22.12.2012 Views

Front cover - IBM Redbooks

Front cover - IBM Redbooks

Front cover - IBM Redbooks

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

108 Lotus Security Handbook<br />

► Security administrative authority: The authority given to an individual by<br />

the assignment of attributes or privileges that are associated with access<br />

control systems and that are required for setting and administering<br />

system-wide security controls.<br />

Users with security administrative authority can improperly use their authority in<br />

a way that allows them to alter system components. Users with system authority<br />

can improperly use their authority in a way that allows them to circumvent the<br />

access control system. Either situation should be considered a misuse of<br />

authority.<br />

Each major system platform and subsystem in the infrastructure must include an<br />

access control system. In order to ensure a reasonable level of system security,<br />

the organization’s security policy should contain:<br />

► Identification of the standard access control systems<br />

► Identification of the security administrative authorities associated with these<br />

access control systems<br />

► Mandatory default control and implementation standards for these access<br />

control systems<br />

Provide availability<br />

Ensure system availability meets your organization’s business requirements with<br />

redundancy and fail-over. Although system availability is not always associated<br />

with security, denial of service (DOS) attacks are very real and systems with<br />

single points of failure become extremely vulnerable. And as the redbook team<br />

experienced first-hand, a DOS attack can originate anywhere in the network<br />

through the unwitting release of a worm virus. So do not assume the redundancy<br />

should focus only on external access coming into your network.<br />

Redundancy for the most part should be architected in a manner that hides the<br />

physical redundancy from a user’s point of view. Not only does this provide a<br />

system that is easier for the end users, it also creates an environment that makes<br />

it more difficult for an intruder to directly attack a specific component.<br />

An additional key component of availability is system monitoring. System and<br />

network failures must be detected and responsible parties notified as rapidly as<br />

possible.<br />

Control administrative maintenance activity<br />

Administrative maintenance activity refers to actions performed by staff who<br />

have either system administrative or security administrative levels of access that<br />

relate to system configuration and operation. In other words, the staff has

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!