19.12.2012 Views

IT Baseline Protection Manual - The Information Warfare Site

IT Baseline Protection Manual - The Information Warfare Site

IT Baseline Protection Manual - The Information Warfare Site

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

Safeguard Catalogue - Hardware & Software Remarks<br />

____________________________________________________________________ .........................................<br />

S 4.15 Secure log-in<br />

Initiation responsibility: Head of <strong>IT</strong> Section, <strong>IT</strong> Security Management<br />

Implementation responsibility: Administrators<br />

Use should be made of a log-in program or the relevant options should be<br />

activated so that the following measures can be taken:<br />

- <strong>The</strong> number of unsuccessful log-in attempts is restricted.<br />

- After each unsuccessful log-in attempt, the waiting time until the next login<br />

prompt will increase. After a certain number of unsuccessful attempts,<br />

the account and/or terminal will be blocked. It should be noted that the<br />

administrator must not be locked out by this measure; his continued access<br />

from the console must be ensured (cf. also S 1.32 Adequate siting of the<br />

console, devices with exchangeable data media, and printers).<br />

- When logging in, the user is informed of the time of the last successful login.<br />

- When logging in, the user is advised of unsuccessful log-in attempts. This<br />

information might be repeated at the time of several subsequent log-ins.<br />

- When logging in, the user is informed of the time of the last log-out. Here,<br />

a difference is made between log-outs to an interactive log-in and log-outs<br />

to a non-interactive log-in (log-out of background processes).<br />

- <strong>The</strong> additional use of one-time passwords is recommended for log-in via<br />

networks with non-encrypted transmission of passwords (also refer to S<br />

5.34 Use of one- time passwords).<br />

Additional controls:<br />

- Have the users been instructed to check the time of the last successful login<br />

for plausibility?<br />

- How often are unsuccessful log-in attempts reported to the user?<br />

____________________________________________________________________ .........................................<br />

<strong>IT</strong>-<strong>Baseline</strong> <strong>Protection</strong> <strong>Manual</strong>: Oktober 2000

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!