19.12.2012 Views

IT Baseline Protection Manual - The Information Warfare Site

IT Baseline Protection Manual - The Information Warfare Site

IT Baseline Protection Manual - The Information Warfare Site

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

Threats Catalogue Deliberate Acts Remarks<br />

____________________________________________________________________ .........................................<br />

T 2.64 Lack of or defective rules for the RAS system<br />

If no rules or only inadequate ones have been set for the RAS system, this<br />

constitutes a considerable threat to the system as a whole. As a RAS system is<br />

composed of a number of components, the first set of threats comes from the<br />

"Organisational shortcomings" area of the various individual components, as<br />

set forth in the relevant module descriptions.<br />

In the RAS environment, the threats outlined below deserve special mention.<br />

- A RAS system should not be allowed to "grow organically". Instead, use of<br />

RAS access should be preceded by careful planning, irrespective of how<br />

complex access is designed to be. Experience shows that especially where<br />

RAS access is continually extended, complex hardware and software<br />

scenarios can come about which it is then no longer possible to keep under<br />

control. This can result in security settings that are incorrectly selected,<br />

incompatible with each other or which cancel each other out.<br />

- In the absence of a universal and binding security policy, it is usually left<br />

to individual administrators and RAS users to make the security settings<br />

which seem appropriate to them. This can result in incompatible security<br />

settings which either prevent connections from being established or else<br />

allow insecure connections to be established. But since in many cases <strong>IT</strong><br />

systems which are linked up via RAS have the same access possibilities as<br />

<strong>IT</strong> systems which are actually on the LAN, one result may be that the<br />

security of the LAN is compromised.<br />

- <strong>The</strong> security of a RAS system is based on the interaction of the physical<br />

components (computers, network switching elements), their connection<br />

structure (distribution over the network, connection topology) and the<br />

configurations of the relevant software components. <strong>The</strong> rules specified in<br />

the RAS security concept and their implementation through corresponding<br />

configuration settings can, however, only deliver the required security if<br />

the system that is actually installed agrees with the planned system. But in<br />

practice changes are often made to the physical design during the<br />

installation phase, for example, due to a lack of detailed information during<br />

the planning phase. If these changes are not recorded, documented and<br />

analysed for possible effects on <strong>IT</strong> security, then the security of the LAN<br />

can be endangered through incompatibilities of system structure and<br />

configuration of the RAS system.<br />

- If no rules or only inadequate ones have been set for the use of RAS, this<br />

constitutes a special threat. RAS users generally act on their own initiative<br />

when using RAS. If there are no dedicated rules on the use of RAS or if the<br />

users do not know about them, then security weaknesses can be created<br />

unknowingly by the user. Rules whose adherence is the sole responsibility<br />

of the individual user may not always be adhered to in their entirety, for<br />

example due to a lack of technical understanding.<br />

Examples<br />

- Incompatible security settings. <strong>The</strong> RAS system administrator only allows<br />

triple-DES encrypted connections, but a user has not configured any<br />

encryption for the RAS client. A connection is therefore not established.<br />

____________________________________________________________________ .........................................<br />

<strong>IT</strong>-<strong>Baseline</strong> <strong>Protection</strong> <strong>Manual</strong>: Oktober 2000<br />

Lack of or inadequate<br />

planning of the RAS<br />

system<br />

Lack of a RAS security<br />

concept<br />

Installation which does<br />

not comply with the<br />

rules<br />

Lack of or defective<br />

rules for use of RAS

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!