19.12.2012 Views

IT Baseline Protection Manual - The Information Warfare Site

IT Baseline Protection Manual - The Information Warfare Site

IT Baseline Protection Manual - The Information Warfare Site

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

Safeguard Catalogue Infrastucture Remarks<br />

____________________________________________________________________ .........................................<br />

S 1.38 Suitable siting of a modem<br />

Initiation responsibility: Head of <strong>IT</strong> Section, <strong>IT</strong> Security Management<br />

Implementation responsibility: <strong>IT</strong> users, Administrator<br />

To prevent misuse of modems, it must be ensured that only authorised persons<br />

have physical access to this equipment. Misuse in this case implies, firstly,<br />

unauthorised data transmissions possibly resulting in costs, virus infiltration or<br />

the transfer of confidential information outside, and secondly, unauthorised<br />

alteration or viewing of the modem configuration possibly resulting in security<br />

weaknesses.<br />

To control physical access to an external or PCMCIA modem, it must be<br />

ensured, for example, that modems operated continuously are kept inside<br />

locked rooms and modems operated temporarily are kept safely inside<br />

cabinets when not in use. <strong>The</strong> provisions in Chapter 4.3.1 Office are to be<br />

observed here.<br />

Due to its integration in an <strong>IT</strong> system, an internal modem has a higher intrinsic<br />

degree of physical protection. In this case, it is sufficient to observe the<br />

measures in Chapter 4.3.1 Office or 4.3.2 Server Room.<br />

If access to the internal network is created via a modem or a modem pool,<br />

Chapter 7.3 Firewall should be consulted. Access to the internal network<br />

should not be created via modems whilst bypassing an existing firewall.<br />

If more external accesses to a network protected by a firewall are to be created<br />

with a modem pool, this must be set up on the insecure side of the firewall<br />

(c.f. S 2.77 Correct Configuration of Other Components). <strong>The</strong> modem pool<br />

shouls be set up with the relevant server in a security server room. <strong>The</strong><br />

safeguards contained in Chapter 4.3.2 Server Room should be observed.<br />

____________________________________________________________________ .........................................<br />

<strong>IT</strong>-<strong>Baseline</strong> <strong>Protection</strong> <strong>Manual</strong>: Oktober 2000

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!