19.12.2012 Views

IT Baseline Protection Manual - The Information Warfare Site

IT Baseline Protection Manual - The Information Warfare Site

IT Baseline Protection Manual - The Information Warfare Site

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

Safeguard Catalogue - Hardware & Software Remarks<br />

____________________________________________________________________ .........................................<br />

S 4.85 Design of suitable interfaces for crypto modules<br />

S 4.86 Secure separation of roles and configuration with crypto<br />

modules<br />

S 4.87 Physical security of crypto modules<br />

S 4.88 Operating system security requirements when using<br />

crypto modules<br />

S 4.89 Emission security<br />

S 4.90 Use of cryptographic procedures on the various layers<br />

of the ISO/OSI reference model<br />

S 4.91 Secure installation of a system management system<br />

S 4.92 Secure operation of a system management system<br />

S 4.93 Regular integrity checking<br />

S 4.94 <strong>Protection</strong> of WWW files<br />

S 4.95 Minimal operating system<br />

S 4.96 Deactivating DNS<br />

S 4.97 One service per server<br />

S 4.98 Restricting communication to a minimum with packet<br />

filters<br />

S 4.99 <strong>Protection</strong> against subsequent changes to information<br />

S 4.100 Firewalls and active content<br />

S 4.101 Firewalls and encryption<br />

S 4.102 C2 security under Novell 4.11<br />

S 4.103 DHCP server under Novell Netware 4.x<br />

S 4.104 LDAP Services for NDS<br />

S 4.105 Initial measures after a Unix standard installation<br />

S 4.106 Aktivation of system logging<br />

S 4.107 Use of vendor resources<br />

S 4.108 Simplified and secure network management with DNS<br />

services under Novell NetWare 4.11<br />

S 4.109 Software reinstallation on workstations<br />

S 4.110 Secure installation of the RAS system<br />

S 4.111 Secure configuration of the RAS system<br />

S 4.112 Secure operation of the RAS system<br />

S 4.113 Use of an authentication server within RAS access<br />

S 4.114 Use of the security mechanisms provided on mobile<br />

phones<br />

____________________________________________________________________ .........................................<br />

<strong>IT</strong>-<strong>Baseline</strong> <strong>Protection</strong> <strong>Manual</strong>: Oktober 2000

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!