19.12.2012 Views

IT Baseline Protection Manual - The Information Warfare Site

IT Baseline Protection Manual - The Information Warfare Site

IT Baseline Protection Manual - The Information Warfare Site

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

Safeguard Catalogue - Organisation Remarks<br />

____________________________________________________________________ .........................................<br />

Organisational rules or technical measures are required in order to meet the<br />

following conditions, in particular:<br />

- <strong>The</strong> browsers intended for users should be pre-configured by the<br />

administrator so as to automatically achieve the highest possible level of<br />

security without further intervention by the users (see also S 5.45 Security<br />

of WWW browsers).<br />

- Files whose content is liable to cause offence must be neither placed on nor<br />

retrieved from WWW servers. It must be established what type of content<br />

is considered offensive.<br />

- After files have been downloaded, they must be explicitly checked for<br />

computer viruses.<br />

All rules and instructions concerning the use of the WWW must be specified<br />

in writing and should remain available to employees at all times. A sample of<br />

such rules is given on the CD-ROM accompanying the <strong>IT</strong> <strong>Baseline</strong> <strong>Protection</strong><br />

<strong>Manual</strong>, in the Auxiliary Materials directory.<br />

In order to prevent operating errors and to ensure observance of the<br />

organisation’s internal guidelines, users must be given training before they use<br />

the WWW, both in operation of their WWW browser and in the use of the<br />

Internet. In particular, they must be made aware of potential hazards and of<br />

the security measures that have to be observed.<br />

Supplementary checks:<br />

- Is there a security strategy for the operation of a WWW server?<br />

- Is there a security strategy for the use of WWW services?<br />

- Are the arrangements that have been made adequate?<br />

____________________________________________________________________ .........................................<br />

<strong>IT</strong>-<strong>Baseline</strong> <strong>Protection</strong> <strong>Manual</strong>: Oktober 2000

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!