19.12.2012 Views

IT Baseline Protection Manual - The Information Warfare Site

IT Baseline Protection Manual - The Information Warfare Site

IT Baseline Protection Manual - The Information Warfare Site

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

Safeguard Catalogue - Communications Remarks<br />

____________________________________________________________________ .........................................<br />

newly received consignment of spam mail. Appropriate filter lists are<br />

available in the Internet and can be obtained from various manufacturers of<br />

communications software.<br />

Authorised protocols and services on the mail server must be specified. For<br />

example, it is advisable to authorise SMTP (TCP port 25) for outbound and<br />

inbound links, but only authorise POP3 for internal links.<br />

<strong>The</strong> mail server must be protected against use as a spam relay. For this<br />

purpose, the mail server should be so configured that it only accepts e-mail<br />

intended for the organisation and only transmits e-mail originating from the<br />

staff of the organisation. <strong>The</strong> mail server should only accept incoming e-mail<br />

if the IP address of the transmitting mail server is located in an IP network<br />

authorised explicitly by the administrator, or if the mail server holds an MX<br />

entry for the recipient. All other e-mail must be rejected with a corresponding<br />

error message.<br />

In spite of these safeguards, authorised users can continue to send/receive email<br />

to/from any required party. However, the filtration of incoming e-mail<br />

described above prevents the mail server from being misused as a spam relay<br />

by external parties.<br />

If IP networks from which e-mail is to be accepted have been inadvertently<br />

omitted from the list mentioned above, the administrator of the mail server<br />

must be informed duly so that he/she can include these networks subsequently<br />

in the list.<br />

If, instead of operating its own mail server, an organisation accesses the mail<br />

server of a provider via one or more mail clients, clarification by the provider<br />

is required as to the rules and security measures applicable on that server<br />

(refer to S 2.123 Selection of a mail provider).<br />

____________________________________________________________________ .........................................<br />

<strong>IT</strong>-<strong>Baseline</strong> <strong>Protection</strong> <strong>Manual</strong>: Oktober 2000

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!