19.12.2012 Views

IT Baseline Protection Manual - The Information Warfare Site

IT Baseline Protection Manual - The Information Warfare Site

IT Baseline Protection Manual - The Information Warfare Site

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

Safeguard Catalogue - Communications Remarks<br />

____________________________________________________________________ .........................................<br />

- identification and authentication of the operator;<br />

- disconnection in case of critical security incidents;<br />

- automatic call back; and<br />

- logging of all activities.<br />

In addition, other functions can be implemented as well:<br />

- Activation of a time lock on invalid access attempts.<br />

- De-activation of remote maintenance during normal operation and explicit<br />

release for a clearly defined period of time. This is an expedient measure<br />

which, in an emergency, will enable the manufacturer or another service<br />

contractor to intervene.<br />

- Restrictions on the rights of maintenance staff. By means of additional<br />

software installed on the service PC, the users' scope for action can be<br />

restricted in order to achieve gradation of the administration of rights.<br />

- "Forced log-out" in case of line interruption. If the connection between the<br />

remote-maintenance unit and the PC gateway is interrupted in any way,<br />

access to the system must be stopped by a "forced log-out".<br />

Physical de-activation of the remote-maintenance ports<br />

If remote maintenance is normally not required and is to be provided only if<br />

required, physical shut-off of the port is recommended. If required, it can be<br />

re-activated at short notice, possibly after consultation over the telephone with<br />

the manufacturer or the service contractor.<br />

Closed User Group (CUG)<br />

It is possible to create a CUG in public ISDN and X.25 networks. Here, the<br />

network operator provides the user with a virtual "network within a network".<br />

<strong>The</strong> closed user groups can be obtained from the network operator against the<br />

appropriate fee.<br />

Alternatively, it can be considered realising the closed user groups by using<br />

the ISDN Calling Line Identification and Presentation (CLIP) and Connected<br />

Line Identification and Presentation (COLP). If possible, this can also be done<br />

by appropriately configuring the PBX system or the PC gateway.<br />

Avoiding or controlling direct dial-in<br />

Direct dial-in, e.g. from other networks by suffix dialling in dual tone<br />

multifrequency signalling, into the PBX system should be disabled, if<br />

possible. This is often used for access to server services. If it is not possible to<br />

prevent direct dial-in, it is recommended to activate all available protective<br />

mechanisms and regular controls to detect possible abuse.<br />

____________________________________________________________________ .........................................<br />

<strong>IT</strong>-<strong>Baseline</strong> <strong>Protection</strong> <strong>Manual</strong>: Oktober 2000

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!