HostedDB - Dedicated UNIX Servers

-->
IT baseline protection manual

IT Baseline Protection Manual - Index

A B C D E F G H I j K L M N O P R S T U V W Z

passwords
- change of pre-set S 4.7
- escrow S 2.22
- non recurrent S 5.34
- protection S 4.1
- systematic trying-out of T 5.18
- Unix password protection S 4.14
- use of one-time passwords S 5.34
- use of password S 2.11
PBX
- agreement on the delivery deadlines for "vital" PBX units S 6.28
- audit of configuration S 4.6
- awareness of risks S 3.13
- backup of configuration data for S 6.26
- emergency circuit S 6.30
- external advisory service S 2.28
- failure of the PBX due to operating errors T 3.7
- obtaining PBX-annexes S 2.105
- operating instructions for users S 2.29
- operator's console, protection of S 4.8
- regular backup of PBX configuration data S 6.26
- safeguarding of data media containing data on telecommunications charges S 1.30
- screening of interfaces S 4.11
- selection of a trustworthy administrator and his substitute S 3.10
- terminals, password protection for S 4.10
- warning notices, warning symbols and acoustic alarm signals S 3.12
PC emergency floppy disk S 6.24
PC security product, use of a suitable S 4.41
PC use Guideline S 2.23
PC user, incorrect change of T 3.17
Peer-to-peer network
- deleting the post office T 5.47
- implementing security checks S 2.68
- instructions concerning the correct use of the security functions S 3.19
- restricting the functionality S 5.37
- setting up a secure environment S 4.45
perimeter protection S 1.55
poor adjustment to changes in the use of IT T 2.9
power supply, disruption of T 4.1
power supply, uninterruptible S 1.28
precautions against Trojan horses S 2.224
procedures in case of a loss of network integrity S 6.54
procedures regarding the use of outside staff S 2.226
protection against active content S 5.69
protective cabinets
- correct procedure for code locks S 2.97
- electromagnetic irradiation S 1.41
- instructions concerning the operation of S 3.20
- locking of S 2.96
- obtaining of S 2.95
- suitable siting of S 1.40


© Copyright by
Bundesamt für Sicherheit in der Informationstechnik
last update:
July 2001
home