19.12.2012 Views

IT Baseline Protection Manual - The Information Warfare Site

IT Baseline Protection Manual - The Information Warfare Site

IT Baseline Protection Manual - The Information Warfare Site

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

Safeguard Catalogue - Hardware & Software Remarks<br />

____________________________________________________________________ .........................................<br />

S 4.111 Secure configuration of the RAS system<br />

Initiation responsibility: Head of <strong>IT</strong> Section, <strong>IT</strong> Security Management<br />

Team<br />

Implementation responsibility: Administrator<br />

<strong>The</strong> functioning and security of a RAS system are essentially determined by<br />

the configuration parameter settings. However, since a RAS system does not<br />

consist of only one component which has to be configured, the overall<br />

configuration is naturally a lot more complex. Due to this complexity,<br />

configuration errors which could reduce the security of the system as a whole<br />

can easily occur. Uncoordinated changes of one configuration parameter on a<br />

component can thus interact with the other components in such a way as to<br />

prevent error-free operation. In extreme cases the security of the LAN could<br />

even be impaired.<br />

Since the configuration of a RAS system is generally subject to changes over<br />

time (e.g. due to changes in personnel, new operational scenarios, system<br />

enhancements etc.), it cannot be assumed that there is only one secure (and<br />

static) configuration which is defined once and never changed afterwards. On<br />

the contrary, the configuration is likely to undergo a series of version changes.<br />

It is the job of the administrators who are responsible for the RAS system to<br />

ensure that only secure versions of the system configuration are defined and<br />

that when the system configuration settings are changed, the new<br />

configuration is also secure.<br />

In general, the following configuration categories may be distinguished:<br />

- <strong>The</strong> default configuration comprises the default parameter settings defined<br />

by the vendor. This will normally not be secure enough and should<br />

therefore not be used.<br />

- After installation and prior to initial operation, the default configuration<br />

must be converted to a secure initial configuration by the administrators.<br />

Here the settings should be as restrictive as possible so that only authorised<br />

administrators can effect changes in order, for example, to define an initial<br />

operational configuration which implements the planned security concept.<br />

- <strong>The</strong> secure operational configurations are the result of configurations<br />

made during ongoing operations. Regular checks must be made here to see<br />

whether any new security weaknesses which have come to light inflict<br />

modifications (see also S 2.35 Obtaining information on security<br />

weaknesses of the system).<br />

- Finally, secure fallback configurations should be defined and documented<br />

as part of contingency planning. <strong>The</strong>se are also used to maintain security<br />

where operational capability is reduced. Normally several emergency<br />

situations are defined during contingency planning. It is recommended that<br />

an appropriate fallback configuration is specified for each of the defined<br />

situations. In the simplest case the fallback configuration simply means<br />

that access to the RAS system is blocked.<br />

To ensure that the configuration is secure, the following points should be<br />

noted when making the configuration settings.<br />

____________________________________________________________________ .........................................<br />

<strong>IT</strong>-<strong>Baseline</strong> <strong>Protection</strong> <strong>Manual</strong>: Oktober 2000<br />

Default settings must be<br />

modified

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!