19.12.2012 Views

IT Baseline Protection Manual - The Information Warfare Site

IT Baseline Protection Manual - The Information Warfare Site

IT Baseline Protection Manual - The Information Warfare Site

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

Safeguard Catalogue - Hardware & Software Remarks<br />

____________________________________________________________________ .........................................<br />

S 4.41 Use of a suitable PC security product<br />

Initiation responsibility: Head of <strong>IT</strong> Section, <strong>IT</strong> security management,<br />

data privacy officer, persons responsible for<br />

individual <strong>IT</strong> applications<br />

Implementation responsibility: Procurement department, administrator<br />

Provision of a PC security product must be arranged for the DOS PC with<br />

several users. <strong>The</strong> following minimum functionality may be used as a standard<br />

for procuring a product or for reviewing products already in use. <strong>The</strong> aim of<br />

this minimum functionality is to ensure that<br />

- only authorised persons can use the PC,<br />

- the users can only access the data in the way necessary for them to fulfil<br />

the task,<br />

- irregularities and attempts at manipulation become apparent.<br />

Recommended minimum functionality for PC security products for use in<br />

DOS PC’s with several users:<br />

- Identification and authentication of the administrator and the users. Lockout<br />

from the system which can only be reset by the administrator should<br />

take place after 3 incorrect attempts at authentication. If a password is<br />

used, it should have at least six characters and should be stored in the<br />

system in encrypted form.<br />

- Administration and monitoring of rights on hard disks and files where there<br />

should at least be differentiation between read and write access.<br />

- Role separation between administrator and user. <strong>The</strong> administrator alone<br />

may assign or withdraw rights.<br />

- Logging of logging-on, logging-off and infringement of rights procedures<br />

should be possible.<br />

- No system access at operating system level (DOS) must be possible for<br />

users.<br />

- Screen lock following inactivity of the keyboard or mouse for some time<br />

and re-activating by means of identification and authentication.<br />

- Boot protection should make it impossible to be able to boot up the PC<br />

from floppy disk without authorisation.<br />

Sensible minimum evaluation depth and minimum strength of mechanisms for<br />

certificates in accordance with <strong>IT</strong>SEC: E2, medium.<br />

Additional requirements of the PC security product:<br />

- User-friendly surface to increase acceptance.<br />

- Informative and comprehensible documentation for administrator and user.<br />

Desirable additional functionality of the PC security product:<br />

____________________________________________________________________ .........................................<br />

<strong>IT</strong>-<strong>Baseline</strong> <strong>Protection</strong> <strong>Manual</strong>: Oktober 2000

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!