19.12.2012 Views

IT Baseline Protection Manual - The Information Warfare Site

IT Baseline Protection Manual - The Information Warfare Site

IT Baseline Protection Manual - The Information Warfare Site

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

Safeguard Catalogue - Communications Remarks<br />

____________________________________________________________________ .........................................<br />

S 5.8 Monthly security checks of the network<br />

Initiation responsibility: Head of <strong>IT</strong> Section, <strong>IT</strong> Security Management<br />

Implementation responsibility: Administrators<br />

<strong>The</strong> network administrator should perform at least monthly security checks of<br />

the network. Some network operating systems offer programs which automate<br />

these checks. One example is the program SECUR<strong>IT</strong>Y in the directory<br />

SYS:SYSTEM within Novell 3.11. <strong>The</strong> parameters checked include the<br />

following:<br />

- Are there any users without a password?<br />

- Are there any users who have not used the network for some time?<br />

- Are there any users whose passwords do not meet the prescribed<br />

requirements?<br />

- Which users have the same rights as the supervisor?<br />

UNIX systems also come with programs which enable such checks to be<br />

performed automatically. A large number of public domain and commercial<br />

programs offer additional test capabilities. Some of these programs are<br />

described in S 4.26 Regular security checks of the UNIX system. <strong>The</strong> secure<br />

UNIX administration tool developed by the BSI (USE<strong>IT</strong>) also offers extensive<br />

facilities for checking the network security of a UNIX system. <strong>The</strong> tests<br />

performed include the following:<br />

- checking for log-ins without passwords or with only weak passwords,<br />

- checking of preconfigured minimum password length,<br />

- checking of network services and their configuration,<br />

- penetration testing in the local subnetwork,<br />

- inconsistency checks of system files and the system,<br />

- checking for insecure ports and services.<br />

Additional controls:<br />

- Are the performance and results of such security checks documented?<br />

____________________________________________________________________ .........................................<br />

<strong>IT</strong>-<strong>Baseline</strong> <strong>Protection</strong> <strong>Manual</strong>: Oktober 2000

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!