19.12.2012 Views

IT Baseline Protection Manual - The Information Warfare Site

IT Baseline Protection Manual - The Information Warfare Site

IT Baseline Protection Manual - The Information Warfare Site

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

Safeguard Catalogue - Hardware & Software Remarks<br />

____________________________________________________________________ .........................................<br />

S 4.102 C2 security under Novell 4.11<br />

Initiation responsibility: Head of <strong>IT</strong> Section, <strong>IT</strong> Security<br />

Management<br />

Implementation responsibility: Administrators<br />

Certain standardised evaluation criteria have become established for the<br />

assessment of <strong>IT</strong> products and <strong>IT</strong> systems: the US criteria known as TCSEC<br />

(Trusted Computer System Evaluation Criteria) and the European version,<br />

<strong>IT</strong>SEC (<strong>Information</strong> Technology Security Evaluation Criteria), which in the<br />

meantime have been further developed to become the CC (<strong>The</strong> Common<br />

Criteria for <strong>Information</strong> Technology Security Evaluation). In the autumn of<br />

1997 Novell Netware 4.11 received a certification in accordance with<br />

functionality class C2 of the TCSEC from the National Computer Security<br />

Center (NCSC); this corresponds to <strong>IT</strong>SEC class F-C2/E2.<br />

<strong>The</strong> use of a certified product provides a guarantee that the security<br />

functionality of the product has been independently tested and does not fall<br />

below the standard specified in the evaluation level (see also S 2.66<br />

Consideration of the contribution of certification to procurement).<br />

Frequently encountered standard cases are grouped together as functionality<br />

classes in these security criteria. <strong>The</strong> requirements of functionality classes F-<br />

C2 are essentially intended for operating systems. <strong>The</strong>y include definitions of<br />

the following features, for example:<br />

- Adoption of the C1 specifications<br />

- Existence of mechanisms for restricting access by users to certain<br />

documents<br />

- Identification of users<br />

- Refinement of access rights<br />

- Auditing of all security-related events with time stamp, user name, object<br />

and message indicating whether successful or unsuccessful<br />

- Administration of audit files (access protection, control of size, etc.)<br />

- Delimitation of resources (access protection)<br />

- Delimitation of data from different processes with respect to other<br />

processes even after sharing<br />

<strong>The</strong> observance of these specifications is checked with special test procedures.<br />

However, acquiring a C2-certified product is not sufficient in itself to achieve<br />

C2 security. <strong>The</strong> key factor for actually putting a C2 system into practice is<br />

the precise implementation of the specifications of the certification report.<br />

<strong>The</strong> security options necessary for achieving C2 security with Netware 4.11<br />

were summarised in the file named SECURE.NCF. <strong>The</strong> following sections<br />

look more closely at the SECURE.NCF file and explain the individual<br />

options.<br />

____________________________________________________________________ .........................................<br />

<strong>IT</strong>-<strong>Baseline</strong> <strong>Protection</strong> <strong>Manual</strong>: Oktober 2000

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!