19.12.2012 Views

IT Baseline Protection Manual - The Information Warfare Site

IT Baseline Protection Manual - The Information Warfare Site

IT Baseline Protection Manual - The Information Warfare Site

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

Threats Catalogue Deliberate Acts Remarks<br />

____________________________________________________________________ .........................................<br />

T 3.41 Improper use of remote access services<br />

Unless users receive appropriate training it is possible, as with every other <strong>IT</strong><br />

system, for security problems to develop as a result of users’ (usually<br />

unintentional) mistaken actions while using RAS or in the environment in<br />

which RAS is used (e.g. violation of <strong>IT</strong> security guidelines or incorrect<br />

configuration).<br />

Moreover, stationary and mobile <strong>IT</strong> systems on which RAS client software is<br />

installed are often used not just to access a LAN. In particular, if the RAS<br />

connection is established over the Internet, then often Web and e-mail services<br />

are used over these <strong>IT</strong> systems. In many cases external networks are accessed,<br />

for example, when employees working in the field log on to customer<br />

networks using mobile RAS clients. This can result in exposure to the threats<br />

described below.<br />

- As a minimum, establishment of connections which have not been<br />

approved causes unnecessary loading of the system, as an authorisation<br />

check has to be performed in every case. In this way, system resources are<br />

tied up unnecessarily. When this is combined with incorrect configuration<br />

settings, the result may that an attempt at unauthorised access succeeds.<br />

- Amongst other possibilities, RAS clients can be used for Internet access.<br />

One potential danger here is that unless special precautions (e.g. secure<br />

configuration or PC firewall) are taken, it may be possible to access the<br />

client computer from the Internet. This means that the computer is exposed<br />

to potential attacks. Thus, for example, an aggressor could disable data<br />

encryption or change other RAS configuration data so that secure RAS<br />

communication is no longer possible. Similar problems (viruses, Trojan<br />

horses) can arise where software has been downloaded from the Internet<br />

and stored on the RAS client.<br />

- If a RAS client is connected to an external LAN (e.g. customer network or<br />

private home network), often there will be interfaces from that LAN to<br />

other networks, e.g. the Internet or local subnets. Depending on the<br />

security requirements covering LAN administration, uncontrolled access to<br />

the RAS client may be possible (see also T 5.39 Infiltrating computer<br />

systems via communication cards).<br />

Examples<br />

- During a business trip an employee logs on to the corporate network<br />

over the Internet. Before the connection is established with the RAS<br />

system, he loads an executable file from a Web server. In addition to its<br />

"official" functionality, the file also contains a malicious section of code<br />

which attempts to influence the security mechanisms in the RAS<br />

configuration (e.g. disabling of encryption) and to access data in the<br />

corporate network where an existing RAS connection has been previously<br />

discovered.<br />

- An employee working out in the field connects his laptop to the network of<br />

a customer. In order to be able to exchange data with the customer, he<br />

makes some local directories shared so that they can be accessed from the<br />

____________________________________________________________________ .........................................<br />

<strong>IT</strong>-<strong>Baseline</strong> <strong>Protection</strong> <strong>Manual</strong>: Oktober 2000<br />

Unapproved RAS<br />

connections established<br />

Use of the RAS client on<br />

the Internet<br />

Connection of the RAS<br />

client to an external<br />

network

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!