19.12.2012 Views

IT Baseline Protection Manual - The Information Warfare Site

IT Baseline Protection Manual - The Information Warfare Site

IT Baseline Protection Manual - The Information Warfare Site

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

Data Transmission Systems Remote Access<br />

_________________________________________________________________________________________<br />

To implement <strong>IT</strong> baseline protection, selection of the required packages of safeguards ("modules"), as<br />

described in Sections 2.3 and 2.4, is recommended.<br />

A RAS system consists of several components which from the outset should be protected as individual<br />

components. Quite apart from the RAS functionality, these should be viewed as normal <strong>IT</strong> systems or<br />

network switching elements which need to be protected according to the suggestions made in the<br />

relevant safeguard modules. RAS servers are computers which are normally fully under the control of<br />

an organisation and perform the important task of controlling access to the internal network. <strong>The</strong> RAS<br />

functionality is generally superimposed on an operating system which in most cases offers additional<br />

services as well. Hence the security of RAS access also depends on there being no security<br />

weaknesses either at operating system or service level.<br />

As well as protecting the RAS system components, however, it is also necessary to draw up a RAS<br />

security policy which must be integrated into the existing security policy. At the same time as<br />

implementing existing security requirements, the RAS system requires that new, RAS-specific<br />

security rules are defined.<br />

A RAS system will generally be used in the environment of other systems which serve to control<br />

access to the internal network from outside. Examples of other systems with which a RAS system has<br />

to work are firewall systems and remote maintenance systems. For this reason, when implementing the<br />

RAS-specific safeguards, the safeguards from the relevant modules of the affected systems must also<br />

be considered. <strong>The</strong> modules which should be considered include:<br />

- 4.5 Working place at home (telecommuting)<br />

- 7.3 Firewalls<br />

- 8.1 Private branch exchanges<br />

- 9.3 Telecommuting<br />

Secure RAS access depends on a series of safeguards being taken, starting at the design stage, and<br />

then moving on to procurement and operation. <strong>The</strong> steps involved here and the safeguards which<br />

should be considered at each of the steps are listed below.<br />

1. A RAS concept must be prepared up front, based on the security requirements for the<br />

existing <strong>IT</strong> systems and the requirements arising from the planned situations under which<br />

RAS will be used.<br />

1.1 To tailor the concept to the particular application, the requirements must be determined at the<br />

start. For this purpose a requirements analysis must be performed (see S 2.183 Performing a<br />

RAS requirements analysis).<br />

1.2 On the basis of the requirements thus determined, a RAS concept can then be defined (see<br />

S 2.184 Development of a RAS concept).<br />

1.3 To implement the concept, a RAS system architecture must be defined (see S 2.185 Selection<br />

of a suitable RAS system architecture), which is tailored to the organisation's RAS<br />

requirements and the RAS concept to be implemented.<br />

2. Before the RAS system can be procured, the requirements relating to the RAS product must<br />

be derived from the RAS concept and the choice of a suitable RAS product must be based on<br />

these (see S 2.186 Selection of a suitable RAS product).<br />

3. <strong>The</strong> security-relevant safeguards for the implementation of the RAS concept may be broken<br />

down into the following areas:<br />

_________________________________________________________________________________________<br />

<strong>IT</strong>-<strong>Baseline</strong> <strong>Protection</strong> <strong>Manual</strong>: Otober 2000

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!