19.12.2012 Views

IT Baseline Protection Manual - The Information Warfare Site

IT Baseline Protection Manual - The Information Warfare Site

IT Baseline Protection Manual - The Information Warfare Site

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

Telecommunications LAN connection of an <strong>IT</strong> system via ISDN<br />

_________________________________________________________________________________________<br />

Infrastructure:<br />

- S 1.43 (2) Secure siting of ISDN routers<br />

Organisation:<br />

- S 2.4 (2) Maintenance/Repair Regulations<br />

- S 2.9 (2) Ban on Using Non-Approved Software<br />

- S 2.35 (2) Obtaining information on security weaknesses of the system<br />

- S 2.42 (1) Determination of potential communications partners<br />

- S 2.46 (2) Appropriate key management<br />

- S 2.64 (2) Checking the log files<br />

- S 2.106 (2) Purchase of suitable ISDN cards<br />

- S 2.107 (2) Documentation of the configuration of ISDN cards<br />

- S 2.108 (2) Relinquishment of remote maintenance of ISDN gateways (optional)<br />

- S 2.109 (1) Assigning rights for remote access<br />

- S 2.204 (1) Prevention of insecure network access<br />

Personnel:<br />

- S 3.4 (1) Training before actual use of a program<br />

- S 3.5 (1) Education on <strong>IT</strong> security measures<br />

Hardware and software:<br />

- S 4.7 (1) Change of preset passwords<br />

- S 4.34 (1) Using encryption, checksums or digital signatures (optional)<br />

- S 4.59 (1) Deactivation of ISDN board functions which are not required<br />

- S 4.60 (1) Deactivation of ISDN router functions which are not required<br />

- S 4.61 (1) Use of security mechanisms offered by ISDN components<br />

- S 4.62 (2) Use of a D-channel filter (optional)<br />

Communications:<br />

- S 5.29 (2) Periodic checks of destination addresses and logs<br />

- S 5.32 (1) Secure use of communications software<br />

- S 5.47 (1) Configuration of a Closed User Group (optional)<br />

- S 5.48 (1) Authentication via CLIP/COLP<br />

- S 5.49 (1) Callback based on CLIP/COLP<br />

- S 5.50 (1) Authentication via PAP/CHAP<br />

_________________________________________________________________________________________<br />

<strong>IT</strong>-<strong>Baseline</strong> <strong>Protection</strong> <strong>Manual</strong>: Otober 2000

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!