19.12.2012 Views

IT Baseline Protection Manual - The Information Warfare Site

IT Baseline Protection Manual - The Information Warfare Site

IT Baseline Protection Manual - The Information Warfare Site

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

Non-Networked Systems and Clients <strong>IT</strong>-Security Management<br />

_________________________________________________________________________________________<br />

- S 4.9 (1) Use of the security mechanisms of X Windows<br />

- S 4.19 (1) Restrictive allocation of attributes for UNIX system files and directories<br />

- S 4.20 (2) Restrictive allocation of attributes for UNIX user files and directories<br />

- S 4.21 (1) Preventing unauthorised acquisition of administrator rights<br />

- S 4.22 (3) Prevention of loss of confidentiality of sensitive data in the UNIX system<br />

- S 4.23 (3) Secure invocation of executable files<br />

Logging / Security checks<br />

- S 4.25 (1) Use of logging in UNIX systems<br />

- S 4.26 (2) Regular security checks of the UNIX system<br />

- S 4.40 (2) Preventing unauthorised use of computer microphones<br />

- S 4.106 (2) Activation of system logging<br />

Communication<br />

- S 5.17 (1) Use of NFS security mechanisms<br />

- S 5.18 (1) Use of NIS security mechanisms<br />

- S 5.19 (1) Use of the sendmail security mechanisms<br />

- S 5.20 (1) Use of the security mechanisms of rlogin, rsh and rcp<br />

- S 5.21 (1) Secure use of telnet, ftp, tftp and rexec<br />

- S 5.34 (2) Use of one-time passwords (optional)<br />

- S 5.35 (1) Use of UUCP security mechanisms<br />

- S 5.36 (2) Encryption under UNIX and Windows NT (optional)<br />

- S 5.64 (2) Secure Shell<br />

- S 5.72 (1) Deactivation of unnecessary network services<br />

Contingency Planning<br />

- S 6.20 (2) Appropriate storage of backup data media<br />

- S 6.21 (2) Backup copy of the software used<br />

- S 6.22 (2) Sporadic checks of the restorability of backups<br />

- S 6.31 (2) Procedural patterns following a loss of system integrity<br />

- S 6.32 (1) Regular data backup<br />

_________________________________________________________________________________________<br />

<strong>IT</strong>-<strong>Baseline</strong> <strong>Protection</strong> <strong>Manual</strong>: Otober 2000<br />

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!