19.12.2012 Views

IT Baseline Protection Manual - The Information Warfare Site

IT Baseline Protection Manual - The Information Warfare Site

IT Baseline Protection Manual - The Information Warfare Site

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

Safeguard Catalogue - Organisation Remarks<br />

____________________________________________________________________ .........................................<br />

passwords). <strong>The</strong> maximum term of validity for these passwords should thus be<br />

stipulated. In order to be able to change the ADMINCFG.EXE password<br />

efficiently, the relevant configuration files can be stored centrally on one<br />

server. As changing the share passwords can involve a high degree of<br />

organisation (see No. 5), it should be determined in advance how often these<br />

are to be changed and how those persons affected are to be informed of the<br />

new passwords.<br />

Windows 95<br />

Under Windows 95, the amount of passwords to be used depends upon which<br />

access model is deployed (User Level Security or Share Level Security). In<br />

the former case, as with Windows NT, the passwords will only be required for<br />

the computers having shared resources for network access. In the latter case,<br />

similar to WfW, passwords for the shared resources will also be required.<br />

Separate passwords for the administration of Peer-to-Peer functions are not<br />

required as these will be controlled via the user profile.<br />

Access protection at the user level is based on the user lists contained in<br />

Windows NT or Novell Netware servers, and can thus only be implemented in<br />

these networks. If Peer-to-Peer functions must be implemented despite having<br />

a Windows NT or Novell Netware server network, then it is preferable to<br />

implement this access model since it offers a higher level of protection.<br />

Windows NT<br />

Under Windows NT, the administration of Peer-to-Peer functions takes place<br />

under general network and access control, so that no separate passwords are<br />

required for these administrative tasks. Regarding administration of access<br />

passwords for the users concerned, please refer to the notes contained in<br />

safeguard S 2.11 Provisions governing the use of passwords.<br />

7. Responsibilities for users in a Peer-to-Peer network<br />

In addition to Peer-to-Peer management tasks (see No. 2), other<br />

responsibilities must be determined. It should be determined what the<br />

responsibilities of the various Peer-to-Peer network users are to be, such as:<br />

<strong>The</strong>se can, for example, be responsibilities for<br />

- the evaluation of the log files on the individual servers or clients,<br />

- the allocation of access rights,<br />

- the escrow and changing of passwords and<br />

- carrying out data backups.<br />

8. Training<br />

It must then be determined which Peer-to-Peer users have to be trained in<br />

which points. Effective operation can only begin after adequate training.<br />

<strong>The</strong> security strategy developed in this way should be documented and<br />

announced to the users of the Peer-to-Peer network to the extent required.<br />

Additional controls:<br />

- Is the security strategy adapted to changes in the usage environment?<br />

____________________________________________________________________ .........................................<br />

<strong>IT</strong>-<strong>Baseline</strong> <strong>Protection</strong> <strong>Manual</strong>: Oktober 2000

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!