19.12.2012 Views

IT Baseline Protection Manual - The Information Warfare Site

IT Baseline Protection Manual - The Information Warfare Site

IT Baseline Protection Manual - The Information Warfare Site

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

Safeguard Catalogue - Organisation Remarks<br />

____________________________________________________________________ .........................................<br />

S 2.31 Documentation on authorised users and on rights<br />

profiles<br />

S 2.32 Establishment of a restricted user environment<br />

S 2.33 Division of Administrator roles under UNIX<br />

S 2.34 Documentation of changes made to an existing <strong>IT</strong><br />

system<br />

S 2.35 Obtaining information on security weaknesses of the<br />

system<br />

S 2.36 Orderly issue and retrieval of a portable (laptop) PC<br />

S 2.37 Clean desk policy<br />

S 2.38 Division of administrator roles in PC networks<br />

S 2.39 Response to violations of security policies<br />

S 2.40 Timely involvement of the staff/factory council<br />

S 2.41 Employees' commitment to data backup<br />

S 2.42 Determination of potential communications partners<br />

S 2.43 Adequate labelling of data media for dispatch<br />

S 2.44 Secure packaging of data media<br />

S 2.45 Controlling the exchange of data media<br />

S 2.46 Appropriate key management<br />

S 2.47 Designating a person in charge of the fax system<br />

S 2.48 Designating authorised fax operators<br />

S 2.49 Procurement of suitable fax machines<br />

S 2.50 Appropriate disposal of consumable fax accessories and<br />

spare parts<br />

S 2.51 Producing copies of incoming fax messages<br />

S 2.52 Supply and monitoring of consumable fax accessories<br />

S 2.53 Deactivation of fax machines after office hours<br />

S 2.54 Procurement/selection of suitable answering machines<br />

S 2.55 Use of a security code<br />

S 2.56 Avoidance of confidential information on answering<br />

machines<br />

S 2.57 Regular playback and deletion of recorded messages<br />

S 2.58 Limitation of message time<br />

S 2.59 Procurement of a suitable modem<br />

S 2.60 Secure administration of a modem<br />

S 2.61 Requirements document for modem usage<br />

____________________________________________________________________ .........................................<br />

<strong>IT</strong>-<strong>Baseline</strong> <strong>Protection</strong> <strong>Manual</strong>: Oktober 2000

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!