19.12.2012 Views

IT Baseline Protection Manual - The Information Warfare Site

IT Baseline Protection Manual - The Information Warfare Site

IT Baseline Protection Manual - The Information Warfare Site

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

Safeguard Catalogue - Hardware & Software Remarks<br />

____________________________________________________________________ .........................................<br />

numerical IP addresses or subnetworks but to certain computer names or<br />

domain names instead, attention should also be paid to the risk of DNS<br />

spoofing.<br />

If the WWW browser accesses the WWW server via a proxy server, it should<br />

be borne in mind that the WWW server only finds out the IP address of the<br />

proxy. A proxy can only be considered trustworthy, however, if all <strong>IT</strong> systems<br />

and users hidden behind it are also trustworthy.<br />

If access to WWW files is restricted to specified IP addresses, subnetworks or<br />

domains, it may therefore be advantageous to give these additional protection<br />

with a password.<br />

Password protection<br />

In order to protect WWW files with passwords, it is first necessary to create a<br />

password file in which the authorised users and their passwords will be<br />

entered. It is vital that this file should not be stored in areas of the WWW<br />

server which could possibly be accessed from the outside. <strong>The</strong> file must be<br />

readable for the Web server, however. It is advisable to create a separate<br />

directory for these password files. Only the owner of the file and the WWW<br />

server are allowed to access the files stored in that directory.<br />

One problem with the protection of WWW files by means of passwords is that<br />

the authorised users have to handle their passwords carefully; for example<br />

they must not pass them on, but must keep them safely, change them regularly<br />

and select them with care (see S 2.11 Provisions governing the use of<br />

passwords). Another problem is whether and how passwords can be protected<br />

against interception during transmission. Passwords must under no<br />

circumstances be transmitted within a URL.<br />

If possible it is advisable to use authentication via addresses in addition.<br />

Encryption<br />

Another possibility is storing files in encrypted form on a WWW server, such<br />

that only users who are in possession of the correct cryptographic key are able<br />

to read the files. This approach does require a corresponding system of key<br />

management, however, which may be complex and costly.<br />

Procedures such as SSL or S-HTTP can be used to prevent interception of the<br />

files and passwords during transmission.<br />

____________________________________________________________________ .........................................<br />

<strong>IT</strong>-<strong>Baseline</strong> <strong>Protection</strong> <strong>Manual</strong>: Oktober 2000

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!