19.12.2012 Views

IT Baseline Protection Manual - The Information Warfare Site

IT Baseline Protection Manual - The Information Warfare Site

IT Baseline Protection Manual - The Information Warfare Site

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

Networked Systems Server-Supported Network<br />

_________________________________________________________________________________________<br />

- S 4.44 (2) Checking of incoming files for macro viruses<br />

- S 4.65 (2) Testing of new hardware and software<br />

Communications:<br />

- S 5.6 (1) Mandatory use of a network password<br />

- S 5.7 (1) Network management<br />

- S 5.8 (1) Monthly security checks of the network<br />

- S 5.9 (2) Logging at the server<br />

- S 5.10 (1) Restrictive granting of access rights<br />

- S 5.13 (1) Appropriate use of equipment for network coupling<br />

Contingency Planning:<br />

- S 6.20 (2) Appropriate storage of backup data media<br />

- S 6.21 (3) Backup copy of the software used<br />

- S 6.22 (2) Sporadic checks of the restorability of backups<br />

- S 6.25 (1) Regular data backup<br />

- S 6.31 (2) Procedural patterns following a loss of system integrity<br />

- S 6.32 (1) Regular data backup<br />

_________________________________________________________________________________________<br />

<strong>IT</strong>-<strong>Baseline</strong> <strong>Protection</strong> <strong>Manual</strong>: Otober 2000<br />

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!