19.12.2012 Views

IT Baseline Protection Manual - The Information Warfare Site

IT Baseline Protection Manual - The Information Warfare Site

IT Baseline Protection Manual - The Information Warfare Site

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

Networked Systems<br />

_________________________________________________________________________________________<br />

Infrastructure:<br />

- S 1.25 (1) Overvoltage protection<br />

- S 1.27 (2) Air conditioning<br />

- S 1.28 (1) Local Uninterruptible Power Supply (UPS)<br />

- S 1.29 (3) Adequate Siting of an <strong>IT</strong> System (optional)<br />

- S 1.32 (1) Adequate siting of the Consoles, Devices with Exchangeable Data Media, and Printers<br />

Organisation:<br />

- S 2.4 (2) Maintenance/Repair Regulations<br />

- S 2.22 (2) Escrow of Passwords<br />

- S 2.25 (1) Documentation of the System Configuration<br />

- S 2.26 (1) Appointment of an administrator and his deputy<br />

- S 2.34 (1) Documentation of changes made to an existing <strong>IT</strong> system<br />

- S 2.35 (1) Obtaining information on security weaknesses of the system<br />

- S 2.38 (2) Division of administrator roles in PC networks<br />

- S 2.64 (2) Checking the log files<br />

- S 2.139 (1) Survey of the existing network environment<br />

- S 2.140 (1) Analysis of the existing network environment (optional)<br />

- S 2.141 (1) Development of a network concept<br />

- S 2.142 (1) Development of a network realisation plan<br />

- S 2.143 (1) Development of a network management concept<br />

- S 2.144 (1) Selection of a suitable network management protocol<br />

- S 2.145 (2) Requirements for a network management tool<br />

- S 2.146 (1) Secure operation of a network management system<br />

Personnel:<br />

- S 3.4 (1) Training before actual use of a program<br />

- S 3.5 (1) Education on <strong>IT</strong> security measures<br />

- S 3.10 (1) Selection of a trustworthy administrator and his substitute<br />

- S 3.11 (1) Training of maintenance and administration staff<br />

Hardware and software:<br />

- S 4.7 (1) Change of preset passwords<br />

- S 4.15 (2) Secure log-in<br />

- S 4.24 (1) Ensuring consistent system management<br />

- S 4.79 (1) Secure access mechanisms for local administration<br />

- S 4.80 (1) Secure access mechanisms for remote administration<br />

- S 4.81 (2) Auditing and logging of activities in a network<br />

_________________________________________________________________________________________<br />

<strong>IT</strong>-<strong>Baseline</strong> <strong>Protection</strong> <strong>Manual</strong>: Otober 2000

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!