19.12.2012 Views

IT Baseline Protection Manual - The Information Warfare Site

IT Baseline Protection Manual - The Information Warfare Site

IT Baseline Protection Manual - The Information Warfare Site

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

Safeguard Catalogue - Organisation Remarks<br />

____________________________________________________________________ .........................................<br />

Such procedures must also be documented.<br />

All activities in this phase are to be performed by the general database<br />

administrator in consultation with the application-specific administrators (in<br />

order to specify the size of the database, for example).<br />

3. Configuring the database<br />

<strong>The</strong> third phase consists of implementing the user and group concepts and - if<br />

required - the role concept. For this purpose, the general database<br />

administrator configures the individual authorisation profiles, and creates all<br />

the groups and administrative user IDs (for the application-specific<br />

administrators). In this process, the instructions specified in S 2.132<br />

Provisions forCconfiguring Database Isers / User Groups should be observed.<br />

Naturally, access rights pertaining to individual database objects can only be<br />

defined if these objects are already in existence (refer to step 4).<br />

If the database software supports a distribution of data among several files or<br />

hard disks, it is necessary to specify additional parameters assigning the<br />

creation of these files as well as the corresponding memory sectors.<br />

All the performed settings must be documented in detail (refer to S 2.25<br />

Documentation on the System Configuration).<br />

All activities in this phase are to be performed by the general database<br />

administrator.<br />

4. Creating and configuring database objects<br />

In this last phase, the database objects of the individual applications are<br />

created in accordance with the database security concept (refer to S 2.126<br />

Creation of a Database Security Concept). If possible, this procedure should<br />

be automated and logged using scripts. After the database objects have been<br />

created, the related access rights for roles, groups and users are to be assigned.<br />

Specific users can now also be configured on the basis of the existing<br />

authorisation profiles.<br />

All activities in this phase are to be performed by the application-specific<br />

administrators.<br />

Additional controls:<br />

- Have users been informed about an impending installation?<br />

- Are all the parameters and related values required during installation<br />

known before the database is created?<br />

- Are all post installation tasks required after the creation of the database<br />

known?<br />

- Have the installation, creation and configuration of the database and its<br />

objects been documented?<br />

____________________________________________________________________ .........................................<br />

<strong>IT</strong>-<strong>Baseline</strong> <strong>Protection</strong> <strong>Manual</strong>: Oktober 2000

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!