19.12.2012 Views

IT Baseline Protection Manual - The Information Warfare Site

IT Baseline Protection Manual - The Information Warfare Site

IT Baseline Protection Manual - The Information Warfare Site

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

Safeguard Catalogue - Communications Remarks<br />

____________________________________________________________________ .........................................<br />

S 5 Safeguard Catalogue - Communications<br />

S 5.1 Removal, or short-circuiting and grounding, of<br />

unneeded lines<br />

S 5.2 Chosing a suitable network topography<br />

S 5.3 Selection of cable types suited in terms of<br />

communication technology<br />

S 5.4 Documentation on, and marking of, cabling<br />

S 5.5 Damage-minimising routing of cables<br />

S 5.6 Mandatory use of a network password<br />

S 5.7 Network management<br />

S 5.8 Monthly security checks of the network<br />

S 5.9 Logging at the server<br />

S 5.10 Restrictive granting of access rights<br />

S 5.11 Blocking the server console<br />

S 5.12 Setting up an additional network administrator<br />

S 5.13 Appropriate use of equipment for network coupling<br />

S 5.14 Shielding of internal remote accesses<br />

S 5.15 Shielding of external remote accesses<br />

S 5.16 Survey of network services<br />

S 5.17 Use of the NFS security mechanisms<br />

S 5.18 Use of the NIS security mechanisms<br />

S 5.19 Use of the sendmail security mechanisms<br />

S 5.20 Use of the security mechanisms of rlogin, rsh and rcp<br />

S 5.21 Secure use of telnet, ftp, tftp and rexec<br />

S 5.22 Compatibility check of the transmission and reception<br />

systems<br />

S 5.23 Selecting suitable types of dispatch for data media<br />

S 5.24 Use of a suitable fax cover sheet<br />

S 5.25 Using transmission and reception logs<br />

S 5.26 Announcing fax messages via telephone<br />

S 5.27 Acknowledging successful fax reception by telephone<br />

S 5.28 Acknowledging a correct fax sender<br />

S 5.29 Periodic checks of destination addresses and logs<br />

S 5.30 Activating an existing call-back option<br />

____________________________________________________________________ .........................................<br />

<strong>IT</strong>-<strong>Baseline</strong> <strong>Protection</strong> <strong>Manual</strong>: Oktober 2000

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!