19.12.2012 Views

IT Baseline Protection Manual - The Information Warfare Site

IT Baseline Protection Manual - The Information Warfare Site

IT Baseline Protection Manual - The Information Warfare Site

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

Safeguard Catalogue - Organisation Remarks<br />

____________________________________________________________________ .........................................<br />

S 2.92 Performing security checks in the Windows<br />

NT client-server network<br />

Initiation responsibility: Head of <strong>IT</strong> Section, <strong>IT</strong> Security Management<br />

Implementation responsibility: Administrators<br />

<strong>The</strong> following points should be checked regularly at the level of the servers in<br />

a Windows NT client-server network in terms of whether they are being<br />

followed and their effectiveness (see also S 4.54 Logging under Windows NT):<br />

- System security settings<br />

<strong>The</strong> correct setting of the entries relevant to security in the registry, i.e.<br />

essentially the entries in the sector HKEY_LOCAL_MACHINE, must be<br />

checked regularly by checking the entries of the security logs which refer<br />

to the registry.<br />

- Use of privileged user accounts<br />

<strong>The</strong> use of privileged user accounts, i.e. of accounts with extended rights<br />

and authorisations e.g. for administrators, must be checked regularly by<br />

checking the entries in the security log. Likewise the log must be checked<br />

for log-on attempts to the guest user account.<br />

- Failed access attempts (authorisation violations)<br />

If access to files and/or the registry is recorded, the security log must be<br />

checked weekly, or more often when required, for the occurrence of failed<br />

log-on attempts. If authorisation violations are discovered, the cause must<br />

be established.<br />

- System integrity<br />

System integrity must be checked regularly; in particular, the data relating<br />

to the last modification and the rights to access important system files must<br />

be checked and compared with the values obtained directly after<br />

installation of the system and at each previous check. Since this check,<br />

with the aid of the capabilities offered by Windows NT, is relatively<br />

expensive, suitable ancillary tools should be used here, for example the<br />

shareware program DumpACL, or the service program WinDiff supplied<br />

with the Technical Reference (the "resource kit") for Windows NT, with<br />

which the contents of directories and files can be compared.<br />

- Unused user accounts<br />

It must be ensured that the accounts of former employees are immediately<br />

deactivated and deleted from the system after a suitable transitional period<br />

(approx. ½ year). As the time of the last log-on to the system is not<br />

indicated, then, for this purpose, all user accounts should, if, possible, be<br />

supplied with an expiry date which has to be updated at certain intervals<br />

(e.g. annually) at the request of the user. Inactive, i.e. expired user accounts<br />

must be deleted. <strong>The</strong> owners must first be informed. <strong>The</strong> list of defined<br />

users must be checked regularly to ensure that only active employees are<br />

working on the system.<br />

____________________________________________________________________ .........................................<br />

<strong>IT</strong>-<strong>Baseline</strong> <strong>Protection</strong> <strong>Manual</strong>: Oktober 2000

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!