19.12.2012 Views

IT Baseline Protection Manual - The Information Warfare Site

IT Baseline Protection Manual - The Information Warfare Site

IT Baseline Protection Manual - The Information Warfare Site

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

Safeguard Catalogue - Communications Remarks<br />

____________________________________________________________________ .........................................<br />

S 5.52 Security-related requirements for<br />

communications computers<br />

Initiation responsibility: Agency/company management; <strong>IT</strong> Security<br />

Management<br />

Implementation responsibility: Administrators<br />

Access by telecommuters to data at an institution differs in accordance with<br />

the type of telecommuting and the tasks to be performed. In some situations,<br />

only e-mail might be exchanged between telecommuters and the institution. In<br />

other cases, it might be necessary for telecommuters to access servers at the<br />

institution. Regardless of the type of access procedure being used though, the<br />

communications computer at the institution needs to meet the following<br />

security requirements:<br />

- Identification and authentication: All users of the communications<br />

computer, i.e. administrators, employees at the institution and<br />

telecommuters, must identify and authenticate themselves before gaining<br />

access to the computer. If attempts of identification and authentication fail<br />

repeatedly, access is to be denied. Preset passwords are to be changed.<br />

If necessary, the communications computer should be able to prompt for<br />

renewed authentication from the telecommuter or remote workstation<br />

during the process of data transfer in order to preclude unauthorised<br />

interventions.<br />

As part of user identification and authentication, the remote workstation<br />

should also be identified (for example, by means of subscriber numbers<br />

and call-back procedures).<br />

- Role distinction: <strong>The</strong> roles assumed by the administrator and users of the<br />

communications computer must be separated. Only the administrator<br />

should be able to allocate permissions.<br />

- Rights management and monitoring: Access to files on the<br />

communications computer must only be granted in accordance with the<br />

rights allocated in each case. In particular, access to computers installed at<br />

the institution and the data stored on them must be regulated. Data and<br />

system access should be restricted to the bare minimum. <strong>The</strong> time periods<br />

during which access by telecommuters is possible, can also be restricted.<br />

In the event of a system failure or irregularities, the communications<br />

computer must assume a stable state, in which access to it might no longer<br />

be possible.<br />

- Minimisation of services: Services provided by the communications<br />

computer must follow the principle of minimisation: Everything not<br />

explicitly allowed is prohibited. <strong>The</strong> services themselves must be restricted<br />

to the scope absolutely necessary for telecommuters to fulfill their duties.<br />

- Logging: Data transmissions from, to and via the communications<br />

computer must be logged with details of the time, user, address and type of<br />

service.<br />

____________________________________________________________________ .........................................<br />

<strong>IT</strong>-<strong>Baseline</strong> <strong>Protection</strong> <strong>Manual</strong>: Oktober 2000

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!