19.12.2012 Views

IT Baseline Protection Manual - The Information Warfare Site

IT Baseline Protection Manual - The Information Warfare Site

IT Baseline Protection Manual - The Information Warfare Site

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

Safeguard Catalogue - Organisation Remarks<br />

____________________________________________________________________ .........................................<br />

S 2.67 Defining a security strategy for peer-to-peer<br />

networks<br />

Initiation responsibility: Head of <strong>IT</strong> Section, <strong>IT</strong> Security Management<br />

Implementation responsibility: <strong>IT</strong> Security Management<br />

Prior to commencement of the configuration and installation of a Peer-to-Peer<br />

network on a WfW, Windows 95 and/or Windows NT computer, two basic<br />

factors must be considered:<br />

It should first be clarified which service must be performed by the relevant<br />

operating system and what is the scope of this service? In particular, it should<br />

be clarified whether the Peer-to-Peer functions of the operating system, i.e.<br />

shared resources such as printers or directories should be used at all.<br />

This can be illustrated using a number of examples:<br />

- <strong>The</strong> <strong>IT</strong>-system is used for a working group of typically three to five users,<br />

whereby each user should have all rights. <strong>The</strong> complete Peer-to-Peer<br />

functionality should be supported at each workstation.<br />

- <strong>The</strong> <strong>IT</strong>-system is used for a large group in which various rights can be<br />

allocated. <strong>The</strong> Peer-to-Peer functionality is to be implemented in a limited<br />

manner on the basis of definite requirements.<br />

- <strong>The</strong> <strong>IT</strong>-system is used in a server-supported PC network, where Peer-to-<br />

Peer functionality for the exchange of data can generally be dispensed<br />

with. several printers should be used jointly via peer-to-peer functions.<br />

- <strong>The</strong> <strong>IT</strong>-system is to be installed in a server-supported PC network, where<br />

Peer-to-Peer functionality is not planned. All Peer-to-Peer functions must<br />

then be deactivated. In this case, the consideration of the following points<br />

is not necessary. However, the measures described in S 5.37 Restricting<br />

peer-to-peer functions when using WfW, Windows 95 or Windows NT in a<br />

server-supported network should be taken into account.<br />

Note:<br />

security functions offered by server-supported networks are far more<br />

extensive than those offered by Peer-to-Peer networks. Moreover, additional<br />

security problems may arise when using Peer-to-Peer functions in a serversupported<br />

network. <strong>The</strong>refore the use of Peer-to-Peer functions in a serversupported<br />

PC network should be avoided. Peer-to-Peer networks which<br />

serve to connect WfW to other computers with WfW, Windows 95 or<br />

Windows NT should only be considered as a temporary solution until WfW is<br />

replaced by Windows 95 or Windows NT or until a server-supported network<br />

operating system is installed.<br />

Given that Peer-to-Peer functions should be used, these considerations must<br />

then be transformed into a security strategy.<br />

This demonstrates that the development of a suitable security strategy involves<br />

a relatively large amount of time and expense, depending on the system<br />

environment and organisation structure already in place, as well as the planned<br />

restrictions of Peer-to-Peer functionality.<br />

____________________________________________________________________ .........................................<br />

<strong>IT</strong>-<strong>Baseline</strong> <strong>Protection</strong> <strong>Manual</strong>: Oktober 2000

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!