19.12.2012 Views

IT Baseline Protection Manual - The Information Warfare Site

IT Baseline Protection Manual - The Information Warfare Site

IT Baseline Protection Manual - The Information Warfare Site

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

Safeguard Catalogue - Hardware & Software Remarks<br />

____________________________________________________________________ .........................................<br />

S 4.107 Use of vendor resources<br />

Initiation responsibility: Head of <strong>IT</strong> Section, <strong>IT</strong> Security Management<br />

Implementation responsibility: Administrator<br />

All vendors of <strong>IT</strong> systems or <strong>IT</strong> components offer various forms of support<br />

and information for purchasers of their products. <strong>The</strong>se include, for example,<br />

assistance in dealing with problems (support, hotline, updates, patches etc.)<br />

and access to information on security solutions (www sites, news groups,<br />

mailing lists etc.). Some of these are free of charge, others are not.<br />

Already when purchasing <strong>IT</strong> systems or products, consideration should be<br />

given to the question of which forms of support provided by the vendor should<br />

be taken up, especially when these incur ongoing costs.<br />

Steps should be taken to ensure that for all <strong>IT</strong> systems and products used<br />

regular checks are made as to whether new information regarding security<br />

problems and possible solutions is available from the vendor. This is<br />

especially important for all server operating systems as a security weakness on<br />

the server can cause significantly more damage than one which affects only a<br />

single <strong>IT</strong> system.<br />

Security-specific updates, when these are not supplied directly from the<br />

vendor on CD-ROM, should only be obtained from trustworthy sources, e.g.<br />

from CERTs (see also S 2.35 Obtaining information on security weaknesses of<br />

the system). Updates should be checked to ensure they are intact using<br />

cryptographic methods (e.g. MD5, PGP) if they are offered appropriately<br />

encrypted and digitally signed.<br />

To ensure that security-relevant advice from the vendor can be accessed at any<br />

time, a summary should be maintained for all operating systems and all major<br />

<strong>IT</strong> products used. This should show clearly the www addresses where<br />

security-specific updates and patches and information provided by the<br />

operating system vendor can be found.<br />

A table like the one set out below, which provides a summary of the relevant<br />

links to known server operating systems, can be used for this purpose. <strong>The</strong><br />

lines marked with U contain the URLs for (security-specific) updates and<br />

patches for the vendor concerned, while the lines marked with I contain the<br />

addresses from where security-specific information can be obtained.<br />

Berkeley Software Design, Inc. - BSD/OS<br />

U ftp://ftp.bsdi.com/bsdi/patches/<br />

I http://www.bsdi.com/services/support/<br />

Caldera OpenLinux<br />

U ftp://ftp.caldera.com/pub/openlinux/updates/<br />

I http://www.calderasystems.com/support/security/<br />

Deban Linux<br />

____________________________________________________________________ .........................................<br />

<strong>IT</strong>-<strong>Baseline</strong> <strong>Protection</strong> <strong>Manual</strong>: Oktober 2000

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!