19.12.2012 Views

IT Baseline Protection Manual - The Information Warfare Site

IT Baseline Protection Manual - The Information Warfare Site

IT Baseline Protection Manual - The Information Warfare Site

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

Safeguard Catalogue - Hardware & Software Remarks<br />

____________________________________________________________________ .........................................<br />

it is not possible to give away files and directories. Irrespective of the entries<br />

in the access control list, administrators can assume ownership of any file or<br />

directory.<br />

Note:<br />

As far as possible, users should never allocate the permission “Full<br />

access“, but at most the permission “Change“, so that ownership cannot be<br />

withdrawn from them and they always retain sovereignty over rights<br />

allocation.<br />

<strong>The</strong> attention of all users must be drawn to the fact that they should check<br />

regularly with File Manager or Explorer whether they are still owners of<br />

their directories and files. This is the only way in which users can tell<br />

whether access rights set by them have been by-passed.<br />

<strong>The</strong> safeguards mentioned in the following sections apply mainly to files and<br />

directories for which the administrator is responsible, i.e. to those which are<br />

either important for all users or useful for administration purposes. It is not<br />

sufficient to check the rights of one program. <strong>The</strong> rights allocation of all<br />

programs which are called up from this program must also be checked (in<br />

particular to avoid Trojan horses).<br />

<strong>The</strong> attributes of all system files should, as far as possible, be set in such a<br />

way that only the system administrator has access to them. Directories should<br />

provide no more than the required privileges for users.<br />

Directories of the operating system and the application programs<br />

<strong>The</strong> files and directories of the operating system itself must be adequately<br />

protected against illicit accesses. Immediately following installation of the<br />

system, the standard access rights specified should be adjusted to more<br />

restrictive forms of access control for the relevant files and directories (the<br />

Windows directory, %SystemRoot%, e.g. \WINNT, the Windows system<br />

directory %SystemRoot%\SYSTEM32 and any further program directories, e.g.<br />

\MsOffice and \Programs, and all sub-directories).<br />

At this point, however, it should be noted that quite a number of programs,<br />

particularly 16-bit programs but also MS Winword 7.0, create initialisation<br />

and configuration files in the Windows directory and/or in the program<br />

directory. If such programs are to be used it can become necessary to give<br />

users the access right "Change" for the relevant directories and files.<br />

Only administrators should have write access to these directories. All other<br />

users should only have read and execute permissions (RX).<br />

User (group) Access right<br />

SYSTEM Full access<br />

Administrators Full access<br />

Users Read<br />

____________________________________________________________________ .........................................<br />

<strong>IT</strong>-<strong>Baseline</strong> <strong>Protection</strong> <strong>Manual</strong>: Oktober 2000

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!