19.12.2012 Views

IT Baseline Protection Manual - The Information Warfare Site

IT Baseline Protection Manual - The Information Warfare Site

IT Baseline Protection Manual - The Information Warfare Site

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

Safeguard Catalogue - Communications Remarks<br />

____________________________________________________________________ .........................................<br />

internal remote maintenance<br />

service interface<br />

interconnected PBX system<br />

Diagram: Modem<br />

____________________________________________________________________ .........................................<br />

<strong>IT</strong>-<strong>Baseline</strong> <strong>Protection</strong> <strong>Manual</strong>: Oktober 2000<br />

from the public network<br />

external remote maintenance<br />

service phone<br />

Structure of a remote maintenance unit<br />

In this case, the following measures can be taken to protect against accesses<br />

from external networks:<br />

- No direct-access extension for the modem connection<br />

<strong>The</strong> modem connection through which the administration port of the<br />

installation is accessed should in any case not be a direct-access<br />

extension! This minimum requirement should be checked first. <strong>The</strong>reby<br />

itcan be preventedfor the modem to be called directly from outside.<br />

- Confidentiality of the call number of the service port (modem)<br />

In order to discourage misuse from the very start, the call number of the<br />

service phone should not be listed in telephone directories. It should be<br />

known exclusively to the persons having a direct need for it.<br />

- Use of dedicated lines (optional)<br />

<strong>The</strong> use of dedicated lines for the remote connections which do not run via<br />

switching equipment is one of the most secure methods of preventing<br />

external access to the remote accesses. As this system is generally very<br />

expensive, it can only be used in exceptional cases.<br />

In order to ensure that only authorised bodies within the internal network can<br />

gain access to remote accesses, the following steps must be taken:<br />

- Creation of Closed User Groups (CUG)<br />

CUG's which operate on a supra-system basis can be set up in some PBX<br />

systems. <strong>The</strong>se closed user groups represent a type of network within a<br />

network. All required remote accesses should thus be combined with the<br />

various authorised bodies in such CUG's.<br />

extra PC<br />

as a gateway

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!