19.12.2012 Views

IT Baseline Protection Manual - The Information Warfare Site

IT Baseline Protection Manual - The Information Warfare Site

IT Baseline Protection Manual - The Information Warfare Site

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

<strong>IT</strong> <strong>Baseline</strong> <strong>Protection</strong> of Generic Components<br />

_________________________________________________________________________________________<br />

- Module 6.1 Server-supported Network must be applied to every <strong>IT</strong> system which offers services<br />

(e.g. file or print services) as a server in the network.<br />

- Module 6.2 UNIX Server must be applied to every server which runs under the UNIX operating<br />

system.<br />

- Module 6.3 Peer-to-Peer Network must be applied to every client which offers peer-to-peer<br />

services (for example shared directories) in the network.<br />

- Module 6.4 Windows NT Network must be applied to every server which runs under<br />

Windows NT.<br />

- Module 6.5 Novell Netware 3.x must be applied to every server which runs under this operating<br />

system.<br />

- Module 6.6 Novell Netware 4.x must be applied to every server which runs under this operating<br />

system.<br />

NB in addition to the operating system-specific module, module 6.1 must be applied for every<br />

server as this module draws together all the platform-independent security aspects of servers.<br />

- Module 8.1 must be applied to every private branch exchange or to every sample of the same<br />

from a corresponding group.<br />

- Module 8.2 must be applied to every fax machine or to every sample of the same from a<br />

corresponding group.<br />

- Module 8.3 must be applied to every answering machine or to every sample of the same from a<br />

corresponding group.<br />

- Module 8.6 Mobile Telephones should be applied at least once if the use of mobile phones is not<br />

forbidden in the organisation or organisational unit under consideration. If there are several<br />

different mobile phone operational areas (for example several mobile phone pools) then module 8.6<br />

should be applied separately to each one.<br />

- Module 9.3 Telecommuting must also be applied to every <strong>IT</strong> system which is used for telework.<br />

Tier 4: Security in the network<br />

This tier is concerned with security aspects in the network which cannot be isolated to particular <strong>IT</strong><br />

systems (e.g. servers) in the network. Rather, the concern here is those security aspects which relate to<br />

the network connections and communications between the <strong>IT</strong> systems.<br />

To simplify matters, it may be appropriate to consider sections within the complete network rather<br />

than the whole network at once. <strong>The</strong> division of the full network into subnetworks should be<br />

performed in accordance with these two criteria:<br />

- <strong>The</strong> assessment of protection requirements will have identified connections over which certain data<br />

must under no circumstances be transported. <strong>The</strong>se connections should be viewed as "interfaces"<br />

between subnetworks, i.e. the two endpoints of such a connection should be in different<br />

subnetworks. Conversely, connections which transport data that has a high or very high protection<br />

requirement should if possible not pass over any subnetwork boundaries. If this principle is<br />

followed, the protection requirements of the resulting subnetworks will be uniform as far as<br />

possible.<br />

- Components which are only connected to each other over a long-distance connection should not be<br />

assigned to the same subnetwork i.e. subnetworks should not extend over more than one location or<br />

property. This is desirable both in order to retain an overview and for the efficient conduct of the<br />

project.<br />

_________________________________________________________________________________________<br />

<strong>IT</strong>-<strong>Baseline</strong> <strong>Protection</strong> <strong>Manual</strong>: Otober 2000

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!