19.12.2012 Views

IT Baseline Protection Manual - The Information Warfare Site

IT Baseline Protection Manual - The Information Warfare Site

IT Baseline Protection Manual - The Information Warfare Site

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

Safeguard Catalogue - Hardware & Software Remarks<br />

____________________________________________________________________ .........................................<br />

S 4.93 Regular integrity checking<br />

Initiation responsibility: Head of <strong>IT</strong> Section, <strong>IT</strong> Security Management<br />

Implementation responsibility: Administrators<br />

Regular checking of the file system for unexpected changes helps to detect<br />

inconsistencies. In this way it is also possible to detect attacks quickly. If an<br />

attack has indeed been made, it is important to reconstruct the attacker’s<br />

approach. On the one hand this serves the purpose of ensuring that users do<br />

not have recourse to corrupted data, and on the other hand of detecting hidden<br />

back doors which an attacker may have installed to give him access to the<br />

computer at a later date.<br />

Programs which calculate cryptographic checksums across a large proportion<br />

of the files in the file system can be used for integrity checking. Tools offering<br />

this functionality under Unix include the tripwire program, for example, some<br />

versions of which are also available free of charge, or the tool developed on<br />

behalf of the BSI for secure Unix administration (USE<strong>IT</strong>). Comparable<br />

programs are also available for the Windows NT operating system. Apart from<br />

the file system, it should also be possible to subject the registration keys to an<br />

integrity test.<br />

tripwire and USE<strong>IT</strong> can detect any change to a file system because the<br />

checksums no longer match when a change has been made. <strong>The</strong>y not only test<br />

whether a file has been modified, they also detect any change to access rights,<br />

or if data has been deleted and subsequently reloaded. Given a special setting,<br />

all accesses to a file, even read accesses, can be detected in most cases.<br />

In order to prevent the possibility of the program or checksum file being<br />

corrupted by an attacker, they should be located on a data medium that<br />

optionally allows only read access. However, the checksum file also has to be<br />

changed when changes are made to the file system, so floppy disks are<br />

recommended for small file systems and removable hard disks for larger<br />

systems.<br />

An integrity check should be performed regularly, for example every night.<br />

Notification of the outcome should be sent automatically to the administrator<br />

by e-mail, even if no changes have been detected.<br />

Additional Controls:<br />

- Which integrity checkers are used?<br />

- How often are the results of the integrity checkers examined?<br />

- How are the checksum file and the program itself protected against<br />

manipulation?<br />

____________________________________________________________________ .........................................<br />

<strong>IT</strong>-<strong>Baseline</strong> <strong>Protection</strong> <strong>Manual</strong>: Oktober 2000

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!