19.12.2012 Views

IT Baseline Protection Manual - The Information Warfare Site

IT Baseline Protection Manual - The Information Warfare Site

IT Baseline Protection Manual - The Information Warfare Site

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

Safeguard Catalogue - Organisation Remarks<br />

____________________________________________________________________ .........................................<br />

of aspects to be observed for correct operation of the various protocols and<br />

services is provided in S 5.39 Secure Use of Protocols and Services. Using<br />

this as a basis, filter rules must be drawn up (see S 2.76 Selection and<br />

Implementation of Suitable Filter Rules).<br />

In addition to the establishment and implementation of filter rules, the<br />

following organisational regulations are required:<br />

- Persons-in-charge should be appointed for the establishment,<br />

implementation and testing of the filter rules. It must be clarified who is<br />

authorised to alter filter rules, e.g. for testing new services.<br />

- It must be determined which information is logged and who assesses these<br />

protocols. All connections which were correctly established and those<br />

which were denied must be logged. Logging must comply with the data<br />

privacy regulations.<br />

- <strong>The</strong> users must be informed in detail of their permissions, particularly with<br />

regard to the extent of the data filtering.<br />

- Attacks on the firewall should not only be successfully prevented, but also<br />

detected at an early stage. Attacks can be detected by assessing the log<br />

files. On the basis of predefined events, e.g. repeated entry of an incorrect<br />

password on an application gateway, or attempts to establish forbidden<br />

connections, the firewall should also be able to issue warnings or even<br />

trigger actions.<br />

- It should be clarified which actions are started in the event of an attack,<br />

whether the attacker should be traced, for example, or whether the external<br />

network connection should be cut off. As this can have a great effect on<br />

operation of the network, persons-in-charge must be appointed who are<br />

able to decide whether an attack is present and what action should be taken.<br />

<strong>The</strong> tasks and authority for the persons and functions in question must be<br />

clearly stipulated.<br />

<strong>The</strong> following questions must be clarified when determining the security<br />

policy:<br />

- What damage can be caused to the network requiring protection if the<br />

firewall is passed? As there is no such thing as absolute protection, it must<br />

be decided whether the maximum possible damage is acceptable or<br />

whether additional measures must be taken.<br />

- What is the remaining risk when the firewall is operating correctly? This<br />

may be vulnerabilities in the equipment and operating systems used.<br />

- How quickly is an attack on the firewall detected?<br />

- Which protocol information is still available after a successful attack?<br />

- Are the users willing to accept the limitations caused by the firewall?<br />

____________________________________________________________________ .........................................<br />

<strong>IT</strong>-<strong>Baseline</strong> <strong>Protection</strong> <strong>Manual</strong>: Oktober 2000

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!