19.12.2012 Views

IT Baseline Protection Manual - The Information Warfare Site

IT Baseline Protection Manual - The Information Warfare Site

IT Baseline Protection Manual - The Information Warfare Site

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

Safeguard Catalogue - Hardware & Software Remarks<br />

____________________________________________________________________ .........................................<br />

- <strong>The</strong> relevant powers must be laid down as part of the security policy. In the<br />

field of management, too, there is a division of roles between<br />

administrators and auditors – and depending on the product also between<br />

administrators with different rights (such as workgroup administrators or<br />

divisional administrators). It is advisable to define certain roles and to set<br />

up users with the appropriate authorisations in accordance with these<br />

different roles. In that way the user accessing the system is granted only<br />

those rights to components or data in the management system that are<br />

necessary for the task in hand. Depending on the management system,<br />

users are set up either in the management system or in the user<br />

administration system for the computers. As the existing systems do not<br />

include direct provision for the definition of different roles (such as<br />

administrator and auditor), the roles must be emulated as closely as<br />

possible by creating various user accounts (e.g. "Administrator", "Auditor",<br />

"Computer Admin", "Data Privacy Officer") with the corresponding rights.<br />

Depending on the system, these roles can only be emulated incompletely<br />

and at some expense, because it may be necessary to assign and maintain<br />

the rights for individual roles explicitly for each system component (files,<br />

programs).<br />

- Access to the management software must be protected by secure<br />

passwords. <strong>The</strong> passwords should be changed at regular intervals, in<br />

accordance with the security policy.<br />

- Functions offered by the management software which according to the<br />

management strategy should not be used should (if possible) be disabled.<br />

- <strong>The</strong> logging files must be checked for anomalies at regular intervals (such<br />

as the execution of functions that are not supposed to be used). It is<br />

recommended to use log analysers for this, which may either be integrated<br />

into the management product or be available as add-on software, and which<br />

can generate alarm messages (such as by e-mail or pager) as the need<br />

arises, usually under rule control.<br />

- Integrity tests must be run on the management system at certain intervals<br />

so that unauthorised changes can be detected as early as possible. This<br />

applies in particular to all configuration data in the management system.<br />

- If the system management system is also used to distribute software, the<br />

program data that is to be distributed must also be checked regularly for<br />

changes in order to prevent the distribution of modified software across the<br />

entire network.<br />

- <strong>The</strong> response of the management system in the event of a system crash<br />

should be tested. Automatic restarting of the management system or of<br />

local subcomponents of the system must be ensured, depending on the<br />

management and security policies. This prevents computers that are<br />

connected to the management system from being inaccessible to<br />

management for lengthy periods (see also S 6.57 Creation of an emergency<br />

plan for the failure of the management system).<br />

- In the event of a system crash, the management databases must not be<br />

destroyed or enter an inconsistent state. This prevents a potential attacker<br />

from exploiting provoked inconsistencies for an attack. To ensure this, the<br />

____________________________________________________________________ .........................................<br />

<strong>IT</strong>-<strong>Baseline</strong> <strong>Protection</strong> <strong>Manual</strong>: Oktober 2000

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!