19.12.2012 Views

IT Baseline Protection Manual - The Information Warfare Site

IT Baseline Protection Manual - The Information Warfare Site

IT Baseline Protection Manual - The Information Warfare Site

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

Safeguard Catalogue - Hardware & Software Remarks<br />

____________________________________________________________________ .........................................<br />

S 4 Safeguard Catalogue - Hardware & Software<br />

S 4.1 Password protection for <strong>IT</strong> systems<br />

S 4.2 Screen lock<br />

S 4.3 Periodic runs of a virus detection program<br />

S 4.4 Locking of floppy disk drive<br />

S 4.5 Logging of PBX administration jobs<br />

S 4.6 Audit of the PBX configuration (target/performance<br />

reconciliation)<br />

S 4.7 Change of preset passwords<br />

S 4.8 <strong>Protection</strong> of the PBX operator's console<br />

S 4.9 Use of the security mechanisms of X Windows<br />

S 4.10 Password protection for PBX terminals<br />

S 4.11 Screening of PBX interfaces<br />

S 4.12 Disabling of unneeded user facilities<br />

S 4.13 Careful allocation of identifiers<br />

S 4.14 Mandatory password protection under UNIX<br />

S 4.15 Secure log-in<br />

S 4.16 Restrictions on access to accounts and/or terminals<br />

S 4.17 Blocking and deletion of unnecessary accounts and<br />

terminals<br />

S 4.18 Administrative and technical means to control access to<br />

the system-monitor and single-user mode<br />

S 4.19 Restrictive allocation of attributes for UNIX system<br />

files and directories<br />

S 4.20 Restrictive allocation of attributes for UNIX user files<br />

and directories<br />

S 4.21 Preventing unauthorised acquisition of administrator<br />

rights<br />

S 4.22 Prevention of loss of confidentiality of sensitive data in<br />

the UNIX system<br />

S 4.23 Secure invocation of executable files<br />

S 4.24 Ensuring consistent system management<br />

S 4.25 Use of logging in UNIX systems<br />

S 4.26 Regular security checks of the UNIX system<br />

S 4.27 Password protection in laptop PCs<br />

____________________________________________________________________ .........................................<br />

<strong>IT</strong>-<strong>Baseline</strong> <strong>Protection</strong> <strong>Manual</strong>: Oktober 2000

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!