19.12.2012 Views

IT Baseline Protection Manual - The Information Warfare Site

IT Baseline Protection Manual - The Information Warfare Site

IT Baseline Protection Manual - The Information Warfare Site

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

Safeguard Catalogue - Hardware & Software Remarks<br />

____________________________________________________________________ .........................................<br />

- User authentication must be performed via the chosen mechanism every<br />

time that a connection is established. In particular use of the CLIP<br />

mechanism (transmission of call numbers) on its own is not sufficient to<br />

ensure reliable authentication.<br />

- <strong>Protection</strong> of communications using one of the methods permitted in the<br />

RAS security concept must be enforced for every connection in order to<br />

ensure that the transmitted data is protected.<br />

- <strong>The</strong> additional security mechanisms (use of call number transmission,<br />

callback to a preconfigured phone number for non-mobile RAS clients or<br />

for RAS clients connected over a mobile phone) provided by the access<br />

technology should be used.<br />

- <strong>The</strong> RAS system should be audited at regular intervals. <strong>The</strong> roles of<br />

Administrator and Internal Auditor must not be assigned to the same<br />

person.<br />

- A mobile <strong>IT</strong> system can be connected to a LAN over GSM (see also ###<br />

S 5.x5 Secure transmission over mobile phone). When RAS is used over a<br />

mobile phone network, it should be noted that the CLIP mechanism<br />

(transmission of call numbers) is generally only suitable as an additional<br />

authentication feature as the mobile phone identified over the call number<br />

can easily fall into unauthorised hands.<br />

As RAS clients are generally operated in environments that are not under full<br />

control, special mechanisms, procedures and safeguards must be employed to<br />

ensure protection of the client. In particular, mobile RAS clients are exposed<br />

to a special danger here in that their physical design makes them especially<br />

easy to attack (e.g. theft, vandalism). Once a RAS client is compromised,<br />

there is a danger that the security of the LAN could also be impaired as a<br />

result.<br />

For the secure operation of RAS clients, the following aspects must therefore<br />

be considered:<br />

- <strong>The</strong> basic security of the <strong>IT</strong> system must be assured (see also modules 5.3<br />

Laptop PCs, 7.2 Modems, 8.6 Mobile phones and 9.3 Telecommuting).<br />

- As mobile RAS clients are exposed to greater risks than stationary clients,<br />

they need to be protected through additional safeguards. One such<br />

safeguard is to encrypt the hard disk in order to ensure that in the event of<br />

the device going missing it is not possible for any data to be read or for<br />

unauthorised RAS connections to be established.<br />

- Especially where RAS clients are linked using Internet connections, it is<br />

essential to have anti-virus software installed on them (see also module 3.6<br />

Computer virus protection concept).<br />

- Consideration should be given to installing PC firewalls on the RAS clients<br />

so that they are protected against unauthorised access from the Internet by<br />

third parties. Like conventional firewalls (see module 7.3 Firewalls), PC<br />

firewalls filter the packets of network communication protocols. However,<br />

the filtering rules can generally be dynamically generated by the user. For<br />

every access for which no rule currently exists, a selection of possible<br />

responses is offered (e.g. allow, reject, conditional processing), enabling<br />

____________________________________________________________________ .........................................<br />

<strong>IT</strong>-<strong>Baseline</strong> <strong>Protection</strong> <strong>Manual</strong>: Oktober 2000<br />

Auditing<br />

Connection over mobile<br />

phone<br />

Encryption of hard disks<br />

Up-to-date anti-virus<br />

program<br />

PC firewalls

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!