19.12.2012 Views

IT Baseline Protection Manual - The Information Warfare Site

IT Baseline Protection Manual - The Information Warfare Site

IT Baseline Protection Manual - The Information Warfare Site

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

Safeguard Catalogue - Hardware & Software Remarks<br />

____________________________________________________________________ .........................................<br />

- SSL can also be used for encryption if it is not possible for particular<br />

reasons to use encryption at a low protocol level. This applies especially to<br />

access on Web servers or e-mail servers via Web browsers, which support<br />

SSL-protected communication as standard. In this connection see also<br />

S 5.66 Use of SSL.<br />

- As well as software protection of communications, the use of network<br />

switching elements such as routers and modems which encrypt data should<br />

also be considered. <strong>The</strong>se are especially advisable for stationary use and<br />

where several computers are to be connected, as the encryption process is<br />

transparent and no extra load is placed on clients and server. However, it<br />

should be noted that the devices must be carefully configured and<br />

maintained.<br />

- Where e-mails are to be exchanged over insecure channels it may be<br />

appropriate to use e-mail encryption (see also S 4.34 Using encryption,<br />

checksums or digital signatures).<br />

Security with remote access over a RAS connection can only be assured if all<br />

the components of the RAS system are correctly and consistently configured.<br />

However, it should be noted that, depending on the access procedure, a large<br />

proportion of the components used are not under the direct control of the local<br />

RAS administration. <strong>The</strong>refore RAS access to a LAN must be monitored<br />

especially carefully and thoroughly.<br />

Example<br />

As Windows NT comes with RAS support as standard, the Remote Access<br />

Service of Windows NT will be used as an example. <strong>The</strong> functionality offered<br />

and the available security mechanisms are, however, generally only suitable<br />

for a small number of RAS users and for data which has a low protection<br />

requirement. Where there are large numbers of users and the protection<br />

requirement is high, additional RAS products should be considered as well.<br />

<strong>The</strong> following applies to RAS clients running under Windows NT:<br />

- For RAS clients, the option of saving user names and passwords so as to<br />

allow automatic connections should be disabled. This requires that the<br />

"Save password" option in the Dial-Up Networking dialogue is disabled. If<br />

the password has been saved by mistake, it can be deleted again by clicking<br />

the "Unsave password" pushbutton on the "Security" tab of the properties<br />

dialogue.<br />

- Automatic establishment of a dial-up connection should only occur after<br />

confirmation by the user. This is ensured by selecting the "Always prompt<br />

before auto-dialing" option on the "Settings" tab of "User preferences" in<br />

Dial-Up Networking. However, it is best that auto-dialling should be<br />

completely disabled. This is ensured by disabling the option "Enable autodial<br />

by location" for all locations on the "Dialing" tab of "User<br />

preferences" in Dial-Up Networking.<br />

- Care should be taken to ensure that no incoming connections are allowed.<br />

For the "Port Usage" setting under Control Panel, Network, Services,<br />

Remote Access Service, Attached Device, Configure the option "Dial out<br />

only" should be enabled.<br />

____________________________________________________________________ .........................................<br />

<strong>IT</strong>-<strong>Baseline</strong> <strong>Protection</strong> <strong>Manual</strong>: Oktober 2000<br />

SSL encryption<br />

Encryption through<br />

network switching<br />

elements<br />

E-mail encryption

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!