|
Initiation responsibility: Head of IT Section, IT Security Management
Implementation responsibility: Administrators
The possibilities of configuring an ISDN card in accordance with the area of application involved are almost endless. To ensure proper re-starting (e.g. following a replacement of the ISDN card or the related communications software), it is advisable to document at least the following settings:
In the case of authentication procedures which involve a mutual maintenance of secrecy (e.g. through the use of a password), the secret can also be documented. However, this documentation must only be made available to a small circle of persons, to avoid unwanted disclosure of the secret.
Additional controls:
© Copyright
by Bundesamt für Sicherheit in der Informationstechnik |
July 1999 |