19.12.2012 Views

IT Baseline Protection Manual - The Information Warfare Site

IT Baseline Protection Manual - The Information Warfare Site

IT Baseline Protection Manual - The Information Warfare Site

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

Networked Systems Server-Supported Network<br />

_________________________________________________________________________________________<br />

Infrastructure:<br />

- S 1.28 (2) Local Uninterruptible Power Supply (UPS)<br />

- S 1.29 (3) Adequate Siting of an <strong>IT</strong> System (optional)<br />

- S 1.32 (1) Adequate siting of the Consoles, Devices with Exchangeable Data Media, and Printers<br />

Organisation:<br />

- S 2.3 (2) Data Media Control<br />

- S 2.4 (2) Maintenance/Repair Regulations<br />

- S 2.9 (2) Ban on Using Non-Approved Software<br />

- S 2.10 (3) Survey of the Software Held<br />

- S 2.13 (2) Correct disposal of resources requiring protection<br />

- S 2.22 (2) Escrow of Passwords<br />

- S 2.25 (1) Documentation of the System Configuration<br />

- S 2.26 (1) Appointment of an administrator and his deputy<br />

- S 2.30 (2) Provisions governing the configuration of users and of user groups<br />

- S 2.31 (2) Documentation on authorised users and on rights profiles<br />

- S 2.32 (3) Establishment of a restricted user environment (optional)<br />

- S 2.34 (2) Documentation of changes made to an existing <strong>IT</strong> system<br />

- S 2.35 (2) Obtaining information on security weaknesses of the system<br />

- S 2.38 (2) Division of administrator roles in PC networks<br />

- S 2.138 (2) Structured data storage<br />

- S 2.204 (1) Prevention of insecure network access<br />

Personnel:<br />

- S 3.4 (1) Training before actual use of a program<br />

- S 3.5 (1) Education on <strong>IT</strong> security measures<br />

- S 3.10 (1) Selection of a trustworthy administrator and his substitute<br />

- S 3.11 (1) Training of maintenance and administration staff<br />

Hardware and software:<br />

- S 4.1 (1) Password protection for <strong>IT</strong> systems<br />

- S 4.2 (1) Screen lock<br />

- S 4.3 (2) Periodic runs of a virus detection program<br />

- S 4.7 (1) Change of preset passwords<br />

- S 4.15 (2) Secure log-in<br />

- S 4.16 (2) Restrictions on access to accounts and/or terminals<br />

- S 4.17 (2) Blocking and deletion of unnecessary accounts and terminals<br />

- S 2.138 (2) Ensuring consistent system management<br />

_________________________________________________________________________________________<br />

<strong>IT</strong>-<strong>Baseline</strong> <strong>Protection</strong> <strong>Manual</strong>: Otober 2000

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!