19.12.2012 Views

IT Baseline Protection Manual - The Information Warfare Site

IT Baseline Protection Manual - The Information Warfare Site

IT Baseline Protection Manual - The Information Warfare Site

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

Safeguard Catalogue - Organisation Remarks<br />

____________________________________________________________________ .........................................<br />

S 2.31 Documentation on Authorised Users and on<br />

Rights Profiles<br />

Initiation responsibility: Head of <strong>IT</strong> Section, <strong>IT</strong> Security Management<br />

Implementation responsibility: Administrator<br />

Such documentation serves to provide an overview of the authorised users,<br />

user groups and rights profiles and is required for effective monitoring.<br />

<strong>The</strong> following three means of providing documentation should all be used:<br />

- generic administration files provided by the system,<br />

- individual files administered by the responsible Administrator,<br />

- hard copies.<br />

In particular, the following should be documented:<br />

- authorised users together with the following details: assigned rights profile<br />

(plus any deviations from the standard rights profile used), reasons for<br />

selecting that particular rights profile (plus any deviations, if applicable),<br />

user contact details, date and reason for configuring this user, and any time<br />

limits;<br />

- authorised groups, together with details of the relevant users, date and<br />

reason for configuration, plus any time limits.<br />

<strong>The</strong> documentation regarding the authorised users and rights profiles should<br />

be checked at regular intervals (at least every six months) to see whether it<br />

reflects the actual situation regarding the granting of rights and whether the<br />

assignment of rights still matches the security requirements and the current<br />

tasks of the users.<br />

Additional controls:<br />

- Are there records of the authorised users and groups and their authorisation<br />

profiles?<br />

- Are the records up to date?<br />

- When were the records last checked?<br />

- Are the records adequately protected against unauthorised access?<br />

____________________________________________________________________ .........................................<br />

<strong>IT</strong>-<strong>Baseline</strong> <strong>Protection</strong> <strong>Manual</strong>: Oktober 2000

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!