19.12.2012 Views

IT Baseline Protection Manual - The Information Warfare Site

IT Baseline Protection Manual - The Information Warfare Site

IT Baseline Protection Manual - The Information Warfare Site

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

Safeguard Catalogue - Organisation Remarks<br />

____________________________________________________________________ .........................................<br />

- Is too much information recorded (long log files make it more difficult to<br />

detect irregularities)?<br />

- Are there any particularly long periods of time when the user has not<br />

changed (suggesting that logging-off is not being consistently carried out<br />

when a user finishes working)?<br />

- Are there any unusually long periods during which a connection with a<br />

public network has been maintained (see T 4.25 Still Active Connections)?<br />

- Have unusually high network loads or an interruption in network<br />

operations been detected in individual network segments or throughout the<br />

network? (suggesting that there have been attempts to obstruct or impair<br />

network services or that the network has been inappropriately designed or<br />

configured)?<br />

When evaluating the log files, particular attention should be paid to all<br />

accesses which have been carried out using an Administrator ID.<br />

If extensive log files are to be evaluated on a regular basis, it is sensible to use<br />

an evaluation tool. This tool should allow evaluation criteria to be selected and<br />

highlight especially critical entries (e.g. repeated failed attempts at log-on).<br />

<strong>The</strong> guidelines stated above also apply to the gathering of auditing data,<br />

because in principle, this involves the logging of security-critical events.<br />

Additional controls:<br />

- Who analyses the log files? Is the two-person rule applied?<br />

- Can the activities of the Administrator be monitored to a sufficient extent?<br />

- Is the <strong>IT</strong> Security Management Team notified of irregularities?<br />

____________________________________________________________________ .........................................<br />

<strong>IT</strong>-<strong>Baseline</strong> <strong>Protection</strong> <strong>Manual</strong>: Oktober 2000

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!