HostedDB - Dedicated UNIX Servers

-->
IT baseline protection manual

IT Baseline Protection Manual - Index

A B C D E F G H I j K L M N O P R S T U V W X Z


sabotage T 1.12
safety doors S 1.10
screen lock S 4.2
secondary power supply S 1.56
secure configuration of mail clients S 5.57
secure configuration of TCP/IP network administration under Windows NT S 5.42
secure remote maintenance via modem S 5.33
secure shell S 5.64
security check
- of the network S 5.8
- Regular security checks of the Unix system S 4.26
security flaws involved in integrating DOS PCs into a server-based network T 2.23
security function in application programs S 4.30
security functionality in IT applications S 4.42
security incidents
- detection measures S 6.67
- escalation strategy for security incidents S 6.61
- escalation strategy S 6.61
- evaluation S 6.66
- inappropriate handling of T 2.62
- investigation and assessment S 6.63
- notification of the parties affected S 6.65
- procedural rules and reporting channels S 6.60
- remedial action S 6.64
- specification of priorities S 6.62
- specification of responsibilies for dealing with S 6.59
- testing effectiveness of management system S 6.68
security policy S 2.39
security weaknesses, obtaining information about S 2.35
segmentation, lack of or unsuitable T 3.29
segmentation, physical S 5.61
selection of a suitable application gateway S 2.75
selection of a suitable backbone technology S 5.60
selection of a suitable network management protocol S 2.144
selection of a suitable site S 1.16
sendmail security mechanisms S 5.19
Separation of functions S 2.5 , S 2.6
server console S 5.11
Services and counselling for IT users T 2.12
single-user mode and monitor, access control to S 4.18
SMTP, Simple Mail Transfer Protocol S 5.39
software acceptance and approval S 2.62
software inventory S 2.10
software test with production data T 2.29
software vulnerabilities T 4.8
Source Routing, abuse of T 5.49
Spamming, protection from S 5.54
staff council S 2.40
standard software
- Installation and configuration of standard software S 2.87
- approval of S 2.85
- determining responsibilies S 2.79
- developing a test plan for S 2.82
- installation and configuration of S 2.87
- test of S 2.83
standard workstation S 2.69
standards S 1.1
storms T 1.13
strategy for the network system and management system is not laid down or insufficient T 2.60
substitution arrangements S 3.3
suitable logical segmentation S 5.62
supervising or escorting outside staff/visitors S 2.16
supply facilities S 1.2
system configuration, documentation of S 2.25
system failure T 1.2
system integrity, procedural rules after loss of S 6.31
system management
- Developing a system management strategy S 2.169
- Requirements to be met by a system management system S 2.170
- secure installation of a system management system S 4.91
- secure operation of a system management system S 4.92


© Copyright by
Bundesamt für Sicherheit in der Informationstechnik
last update:
July 2001
home