19.12.2012 Views

IT Baseline Protection Manual - The Information Warfare Site

IT Baseline Protection Manual - The Information Warfare Site

IT Baseline Protection Manual - The Information Warfare Site

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

Safeguard Catalogue - Organisation Remarks<br />

____________________________________________________________________ .........................................<br />

S 2.146 Secure operation of a network management<br />

system<br />

Initiation responsibility: Head of <strong>IT</strong> Section, <strong>IT</strong> Security Management<br />

Implementation responsibility: Administrators<br />

For the secure and reliable operation of a network management tool or a<br />

complex network management system composed, for example, of several<br />

different network management tools, a secure configuration of all the<br />

components involved should be ensured. <strong>The</strong>se components include the<br />

operating systems on which the network management system is executed, the<br />

external databases usually required for the network management system, the<br />

protocol in use (refer to S 2.144 Selection of a suitable network management<br />

protocol) and the active network components themselves. Before a network<br />

management system is put into operation, the requirements for preparing and<br />

implementing a network management concept should be determined (refer to<br />

S 2.143 Development of a network management concept).<br />

<strong>The</strong> following items must be observed in particular:<br />

- To prevent network management information from being intercepted or<br />

modified, the computer on which the network management console is<br />

operated must be protected appropriately. Measures here include, for<br />

example, installation in a specially protected room, the use of screen locks,<br />

password protection for the network management console, and further<br />

security mechanisms offered by the underlying operating system.<br />

- Safeguard S 2.144 Selection of a suitable network management protocol<br />

should be taken into account in order to ensure secure operation. In<br />

particular, the reading of MIBs and other information by unauthorised<br />

persons should be prevented by appropriately configuring the active<br />

network components on the basis of the protocol in use (refer to S 4.80<br />

Reliable access mechanisms for remote administration and S 4.82 Secure<br />

configuration of active network components).<br />

- If network management functions are performed decentrally in accordance<br />

with the client / server model or through the use of X-Windows<br />

technology, their secure operation must also be ensured.<br />

- <strong>The</strong> integrity of the software in use must be tested at regular intervals in<br />

order to allow a timely detection of any unauthorised modifications.<br />

- <strong>The</strong> response of the network management system in the event of a system<br />

crash must be tested. In particular, it should be possible to perform an<br />

automatic restart in order to minimise the time interval over which the local<br />

network is not monitored. <strong>The</strong> network management database must not be<br />

damaged by a system crash, and must be available again following a<br />

restart, as the configuration data it contains are essential for the operation<br />

of the network management system. For this reason, these data require<br />

special protection, firstly in order to ensure their availability, and secondly<br />

in order to prevent the utilisation of old or faulty configuration data<br />

following a restart which may have been perpetrated by an intruder<br />

____________________________________________________________________ .........................................<br />

<strong>IT</strong>-<strong>Baseline</strong> <strong>Protection</strong> <strong>Manual</strong>: Oktober 2000

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!