19.12.2012 Views

IT Baseline Protection Manual - The Information Warfare Site

IT Baseline Protection Manual - The Information Warfare Site

IT Baseline Protection Manual - The Information Warfare Site

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

Safeguard Catalogue - Communications Remarks<br />

____________________________________________________________________ .........................................<br />

prompt involvement of the staff council or works council should be borne in<br />

mind.<br />

Reservations regarding the use of a fax server are often due to the fact that an<br />

<strong>IT</strong> system which is integrated into the LAN can be accessed over the public<br />

telecommunications network.<br />

Through careful selection and configuration of communications cards,<br />

operating system and fax server application and secure positioning of the<br />

server in the network topology, the danger of penetration of the network or the<br />

fax server can be reduced to a minimal residual risk.<br />

Where active ISDN cards are in use, features which are not necessary for<br />

receiving and sending faxes should be disabled (see S 4.59 Deactivation of<br />

ISDN board functions which are not required).<br />

Where dedicated fax cards are used, once again it is important to find out at<br />

the outset exactly what facilities are provided, and, if possible, to disable any<br />

unnecessary features which are not required.<br />

<strong>The</strong> fax service should be the only service provided by the fax server. In<br />

particular, a fax server should not be used also as a data, printer, e-mail or<br />

Internet server or as a remote access computer. To reduce the probability of<br />

penetration over the telecommunications network, the operating system must<br />

be configured as "lean" as possible. This means that services and protocols<br />

which are not really necessary for operations are not installed. For example, if<br />

the Telnet service is not started up on a fax server, then it is not possible for an<br />

attack to occur from this source. When deciding which services and protocols<br />

are necessary, it should be borne in mind that dangers often arise from the<br />

combination of different services and protocols.<br />

How the server is securely positioned in the network topology depends partly<br />

on whether any firewall is in use in the organisation and, if so, which type.<br />

A fax server has a minimum of one interface to each of the<br />

telecommunications network and the LAN. <strong>The</strong> fax server should be placed in<br />

the network in such a way that in the event of a successful attack on the fax<br />

server it is not possible for the adversary to penetrate the entire network. On<br />

the other hand it must not be possible to attack the fax server successfully<br />

from within the network either. For example, it is conceivable that an attack<br />

could be launched by an adversary from the Internet. If such an attack<br />

succeeds, the perpetrator is then in a position to arrange for faxes to be sent<br />

out using the fax server of the attacked organisation. This not only results in<br />

telephone charges but, even more serious, could harm the company's<br />

reputation. If the attacker succeeds in getting through, he will also be able to<br />

view the fax transmissions stored either permanently or temporarily on the fax<br />

server, despite not being authorised to do so. Similarly, attacks by insiders<br />

over the LAN are also feasible.<br />

As a fax server usually is not the only <strong>IT</strong> component which is connected to an<br />

external network, there will normally be a barrier to protect the internal<br />

network against external networks (see also Section 7.3 Firewalls).<br />

If there is a screened subnet acting as Internet firewall (configuration 1 from<br />

S 2.73 Selecting a suitable firewall), the fax server should be positioned<br />

____________________________________________________________________ .........................................<br />

<strong>IT</strong>-<strong>Baseline</strong> <strong>Protection</strong> <strong>Manual</strong>: Oktober 2000<br />

Deactivation of<br />

unnecessary facilities<br />

One service per server<br />

Position of the fax server<br />

in the network<br />

Position of fax server<br />

where there is a firewall

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!