19.12.2012 Views

IT Baseline Protection Manual - The Information Warfare Site

IT Baseline Protection Manual - The Information Warfare Site

IT Baseline Protection Manual - The Information Warfare Site

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

Safeguard Catalogue - Hardware & Software Remarks<br />

____________________________________________________________________ .........................................<br />

S 4.97 One service per server<br />

Initiation responsibility: Head of <strong>IT</strong> Section, <strong>IT</strong> Security Management<br />

Implementation responsibility: Administrators<br />

Many weak points in <strong>IT</strong> systems cannot be exploited in isolation by a potential<br />

attacker. It is often only a combination of vulnerabilities that makes successful<br />

infiltration of a computer a possibility. One recommendation for the operation<br />

of secure servers is therefore: different services should be located on different<br />

computers.<br />

Only one service should therefore be loaded on a minimal system (see also S<br />

4.95 Minimal operating system), i.e. for example either a WWW server or an<br />

e-mail server. Besides this, the security classifications of individual services<br />

also vary. Successful infiltration of a WWW server may well be very<br />

annoying, particularly if the attacker makes changes to the WWW pages that<br />

are externally accessible. <strong>The</strong> attacker does not have access to internal<br />

information in this way, however. If the WWW server is also the e-mail<br />

server, though, the attacker may be able to intercept all of the e-mail traffic,<br />

which could have much worse consequences.<br />

<strong>The</strong> separation can even be further increased, by sharing different tasks of an<br />

individual service between different computers. For example, there could be<br />

one e-mail server (A), which receives e-mails from the Internet and forwards<br />

them to the internal network, and another e-mail server (B), which forwards emails<br />

from the internal network to the Internet. As communication from the<br />

Internet can only be established with e-mail server A, an attacker can only<br />

attack that server, not the other. E-mail server A is not itself allowed to send<br />

any e-mails to the Internet, and therefore this computer cannot be misused for<br />

e-mail spamming, either.<br />

Dividing up various services between different computers has the following<br />

advantages, among others:<br />

- Easier configuration of the individual computers<br />

- Simpler and more secure configuration of an upstream packet filter<br />

- Increased resistance to attacks<br />

- Greater operational reliability<br />

It should be possible to compensate for any negative consequences that may<br />

arise, such as higher hardware costs for purchasing several computers, by the<br />

fact that the individual computers do not have to produce the same<br />

performance and consequently all in all, with the same performance, do not<br />

have to be more expensive than one particularly powerful computer.<br />

Administration costs do not necessarily have to rise with the number of<br />

computers, either, because simpler configuration of the individual computers<br />

saves time.<br />

____________________________________________________________________ .........................................<br />

<strong>IT</strong>-<strong>Baseline</strong> <strong>Protection</strong> <strong>Manual</strong>: Oktober 2000

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!