19.12.2012 Views

IT Baseline Protection Manual - The Information Warfare Site

IT Baseline Protection Manual - The Information Warfare Site

IT Baseline Protection Manual - The Information Warfare Site

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

Safeguard Catalogue - Hardware & Software Remarks<br />

____________________________________________________________________ .........................................<br />

the user to define a new rule. However, as it is often difficult for the user to<br />

distinguish between permitted and unauthorised accesses, the ruleset<br />

should be pre-installed by an Administrator.<br />

- RAS clients too should be included in the system management as far as is<br />

possible. Firstly this permits monitoring of the clients within the<br />

framework of maintaining ongoing operations. And secondly it enables<br />

software updates (e.g. virus databases, applications programs) to be<br />

imported over a controlled route. Remote computers, however, place<br />

higher requirements on system management as they are not permanently<br />

linked to the network, so that the computers must regularly be examined<br />

for (non-permitted) configuration changes. Here, depending on the<br />

management product, the "Discovery" function can be used to ascertain the<br />

current status of the computer. It should be noted that capturing this<br />

information places a load on the RAS client and the data has to be<br />

transmitted over the RAS connection. If the RAS connection has a low<br />

bandwidth, as is the case for example on a mobile phone, this can result in<br />

response times which are unacceptable to users.<br />

- If TCP/IP is used as the protocol, consideration should be given to the<br />

possibility of using fixed IP addresses for RAS clients rather than assigning<br />

addresses dynamically. This procedure does carry high administrative<br />

penalties (e.g. the necessity to maintain the assignment tables), but it does<br />

allow unique network addresses to be assigned to individual computers.<br />

<strong>The</strong> disadvantage of dynamic assignment of network addresses is that a<br />

record must be made of which RAS client was given a certain network<br />

address when. Otherwise it is generally not possible to establish which<br />

RAS client executed a particular action.<br />

<strong>The</strong> communications link between RAS client and RAS server is generally<br />

established over third-party networks. <strong>The</strong> network components used here are<br />

generally not under the control of the operator of the LAN with which the<br />

connection is to be established. It must also be assumed that the data will not<br />

only be transmitted over the telecommunications network of a provider but<br />

that the networks will also be used by partners of the telecommunications<br />

provider. This applies especially where a LAN is accessed from abroad. To<br />

satisfy the protection requirements of the data thus transmitted, security<br />

measures must be taken which, for example, assure the confidentiality of data.<br />

<strong>The</strong> following therefore applies to data transmission:<br />

- It is imperative for secure operations that all data transmitted is encrypted.<br />

- Signature mechanisms should be employed to safeguard the authenticity<br />

and integrity of the data.<br />

A number of security mechanisms can be used for RAS connections in order<br />

to satisfy these data protection requirements. <strong>The</strong>se include the following:<br />

- <strong>The</strong> communication can be encrypted at a low protocol level (so-called<br />

tunnelling - see S 5.76 Use of suitable tunnel protocols for RAS<br />

communication). This requires selection of a suitable procedure.<br />

Conventional RAS systems offer such methods as standard, though in<br />

different number and form.<br />

____________________________________________________________________ .........................................<br />

<strong>IT</strong>-<strong>Baseline</strong> <strong>Protection</strong> <strong>Manual</strong>: Oktober 2000<br />

Include RAS clients in<br />

system management<br />

Unique assignment of IP<br />

address and computer<br />

Tunnelling

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!