HostedDB - Dedicated UNIX Servers

-->
IT baseline protection manual

IT Baseline Protection Manual - Index

A B C D E F G H I j K L M N O P R S T U V W X Z

rcp security mechanisms S 5.20
recovery plan S 6.11
Redundant communication links S 6.75
regulations concerning substitution of teleworkers, inadequate T 2.53
relocation, security during S 2.177
remote access
- creation of a contingency plan for failure of the RAS system S 6.70
- definition of a set of RAS security guidelines S 2.187
- development of a RAS concept S 2.184
- disabling of RAS access security mechanisms T 5.91
- granting rights S 2.109
- improper administration of the RAS system T 3.39
- improper use of T 3.41
- inappropriate use of authentication services T 3.40
- insecure configuration of RAS clients T 3.42
- lack of or defective rules for the RAS system T 2.64
- performing a requirements analysis S 2.183
- permitting use of RAS components by third parties T 5.93
- ponts, shielding of S 5.14 , S 5.15
- secure configuration of the RAS system S 4.111
- secure installation of the RAS system S 4.110
- selection of a suitable RAS product S 2.186
- selection of a suitable RAS system architecture S 2.185
- unsuitable fitting out of the RAS client operational environment T 4.40
- use of an authentication server within RAS access S 4.113
- use of suitable tunnel protocols for RAS communication S 5.76
- use of the RAS client as RAS server T 5.92
remote administration, secure access mechanisms for S 4.80
remote indication of malfunctions S 1.31
repair S 2.4
replacement procurement plan S 6.14
replay of messages T 5.24
resource management S 2.2 , S 2.3
resources, correct disposal of S 2.13
resources S 2.2 , S 2.3
responsibilities S 2.1
restorability of data backups S 6.22
restrictive granting of access rights to system files S 4.135
restricted IT operation S 6.5
rexec S 5.21
rlogin security mechanisms S 5.20
room allocation, with due regard to fire loads S 1.8
rooms requiring protection S 1.13
routers, misuse of remote-access T 5.61
routing protocols, abuse of T 5.51
rsh security mechanisms S 5.20


© Copyright by
Bundesamt für Sicherheit in der Informationstechnik
last update:
July 2001
home