19.12.2012 Views

IT Baseline Protection Manual - The Information Warfare Site

IT Baseline Protection Manual - The Information Warfare Site

IT Baseline Protection Manual - The Information Warfare Site

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

Safeguard Catalogue - Communications Remarks<br />

____________________________________________________________________ .........................................<br />

ensured when changing the X.25 carrier, i.e. with data transmission crossing<br />

country borders.<br />

Under RAS the system administrator controls remote access to the network.<br />

Further to the service programmes that are delivered with the Windows NT<br />

server package, the service programme RAS-Administration offers the<br />

administrator the possibility to remove or provide access permissions for<br />

single users and/or groups. This means that access to the network must be<br />

explicitly provided for every user accessing the network via RAS, although<br />

RAS is running on a Windows NT server computer. This process ensures not<br />

only that remote access must be explicitly permitted, but also allows call-back<br />

restrictions to be defined.<br />

RAS offers an additional security level. RAS-Administration offers an option<br />

which allows access to all resources that the RAS host detects, or to the<br />

available resources on the local computer. <strong>The</strong> administrator can thus control<br />

which data is available to a remote user. If possible, permission for access to<br />

further computers in the network should either be provided restrictively or not<br />

at all, in order to limit possible damage when security barriers have been<br />

broken.<br />

Note: If RAS is used in a domain, changes to RAS permission will not<br />

immediately take effect on all servers. It can take up to 15 minutes for a<br />

change to be replicated on all servers in the domain. If required, the domains<br />

can be explicitly synchronised anew, to ensure that a user whose permissions<br />

have been removed, no longer has access to the network until the change has<br />

been replicated.<br />

Additional controls:<br />

- Are the functions of encrypted authentication and call-back security used<br />

for all external accesses?<br />

- Is access activated only for the RAS server, but not for the rest of the<br />

network?<br />

- Is the list of authorised users for RAS access regularly checked and<br />

brought up-to-date?<br />

____________________________________________________________________ .........................................<br />

<strong>IT</strong>-<strong>Baseline</strong> <strong>Protection</strong> <strong>Manual</strong>: Oktober 2000

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!