19.12.2012 Views

IT Baseline Protection Manual - The Information Warfare Site

IT Baseline Protection Manual - The Information Warfare Site

IT Baseline Protection Manual - The Information Warfare Site

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

Networked Systems UNIX Server<br />

_________________________________________________________________________________________<br />

Infrastructure:<br />

- S 1.28 (1) Local Uninterruptible Power Supply (UPS)<br />

Organisation:<br />

- S 2.33 (2) Division of Administrator roles under UNIX<br />

Hardware and software:<br />

Access to the UNIX system<br />

- S 4.13 (1) Careful allocation of identifiers<br />

- S 4.14 (1) Mandatory password protection under UNIX<br />

- S 4.18 (1) Administrative and technical means to control access to the system-monitor and<br />

single-user mode<br />

- S 4.105 (1) Initial measures after a Unix standard installation<br />

Allocation of attributes / Working with the UNIX system<br />

- S 4.9 (1) Use of the security mechanisms of X Windows<br />

- S 4.19 (1) Restrictive allocation of attributes for UNIX system files and directories<br />

- S 4.20 (2) Restrictive allocation of attributes for UNIX user files and directories<br />

- S 4.21 (1) Preventing unauthorised acquisition of administrator rights<br />

- S 4.22 (3) Prevention of loss of confidentiality of sensitive data in the UNIX system<br />

- S 4.23 (3) Secure invocation of executable files<br />

Logging / Security checks<br />

_________________________________________________________________________________________<br />

<strong>IT</strong>-<strong>Baseline</strong> <strong>Protection</strong> <strong>Manual</strong>: Otober 2000

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!