19.12.2012 Views

IT Baseline Protection Manual - The Information Warfare Site

IT Baseline Protection Manual - The Information Warfare Site

IT Baseline Protection Manual - The Information Warfare Site

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

Safeguard Catalogue - Hardware & Software Remarks<br />

____________________________________________________________________ .........................................<br />

Where necessary, access to executable files (.EXE, .COM and .BAT) can be<br />

restricted still further, so that only executable (X) access to these files is<br />

possible. In a similar manner, the files which are of critical importance in<br />

starting the system, namely \BOOT.INI, \NTDETECT.COM, \NTLDR,<br />

\AUTOEXEC.BAT and \CONFIG.SYS, must be protected against<br />

unauthorised amendment by non-privileged users.<br />

However, checks should also be carried out - preferably in a test environment<br />

- to determine whether all application programs are still able to run with this<br />

restrictive setting, or whether individual access controls still have to be<br />

supplemented by further access capabilities, in order to permit, for example,<br />

the storage of temporary files or configuration information in a program<br />

directory. Generally, however, access to the program files themselves (.EXEfiles)<br />

and to dynamic libraries (.DLL-files) for the group "Everyone" should<br />

be restricted to read access, especially as this safeguard also offers a certain<br />

protection against the spread of viruses.<br />

Temporary files<br />

Temporary files, which are used by various application programs for the<br />

relocation and intermediate storage of data, are filed under Windows NT in<br />

the directory %TEMP% (usually C:\TEMP). All users also need the right to<br />

store files in this directory, but, at the same time, users must be prevented<br />

from gaining access to temporary files of other users. <strong>The</strong> access rights for the<br />

directory should therefore be changed to the following value:<br />

Registration<br />

User (group) Access right<br />

SYSTEM Full access<br />

Administrators Full access<br />

Creator/Owner Change<br />

Users Add<br />

<strong>The</strong> registry of Windows NT is located in the sub-directory CONFIG of the<br />

Windows system directory %SystemRoot%\SYSTEM32, i. e. in general in the<br />

directory C:\WINNT\SYSTEM32\CONFIG. <strong>The</strong> user must have access to this<br />

directory, as the registry is automatically changed by settings of the user in<br />

application programs. If the user cannot access this directory, it leads to<br />

system errors or to the crashing of the system. Under version 3.51, the<br />

standard rights set for this directory, which, as far as possible, should not be<br />

amended, are:<br />

____________________________________________________________________ .........................................<br />

<strong>IT</strong>-<strong>Baseline</strong> <strong>Protection</strong> <strong>Manual</strong>: Oktober 2000

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!