HostedDB - Dedicated UNIX Servers

-->
IT Baseline Protection Manual S 2.68 Implementation of security checks by the peer-to-peer network users

S 2.68 Implementation of security checks by the peer-to-peer network users

Initiation responsibility: Head of IT Section, IT Security Management

Implementation responsibility: IT-user

As the major security measures in a Peer-to-Peer network can only be checked on a decentralised basis, the users are responsible for implementing security checks of this kind. The following checks should thus be carried out by the users at appropriate intervals:

For example:

In the event that unauthorised access by a computer to a directory or the printer is displayed, share is to be withdrawn. Any pending printing jobs can be interrupted using the print manager. The various actions are documented in the event protocol (see next illustration). In the event of unauthorised access to the output file, this should also be interrupted. It is recommended, however, to copy the contents of the window of the Network Monitor to the clipboard with the Print key as access to the output file is not documented.

It should be checked on a weekly basis, for example, whether unauthorised users accessed shared directories, whether there were errors in accessing shared directories or whether the system was started at unusual times. As these protocol data also contain person-related data, they should be deleted after assessment if storage is no longer required.

Example for a possible incident protocol:

A check of the allocation of rights is not possible in a Peer-to-Peer network directly as the person who knows the valid password also has the relevant rights. Only by using the complicated password change process can a consistent distribution of rights be ensured.

Additional controls:


© Copyright by
Bundesamt für Sicherheit in der Informationstechnik
July 1999
home