19.12.2012 Views

IT Baseline Protection Manual - The Information Warfare Site

IT Baseline Protection Manual - The Information Warfare Site

IT Baseline Protection Manual - The Information Warfare Site

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

Safeguard Catalogue - Organisation Remarks<br />

____________________________________________________________________ .........................................<br />

- In Netware version 4.11 and higher, the auditor must receive the necessary<br />

right to the corresponding NDS audit file objects.<br />

- Activate the network auditing function. <strong>The</strong> person who creates the NDS<br />

audit file object receives the supervisor right for the NDS audit file object<br />

and the right Write for the access control list property. This user also<br />

receives the rights Read and Write for the audit policy property and the<br />

right Read for the audit contents property. <strong>The</strong> creator of this NDS audit<br />

file object is therefore able to administrate and evaluate the auditing.<br />

- <strong>The</strong> allocation of a auditor password in the utility<br />

SYS:PUBLIC\AUD<strong>IT</strong>CON.EXE in order to become independent from the<br />

administrator (Netware 4.10 and for reasons of compatibility also in<br />

Netware 4.11).<br />

In Netware version 4.11 and higher, the auditor should be made<br />

independent from the administrator through the allocation of NDS rights. It<br />

can also be determined whether a particular auditor is allowed to view<br />

audit files and/or manage the auditing.<br />

If, for carefully considered reasons, it is not desirable or possible to configure<br />

the role of an independent auditor, the log files can also be evaluated by the<br />

administrator. Should this be the case, it should be pointed out that the<br />

Administrator's activities are difficult to monitor. Consequently, the results of<br />

evaluation should be presented at least to the <strong>IT</strong> security officer, <strong>IT</strong> in-charge,<br />

or another specially appointed staff member.<br />

Additional controls:<br />

- Who evaluates the auditing files?<br />

- Can the activities of the administrator be monitored to a sufficient extent?<br />

- Is the <strong>IT</strong> security management notified of irregularities?<br />

- Has a limit been imposed on the maximum size of the log files in order to<br />

prevent memory shortages?<br />

____________________________________________________________________ .........................................<br />

<strong>IT</strong>-<strong>Baseline</strong> <strong>Protection</strong> <strong>Manual</strong>: Oktober 2000

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!