19.12.2012 Views

IT Baseline Protection Manual - The Information Warfare Site

IT Baseline Protection Manual - The Information Warfare Site

IT Baseline Protection Manual - The Information Warfare Site

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

Safeguard Catalogue - Hardware & Software Remarks<br />

____________________________________________________________________ .........................................<br />

S 4.95 Minimal operating system<br />

Initiation responsibility: Head of <strong>IT</strong> Section, <strong>IT</strong> Security Management<br />

Implementation responsibility: Administrators<br />

Computers in a security-critical environment should be designed so as to<br />

present as few targets for attack as possible. As today's operating systems<br />

provide many network services as standard, a well thought-out server service<br />

(such as an SSL-based Web server) is not sufficient for the operation of a<br />

secure server. It is also necessary to safeguard the operating system, because<br />

otherwise the security functions of the server service could be evaded via a<br />

weak point in the operating system. <strong>The</strong> characteristic feature of what is<br />

referred to as a minimal operating system is that ideally it does not provide<br />

any form of network service. A potential attacker will therefore be unable to<br />

exploit a weak point in a network service belonging to the operating system.<br />

Even if an attacker does gain access to the computer via a weak point, he will<br />

be further impeded by the minimal system. <strong>The</strong> fewer programs an attacker<br />

finds on a target computer, the more difficult it is for him to locate and exploit<br />

further weak points on that computer. Furthermore this also greatly facilitates<br />

maintenance of the server, because the patches or service packs for utility<br />

programs no longer have to be loaded if the programs are not there.<br />

<strong>The</strong> following sections describe the configuration of an operating system<br />

using the example of an Internet server, because in this case the security<br />

requirements imposed on the operating system are generally very high.<br />

An Internet server usually has only one task: making a certain number of<br />

services (such as the readiness to receive e-mails) available to other computers<br />

in a stable manner. <strong>The</strong> underlying operating system should not provide any<br />

other services. <strong>The</strong> following procedure should therefore be observed when<br />

installing an Internet server:<br />

1. Basic installation of the operating system<br />

If it is possible to influence which packages are actually installed during<br />

installation, only the necessary packages should be loaded at this stage. It is<br />

not always easy to establish the necessity of certain packages, however, so<br />

at least those packages which are obviously superfluous should not be<br />

loaded.<br />

2. Deactivation of unnecessary programs<br />

When a computer is started up, a large number of programs are launched<br />

automatically. Some of these programs are entirely irrelevant for an<br />

Internet server and should be deactivated. <strong>The</strong>y can be deactivated by<br />

preventing automatic launching (start scripts under Unix, Startup and<br />

Service Manager under Windows NT) and by additionally deleting the<br />

corresponding programs. For security reasons it is recommended to delete<br />

them, because then an attacker will not be able to reactivate the services.<br />

However, it is sometimes very difficult to find and delete all of the files<br />

belonging to a particular service, so if there is any doubt the files should<br />

not be deleted.<br />

____________________________________________________________________ .........................................<br />

<strong>IT</strong>-<strong>Baseline</strong> <strong>Protection</strong> <strong>Manual</strong>: Oktober 2000

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!