19.12.2012 Views

IT Baseline Protection Manual - The Information Warfare Site

IT Baseline Protection Manual - The Information Warfare Site

IT Baseline Protection Manual - The Information Warfare Site

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

Safeguard Catalogue - Hardware & Software Remarks<br />

____________________________________________________________________ .........................................<br />

S 4.78 Careful modifications of configurations<br />

Initiation responsibility: Head of <strong>IT</strong> Section, <strong>IT</strong> Security management<br />

Implementation responsibility: Administrators<br />

All changes made to an <strong>IT</strong> system during actual operation should be<br />

considered as critical, and appropriate caution must be exercised when<br />

performing such changes.<br />

Before any change is made to an <strong>IT</strong> system, the old configuration should be<br />

backed up, so that it is readily available if the new configuration poses any<br />

problems.<br />

In the case of networked <strong>IT</strong> systems, users must be duly informed about<br />

impending maintenance work, so that they can plan for a temporary system<br />

shutdown and correctly localise any problems which might occur after the<br />

changes have been made.<br />

Changes to a configuration should always be performed in individual steps.<br />

Regular checks should be made as to whether these steps have been executed<br />

correctly, and whether the affected <strong>IT</strong> system and applications are still fully<br />

functional.<br />

If changes are made to system files, a re-start should be performed<br />

subsequently in order to check whether the <strong>IT</strong> system can still be started<br />

correctly. All data carriers required for emergency starting - such as boot<br />

diskettes, boot CD-ROM - should be kept handy in case a problem occurs.<br />

If possible, complex changes to a configuration should not be made in the<br />

original files, but in copies. All changes which have been performed should be<br />

examined by a colleague before being incorporated into regular operations.<br />

In the case of <strong>IT</strong> systems which need to fulfil high availability requirements,<br />

redundant systems should be maintained, or at least restricted <strong>IT</strong> operations<br />

should be ensured. Ideally, the procedures specified in the contingency manual<br />

should be followed in this case.<br />

All changes made to a configuration should be noted down step-by-step, so<br />

that if a problem occurs, the functionality of the <strong>IT</strong> system can be restored by<br />

a successive reversal of the changes (also refer to S 2.34 Documentation of<br />

changes made to an existing <strong>IT</strong> system).<br />

Additional controls:<br />

- Have changes to the system been documented step-by-step?<br />

- Can the changes be undone subsequently?<br />

____________________________________________________________________ .........................................<br />

<strong>IT</strong>-<strong>Baseline</strong> <strong>Protection</strong> <strong>Manual</strong>: Oktober 2000

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!