19.12.2012 Views

IT Baseline Protection Manual - The Information Warfare Site

IT Baseline Protection Manual - The Information Warfare Site

IT Baseline Protection Manual - The Information Warfare Site

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

Safeguard Catalogue - Organisation Remarks<br />

____________________________________________________________________ .........................................<br />

Determining a security strategy for a client-server network<br />

<strong>The</strong> security strategy must demonstrate how a client-server network for the<br />

respective organisation can be securely constructed, administrated and<br />

operated. <strong>The</strong> individual development steps of such a strategy are presented<br />

below:<br />

1. Definition of the client-server network structure<br />

<strong>The</strong> first step involves determining the logical structure of the client-server<br />

network, in particular the allocation of the servers and the network domains<br />

(see S 2.93 Planning of a Windows NT network). If possible, the use of Peerto-Peer<br />

functions should be dispensed with, as these can adversely affect the<br />

security of the client-server network. Provided that this cannot be avoided,<br />

however, binding rules must be made for the use of Peer-to-Peer functions<br />

(see S 2.67 Defining a security strategy for Peer-to-Peer networks).<br />

2. Regulation of responsibilities<br />

A client-server network should be operated securely by a trained network<br />

administrator together with a substitute. Only these individuals should be<br />

allowed to alter security parameters in the network. For example, they are<br />

responsible for making administration rights and tools available to the relevant<br />

individuals in charge on the servers, so that the latter can allocate file and<br />

directory rights, share directories and applications required by others,<br />

configure user groups and accounts, and set system guidelines for users,<br />

access supervision and monitoring.<br />

<strong>The</strong> responsibilities of the individual users in the client-server network are<br />

outlined under Step 11.<br />

3. Determining name conventions<br />

In order to facilitate the management of the client-server network,<br />

unambiguous names should be used for the computers, user groups and users.<br />

In addition, naming conventions should be introduced for the share names of<br />

directories or printers (see S 2.67 Defining a security strategy for Peer-to-Peer<br />

networks). Should no conclusions be possible on the contents of a shared<br />

directory, appropriate pseudonyms must be used. Should a shared resource not<br />

be recognisable as such, the symbol ”$” must be attached to the share name.<br />

<strong>The</strong> latter is always recommended whenever directories are shared only for<br />

the bilateral exchange of information between two users or for accessing<br />

resources which are only meant to be known to individual users.<br />

4. Determining the rules for user accounts<br />

Before user accounts are set up, the restrictions intended to apply to all, or a<br />

certain number, of these accounts should be stipulated. In particular, this<br />

concerns the rules for passwords and for the reaction of the system to incorrect<br />

log-in procedures. <strong>The</strong> rules laid down can be implemented with the aid of the<br />

"Policies" option of the User Manager (see S 4.48 Password protection under<br />

Windows NT).<br />

____________________________________________________________________ .........................................<br />

<strong>IT</strong>-<strong>Baseline</strong> <strong>Protection</strong> <strong>Manual</strong>: Oktober 2000

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!