19.12.2012 Views

IT Baseline Protection Manual - The Information Warfare Site

IT Baseline Protection Manual - The Information Warfare Site

IT Baseline Protection Manual - The Information Warfare Site

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

Safeguard Catalogue - Hardware & Software Remarks<br />

____________________________________________________________________ .........................................<br />

S 4.91 Secure installation of a system management<br />

system<br />

Initiation responsibility: Head of <strong>IT</strong> Section, <strong>IT</strong> Security Management<br />

Implementation responsibility: Administrators<br />

<strong>The</strong> installation of a system management system calls for extensive and<br />

careful planning. After system analysis has been performed (see S 2.168), the<br />

management strategy has been laid down (see S 2.169) and a suitable<br />

management system has been chosen (see S 2.171), installation of the product<br />

must be planned in detail and put into practice accordingly. <strong>The</strong> actual<br />

management system configuration for the local network must be drawn up in<br />

accordance with the architecture on which the management product is based,<br />

paying particular attention to the formulated management strategy.<br />

In order to install most management systems, management software has to be<br />

installed on the computers concerned; this takes over communication between<br />

the management console or servers and the local computer. Often it is also<br />

necessary to install database systems on the central computers (servers or<br />

gateways), in which the management information is permanently stored by the<br />

management software. Depending on the product, it may also be possible to<br />

link in an existing database system for this purpose. As a rule the additionally<br />

installed software imposes extra demands on the computer’s local resources.<br />

During planning, therefore, attention must be paid to what system resources<br />

are available locally. It may be necessary for some systems to be upgraded.<br />

<strong>The</strong>se costs should be taken into account in the selection of the management<br />

product.<br />

In addition to these criteria, which are essentially intended to guarantee<br />

regulated technical system operations, for security reasons the software<br />

associated with the management system and the corresponding data must be<br />

included in the determination of the protection requirements in accordance<br />

with the <strong>IT</strong> <strong>Baseline</strong> <strong>Protection</strong> <strong>Manual</strong> (see Chapter 2), and the protection<br />

requirements must be classified as "high" to "very high". Compromising the<br />

management system is liable not only to cause failure of the entire network; as<br />

well as this, unnoticed changes to the system may cause considerable damage<br />

which can very rapidly take on existence-threatening forms.<br />

Particular attention should be paid to the following points in relation to<br />

installation:<br />

- All computers on which management information is stored must be given<br />

special protection:<br />

- <strong>The</strong> measures specified in the <strong>IT</strong> <strong>Baseline</strong> <strong>Protection</strong> <strong>Manual</strong><br />

Chapters 5 and 6 must be implemented, depending on the system on<br />

hand.<br />

- In particular the operating system mechanisms must be configured<br />

so as to prevent unauthorised access to locally stored management<br />

information.<br />

- Access to the management software must be granted only to<br />

authorised administrators and auditors.<br />

____________________________________________________________________ .........................................<br />

<strong>IT</strong>-<strong>Baseline</strong> <strong>Protection</strong> <strong>Manual</strong>: Oktober 2000

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!