19.12.2012 Views

IT Baseline Protection Manual - The Information Warfare Site

IT Baseline Protection Manual - The Information Warfare Site

IT Baseline Protection Manual - The Information Warfare Site

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

Safeguard Catalogue - Hardware & Software Remarks<br />

____________________________________________________________________ .........................................<br />

S 4.73 Specifying upper limits<br />

Initiation responsibility: Head of <strong>IT</strong> Section, <strong>IT</strong> Security Management<br />

Implementation responsibility: Administrators, application developers<br />

To allow better control of access to a database system and improve<br />

performance, it is advisable to specify upper limits for certain parameters.<br />

Particular note must be made of the following items here:<br />

Specifying upper limits for selectable data records<br />

Particularly for databases holding large amounts of data, it is recommended to<br />

specify a maximum number of data records which can be selected during<br />

access to the database.<br />

If such upper limits do not exist, users can intentionally or unintentionally<br />

execute SELECTs of any scope. This not only obstructs the activities of the<br />

individual user, but also results in long waiting periods for all other users of<br />

the database. Data records which have been selected for modification remain<br />

unavailable to all other users until the transaction is complete.<br />

<strong>The</strong> upper limits must be defined within the framework of the applications<br />

which access the database. Here, suitable controls and locks must be<br />

implemented to monitor adherence to the upper limits. In the case of<br />

applications which offer search functions, unrestricted searching should<br />

generally be disabled, and the entry of search criteria should be made<br />

mandatory.<br />

Imposing restrictions on resources<br />

Another option offered by certain manufacturers is the restriction of resources<br />

as regards the usage of a database. Here, it is possible to define a large number<br />

of attributes, including the number of logins per user ID, maximum<br />

permissible CPU utilisation time per login, total duration of a database session<br />

and the maximum permissible inactive period while an ID remains logged in.<br />

Examples:<br />

<strong>The</strong> following instruction limits the temporary tablespace "Temp" to 100 MB<br />

for database ID "Smith" in an Oracle database:<br />

ALTER USER Smith TEMPORARY TABLESPACE Temp QUOTA<br />

100M ON Temp;<br />

<strong>The</strong> next instruction is used to create a profile tester which limits the number<br />

of sessions, maximum CPU utilisation time per session, maximum duration of<br />

a database link and maximum idle time (IDLE). Such profiles can be allocated<br />

to individual users.<br />

CREATE PROFILE Tester LIM<strong>IT</strong><br />

SESSIONS PER USER 2,<br />

CPU_PER_SESSION 6000,<br />

IDLE_TIME 30,<br />

CONNECT_TIME 500;<br />

____________________________________________________________________ .........................................<br />

<strong>IT</strong>-<strong>Baseline</strong> <strong>Protection</strong> <strong>Manual</strong>: Oktober 2000

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!