19.12.2012 Views

IT Baseline Protection Manual - The Information Warfare Site

IT Baseline Protection Manual - The Information Warfare Site

IT Baseline Protection Manual - The Information Warfare Site

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

Safeguard Catalogue - Organisation Remarks<br />

____________________________________________________________________ .........................................<br />

S 2.65 Checking the efficiency of User separation on<br />

an <strong>IT</strong> System<br />

Initiation responsibility: Head of <strong>IT</strong> Section, <strong>IT</strong> Security Management<br />

Implementation responsibility: Auditor, Administrator, <strong>IT</strong> Security<br />

Management<br />

By means of report assessment or random testing, it should be checked at<br />

appropriate intervals whether the users of the <strong>IT</strong> system log-off regularly after<br />

finishing their task or whether several users work under one ID.<br />

Should it be found that several users work under one ID, then they should be<br />

made aware of the duty of logging off after a task is finished. At the same<br />

time, it should be pointed out that this is in the interest of the user.<br />

Should it also be determined that the log-on and log-off processes take too<br />

much time and are not accepted despite a request to do so, alternative<br />

measures should be discussed, such as:<br />

- Allocation of the <strong>IT</strong> system to a user for certain time periods when other<br />

users may not use the <strong>IT</strong> system. This requires the work process to be<br />

flexible from the point of view of time.<br />

- Procurement of additional <strong>IT</strong> systems, with which quasi-parallel work on<br />

one <strong>IT</strong> system can be avoided. It should be noted that whilst this involves<br />

additional costs, the procurement costs for PC security products are no<br />

longer required. Instead of the module 5.4 DOS PC (multi-user), the<br />

implementation of recommended safeguards of another module e.g. 5.1<br />

DOS PC (one user) becomes necessary.<br />

- Should it be possible to separate the data of the various users (e.g. user A<br />

processes the data A-L, user B the data M-Z), various authorisations can be<br />

granted. When a user wants to work with his data, therefore, he must first<br />

log-on to the system as his colleague does not have access to these data.<br />

Additional controls:<br />

- How frequently are logins and logouts checked?<br />

- Is there an acceptance problem regarding login/logoff?<br />

- Can the data be separated?<br />

____________________________________________________________________ .........................................<br />

<strong>IT</strong>-<strong>Baseline</strong> <strong>Protection</strong> <strong>Manual</strong>: Oktober 2000

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!