19.12.2012 Views

IT Baseline Protection Manual - The Information Warfare Site

IT Baseline Protection Manual - The Information Warfare Site

IT Baseline Protection Manual - The Information Warfare Site

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

Safeguard Catalogue - Organisation Remarks<br />

____________________________________________________________________ .........................................<br />

S 2.32 Establishment of a restricted user<br />

environment<br />

Initiation responsibility: Head of <strong>IT</strong> Section, <strong>IT</strong> Security Management<br />

Implementation responsibility: Administrators<br />

Where users only have specific tasks to perform, it often will not be necessary<br />

to grant them all the rights associated with their own log-in (possibly even<br />

Administrator rights). Examples are certain activities of routine system<br />

administration (such as making backups, designating a new user) which are<br />

carried out using a menu-driven program, or activities for which the user<br />

needs only a single application program.<br />

For these users, a restricted user environment should be established. This can<br />

be achieved, for instance, under UNIX with a restricted shell (rsh) and the<br />

restriction of access paths with the UNIX command chroot. For a user needing<br />

only one application program, this can be entered as a log-in shell so that it is<br />

started directly after he logs on, and he is automatically logged off on exiting<br />

the program.<br />

<strong>The</strong> available range of functions of the <strong>IT</strong> system may be restricted for<br />

individual users or user groups. Use of editors or compilers should be<br />

prevented unless the user actually needs these to perfom his tasks. This can be<br />

achieved on stand-alone systems by the removal of such programs and, on<br />

networked systems, by the allocation of rights.<br />

Additional controls:<br />

- What user environment and what start-up procedure have been defined for<br />

the respective users?<br />

____________________________________________________________________ .........................................<br />

<strong>IT</strong>-<strong>Baseline</strong> <strong>Protection</strong> <strong>Manual</strong>: Oktober 2000<br />

Use restricted shell and<br />

chroot<br />

Restrict use of editors<br />

and compilers

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!