19.12.2012 Views

IT Baseline Protection Manual - The Information Warfare Site

IT Baseline Protection Manual - The Information Warfare Site

IT Baseline Protection Manual - The Information Warfare Site

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

Safeguard Catalogue - Hardware & Software Remarks<br />

____________________________________________________________________ .........................................<br />

S 4.84 Use of BIOS security mechanisms<br />

Initiation responsibility: Head of <strong>IT</strong> Section, <strong>IT</strong> Security Management<br />

Implementation responsibility: Administrator, <strong>IT</strong> users<br />

Modern BIOS variants offer a large number of security mechanisms. Users or<br />

system administrators should acquaint themselves with the options available.<br />

Untrained users should never change BIOS entries as severe damage can be<br />

the result.<br />

- Password protection: most BIOS variants offer activation of a boot<br />

password. A BIOS password is not difficult to overcome, but it should<br />

definitely be used wherever better access safeguards are not available. In<br />

most cases it can be selected whether the password is required for booting<br />

or only for changing BIOS settings. Sometimes different passwords can be<br />

employed for these checks. <strong>The</strong> setup or administrator password should<br />

always be enabled to prevent unauthorised changes being made to the<br />

BIOS settings.<br />

Some BIOS variants support password protection for floppy disk drives.<br />

Unfortunately only few BIOS variants support this option. If available it<br />

should be enabled to prevent unauthorised installation of software and<br />

illicit copying of data.<br />

- Boot sequence: the boot sequence should be set so that the first option is<br />

always to boot from the hard disk. „C,A“ should therefore be used, for<br />

example. This will protect against infection with boot viruses if a floppy<br />

disk in left in the drive by accident. It also saves time, and saves wear on<br />

the floppy disk drive.<br />

Rearrangement of the boot sequence is intended to prevent the boot<br />

procedure from being carried out from an external data medium. This is to<br />

ensure that the system does not access a floppy disk in the floppy disk<br />

drive during booting, which could result in a boot virus infecting the PC<br />

(see T 5.23 Computer viruses). Depending on which BIOS and operating<br />

system is used, it may also be necessary to prevent booting from other<br />

exchangeable data media such as CD-ROMs.<br />

Without rearrangement of the boot sequence it is also possible to<br />

circumvent other safeguards, such as access protection mechanisms (see S<br />

4.1 Password protection for <strong>IT</strong> systems). One example is the ability to start<br />

a different operating system, with the effect of ignoring any security<br />

attributes that have been set (see S 4.49 Safeguarding the boot-up<br />

procedure for a Windows NT system).<br />

<strong>The</strong> effectiveness of the rearrangement of the boot sequence should always<br />

be checked by a boot test, because some controllers deactivate the internal<br />

sequence and need to be set separately.<br />

- Virus protection / warning: if this feature is enabled, the computer requests<br />

confirmation every time a change is made to the boot sector or the MBR<br />

(master boot record).<br />

____________________________________________________________________ .........................................<br />

<strong>IT</strong>-<strong>Baseline</strong> <strong>Protection</strong> <strong>Manual</strong>: Oktober 2000

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!