.6 Security: communication, authentication and access<br />

- Does the product allow secure data transmission?<br />

- Does the product allow the use of alternative security<br />

mechanisms (IPv4 mechanisms, IPSec)?<br />

- Is communication protected using standard mechanisms? In<br />

particular, all the cryptographic algorithms used should be<br />

established and state-of-the-art. <strong>The</strong> product should comply<br />

with current standards.<br />

- Does the product architecture allow subsequent installation of<br />

new security mechanisms?<br />

- Are remote users granted access to the local network only<br />

after successful authentication?<br />

- Does the system allow remote users to be authenticated using<br />

several authentication mechanisms (e.g. user name and<br />

password, Challenge-Response, Calling Line Identification -<br />

CLI)?<br />

- Is the system architecture designed in such a way that new<br />

authentication mechanisms can be subsequently integrated?<br />

- Does the RAS system allow the use of one or more commonly<br />

used external authentication services (e.g. SecureID,<br />

-<br />

RADIUS, TACACS+)?<br />

Is it possible to integrate additional external authentication<br />

services?<br />

- Does the RAS system transmit the information necessary for<br />

access control of access to data in the local network (user ID,<br />

security ID) to the local access control mechanisms?<br />

Once all the requirements for the product to be purchased have been<br />

documented, the products available on the market must be thoroughly<br />

researched to establish to what extent they satisfy these requirements. It is<br />

likely that not every product will satisfy all the requirements at the same time<br />

or equally well. <strong>The</strong>refore each requirement should be weighted in a manner<br />

____________________________________________________________________ .........................................<br />

<strong>IT</strong>-<strong>Baseline</strong> <strong>Protection</strong> <strong>Manual</strong>: Oktober 2000

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!