19.12.2012 Views

IT Baseline Protection Manual - The Information Warfare Site

IT Baseline Protection Manual - The Information Warfare Site

IT Baseline Protection Manual - The Information Warfare Site

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

Safeguard Catalogue - Organisation Remarks<br />

____________________________________________________________________ .........................................<br />

5. Configuring groups<br />

To facilitate administration, user accounts which need to fulfil identical<br />

requirements should be coalesced into groups. User rights such as file,<br />

directory and sharing rights as well as any additional, pre-defined functions<br />

are then assigned to these groups instead of individual user accounts. <strong>The</strong> user<br />

accounts inherit the rights and authorisations of the groups to which they<br />

belong. For example, all the staff members of a particular department can be<br />

coalesced into one group. Rights and authorisations should only be allocated<br />

to individual users in exceptional situations.<br />

6. Determining user rights<br />

Rights allow a user to perform certain actions on the system. <strong>The</strong>y refer to the<br />

entire system, are not assigned to any special object, and can annul the<br />

authorisations to an object, as a right takes precedence over all file and<br />

directory authorisations. Whenever a user logs into an account to which the<br />

desired rights were granted either directly or via group membership, he can<br />

perform the corresponding actions. If a user does not possess the appropriate<br />

rights, Windows NT stops all attempts to carry out the actions concerned.<br />

As already mentioned, user rights should be assigned to groups instead of<br />

individual users wherever possible.<br />

During installation, Windows NT performs default settings which are<br />

generally adequate for secure and efficient operation. However, it is advisable<br />

to withdraw the "Shut down system" and "Local login" rights from the<br />

"Everyone" group and, if applicable, the "Local login" right from the "Guests"<br />

group (refer to S 4.50 Structured system administration under Windows NT).<br />

7. Determining the specifications for logging<br />

Windows NT provides very detailed capabilities for the logging of incidents<br />

relevant to security which, when used to the full, are capable of occupying the<br />

system to a large extent with auditing and consume large amounts of disk<br />

space in the process. A spectrum of incident types can be recorded which<br />

extends from system-wide incidents, such as, for example, the log-on of a user<br />

through to a user attempting to read a certain file. Both the successful and the<br />

failed attempts to perform an action can be recorded. In the configuration of<br />

the logging, however, it must be noted that an increase in logging does not<br />

necessarily also increase the security of the monitored system. Log files which<br />

are not evaluated or which, on account of their size, can only be evaluated<br />

with great effort, do not lead to improved supervision of the system<br />

sequences; on the contrary, they are ultimately useless. For these reasons,<br />

logging should be set in such a way that under normal circumstances it only<br />

records the really significant incidents (see S 4.54 Logging under Windows<br />

NT).<br />

8. Rules concerning data storage<br />

A specification is required as to where user data should be stored (refer to S<br />

2.138 Structured data storage). In some cases, for example, it is advisable to<br />

store user data only on a server. This model does not permit a storage of data<br />

on local hard disks. However, it is also conceivable to store certain user data<br />

only on a local hard disk. <strong>The</strong> strategy to be employed must be ascertained in<br />

____________________________________________________________________ .........................................<br />

<strong>IT</strong>-<strong>Baseline</strong> <strong>Protection</strong> <strong>Manual</strong>: Oktober 2000

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!