19.12.2012 Views

IT Baseline Protection Manual - The Information Warfare Site

IT Baseline Protection Manual - The Information Warfare Site

IT Baseline Protection Manual - The Information Warfare Site

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

Data Transmission Systems WWW server<br />

_________________________________________________________________________________________<br />

Organisation:<br />

- S 2.35 (1) Obtaining information on security weaknesses of the system<br />

- S 2.172 (1) Developing a concept for using the WWW<br />

- S 2.173 (1) Determining a WWW security strategy<br />

- S 2.174 (1) Secure operation of a WWW server<br />

- S 2.175 (2) Setting up a WWW server<br />

- S 2.176 (2) Selection of a suitable Internet service provider<br />

Personnel:<br />

- S 3.4 (1) Training before actual use of a program<br />

- S 3.5 (1) Education on <strong>IT</strong> security measures<br />

- S 3.10 (1) Selection of a trustworthy administrator and his substitute<br />

- S 3.11 (1) Training of maintenance and administration staff<br />

Hardware & Software:<br />

- S 4.33 (1) Use of a virus scanning program when exchanging of data media and data<br />

transmission<br />

- S 4.34 (2) Using encryption, checksums or digital signatures (optional)<br />

- S 4.44 (2) Checking of incoming data for macro viruses<br />

- S 4.64 (1) Verification of data before transmission / elimination of residual information<br />

- S 4.65 (2) Testing of new hardware and software<br />

- S 4.78 (1) Careful modifications of configurations<br />

- S 4.93 (1) Regular integrity checking<br />

- S 4.94 (1) <strong>Protection</strong> of WWW files<br />

- S 4.95 (1) Minimal operating system<br />

- S 4.96 (2) Deactivating DNS<br />

- S 4.97 (2) One service per server<br />

- S 4.98 (1) Restricting communication to a minimum with packet filters<br />

- S 4.99 (2) <strong>Protection</strong> against subsequent changes to information<br />

Communications:<br />

- S 5.45 (2) Security of WWW browsers<br />

- S 5.59 (1) <strong>Protection</strong> against DNS spoofing<br />

- S 5.64 (2) Secure Shell (optional)<br />

- S 5.65 (2) Use of S-HTTP (optional)<br />

- S 5.66 (2) Use of SSL (optional)<br />

- S 5.69 (1) <strong>Protection</strong> against active content<br />

_________________________________________________________________________________________<br />

<strong>IT</strong>-<strong>Baseline</strong> <strong>Protection</strong> <strong>Manual</strong>: Otober 2000

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!