19.12.2012 Views

IT Baseline Protection Manual - The Information Warfare Site

IT Baseline Protection Manual - The Information Warfare Site

IT Baseline Protection Manual - The Information Warfare Site

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

Safeguard Catalogue - Organisation Remarks<br />

____________________________________________________________________ .........................................<br />

S 2.38 Division of administrator roles in PC<br />

networks<br />

Initiation responsibility: Head of <strong>IT</strong> Section, <strong>IT</strong> Security Management<br />

Implementation responsibility: Administrators<br />

Many networked systems offer the possibility to divide the administrator role<br />

and to allocate administrator activities to various users.<br />

Thus, for instance, the following administrator roles can be set up under<br />

Novell Netware 3.11: Workgroup Manager, User Account Manager, File<br />

Server Console Operator, Print Server Operator, Print Queue Operator.<br />

Defined administrator roles can be created under Windows NT for individual<br />

users or better for groups by the controlled allocation of user privileges.<br />

Besides the administrator group, the following must be mentioned: power<br />

users (i.e. administrators with restricted privileges), backup-operators, printoperators,<br />

server-operators and replicator-operators. Additionally, further roles<br />

can be defined via the explicit allocation of user privileges (see also S 4.50<br />

Structured system administration under Windows NT).<br />

Where administrator roles exist for specialised tasks, they should be made use<br />

of. Especially when in large systems where administration tasks must be<br />

entrusted to a number of persons, the risk of the administrator roles holding<br />

excessive powers of control can be reduced by an appropriate division of<br />

responsibilities so that administrators will not be able, without being subject to<br />

control, to make unauthorised or unintentional changes to the system.<br />

Despite the division of administrator roles, the system will in most cases<br />

automatically set up an account for an administrator not subject to any<br />

restrictions, i.e. the supervisor. <strong>The</strong> supervisor password may be known only<br />

to a small number of people. It must not be known to any of the subadministrators<br />

so as to prevent the latter from expanding their rights in this<br />

way. <strong>The</strong> password must be safely deposited (see S 2.22 Depositing of<br />

passwords). <strong>The</strong> supervisor log-in can be additionally protected by the<br />

application of the two-person rule, e.g. by means of organisational measures<br />

such as a split password. In that case, the password must have an extended<br />

minimum length (12 characters or more). It must be ensured that the<br />

password, in its full minimum length, will be checked by the system.<br />

Additional controls:<br />

- To which persons is the supervisor password known?<br />

- Have administrator roles been divided up?<br />

____________________________________________________________________ .........................................<br />

<strong>IT</strong>-<strong>Baseline</strong> <strong>Protection</strong> <strong>Manual</strong>: Oktober 2000

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!